Compliance Checklist ISO 27001 v1.1 20220208
Compliance Checklist ISO 27001 v1.1 20220208
Compliance Checklist ISO 27001 v1.1 20220208
The Standard tab contains the requirements from Clause 4 to 10 in the main body of IEC/ISO 27001:2013.
Column D: Make your way through each row and identify in column D - "Documented or evidenced where?" how
meet the requirements. In most cases you should enter in this column the title of the relevant policy, procedure, lo
specific section in the document where the requirement is mentioned.
Column E: This column has colour formatting applied and entering Y, P or N will turn the cell green, amber or red.
If you fully meet the requirement, enter Y; if you have no way of evidencing that you meet the requirement, enter
your documentation, enter P (for partly).
Column F & G: These are free text fields for you to enter comments/questions assign responsibility and manage th
The Annex A tab contains the requirements for the 114 controls listed in Annex A of IEC/ISO 27001:2013.
Column D: This column will eventually help you complete your Statement of Applicability (see clause 6.1.3 d)). Indi
control applies to your organisation. For example, if your organisation doesn't have any premises, control 11.1 Sec
This column has colour formatting applied and entering Y or N will turn the cell green or grey.
Column E: Make your way through each row and identify in column E - "Documented or evidenced where?" how y
meet the requirements. In most cases you should enter in this column the title of the relevant policy, procedure, lo
specific section in the document where the requirement is mentioned.
Column F: This column has colour formatting applied and entering Y, P or N will turn the cell green, amber or red.
If you fully meet the requirement, enter Y; if you have no way of evidencing that you meet the requirement, enter N
your documentation, enter P (for partly).
Column G & H: These are free text fields for you to enter comments/questions assign responsibility and manage th
of IEC/ISO 27001:2013.
of IEC/ISO 27001:2013.
ISO 27001:2013 ISMS Compliance Checklist Need help? Subscribe to the full ISO
27001 Toolkit for a step-by-step guide
Requirement met?
Clause Title Requirement Documented or evidenced where? Yes/No/ Comments/questions
P (partly)
4 Context of the
organisation
Understanding the Have you determined internal and external issues relevant
4.1 organisation and its to the organisation's purpose and that affect its ability to
context achieve the intended outcomes of the ISMS
Understanding the
needs and
4.2 expectations of Have you determined:
interested parties
a) Interested parties relevant to ISMS
Organisational roles,
5.3 responsibilities and Top management assigns responsibilities and authorities for
authorities roles relevant to information security
e.1) Organisation will plan how to integrate the actions into its
ISMS processes
6.1.2 Information security Have you defined and applied a risk assessment process
risk assessment that includes:
The establishment and maintainenance of information
a) security risk criteria, including:
a.1) risk acceptance criteria
a.2) criteria for performing information security risk
assessments.
Risk assessments that produce consistent, valid and
b)
comparable results
c) Risk assessments that identify security risks:
risks associated with loss of confidentiality, integrity and
c.1) availability
c.2) identify risk owners.
d) Analysis of information security risks to:
d.1) assess consequences of risks identified if they materialise
d.2) assess likelihood of occurrence of risks identified
d.3) determine levels of risk
e) evaluation of information security risks that:
e.1) compares the risk analysis with risk criteria (6.1.2.a)
e.2) prioritises risks for risk treatment.
