ISO 27001 Internal Audit Checklist Aymen Bentijani 1750053285
ISO 27001 Internal Audit Checklist Aymen Bentijani 1750053285
By Aymen Bentijani
ISO 27001:2022 Internal Audit Checklist
Purpose
This checklist is designed to assist internal auditors in evaluating compliance with ISO
27001:2022 requirements. It covers all mandatory clauses (4-10) and provides
s
ce
guidance for assessing the implementation and effectiveness of the Information
vi
Security Management System (ISMS).
r
Se
Instructions for Use
ity
1. Complete all sections of the checklist
c ur
se
Has the
organization
determined
external and
internal
issues
relevant to its
purpose and
that affect its
ability to
achieve the
intended
outcome(s) of
its ISMS?
Is there a
process to
s
monitor and
ce
review
vi
information
r
Se
about these
ity
external and
internal c ur
issues?
se
er
yb
Has the
Be
organization
en
determined
m
interested
Ay
parties
relevant to
the ISMS?
Has the
organization
determined
the
requirements
of these
interested
parties
relevant to
information
security?
Has the
organization
determined
which of
these
requirements
will be
s
addressed
ce
through the
vi
ISMS?
r
Se
Is there a
ity
process to
monitor and
c ur
se
review
er
information
yb
about these
-C
interested
ni
parties and
a
their relevant
n tij
requirements?
Be
en
Has the
organization
determined
the
boundaries
and
applicability of
the ISMS to
establish its
scope?
s
ce
parties (4.2)?
vi
r
Se
Has the scope
considered
ity
interfaces and
dependencies
c ur
se
between
er
activities
yb
performed by
-C
the
organization
ani
and those
tij
performed by
n
Be
other
organizations?
en
m
Is the scope
Ay
available as
documented
information?
Has the
organization
established,
implemented,
maintained,
and
continually
improved an
ISMS in
accordance
with ISO
s
ce
27001:2022?
vi
r
Se
Has the
organization
ity
determined
the processes
c ur
se
needed for
er
their
-C
application
ni
throughout
a
the
n tij
organization?
Be
Has the
en
organization
m
determined
Ay
the
interactions
of these
processes?
Has top
management
demonstrated
leadership and
commitment
to the ISMS?
Has top
management
s
ce
ensured the
vi
information
r
Se
security policy
and objectives
ity
are
established
c ur
se
and
er
compatible
yb
with the
-C
strategic
ni
direction?
a
tij
Has top
n
Be
management
ensured
en
integration of
m
Ay
ISMS
requirements
into the
organization’s
processes?
Has top
management
ensured
resources
needed for the
ISMS are
available?
Has top
management
communicated
the
importance of
effective
information
security
management?
s
ce
Has top
vi
management
r
Se
ensured the
ISMS achieves
ity
its intended
outcome(s)?
c ur
se
er
Has top
yb
management
-C
directed and
supported
ani
persons
tij
contributing
n
Be
to the ISMS?
en
Has top
m
management
Ay
promoted
continual
improvement?
Has top
management
supported
other relevant
management
roles to
demonstrate
their
leadership?
5.2 Policy
Has top
management
established an
s
information
ce
security policy
vi
appropriate to
r
Se
the
ity
organization?
Does the
c ur
se
policy include
er
information
yb
security
-C
objectives or
ni
provide a
a
framework for
n tij
setting
Be
objectives?
en
Does the
m
Ay
policy include
a commitment
to satisfy
applicable
requirements?
Does the
policy include
a commitment
to continual
improvement
of the ISMS?
Is the policy
available as
documented
information?
Is the policy
communicated
within the
organization?
s
ce
Is the policy
vi
available to
r
Se
interested
parties, as
ity
appropriate? c ur
se
Has top
a
tij
management
n
Be
ensured
responsibilities
en
and authorities
m
for relevant
Ay
roles are
assigned and
communicated?
Has top
management
assigned
responsibility
and authority
for ensuring
the ISMS
conforms to
ISO
27001:2022?
Has top
management
assigned
responsibility
and authority
for reporting
on the
s
performance of
ce
the ISMS?
vi
r
Se
Section 3: Planning (Clause 6)
ity
6.1 Actions to address risks and opportunities
c ur
se
er
6.1.1 General
yb
-C
Has the
n
Be
organization
en
planned
actions to
m
Ay
address risks
and
opportunities
considering
issues (4.1)
and
requirements
(4.2)?
