Iso 27002 Audit Sample7
Iso 27002 Audit Sample7
Iso 27002 Audit Sample7
CTRL Do you make sure that background verifications comply with all Y N X
relevant laws and regulations and with all relevant ethical standards?
GUIDE Do you respect all relevant legislation when you do background checks? Y N X
GUIDE Did you define background verification criteria and clarify limitations? Y N X
PART 7 COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED. PAGE 23
ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL
GUIDE Do you clarify what must be done when problems are discovered? Y N X
GUIDE Do you clarify what must be done when screening isnt completed? Y N X
GUIDE Do you do more detailed checks for both new hires and promotions? Y N X
PART 7 COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED. PAGE 24
ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL
GUIDE Do you ensure that agreements comply with your security policies? Y N X
GUIDE Do you clarify copyright and data protection laws (18.1.2, 18.1.4)? Y N X
GUIDE Do you clarify the actions and legal steps that will be taken (7.2.3)? Y N X
GUIDE Do you tell job candidates that they will be expected to sign agreements? Y N X
GUIDE Do you clarify their specific duties during the pre-employment process? Y N X
GUIDE Do you explain that obligations may continue after job ends (see 7.3)? Y N X
GUIDE Do you ensure that agreements are signed before access is allowed? Y N X
GUIDE Do you ensure that terms and conditions are appropriate to the job? Y N X
GUIDE Do you ensure that they agree with your terms and conditions? Y N X
PART 7 COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED. PAGE 25
ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL
CTRL Do you make sure that your managers require all employees to apply Y N X
your organizations information security policies and procedures?
CTRL Do you make sure that your managers require all contractors to apply Y N X
your organizations information security policies and procedures?
GUIDE Do you clarify security roles and responsibilities before allowing access? Y N X
GUIDE Do you expect all personnel to use the appropriate work methods? Y N X
GUIDE Do you expect managers to ensure that all personnel are competent? Y N X
GUIDE Do they ensure that people have the right skills and qualifications? Y N X
GUIDE Do they ensure that people continue to have the right knowledge? Y N X
GUIDE Do you expect people to report security policy and procedure violations? Y N X
PART 7 COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED. PAGE 26
ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL
CTRL Do you make sure that employees are aware of your security policies Y N X
and procedures and are kept up-to-date with the latest changes?
CTRL Do you make sure that employees receive the information security Y N X
training and education they need to properly carry out their jobs?
CTRL Do you make sure that contractors are aware of your security policies Y N X
and procedures and are kept up-to-date with the latest changes?
CTRL Do you make sure that your organizations contractors receive the Y N X
GUIDE Did you ensure that the program complies with your security policies? Y N X
GUIDE Did you ensure that the program complies with your security procedures? Y N X
GUIDE Did you design and plan an information security awareness program? Y N X
GUIDE Did you think about the jobs people do and what you expect from them? Y N X
GUIDE Did you think about what employees should know about security? Y N X
GUIDE Did you think about what contractors should know about security? Y N X
GUIDE Did you think about what your awareness program should discuss? Y N X
GUIDE Did you think about your organizations specific security obligations? Y N X
GUIDE Did you think about what kinds of information should be protected? Y N X
GUIDE Did you think about your organizations information security controls? Y N X
GUIDE Did you think about your current information security controls? Y N X
GUIDE Did you think about newly adopted information security controls? Y N X
GUIDE Did you think about how your awareness program should be delivered? Y N X
PART 7 COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED. PAGE 27
ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL
GUIDE Did you consider using booklets and newsletters to raise awareness? Y N X
GUIDE Did you think about how awareness activities should be scheduled? Y N X
GUIDE Do you schedule activities for people with new roles or positions? Y N X
GUIDE Do you provide training before people start their new jobs? Y N X
GUIDE Do you use your awareness program to talk about information security? Y N X
GUIDE Do you discuss the need to be accountable for actions and inactions? Y N X
GUIDE Do you talk about relevant information security rules and regulations? Y N X
GUIDE Do you explain why they must be familiar with rules and regulations? Y N X
GUIDE Do you explain why they must comply with rules and regulations? Y N X
GUIDE Do you explain why they must comply with security policies? Y N X
GUIDE Do you explain why they must comply with security legislation? Y N X
PART 7 COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED. PAGE 28
ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL
GUIDE Do you explain why they must comply with security regulations? Y N X
GUIDE Do you explain why they must comply with security agreements? Y N X
GUIDE Do you explain why they must comply with security standards? Y N X
GUIDE Do you explain why they must comply with security contracts? Y N X
GUIDE Do you teach people about the information that must be protected? Y N X
GUIDE Do you teach people about your clear desk and screen policy? Y N X
GUIDE Do you teach people about how they can learn more about security? Y N X
GUIDE Do you explain who they can contact to get more information? Y N X
GUIDE Do you explain how they can access more security resources? Y N X
GUIDE Do you explain where they can get more training materials? Y N X
GUIDE Do you see if it still complies with security policies and procedures? Y N X
PART 7 COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED. PAGE 29
ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL
CTRL Do you communicate your disciplinary process and make sure that Y N X
GUIDE Did you design a formal disciplinary process to handle security breaches? Y N X
GUIDE Did you design a process that treats offenders fairly and correctly? Y N X
GUIDE Did you design a graduated process that requires a measured response? Y N X
GUIDE Do you consider the nature and the gravity of security breaches? Y N X
GUIDE Do you consider how much security training the offender has? Y N X
GUIDE Do you make sure that a breach has occurred before you take action? Y N X
GUIDE Do you use your disciplinary process to deter future security breaches? Y N X
GUIDE Do you make it clear that security violations will not be tolerated? Y N X
CTRL Have you defined information security responsibilities and duties that Y N X
PART 7 COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED. PAGE 30
ISO IEC 27002 2013 INFORMATION SECURITY AUDIT TOOL
GUIDE Do you clarify which legal responsibilities remain valid after termination? Y N X
GUIDE Do you clarify how long security requirements are valid (7.1.2)? Y N X
GUIDE Do you clarify information security responsibilities when job duties change? Y N X
GUIDE Do you identify old responsibilities still valid after job duties change? Y N X
Answer each of the above questions. Three answers are possible: Y (yes), N (no), and X (eXclude). Y means you're in compliance,
N means you're not in compliance, while X means that this question can be excluded because its not applicable in your situation.
Y answers and X answers require no further action, while N answers point to security practices that need to be followed and
security controls that need to be implemented. Also, please use the column on the right to record your notes, and in the spaces
below, enter the name and location of your organization, who completed this page, who reviewed it, and the dates.
PART 7 COPYRIGHT 2014 BY PRAXIOM RESEARCH GROUP LIMITED. ALL RIGHTS RESERVED. PAGE 31