How to audit ISO 27001 Clause 4.4 – The Information Security Management System (ISMS)

Home / ISO 27001 Tutorials / How to audit ISO 27001 Clause 4.4 – The Information Security Management System (ISMS)

Last updated Dec 5, 2025

Author: Stuart Barker | ISO 27001 Lead Auditor

The ISO 27001 Clause 4.4 audit checklist is designed to help an ISO 27001 Lead Auditor conduct internal audits and external audits of ISO 27001 Clause 4.4 The Information Security Management System (ISMS)

The 10 point ISO 27001 audit plan sets out what to audit, the challenges faced and the audit techniques to adopt.

Establishing the ISMS

Verify that the organisation has documented the ISMS scope, objectives, policies, and procedures. This includes defining the boundaries of the ISMS and its interaction with other business processes.

Challenges

Ensuring the scope is appropriate and doesn’t exclude necessary areas, that objectives are measurable and aligned with business goals, and that policies and procedures are comprehensive and up-to-date. Sometimes, documentation exists but isn’t implemented.

Audit Techniques

Review documented scope, objectives, policies, and procedures. Interview personnel to confirm understanding and application. Examine records of management review and internal audits.

Implementing and operating the ISMS

Check that the documented ISMS is being actively used in day-to-day operations. This involves verifying that controls are implemented and working as intended.

Challenges

Determining the effectiveness of controls in practice, especially where they are complex or rely on human behaviour. Maintaining consistent implementation across the organisation can also be difficult.

Audit Techniques

Observe processes, conduct walkthroughs, and examine records of control implementation (e.g., access logs, change management records). Perform penetration testing or vulnerability scanning where appropriate.

Maintaining and continually improving the ISMS

Confirm that the ISMS is regularly monitored, reviewed, and improved. This includes addressing internal audit findings, management review outputs, and feedback from interested parties.

Challenges

Ensuring continual improvement is more than just maintaining the status quo. Identifying and implementing effective improvements can be difficult, especially when resources are limited.

Audit Techniques

Review records of management review, internal audits, corrective actions, and preventive actions. Interview personnel about their involvement in the improvement process.

Monitoring and measurement

Verify that the organisation has established processes for monitoring and measuring the effectiveness of the ISMS and its controls.

Challenges

Defining appropriate metrics and ensuring they are consistently measured and reported. Using the data effectively to drive improvement can also be a challenge.

Audit Techniques

Examine records of monitoring and measurement activities (e.g., performance reports, incident logs). Interview personnel about how they use the data.

Internal audit

Check that internal audits of the ISMS are conducted regularly to assess its conformity to ISO 27001 and its effectiveness.

Challenges

Ensuring internal audits are conducted objectively and by competent auditors. Following up on audit findings and implementing corrective actions can also be difficult.

Audit Techniques

Review internal audit plans, reports, and follow-up actions. Interview internal auditors and auditees.

Management review

Verify that top management reviews the ISMS at planned intervals to ensure its continuing suitability, adequacy, and effectiveness.

Challenges

Ensuring management review is more than a formality and that it addresses the key issues affecting the ISMS.

Audit Techniques

Review minutes of management review meetings. Interview top management about their involvement in the ISMS.

Continual improvement

Confirm that the organisation is continually improving the effectiveness of the ISMS.

Challenges

Demonstrating that improvements are actually leading to better outcomes.

Audit Techniques

Examine records of improvement initiatives and their impact on the ISMS. Interview personnel about their involvement in the improvement process.

Corrective action

Verify that the organisation has a process for taking corrective action to address nonconformities.

Challenges

Identifying the root cause of nonconformities and implementing effective corrective actions.

Audit Techniques

Review records of corrective actions, including root cause analysis and effectiveness checks.

Interested parties

Check that the organisation considers the needs and expectations of interested parties relevant to information security.

Challenges

Identifying all relevant interested parties and understanding their needs and expectations.

Audit Techniques

Review records of interested party analysis and how their requirements are incorporated into the ISMS. Interview personnel about their interactions with interested parties.

Documented information

Confirm that the ISMS has appropriate documented information to support its operation.

Challenges

Maintaining documented information up-to-date and accessible. Avoiding excessive documentation.

Audit Techniques

Review a sample of documented information (e.g., policies, procedures, records) to ensure it is controlled and up-to-date.

Further Reading

ISO 27001 Clause 4.4 The Information Security Management System

ISO 27001 Clause 4.4 Implementation Checklist

How to conduct an ISO 27001 Internal Audit

ISO 27001 Clause 9.2 Internal Audit

ISO 27001:2022 requirements

ISO 27001 Clauses

ISO 27001 Clause 4.1 – Understanding The Organisation And Its Context

ISO 27001 Clause 4.2 – Understanding The Needs And Expectations of Interested Parties

ISO 27001 Clause 4.3 – Determining The Scope Of The Information Security Management System

ISO 27001 Clause 4.4 – Information Security Management System

ISO 27001 Clause 5.1 – Leadership and Commitment

ISO 27001 Clause 5.3 – Organisational Roles, Responsibilities and Authorities

ISO 27001 Clause 6.1.1 – Planning General

ISO 27001 Clause 6.1.2 – Information Security Risk Assessment

ISO 27001 Clause 6.1.3 – Information Security Risk Treatment

ISO 27001 Clause 6.2 – Information Security Objectives and Planning to Achieve Them

