Unit 3
Unit 3
Unit 3
Introduction to ISMS Auditing, Planning and Conducting ISMS Audits Internal vs. ,
External Audits, Audit Reporting and Follow-Up, Corrective and Preventive Actions,
Compliance Audits and Certification Process, Challenges and Pitfalls in ISMS
Auditing, Maintaining ISMS Certification, Case Studies and Best Practices in ISMS
Auditing
Introduction to ISMS Auditing
• An ISMS audit enables the review of an organization’s ISMS by an objective and competent
auditor. It tests the components of the ISMS based on standard requirements mandated
by the International Organization for Standardization (ISO).
• You can compare it to an evaluation of a building’s physical security. An ISMS audit, like the
physical security audit, tests how well the system works against all threats.
• An ISMS internal audit should ideally be performed every six months but can be conducted
once a year. External ISMS audits conducted by ISO-certified agencies, meanwhile, should
be performed every three years for certification.
Why Is an ISMS Audit Necessary?
.
An ISMS audit tests all the elements of an ISMS according to standard requirements. It is
necessary because:
• All organizations need insights to determine how well the ISMS can meet its needs and
business goals.
• It measures how efficient and practical the organization’s policies and procedures are.
• It also enables organizations to take note of positive findings to ensure they are
maintained and further developed for continual improvement.
• The benefits of conducting an ISMS audit include ensuring ISO 27001 standard
compliance, spotting process-related inefficiencies, identifying good practices that can be
replicated, looking for potential areas of improvement, and ensuring adherence to all
applicable regulations apart from the ISO 27001 standard.
• An ISMS audit has five stages—scoping and pre-audit survey, planning and preparation,
fieldwork, analysis, and reporting.
Certification process
Create a project plan: Educating yourself on ISO 27001 standards
and its 114 controls is a key part of this process. A great place to
start is our in-depth guide to ISO 27001.
Clause 9.2.2 also specifies you must “plan, establish, implement and maintain an audit
programme(s), including the frequency, methods, responsibilities, planning requirements
and reporting”.
conti….
Steps to make your internal audit a success:
1. Scoping and pre-audit survey:
As audits are conducted on a sampling basis, your auditor must take a representative sample
to give a reliable picture of your ISMS. That said, higher-risk processes or controls will be
more frequently audited.When you set the scope for the audit, take the above into account.
During the pre-audit survey, the auditor should also identify and contact the person(s)
responsible to request copies of documentation they’ll review during the audit.
Conti…..
2. Planning and preparation: This involves generating an ISMS audit workplan, which settles
the timing and resourcing of the audit (agreed with management). Conventional project
planning charts, such as Gantt, may prove helpful.
Audit plans identify and put boundaries around the remaining phases of the audit, and often
include ‘checkpoints’ that detail specific opportunities for auditors to provide informal
interim updates to managers.Such updates allow:
• Auditors to raise concerns about access to information or people; and
• Management to raise concerns regarding the audit process.
Specify the timing of important audit work so you can prioritise aspects you believe pose the
greatest risk, should a nonconformity be raised.
• An introduction clarifying the scope, objectives, timing and extent of the work
performed;
• An executive summary providing the key findings, a brief analysis and a conclusion;
• The intended report recipients and, where appropriate, guidelines on classification and
circulation;
• Detailed findings and analysis;
• Conclusions and recommendations; and
• A statement from the auditor detailing recommendations for scope limitations.
The draft audit report should be presented to and discussed with management.
Further review and revision may be necessary, because the final report generally
involves management committing to an action plan.
Corrective and Preventive Action
What is preventive action?
Preventive action is taken to fix the cause of a process problem before it
can happen. A preventive action (PA) definition in a management system
could be: “the activities taken by the organization to eliminate the cause of
a potential process nonconformity.” If you are identifying potential problems
that could happen in a process, assessing what could cause these
problems, and taking action to prevent the problem from occurring before it
happens, then you are taking preventive action.
What is corrective action?
Corrective action (CA) is the activities taken to eliminate the cause of a
process nonconformity. Corrective action is the activity of reacting to a
process problem, getting it under control through containment actions, and
then taking the action needed to stop it from happening again. Earlier
versions of ISO 9001 made the distinction that CA will prevent the
recurrence of a problem, but PA will prevent the occurrence of the problem.
Corrective and Preventive Action
conti…
Difference Between Corrective and Preventive Action:
The difference between corrective and preventive action is that corrective aims to stop current
issues such as nonconformance from recurring while preventive aims to prevent potential
issues from occurring entirely by eliminating the root cause.
Challenges and Pitfalls in ISMS
Not Performing a Robust Risk Assessment and Analysis:
A robust risk assessment process is key to any successful ISMS deployment. This critical step
helps you uncover any security weaknesses that may be present in your current system, as well
as prioritize which risks are most important and need to be addressed first.
Lacking Top Management Support and Commitment:
Management must understand and accept responsibility for leading the
development and implementation of an ISMS, as well as commit to
sustaining its full lifecycle. It's also important for their role in promoting a
culture of security throughout the organization. That means ensuring
employees understand the objectives and goals of your ISMS and have a
buy-in, too
Poorly Defining ISMS Scope and Exclusions: No two
organizations have exactly the same system, every system is unique, so it's
important to establish clear boundaries of which systems, processes and
personnel are covered by the ISMS. Clearly defining these criteria will help
Challenges and pitfalls in ISMS conti…
• Not Monitoring, Measuring and Reviewing ISMS Performance
It’s all too easy to set and forget an information security management system, but that’s a
surefire recipe for failure. Without regular monitoring, measuring and reviewing of your ISMS
performance, your security measures won’t be as effective as they could be
• Choosing the right tool
• Adapting standards to reality
• Disregarding Vulnerability Management and Patching
• Inadequate Resource Allocation: People, Technology and Budget