Has the
organization
planned how
to integrate
and
implement
these actions
into ISMS
processes?
Has the
organization
planned how
to evaluate
s
the
ce
effectiveness
vi
of these
r
Se
actions?
ity
6.1.2 Information security risk assessment
c ur
se
er
Has the
ni
organization
a
tij
defined and
n
Be
applied an
information
en
security risk
m
assessment
Ay
process?
Does the
process
identify
information
security
risks?
Does the
process
analyze
information
security
risks?
Does the
process
evaluate
information
security
s
risks?
ce
vi
Is the process
r
Se
maintained
ity
as
documented c ur
information?
se
er
yb
Has the
organization
en
defined and
m
applied an
Ay
information
security risk
treatment
process?
Does the
process
select
appropriate
risk
treatment
options?
Does the
process
determine all
controls
needed to
implement
the risk
treatment
options?
s
ce
Has the
vi
organization
r
Se
compared
controls
ity
determined
with those in
c ur
se
Annex A and
er
verified no
yb
necessary
-C
controls were
ni
omitted?
a
tij
Has the
n
Be
organization
produced a
en
Statement of
m
Ay
Applicability
containing
necessary
controls and
justification
for inclusions
and
exclusions?
Has the
organization
formulated
an
information
security risk
treatment
plan?
Has the
organization
obtained risk
owners’
approval of
s
the risk
ce
treatment
vi
plan and
r
Se
acceptance of
ity
residual
risks? c ur
se
Is the risk
er
treatment
yb
process
-C
maintained
ni
as
a
documented
n tij
information?
Be
en
Has the
organization
established
information
security
objectives at
relevant
functions and
levels?
Are the
objectives
consistent with
the information
security policy?
Are the
objectives
measurable (if
practicable)?
s
ce
vi
Do the
r
Se
objectives take
into account
ity
applicable
requirements
c ur
se
and risk
er
assessment
yb
and treatment
-C
results?
ni
Are the
a
tij
objectives
n
Be
communicated?
en
Are the
m
objectives
Ay
updated as
appropriate?
Are the
objectives
maintained as
documented
information?
Has the
organization
determined
what will be
done to achieve
the objectives?
Has the
organization
determined
what resources
will be
required?
Has the
s
ce
organization
vi
determined
r
Se
who will be
responsible?
ity
Has the
c ur
se
organization
er
determined
yb
when
-C
objectives will
be completed?
ani
tij
Has the
n
Be
organization
determined
en
be evaluated?
Ay
When the
organization
determines
the need for
changes to
the ISMS, are
the changes
carried out in
a planned
manner?
7.1 Resources
s
Requirement
ce
N/NA) Observations Improvement Opportunity
vi
r
Has the
Se
organization
ity
determined and
provided
c ur
se
resources
er
establishment,
-C
implementation,
maintenance,
ni
and continual
a
tij
improvement of
n
Be
the ISMS?
en
7.2 Competence
m
Ay
Has the
organization
determined
necessary
competence
of persons
doing work
under its
control that
affects its
information
security
performance?
Has the
organization
ensured
these
persons are
s
competent
ce
on the basis
vi
of education,
r
Se
training, or
ity
experience?
Where
c ur
se
applicable,
er
has the
yb
organization
-C
taken actions
ni
to acquire the
a
necessary
n tij
competence?
Be
Has the
en
organization
m
Ay
evaluated the
effectiveness
of actions
taken?
Does the
organization
retain
appropriate
documented
information
as evidence
of
competence?
7.3 Awareness
Are persons
doing work
under the
s
organization’s
ce
control aware
vi
of the
r
Se
information
ity
security
policy? c ur
se
Are they
er
aware of their
yb
contribution
-C
to the
ni
effectiveness
a
of the ISMS
n tij
and benefits
Be
of improved
en
information
m
security
Ay
performance?
Are they
aware of the
implications
of not
conforming
with ISMS
requirements?
Has the
organization
determined the
need for
internal and
external
communications
relevant to the
ISMS?
Has the
s
ce
organization
vi
determined
r
Se
what to
communicate?
ity
Has the
c ur
se
organization
er
determined
yb
when to
-C
communicate?
ni
Has the
a
tij
organization
n
Be
determined with
whom to
en
communicate?
m
Ay
Has the
organization
determined who
shall
communicate?
Has the
organization
determined the
processes by
which
communication
shall be
effected?