Retain documented information about risk assessment
process
Information security Have you defined and applied a risk treatment process for
6.1.3 risk treatment information security risks that ensures:
f) The risk owner approval for the treatment plan and residual
risk is obtained
Retain documented information about information security
risk treatment process
Information security
6.2 objectives and Do you have Information security objectives at relevant
planning to achieve functions and levels. The objectives must:
them
a) be consistent with the information security policy
b) be measurable if possible
d) be communicated
e) updated as appropriate
When planning how to achieve objectives, determine:
f) what will be done
g) what resources are required
h) who is responsible
i) when it will be completed
j) how the results will be evaluated
Retain documented information on the information security
objectives
7 Support
Have you determined and provided the resources necessary
7.1 Resources to establish, implement, maintain and continually improve
the ISMS
7.2 Competence
7.3 Awareness Persons doing work under the organisation's control are
aware of:
a) information security policy
Management
Management direction direction for
5.1 for information security information
security
Review of the
Management direction policies for
5.1.2 for information security information
security
Internal
6.1 Internal organisation organisation
Information
6.1.1 Internal organisation security roles and
responsibilities
Contact with
6.1.3 Internal organisation authorities
Contact with
6.1.4 Internal organisation special interest
groups
Information
6.1.5 Internal organisation security in project
management
Terms and
7.1.2 Prior to employment conditions of
employment
During
7.2 During employment
employment
7.2.1 During employment Management
responsibilities
Information
security
7.2.2 During employment awareness,
education and
training
Termination and
7.3 Termination and changechange of
employment
Termination or
7.3.1 Termination and changechange of
employment
responsibilities
Responsibility for
8.1 Responsibility for assets assets
Management of
8.3.1 Media handling removable media
Physical media
8.3.3 Media handling
transfer
Business
9.1 Business requirements ofrequirements of
access control
User registration
9.2.1 User access managemenand de-registration
User access
9.2.2 User access managemenprovisioning
Management of
9.2.3 User access managemenprivileged access
rights
Management of
secret
9.2.4 User access managemenauthentication
information of
users
Review of user
9.2.5 User access managemen
access rights
Removal or
9.2.6 User access managemenadjustment of
access rights
User
9.3 User responsibilities
responsibilities
Use of secret
9.3.1 User responsibilities authentication
information
System and
9.4 System and application aapplication access
control
Access control to
9.4.5 System and application aprogram source
code
Cryptographic
10.1 Cryptographic controls controls
Physical security
11.1.1 Secure areas perimeter
Protecting against
11.1.4 Secure areas external and
environmental
threats
Working in secure
11.1.5 Secure areas
areas
Equipment
11.2.4 Equipment maintenance
Security of
equipment and
11.2.6 Equipment assets off-
premises
Secure disposal or
11.2.7 Equipment re-use of
equipment
Unattended user
11.2.8 Equipment
equipment
Operational
12.1 Operational procedures aprocedures and
responsibilities
Documented
12.1.1 Operational procedures aoperating
procedures
Capacity
12.1.3 Operational procedures a
management
Separation of
development,
12.1.4 Operational procedures atesting and
operational
environments
Protection from
12.2 Protection from malwar
malware
Logging and
12.4 Logging and monitoring
monitoring
Administrator and
12.4.3 Logging and monitoring
operator logs
Clock
12.4.4 Logging and monitoring
synchronisation
Control of
12.5 Control of operational s operational
software
Installation of
software on
12.5.1 Control of operational s operational
systems
Technical
12.6 Technical vulnerability vulnerability
management
Management of
12.6.1 Technical vulnerability technical
vulnerabilities
Restrictions on
12.6.2 Technical vulnerability software
installation
Information
12.7 Information systems audisystems audit
considerations
Information
12.7.1 Information systems audisystems audit
controls
Network security
13.1 Network security mana management
Security of
13.1.2 Network security mana network services
Security
requirements of
14.1 Security requirements o
information
systems
Information
security
14.1.1 Security requirements o requirements
analysis and
specification
Securing
application
14.1.2 Security requirements o
services on public
networks
Protecting
application
14.1.3 Security requirements o services
transactions
Security in
14.2 Security in developmentdevelopment and
support processes
Secure
14.2.1 Security in developmentdevelopment
policy
System change
14.2.2 Security in developmentcontrol procedures
Technical review
of applications
14.2.3 Security in development
after operating
platform changes
Restrictions on
14.2.4 Security in developmentchanges to
software packages
Secure system
14.2.5 Security in developmentengineering
principles
Secure
14.2.6 Security in developmentdevelopment
environment
Outsourced
14.2.7 Security in development
development
System acceptance
14.2.9 Security in development
criteria
Information
security policy for
15.1.1 Information security in s supplier
relationships
Addressing
security within
15.1.2 Information security in s supplier
agreements
Information and
communication
15.1.3 Information security in s technology supply
chain
Supplier service
15.2 Supplier service delive delivery
management
Monitoring and
15.2.1 Supplier service delive review of supplier
services
Managing changes
15.2.2 Supplier service delive to supplier
services
Management of
information
16.1 Management of informati
security incidents
and
improvements
16.1.1 Responsibilities
Management of informati
and procedures
Reporting
16.1.2 Management of informati
information
security events
Reporting
16.1.3 information
Management of informati
security
weaknesses
Assessment of and
16.1.4 decision on
Management of informati
information
security events
Response to
16.1.5 Management of informati
information
security incidents
Learning from
16.1.6 Management of informati
information
security incidents
16.1.7 Collection of
Management of informati
evidence
Planning
17.1.1 Information security coninformation
security continuity
Implementing
17.1.2 Information security coninformation
security continuity
Compliance with
legal and
18.1 Compliance with legal a contractual
requirements
Identification of
applicable
18.1.1 Compliance with legal a legislation and
contractual
requirements
Intellectual
18.1.2 Compliance with legal a property rights
(IPR)
Privacy and
protection of
18.1.4 Compliance with legal a personally
identifiable
information
Regulation of
18.1.5 Compliance with legal a cryptographic
controls
Information
18.2 Information security rev
security reviews
Independent
review of
18.2.1 Information security rev
information
security
Compliance with
18.2.2 Information security rev security policies
and standards
Does this
control apply in
Control objective/question & 27002 guidelines your
organisation?
