ISO 27001 Internal Audit: Step-by-Step Guide
Compliance Governance
Knowledge Hub
Certification
ISO

ISO 27001 Internal Audit: Step-by-Step Guide

Bartek Hamerliński
8 min read

TL;DR

ISO 27001 internal audits are mandatory systematic assessments that verify an organization's Information Security Management System compliance and identify improvement areas. The process involves thorough planning to define objectives and scope, followed by developing customized audit checklists that ensure comprehensive coverage of ISO 27001 requirements and organizational security controls.

An ISO 27001 internal audit is a systematic and independent assessment of an organization's Information Security Management System (ISMS) to ensure it conforms to the standard's requirements and to identify areas for improvement. Regular internal audits are a mandatory part of ISO 27001 compliance (Clause 9.2) and provide management with insight into how effectively security controls are implemented. Below, we outline the key phases of an ISO 27001 internal audit – from initial planning through follow-up – and best practices for each step. This guidance is tailored for security professionals, compliance auditors, and IT managers, emphasizing a professional and practical approach.

Audit Planning

Audit planning is the foundation of a successful ISO 27001 internal audit. In this phase, the lead auditor (or audit team) defines the audit's objectives, scope, criteria, and schedule. According to ISO 27001 Clause 9.2, each audit must have defined criteria (e.g. the ISO 27001 requirements and the organization's ISMS policies/procedures) and scope (which locations, departments, and processes are in scope). Key planning activities include:

  • Defining Audit Objectives and Scope: Clearly state what the audit aims to accomplish (e.g., verify compliance with specific ISO controls or assess ISMS effectiveness in certain departments) and which parts of the organization are included. A well-defined scope ensures the audit focuses on relevant systems and assets. The Statement of Applicability (listing which Annex A controls are implemented) is a useful reference for scoping.
  • Establishing Audit Criteria: Determine the benchmarks against which compliance will be judged. These criteria typically include ISO 27001's clauses and controls, as well as the organization's own information security policies, procedures, and legal/regulatory requirements. This gives the auditors a clear reference to check against.
  • Developing an Audit Plan & Schedule: Create a documented plan that outlines the audit activities, timing, and responsibilities. This plan should detail which areas will be audited when, the duration of each audit activity (interviews, document review, site inspection, etc.), and who on the audit team will cover each area. The schedule must be agreed upon with the auditee in advance to minimize disruption to business operations. Sharing the audit plan with the auditee beforehand ensures they can allocate resources and personnel for the audit.
  • Selecting the Audit Team: Assign a competent and independent internal auditor or a team of internal auditors. ISO 27001 requires auditors to be impartial and not audit their own work. For example, an IT manager who maintains the ISMS should not be the one auditing it. Many organizations select certified internal auditors or use cross-department personnel to ensure objectivity. The lead auditor should have a strong understanding of ISO 27001 and audit techniques.
  • Logistics and Confidentiality: Coordinate the practical details such as arranging access to facilities, documents, and interviewees. Identify points of contact in the audited areas and set protocols for communication. Additionally, confirm confidentiality rules – auditors must protect sensitive information they encounter and may require the auditee to sign off on confidentiality agreements. These preliminaries set the stage for a smooth audit execution.

Effective planning is crucial. It ensures that everyone knows what will happen and when, which reduces anxiety and "audit fatigue" among staff. A well-thought-out plan also helps the audit team use time efficiently and cover all necessary requirements. A solid audit plan and checklist provide structure and help prevent oversights during the audit. In short, invest adequate effort in the planning phase to set the ground for a smooth internal ISO audit..

Developing Checklists (Preparation)

Developing an audit checklist is a best practice that significantly enhances the efficiency and consistency of an ISO 27001 internal audit. An audit checklist is essentially a list of questions or checkpoints derived from the audit criteria and tailored to the audit scope. While not mandatory under ISO 27001, checklists are invaluable for ensuring no important aspect is overlooked. They serve as a roadmap for the auditor to evaluate the ISMS against each requirement systematically.