7.5.1 General
Does the
s
ce
ISMS include
vi
documented
r
Se
information
required by
ity
ISO
27001:2022?
c ur
se
er
Does the
yb
ISMS include
-C
documented
information
ni
determined
a
tij
by the
n
Be
organization
as necessary
en
for the
m
effectiveness
Ay
of the ISMS?
When
creating and
updating
documented
information,
does the
organization
ensure
appropriate
identification
and
description?
When
creating and
s
updating
ce
documented
vi
information,
r
Se
does the
ity
organization
ensure c ur
appropriate
se
format and
er
media?
yb
-C
When
ni
creating and
a
updating
n tij
documented
Be
information,
en
does the
m
organization
Ay
ensure
appropriate
review and
approval for
suitability
and
adequacy?
Is
documented
information
required by
the ISMS
controlled to
ensure it is
available and
suitable for
use, where
s
ce
and when it is
vi
needed?
r
Se
Is
ity
documented
information
c ur
se
required by
the ISMS
er
yb
controlled to
-C
ensure it is
adequately
ni
protected?
a
n tij
For control of
Be
documented
en
information,
m
does the
Ay
organization
address
distribution,
access,
retrieval and
use?
For control of
documented
information,
does the
organization
address
storage and
preservation,
including
preservation
of legibility?
For control of
documented
information,
does the
s
organization
ce
address
vi
control of
r
Se
changes?
ity
For control of
documented
c ur
se
information,
er
does the
yb
organization
-C
address
ni
retention and
a
disposition?
n tij
Be
Is
documented
en
information
m
Ay
of external
origin
determined
by the
organization
to be
necessary for
the planning
and
operation of
the ISMS
identified and
controlled?
Is
documented
information
maintained
as evidence
of conformity
protected
from
unintended
s
alterations?
ce
vi
r
Se
Section 5: Operation (Clause 8)
ity
8.1 Operational planning and control c ur
se
Status (C/P/ Evidence/ Nonconformity/
Requirement
er
Has the
organization
ni
planned,
a
tij
implemented
n
and
Be
controlled
en
processes
m
needed to
Ay
meet
information
security
requirements?
Has the
organization
established
criteria for the
processes?
Has the
organization
implemented
control of the
processes in
accordance
with the
criteria?
Does the
organization
keep
s
documented
ce
information
vi
r
to the extent
Se
necessary to
ity
have
confidence
c ur
se
that the
er
processes
yb
have been
-C
carried out as
planned?
ani
tij
Does the
n
organization
Be
control
en
planned
m
changes and
Ay
review the
consequences
of unintended
changes,
taking action
to mitigate
any adverse
effects, as
necessary?
Does the
organization
ensure that
outsourced
processes are
determined
and
controlled?
s
Requirement
ce
N/NA) Observations Improvement Opportunity
vi
r
Does the
Se
organization
ity
perform
information
c ur
se
security risk
er
assessments
yb
at planned
-C
intervals or
when
ni
significant
a
tij
changes are
n
Be
proposed or
occur?
en
m
Does the
Ay
organization
retain
documented
information
of the results
of the
information
security risk
assessments?
Does the
organization
implement
the
information
security risk
treatment
plan?
Does the
organization
s
ce
retain
vi
documented
r
Se
information
of the results
ity
of the
information
c ur
se
security risk
er
treatment?
yb
-C
Has the
organization
evaluated the
information
security
performance
and the
effectiveness
of the ISMS?
Has the
organization
determined
what needs to
be monitored
and
measured,
including
information
security
processes and
controls?
s
ce
Has the
vi
r
organization
Se
determined
ity
the methods
for
c ur
se
monitoring,
er
measurement,
yb
analysis and
-C
evaluation to
ensure valid
ni
results?
a
n tij
Has the
Be
organization
en
determined
m
when the
Ay
monitoring
and
measuring
shall be
performed?
Has the
organization
determined
who shall
monitor and
measure?
Has the
organization
determined
when the
results from
monitoring
and
measurement
shall be
s
analyzed and
ce
evaluated?
vi
r
Se
Has the
organization
ity
determined
who shall
c ur
se
analyze and
er
evaluate these
yb
results?
-C
Does the
ani
organization
tij
retain
n
Be
appropriate
documented
en
information
m
Ay
as evidence of
the
monitoring,
measurement,
analysis and
evaluation
results?