Does management provide direction and support for information security in
accordance with business requirements and relevant laws and regulations?
Is there an information security policy document, or set of policies, that has been
defined, approved by management, and has it been published and communicated to all
employees and relevant external parties?
Does it contain objectives, define infosec, assign roles and point to a "process for
handling deviations and exceptions"?
If SME and can't segregate, are other controls in place like monitoring of activities, audit
trails and mgt supervision?
Organizations should have procedures in place that specify when and by whom
authorities (e.g. law enforcement, regulatory bodies, supervisory authorities) should be
contacted and how identified information security incidents should be reported in a
timely manner (e.g. if it is suspected that laws may have been broken).
Does the organisation maintain appropriate contact with special interest groups or other
specialist security forums and professional associations?
E.g. to keep up with best practice knowledge, receive warnings of alerts, advisories,
patches, vulnerabilities
have access with specialist information security advice
share inf about new technology, products, threats or vulnerabilities
provide liaison points when dealing with incidents
Does the organisation address information security in project management, regardless
of the type of project?
Does the organisation ensure the security of teleworking and use of mobile devices?
Does the organisation have a policy and supporting security measures to manage the
risks introduced by the use of mobile devices?
Does the organisation have a policy and supporting security measures to protect
information accessed, processed or stored at teleworking sites?
Does the organisation ensure that employees and contractors understand their
responsibilities and are suitable for the roles for which they are considered?
Does the organisation conduct background verification checks on all candidates for
employment, in accordance with relevant laws, regulations and ethics, and are these
checks sufficient considering the business requirements, the classification of the
information to be accessed and the related risks?
Do contractual agreements with employees and contractors state their and the
organisation's responsibilities for information security? e.g. confidentiality agreement,
respecting information classification requirements, responsibilities when handling 3rd
party information, obligations beyond termination?
Does the organisation ensure that employees and contractors are aware of and fulfil
their information security responsibilities?
Does the organisation's management require all employees and contractors to apply
information security in accordance with the organisation's established policies and
procedures?
For example, management responsibilities should include ensuring that employees and
contractors are briefed on their information security roles and responsibilities, are
provided with guidelineson information security expectations, achieve a level of
awareness on information security relevant to their roles and responsibilities, conform
to the terms and conditions of employment.
Does the organisation ensure that all employees and relevant contractors receive
appropriate awareness education and training? Receive regular updates to policies and
procedures, as relevant for their job role?
Does the organisation have a formal and communicated disciplinary procedure in place
to take action against employees who commit an information security breach?
Does the organisation protect its interests as part of the process of changing or
terminating employment?
Does the organisation define and enforce information security responsibilities and duties
that remain valid after termination or change of employment, and are these
communicated to the employee or contractor? For example, continuing contractual
clauses beyond termination (e.g. confidentiality) and how an internal move should be
considered as a termination and re-hiring.
The asset inventory should be accurate, up to date, consistent and aligned with other
inventories.
For each of the identified assets, ownership of the asset should be assigned (see 8.1.2)
and the classification should be identified (see 8.2).
Have owners of the assets maintained in the asset inventory been identified?
Has the organisation identified, documented and implemented rules for the acceptable
use of information and of assets associated with information and information processing
facilities?
