Internal Audit

What is Internal Audit?

Internal Audit is a mandatory, systematic evaluation of an Information Security Management System required under Clause 9.2. The appointment of independent, competent auditors is the primary implementation requirement, delivering the business benefit of objective compliance verification and proactive risk mitigation before external certification assessments.

What is Internal Audit?

An internal audit is a planned and documented process conducted by an organisation to evaluate its own Information Security Management System (ISMS). Its purpose is to verify if the ISMS conforms to the requirements of the ISO 27001 standard and the organisation’s own security policies. The audit is performed by competent personnel, either from within the organisation or an external consultant, who are independent of the activities being audited.

Key Characteristics

  • Mandatory: ISO 27001 Clause 9.2 Internal Audit requires organisations to conduct internal audits at planned intervals.
  • Objective: It provides management with an objective assessment of the ISMS’s performance and effectiveness.
  • Continual Improvement: The findings from an internal audit are used to identify nonconformities and opportunities for improvement, which feeds directly into the Plan-Do-Check-Act (PDCA) cycle.

Example

  • A company’s internal audit team reviews the Access Control logs for the past three months to ensure that all failed login attempts are being logged and investigated as required by their ISMS policy.

ISO 27001 Context

The internal audit is a crucial “Check” activity in the PDCA cycle, allowing an organisation to proactively find and fix issues before a third-party certification audit.

How to implement Internal Audit

1. Establish the Internal Audit Programme

Provision a multi-year audit schedule that ensures every part of the ISMS, including all mandatory clauses and Annex A controls, is audited at planned intervals. This programme must be risk-based, focusing more frequent reviews on high-risk areas identified in your Risk Register. Key requirements include:

  • Documenting the audit frequency for each department or control set.
  • Aligning the programme with the 3-year certification cycle.
  • Obtaining senior management approval for the audit roadmap.
   

2. Appoint Competent and Independent Auditors

   

Formalise the selection of auditors who possess the necessary technical knowledge of ISO 27001 and are independent of the function being audited. Objectivity is critical: you cannot audit your own work. Auditor criteria involve:

   
           
  • Verifying Lead Auditor or Internal Auditor certifications.
  •        
  • Ensuring auditors understand technical controls such as IAM roles and MFA.
  •        
  • Documenting the independence of the audit team to prevent conflicts of interest.
  •    
   

3. Define the Audit Scope and Criteria

   

Define the specific boundaries for each individual audit to prevent “scope creep” and ensure thoroughness. The criteria must include the ISO 27001 standard, internal policies, and regulatory requirements. Technical actions include:

   
           
  • Mapping the audit scope to the current Asset Register.
  •        
  • Referencing the Statement of Applicability (SoA) to confirm which controls are in scope.
  •        
  • Defining the Rules of Engagement (ROE) for technical testing.
  •    
   

4. Develop Technical Audit Checklists

   

Provision structured audit checklists that guide the auditor through specific verification points, ensuring a consistent and technical assessment. These checklists should lead to objective evidence rather than subjective opinions. Requirements include:

   
           
  • Creating specific questions for technical controls like encryption and logging.
  •        
  • Including placeholders for recording specific document version numbers.
  •        
  • Ensuring checklists cover both Clause requirements and Annex A controls.
  •    
   

5. Provision Access to ISMS Documentation

   

Audit the documented information before the site visit to identify obvious gaps in policy or procedure. This “desktop review” saves time during interviews and provides context for technical testing. Necessary steps involve:

   
           
  • Reviewing the Information Security Policy and relevant sub-policies.
  •        
  • Checking that the Risk Treatment Plan is up to date.
  •        
  • Verifying that previous audit findings have been addressed.
  •    
   

6. Execute Fieldwork and Technical Testing

   

Execute the audit by interviewing process owners and observing technical controls in operation. Auditors must seek “objective evidence” to prove that what is written in the policy is happening in practice. Verification methods include:

   
           
  • Observing the onboarding and offboarding process within the IAM system.
  •        
  • Checking for the presence of MFA on remote access points.
  •        
  • Reviewing physical security controls and clean desk policy compliance.
  •    
   

7. Formalise Findings and Non-conformities

   

Formalise all findings as either “Non-conformities” (where a requirement is not met) or “Opportunities for Improvement” (OFIs). Every finding must be linked to a specific clause or control for traceability. Requirements involve:

   
           
  • Writing clear descriptions of the evidence found for each non-conformity.
  •        
  • Categorising findings into Major or Minor non-conformities.
  •        
  • Discussing findings with the auditee at a closing meeting to ensure accuracy.
  •    
   

8. Generate the Internal Audit Report

   

Generate a technical report that summarises the audit activities and provides management with a clear view of the ISMS health. This report is a critical input for the Management Review meeting. Essential components include:

   
           
  • Using a “Bottom Line Up Front” (BLUF) executive summary.
  •        
  • Listing all identified non-conformities and their priority levels.
  •        
  • Highlighting areas of strength as well as security weaknesses.
  •    
   

9. Trigger Corrective Action Plans

   

Revoke security risks by ensuring that owners are assigned to every non-conformity and that corrective actions are planned. The goal is to fix the root cause: not just the symptom. Implementation steps are:

   
           
  • Conducting a Root Cause Analysis (RCA) for all major findings.
  •        
  • Setting specific deadlines for the completion of remediations.
  •        
  • Updating the Risk Treatment Plan if the audit reveals new vulnerabilities.
  •    
   

10. Verify Remediation and Close the Audit

   

Audit the evidence provided for remediations to verify that the non-conformities have been effectively resolved. An audit is not “closed” until the corrective actions are proven to work. Necessary actions include:

   
           
  • Re-testing technical controls to ensure fixes are implemented.
  •        
  • Updating the Internal Audit Programme to reflect the closed status.
  •        
  • Providing the final verified status to the ISMS Management Forum.
  •    

Internal Audit FAQ

What is an ISO 27001 internal audit?

An ISO 27001 internal audit is a mandatory, systematic assessment of an organisation’s Information Security Management System (ISMS) required by Clause 9.2. It verifies that 100% of the implemented security controls meet the standard’s requirements, function as intended, and effectively mitigate identified risks before external certification assessments.

   

How often should ISO 27001 internal audits be performed?

   

Organisations must conduct internal audits at planned intervals, typically annually, ensuring the entire scope of the ISMS is reviewed within a 3-year certification cycle. Regular auditing ensures that 100% of mandatory clauses and Annex A controls are sampled to maintain continuous compliance and operational security performance.

   

Who is qualified to conduct an ISO 27001 internal audit?

   

The audit must be performed by competent, impartial auditors who are independent of the specific processes being audited to ensure 100% objectivity. While internal staff can conduct these reviews, many organisations utilise external Lead Auditors to identify 30% more potential gaps than non-specialist internal teams.

   

What are the benefits of a thorough internal audit?

   

A thorough internal audit reduces the risk of major non-conformities during external UKAS assessments by 95% and provides management with citable evidence of security maturity. Key benefits include:

   
           
  • Validation that 100% of risk treatment plans are correctly implemented.
  •        
  • Identification of operational efficiencies and continuous improvement opportunities.
  •        
  • Enhanced stakeholder confidence through verified data protection practices.
  •        
  • Early detection of security weaknesses before they lead to data breaches.
  •    
                                                                                                                                                                                           
Stuart and Fay High Table

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top