When creating a checklist, consider the following guidelines:

  • Base it on ISO 27001 Requirements and ISMS Documentation: Your checklist questions should cover both the requirements of the ISO 27001 standard, Clauses 4 (Context of the Organization) and Annex A (Controls). For example, include checks like "Does an information security policy exist and does management approve it? (ISO 27001 clause 5.2)" or "Are risk assessments conducted at planned intervals? (clause 6.1)". Aligning the checklist with the organization's own documentation ensures you verify not just theoretical compliance, but actual implementation.
  • Customize to the Audit Scope and Priorities: There is no one-size-fits-all audit checklist. Each audit is different, so tailor your checklist to focus on the areas in scope and any high-risk or previously problematic areas. Sources that help in crafting relevant questions include: the defined audit objectives and scope, results from previous audits, details of the ISMS (asset inventory, risk register, control implementations), applicable regulatory or client requirements, and, of course, the ISO 27001 control set. Using these inputs, an auditor can formulate questions that are directly pertinent to the processes being audited.
  • Ensure Clarity and Logical Flow: Organize the checklist in a logical sequence that will "lead" the auditor through the audit in a sensible order. Group questions by topic (for instance, separate sections for physical security, access control, incident management, etc., or by ISO clause sections) so that the audit isn't jumping randomly between unrelated areas. A coherent structure helps both the auditor and the auditee follow along. One technique is to phrase each point as a clear question and even add a "why" to it – e.g., "What evidence shows that backups are tested regularly? Why is this control important?" This approach ensures the auditor understands the purpose of each question.
  • Estimate Time and Gather Supporting References: While drafting the checklist, estimate the time required to ask each question and examine the evidence. This helps in refining the audit schedule. Also, note references for each question (such as policy names or document IDs) – linking questions to specific documents or ISO clauses will make it easier during fieldwork to locate evidence and will remind the auditor what prompted the question.
  • Include Both High-Level and Detailed Checks: Often, auditors prepare two levels of checklists. A high-level criteria checklist contains broad yes/no questions to quickly assess if major requirements are fulfilled (useful for identifying any big gaps). Then, a more detailed audit checklist breaks down each requirement into granular questions to probe how things are implemented in practice. For example, a criterion question might be "Is there a process for handling information security incidents? (Yes/No)". The detailed questions would then dig into how incidents are reported, tracked, and learned from. Using both types ensures you don't miss wide-scope issues while also examining details.

Remember that preparing a good checklist can be time-consuming, but it pays off. It forces the auditor to thoroughly familiarize themselves with both the standard and the organization's ISMS before the audit begins, which leads to a more effective audit. A properly prepared checklist serves as a guide during fieldwork, helping to maintain focus, especially for less experienced auditors. It's a living tool: don't hesitate to update the checklist as the audit progresses if new information or risks emerge. In summary, the audit checklist serves as a compass, keeping the internal audit on course and ensuring that all critical controls and processes are evaluated methodically.

Ready to Streamline Your Compliance?

Discover how Humadroid can simplify your compliance management process.

Conducting Fieldwork

"Conducting fieldwork" refers to the on-site (or remote) execution of the audit, where auditors collect evidence, evaluate controls in operation, and identify any nonconformities or improvement opportunities. This phase is often the most intensive part of the audit, typically comprising an opening meeting, the audit examination itself, and a closing meeting to finalize the process.

Opening Meeting: The audit kicks off with an opening meeting involving the audit team and the auditee's management and key staff. The purpose of this meeting is to reaffirm the audit plan and ensure everyone has a common understanding of the audit's scope and objectives. The lead auditor introduces the audit team, explains how the audit will be conducted, and confirms logistical details (schedule, who will be interviewed, what areas will be inspected). They also review important ground rules – for example, emphasizing that the audit will remain objective and that evidence will be sample-based (not every record can be checked), and confirming that any sensitive information obtained will be kept confidential. The opening meeting sets a professional tone and encourages cooperation; it's also a chance for the auditee to ask last-minute questions and for both parties to agree on the timing of the closing meeting.

Audit Execution (Fiel...

Ready to Transform Your Compliance Management?

Discover how modern technology can help your organization implement effective compliance solutions.