How to conduct internal and external ISO 27001 audits?
The ISO 27001 certification process is a rigorous and lengthy one that involves continuous audits and evaluations. There are two main types of ISO 27001 audits that an organisation can undertake: internal audits and external audits.
An internal audit is necessary for compliance regardless of whether or not an organisation is looking to be certified. However, an external audit is required for certification. Organisations must hire third-party Certification Bodies (CB) with competent auditing resources to perform external audits in accordance with ISO 27001 standards.
Let’s take a look at how both internal and external audits are conducted.
ISO 27001 internal audit
An ISO 27001 internal audit is a detailed review of your organisation's ISMS to ensure that it fulfils the certification criteria. In contrast to a certification review, this audit is carried out by your own employees, and the results will be used to steer the development of your ISMS.
It is important to note that audits can be performed by a hired provider if the organisation lacks in-house auditors who are both skilled and objective. "2nd party audits" are commonly used, since the supplier functions as an "inside resource" for the customer.
What are the steps in an internal ISO 27001 audit?
When getting certified, especially for the first time, the internal audit ensures everything is set up correctly for you to pass on your first attempt. Use an internal audit checklist to keep track of the necessary steps in the process. Here's a rundown of the steps in an internal audit:
1) Plan the internal audit
Careful planning is critical for a fool-proof process. It will serve as your roadmap and help you prepare for unforeseen obstacles.
-
Create your audit plan: Initiate the internal audit process by developing a comprehensive audit plan. This document outlines the scope, objectives, and methodologies for the audit. It serves as a blueprint for the entire audit, ensuring a systematic and thorough examination of ISMS.
-
Update the audit plan if needed: Flexibility is key in the audit planning phase. Regularly review and update the audit plan to accommodate organisational processes, risks, or regulatory requirement changes. This ensures that the audit remains relevant and effective in addressing current information security concerns.
2) Conduct the internal audit
It's time for action. Once the audit planning is in place, the next crucial phase in the ISO 27001 internal audit process is the actual execution of the audit. Conduct your internal audit by following these steps:
-
Identify the control owners: Identify and engage with control owners who are responsible for specific aspects of the ISMS. Establish clear communication channels to streamline the audit process.
-
Decide on your audit approach: Choose a suitable audit approach aligned with the audit objectives. Whether through interviews, document reviews, or observations, tailor the approach to the unique characteristics of the ISMS and organisational operations.
-
Contact the control owners: Initiate communication with control owners to inform them about the impending audit. Discuss the audit scope, objectives, and the specific controls to be assessed.
-
Arrange the audit meeting: Coordinate with control owners to schedule the audit meeting. This serves as a platform to set expectations, discuss the audit plan, and address initial queries or concerns.
-
Conduct your first meeting: Reiterate audit objectives and scope during the initial meeting. Outline the audit process timeline and clarify roles and responsibilities.
-
Perform the audit: Execute the audit according to the established plan and approach. Utilise selected methods to assess controls, ensuring a thorough examination of processes, documentation, and evidence.
-
Perform documentation review and collect evidence: Examine relevant documents to assess compliance with ISO 27001 requirements. Systematically collect evidence to substantiate findings, providing a basis for audit results.
-
Perform process review and collect evidence: Evaluate the effectiveness of processes related to information security. Identify gaps or areas for improvement and gather evidence to support observations.
-
Discuss steps after the audit meeting: Engage in a post-audit discussion with control owners to review findings and gather insights.
3) Report your audit findings
After the internal audit is completed, the next critical phase is to communicate the findings to key stakeholders, such as the auditee and management review team.
-
Report to the auditee: Communicate the audit findings transparently, highlighting strengths and areas for improvement within the ISMS while showing a proactive approach to address vulnerabilities.
-
Report to the management review team: Submit a concise report outlining key audit observations and recommendations, enabling informed decision-making and resource allocation to enhance the organisation's overall information security posture.
4) Update the incident and corrective action log
Regularly add new incidents and actions to a log, keeping it current and serving as a central hub for tracking issues identified during the audit, ensuring a proactive approach to resolving and preventing similar problems.
5) Update the audit schedule
Continuously refine the audit schedule based on the outcomes of the internal audit, adjusting it to reflect changes in priorities, risks, or organisational processes. This will ensure that future audits remain pertinent and effective in addressing emerging information security challenges.