? #???????? - ???? ???????? ????? ?????????
? #???????? - ???? ???????? ????? ?????????
AUDIT
CHECKLIST -
ISO 27001-2022
☐ Have we determined internal and external issues that will impact on our information security
management system? “NO/YES”
☐ Have we determined which stakeholder requirements are addressed through the information
security management system? “NO/YES”
Interested Parties
☐ Have we determined what internal and external interested parties are relevant to the information
security management system and what their requirements are? “NO/YES”
Scope
Leadership
Leadership and Commitment
☐
Can we demonstrate top management is providing leadership and commitment to the
information security management system? “NO/YES”
☐ Have we determined the information security risks and opportunities related to our
organization? “NO/YES”
Statement of Applicability
☐ Have we documented a risk treatment plan and Statement of Applicability with regard to controls?
“NO/YES”
Planning of changes
☐ Are changes to the information security management system carried out in a manner that is planned? “NO/YES”
Support
Resources
☐ Have we determined and ensured necessary resources are in place for the information security
management system? “NO/YES”
Competence
☐ Do we ensure competence of personnel? “NO/YES”
☐ Have we determined processes for internal and external communication relevant to information
security? “NO/YES”
Control of Documents
Operations
Operational Planning and Control
☐ Have we established and maintained procedures to meet the requirements of the information security
management system? “NO/YES”
☐ Have we established criteria for processes, and do we maintain control of the processes in accordance
with these criteria? “NO/YES”
Risk Assessment
☐ Do we assess risk at planned intervals and when significant changes occur, and do we maintain records?
“NO/YES”
Risk Treatment
☐ Do we monitor things such as processes, operational controls, access, usage, change? “NO/YES”
☐
Do we plan and conduct internal audits to ensure the information security system conforms to
requirements and is implemented effectively? “NO/YES”
☐
Does our top management review our information security management system at planned intervals?
“NO/YES”
☐
Do we include decisions relating to continual improvement and any need for changes in the
documented results of the management reviews? “NO/YES”
Improvement
Continual Improvement
☐
Do we review the effectiveness of corrective action taken and use this knowledge to make changes or
improvements to the information security management system? “NO/YES”
5.25 Assessment and decision on Assessing information security events to determine if they
information security events are to be categorised as information security incidents
8.11 Data masking Masking data as appropriate and in accordance with the
organisation’s access control policy and other relevant
legislation
8.12 Data leakage Applying measures to systems, networks, and any other devices
prevention that process, store, or transmit
sensitive data to prevent leakage of data
8.13 Information backup Maintaining backup copies of information, software, and
systems
8.14 Redundancy of Implementing sufficient redundancy in information
information processing processing systems to meet availability requirements
facilities
8.15 Logging Producing, storing, protecting, and analysing logs that record
activities, exceptions, faults, and other
relevant events
8.16 Monitoring activities Monitoring networks, systems, and applications for unusual
behaviour and taking appropriate actions to
evaluate potential for information security events
8.17 Clock synchronisation Synchronising clocks of information processing
systems to approve time sources
8.18 Use of privileged Restricting the use of utility programs that can
utility override system and application controls
programs
8.19 Installation of Implementing procedures to securely manage installation of
software on operational software on operational systems
systems
8.20 Networks security Securing, managing, and controlling networks and network
devices to protect information in systems and applications
STAY TUNED