9.2.1 General
Does the
organization
conduct
internal
audits at
planned
intervals to
provide
s
ce
information
on whether
vi
r
the ISMS
Se
conforms to
ity
the
organization’s
c ur
se
own
er
requirements
yb
and the
-C
requirements
of ISO
ani
27001:2022?
n tij
Be
Does the
organization
en
conduct
m
internal
Ay
audits at
planned
intervals to
provide
information
on whether
the ISMS is
effectively
implemented
and
maintained?
Has the
organization
planned,
established,
s
ce
implemented
vi
and maintained
r
Se
an audit
programme,
ity
including
frequency,
c ur
se
methods,
er
responsibilities,
yb
planning
-C
requirements
and reporting?
ani
tij
programme
take into
en
consideration
m
the importance
Ay
of the
processes
concerned and
the results of
previous
audits?
Has the
organization
defined the
audit criteria
and scope for
each audit?
Does the
organization
select auditors
and conduct
audits to
ensure
objectivity and
impartiality of
s
the audit
ce
process?
vi
r
Se
Does the
organization
ity
ensure that the
results of the
c ur
se
audits are
er
reported to
yb
relevant
-C
management?
ani
Does the
tij
organization
n
Be
retain
documented
en
information as
m
Ay
evidence of the
implementation
of the audit
programme
and the audit
results?
Does top
management
review the
organization’s
ISMS at planned
intervals to
ensure its
continuing
suitability,
adequacy and
effectiveness?
s
ce
vi
Does the
r
Se
management
review include
ity
consideration of
the status of
c ur
se
actions from
er
previous
yb
management
-C
reviews?
ani
Does the
tij
management
n
Be
review include
consideration of
en
changes in
m
external and
Ay
internal issues
relevant to the
ISMS?
Does the
management
review include
consideration of
feedback on the
information
security
performance,
including trends
in
nonconformities
and corrective
actions,
monitoring and
measurement
results, audit
results, and
fulfillment of
s
information
ce
security
vi
r
objectives?
Se
ity
Does the
management c ur
review include
se
consideration of
er
feedback from
yb
interested
-C
parties?
ani
Does the
n tij
management
Be
review include
en
consideration of
m
results of risk
Ay
assessment and
status of risk
treatment plan?
Does the
management
review include
consideration of
opportunities
for continual
improvement?
Do the outputs
of the
management
review include
decisions
related to
continual
improvement
opportunities
s
and any needs
ce
for changes to
vi
the ISMS?
r
Se
Does the
ity
organization
retain
c ur
se
documented
er
information as
yb
evidence of the
-C
results of
ni
management
a
reviews?
n tij
Be
When a
nonconformity
occurs, does the
organization
react to the
nonconformity
When a
nonconformity
occurs, does the
organization
deal with the
consequences?
Does the
organization
s
ce
evaluate the
vi
need for action
r
Se
to eliminate the
causes of
ity
nonconformity
by reviewing the
c ur
se
nonconformity,
er
determining the
yb
causes, and
-C
determining if
ni
similar
a
nonconformities
n tij
exist or could
Be
potentially
en
occur?
m
Ay
Does the
organization
implement any
action needed?
Does the
organization
review the
effectiveness of
any corrective
action taken?
Does the
organization
make changes
to the ISMS, if
necessary?
Are corrective
actions
appropriate to
the effects of
the
nonconformities
s
encountered?
ce
vi
Does the
r
Se
organization
ity
retain
documented c ur
information as
se
evidence of the
er
yb
nature of the
-C
nonconformities
and any
ni
subsequent
a
tij
actions taken,
n
of any
en
corrective
m
action?
Ay
Does the
organization
continually
improve the
suitability,
adequacy
and
effectiveness
of the ISMS?
s
1. Is the control implemented as described in the SoA?
ce
2. Is the control operating effectively?
vi
r
3. Is there evidence to demonstrate control implementation and effectiveness?
Se
ity
Note: Detailed assessment of Annex A controls should be conducted using a separate
ur
checklist that covers all 93 controls across the four categories (Organizational,
c
People, Physical, and Technological).
se
er
Audit Summary
yb
-C
Strengths Identified
ani
1.
n tij
2.
Be
3.
en
m
Nonconformities Identified
Ay
1.
2.
3.
1.
2.
3.
Recommendations
Audit Information
s
ce
Approval
vi
r
Se
This Internal Audit Report has been reviewed and approved by:
ity
Name: ________________________ Position: ______________________ Date:
_________________________ Signature: _____________________
c ur
se
er
yb
-C
ani
n tij
Be
en
m
Ay