How to Conduct an ISO/IEC 27001 Internal Audit?

Introduction

An internal audit shows whether your ISMS works in real life. It tells you what is in control, what drifts, and what to fix before the certification audit. Done well, it is a short, focused check that builds trust across teams.

Why the internal audit matters?

It gives leadership facts not guesses. It tests controls where risk is highest. It keeps the Statement of Applicability honest and the risk register alive. It also proves that you check your own work, not just write policies.

What to have on hand?

ISMS scope, policy, risk assessment, risk treatment plan, Statement of Applicability, asset list, data flows, procedures, training logs, access reviews, change records, backup and restore proof, incident tickets, supplier due diligence, business continuity tests, internal metrics, last audit report and action status.

Step by step

  1. Plan a risk-based program
    Map high risk areas first. Identity and access, change, incident response, supplier control, backups, and logging often carry the most weight.

  2. Prepare your checklist
    Tie each question to a clause or an Annex A control from the 2022 edition. Keep questions short. Ask for evidence, not opinions.

  3. Hold a brief opening
    Confirm scope, timing, rules, and how findings will be graded. Set a friendly tone. You are there to learn, not to police.

  4. Collect evidence
    Sample records. Look at dates, owners, approvals, and completeness. Follow a real ticket from start to finish so the chain is clear.

  5. Interview and observe
    Speak with people who do the work. Watch how they handle access, changes, incidents, or supplier onboarding. Check that what is done matches what is written.

  6. Test key controls

  • Access: sample joiners, movers, leavers, admin rights, MFA, reviews

  • Changes: approvals, testing, separation of duties, emergency changes

  • Logging: what is logged, retention, alerting, who reviews it

  • Backups: frequency, scope, off-site copy, test restores

  • Incidents: detection, triage, lessons learned, action follow up

  • Crypto: key management, storage, rotation, revocation

  • Supplier: due diligence, contracts, SLAs, reports, exit plans

  • Continuity: RTOs and RPOs, test evidence, lessons applied

  1. Evaluate against criteria
    Mark conformities, observations, and nonconformities with clear evidence and clause references. No vague wording.

  2. Close with owners
    Share what you saw, agree facts, and outline next steps and dates.

  3. Report
    Write a short report. Scope, team, dates, samples taken, findings with evidence, and a summary view of ISMS health.

How Pacific Certifications can help?

We provide accredited ISO/IEC 27001 certification audits. If you need an independent internal audit, use trained internal staff or an external provider separate from your certification body. When you are ready for Stage 1 and Stage 2, we audit with a focus on real practice and clean proof.

Read more: How to Conduct an ISO 27001 Internal Audit

Comments

Popular posts from this blog

How to Identify and Address ISO 9001 Non-Conformities

ISO 14641:2018

ISO certifications in East Germany (German Democratic Republic) and how Pacific Certifications can help