ISO 27001 Clause 6.3 – Planning Of Changes

ISO 27001 Clause 7.1 – Resources

ISO 27001 Clause 7.2 – Competence

ISO 27001 Clause 7.3 – Awareness

ISO 27001 Clause 7.4 – Communication

ISO 27001 Clause 7.5.1 – Documented Information

ISO 27001 Clause 7.5.2 – Creating and Updating Documented Information

ISO 27001 Clause 8.3 – Information Security Risk Treatment

ISO 27001 Clause 9.1 – Monitoring, Measurement, Analysis, Evaluation

ISO 27001 Clause 9.2 – Internal Audit

ISO 27001 Clause 9.3 – Management Review

ISO 27001 Clause 10.1 – Continual Improvement

ISO 27001 Clause 10.2 – Nonconformity and Corrective Action

ISO 27001 Organisation Controls

ISO 27001 Annex A 5.1: Policies for information security

ISO 27001 Annex A 5.2: Information Security Roles and Responsibilities

ISO 27001 Annex A 5.3: Segregation of duties

ISO 27001 Annex A 5.4: Management responsibilities

ISO 27001 Annex A 5.5: Contact with authorities

ISO 27001 Annex A 5.6: Contact with special interest groups

ISO 27001 Annex A 5.7: Threat intelligence

ISO 27001 Annex A 5.8: Information security in project management

ISO 27001 Annex A 5.9: Inventory of information and other associated assets

ISO 27001 Annex A 5.10: Acceptable use of information and other associated assets

ISO 27001 Annex A 5.11: Return of assets

ISO 27001 Annex A 5.12: Classification of information

ISO 27001 Annex A 5.13: Labelling of information

ISO 27001 Annex A 5.14: Information transfer

ISO 27001 Annex A 5.15: Access control

ISO 27001 Annex A 5.16: Identity management

ISO 27001 Annex A 5.17: Authentication information

ISO 27001 Annex A 5.18: Access rights

ISO 27001 Annex A 5.19: Information security in supplier relationships

ISO 27001 Annex A 5.20: Addressing information security within supplier agreements

ISO 27001 Annex A 5.21: Managing information security in the ICT supply chain

ISO 27001 Annex A 5.22: Monitoring, review and change management of supplier services

ISO 27001 Annex A 5.23: Information security for use of cloud services

ISO 27001 Annex A 5.24: Information security incident management planning and preparation

ISO 27001 Annex A 5.25: Assessment and decision on information security events

ISO 27001 Annex A 5.26: Response to information security incidents

ISO 27001 Annex A 5.27: Learning from information security incidents

ISO 27001 Annex A 5.28: Collection of evidence

ISO 27001 Annex A 5.29: Information security during disruption

ISO 27001 Annex A 5.30: ICT readiness for business continuity

ISO 27001 Annex A 5.31: Identification of legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.32: Intellectual property rights

ISO 27001 Annex A 5.33: Protection of records

ISO 27001 Annex A 5.34: Privacy and protection of PII

ISO 27001 Annex A 5.35: Independent review of information security

ISO 27001 Annex A 5.36: Compliance with policies and standards for information security

ISO 27001 Annex A 5.37: Documented operating procedures

ISO 27001 Technical Controls

ISO 27001 Annex A 8.1: User Endpoint Devices

ISO 27001 Annex A 8.2: Privileged Access Rights

ISO 27001 Annex A 8.3: Information Access Restriction

ISO 27001 Annex A 8.4: Access To Source Code

ISO 27001 Annex A 8.5: Secure Authentication

ISO 27001 Annex A 8.6: Capacity Management

ISO 27001 Annex A 8.7: Protection Against Malware

ISO 27001 Annex A 8.8: Management of Technical Vulnerabilities

ISO 27001 Annex A 8.9: Configuration Management 

ISO 27001 Annex A 8.10: Information Deletion

ISO 27001 Annex A 8.11: Data Masking

ISO 27001 Annex A 8.12: Data Leakage Prevention

ISO 27001 Annex A 8.13: Information Backup

ISO 27001 Annex A 8.14: Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.15: Logging

ISO 27001 Annex A 8.16: Monitoring Activities

ISO 27001 Annex A 8.17: Clock Synchronisation

ISO 27001 Annex A 8.18: Use of Privileged Utility Programs

ISO 27001 Annex A 8.19: Installation of Software on Operational Systems

ISO 27001 Annex A 8.20: Network Security

ISO 27001 Annex A 8.21: Security of Network Services

ISO 27001 Annex A 8.22: Segregation of Networks

ISO 27001 Annex A 8.23: Web Filtering

ISO 27001 Annex A 8.24: Use of Cryptography

ISO 27001 Annex A 8.25: Secure Development Life Cycle

ISO 27001 Annex A 8.26: Application Security Requirements

ISO 27001 Annex A 8.27: Secure Systems Architecture and Engineering Principles

ISO 27001 Annex A 8.28: Secure Coding

ISO 27001 Annex A 8.29: Security Testing in Development and Acceptance

ISO 27001 Annex A 8.30: Outsourced Development

ISO 27001 Annex A 8.31: Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.32: Change Management

ISO 27001 Annex A 8.33: Test Information

ISO 27001 Annex A 8.34: Protection of information systems during audit testing