Are all employees and external party users required to return all of the organisational
assets in their possession upon termination of their employment, contract or
agreement?
The "value" should be built into the classification levels which should be incremental,
e.g. in terms of confidentiality, integrity and availability requirements.
Has an appropriate set of procedures been developed and implemented for information
labelling in accordance with the information classification scheme?
Has the organisation developed and implemented procedures for handling assets in
accordance with the information classification scheme? For example covering access
restrictions, transfer methods, storage location or media for each level of classification.
Are there processes in place to ensure only authorised users have access and to
prevent unauthorised access to systems and services?
Is there a formal user registration and de-registration process to enable assignment of
access rights?
Does it ensure only unique user IDs are used to enable users to be linked to and held
responsible for their actions? Are leavers' user IDs immediately disabled or removed?
Is there a formal user access provisioning process to assign or revoke access rights for all
user types to all systems and services?
Is the allocation and use of privileged access rights restricted and controlled?
Do asset owners review users' access rights at regular intervals? Does it consider both
access and permissions?
Are access rights of employees and external party users to information and processing
facilities removed upon termination (or change) of their employment, contract or
agreement?
Are users accountable for safeguarding their authentication information?
Are users required to follow the organisation's established practices in the use of secret
authentication information?
For example, are users advised to keep secret authentication information confidential
and not divulge it to any other party, including people in authority? Are they advised to
avoid keeping a record (e.g. on paper, software file or hand-held device) of secret
authentication information, unless this can be stored securely and the method of storing
has been approved (e.g. password vault)? Are they advise to change their password if
there's a risk it's been compromised?
Are there quidelines for the use of utility programs that might be capable of overriding
system and application controls? Are their use restricted and tightly controlled?
Have physical security perimeters been defined, and are they used to protect areas that
contain either sensitive or critical information and information processing facilities?
Are secure areas protected by appropriate entry controls to ensure that only authorised
personnel are allowed access?
Have physical security mechanisms for offices, rooms and facilities been considered and
applied?
Have you designed and applied physical protection against natural disasters, malicious
attacks and accidents?
You should seek specialist advice on how to avoid damage from fire, flood, earthquake,
explosion, civil unrest and other forms of natural or man-made disaster.
Have procedures for working in secure areas been designed and applied?
Are access points such as delivery and loading areas controlled or isolated? Or other
points where unauthorised persons could enter the premises unchallenged/unnoticed?
Does the organisation prevent loss, damage, theft and compromise of assets and
interruption to the organisation's operations?
Is equipment located and protected to reduce the risks from environmental threats and
hazards, and opportunities for unauthorised access?
Is equipment protected from power failures and other disruptions caused by failures in
supporting utilities?
Are power and telecommunication cables carrying data or supporting information
services protected from interception, interference and damage?
Is equipment maintained correctly/regularly to ensure continued availability and
integrity?
Are equipment, information and software prevented from being taken off-site without
prior authorisation?
Is security applied to assets when off-site? Does this take into account the different risks
of working outside the organisation's premises?
Are there procedures to verify that equipment containing storage media has had any
sensitive data and licensed software removed or securely overwritten prior to disposal
or re-use?
Are all users made aware of security requirements and procedures to ensure that
unattended equipment has appropriate protection?
Is there a clear desk policy for papers and removable storage media, and a clear screen
policy for information processing facilities?
Does the organisation ensure correct and secure operations of information processing
facilities?
Are there documented IT operating procedures and are they made available to all users
who need them?
For example, procedures to cover the installation and configuration of systems, backups,
job scheduling, error/alert handling and other exceptional conditions, system restart and
recovery etc.
Are the development, testing and operational environments separated to reduce the
risks of unauthorised access and changes to the operational environment?
Are there detection, prevention and recovery controls in place to protect against
malware? Is this combined with appropriate user awareness education/training?
Does the organisation protect against loss of data?
Is there an agreed backup policy, and are backup copies of information, software and
system images taken and tested regularly in accordance with this policy? Are backups
included in the retention policy?
Does the organisation record events and generate evidence?
Are required event logs identified, produced, kept and regularly reviewed or alerts
configured? Do they record user activities, exceptions, faults and information security
events?
Are logging facilities and log information protected against tampering and unauthorised
access?
Are system administrator and system operator activities logged, and are the logs
protected and regularly reviewed?
Privileged user account holders may be able to manipulate the logs under their control,
therefore it is crucial to protect and review the logs to maintain accountability for
privileged users.
Are the clocks of all relevant information processing systems within an organisation or
security domain synchronised with a single reference time source?
Does the organisation minimise the impact of audit activities on operational systems?
Are audit activities involving verification of operational systems carefully planned and
agreed to minimise disruptions to business processes?
Does the organisation ensure that security is an integral party of information systems,
including those information systems that provide services over public networks?
Are there established rules for the development of software and systems, and are they
applied to developments within your control, i.e. within the organisation or sub-
contracted?
Are there formal change control procedures built within the development lifecycle to
control changes to systems ?
When operating systems are changed, are business critical applications reviewed and
tested to ensure there is no adverse impact on organisational operations or security?
Have principles for engineering secure systems been established, documented and
maintained, and are they applied?
Are development environments for system development and integration efforts in place
and appropriately protected? Are they used throughout the development lifecycle?
Are there acceptance testing programs? Are acceptance criteria been established for
new information systems, upgrades and new versions? Do they include testing of
information security requirements?
Is data used for testing protected?
Is test data selected appropriately? Is it protected and controlled?
Are information security requirements for mitigating the risks associated with supplier's
access to the organisation's assets agreed with the supplier and documented?
Are all relevant information security requirements established and agreed with each
supplier that may access, process, store, communicate, or provide IT infrastructure for,
the organisation's information?
Does the organisation maintain an agreed level of information security and service
delivery in line with supplier agreements?
Does the organisation regularly monitor, review and audit supplier service delivery?
Does the organisation ensure that a consistent and effective approach is applied to the
management of information security incidents, including communication on security
events and weaknesses?
Does the organisation assess information security events and make decisions as to
whether they are classified as information security incidents?
Does the organisation use knowledge gained from analysing and resolving information
security incidents to reduce the likelihood or impact of future incidents?
Has the organisation defined and applied procedures for the identification, collection,
acquisition and preservation of information that can serve as evidence?
Has the organisation determined its requirements for information security and the
continuity of information security management in adverse situations (e.g. during a crisis
or disaster)?
Does the organisation verify the established and implemented information security
continuity controls at regular intervals, ensuring that they are valid and effective during
adverse situations?
Does the organisation avoid breaches of legal, statutory, regulatory and contractual
obligations related to information security and of any security requirements?
Have all relevant legislative, statutory, regulatory and contractual requirements and the
organization’s approach to meet these requirements been explicitly identified and
documented, and is it kept up to date for each information system and the organization?
Does the organisation ensure that information security is implemented and operated
in accordance with the organisational policies and procedures?
Is the organisation's approach to managing information security and its implementation
reviewed independently and at planned intervals or when significant changes occur?
Requirement
Documented or evidenced where? met? (Y/N/P) Issues and comments Action required?
What next?
Now that you've used the compliance checklist, you should be in a position to determine exactly how ready you are for th
Stage 1 certification audit. Based on our experience, you're probably in one of the following four scenarios... which one
describes you best?
Scenario 1: You have no or very few documented policies & procedures in pla
You want to do it yourselves but don't have much
You want to do it yourselves. You have time. time.
You want to minimise costs and you have someone with You want to minimise costs and do it on your own, b
time to write all the documentation - i.e. you want don't have time to write all the documentation from
guidance to do it all on your own. blank page.
Use our ISO 27001 Pro Toolkit for a step-by-step gui
Try the Free ISO 27001 Toolkit and all the templates you need.
Contact us Contact us
Scenario 3: You already have all the documentation you need, you want to ma
sure you're ready
You want ISO consultants to do it for you.
You want an ISO expert to give your ISMS a once-over
before your chosen certification body comes in for the
Stage 1 audit.
Contact us
how ready you are for the
scenarios... which one
ocedures in place
ves but don't have much
e.
and do it on your own, but
the documentation from a
page.
kit for a step-by-step guide
lates you need.
ts to do it for you.
urces in-house with the
want consultants to do all
e 15-20 person days of our
for the Stage 1 audit.
touch
place
ants to do it for you.
/or knowledge in house to
fied or complete the gap
takes 3 person days of our
gaps depends how many
are.
touch
takes 3 person days of our
gaps depends how many
are.
touch