ISO 27001 Compliance Assessment

ISO 27001 is an information security framework that was published by the International Organization for Standardization (ISO).  ISO 27001 formally specifies an Information Security Management System (ISMS), which is a management framework through which the organization identifies, analyzes and addresses its information risks.   ISO 27001 includes 14 control groups that consist of 35 control objectives and 114 distinct controls.  The 14 control groups and number of controls in each group are as follows:

  • A.5: Information security policies (2 controls)
  • A.6: Organization of information security (7 controls)
  • A.7: Human resource security - 6 controls that are applied before, during, or after employment
  • A.8: Asset management (10 controls)
  • A.9: Access control (14 controls)
  • A.10: Cryptography (2 controls)
  • A.11: Physical and environmental security (15 controls)
  • A.12: Operations security (14 controls)
  • A.13: Communications security (7 controls)
  • A.14: System acquisition, development and maintenance (13 controls)
  • A.15: Supplier relationships (5 controls)
  • A.16: Information security incident management (7 controls)
  • A.17: Information security aspects of business continuity management (4 controls)
  • A.18: Compliance; with internal requirements, such as policies, and with external requirements, such as laws (8 controls)

ISO 27001 Certification Process

The certification process is divided into two stages: The “Stage 1 Audit” and the “Stage 2 Audit”.   The “Stage 1 Audit” consists of documentation review.  During Stage 1, the ISO 27001 assessor reviews policies and procedures to ensure that appropriate policies and procedures are in place to meet requirements of the ISMS.  The “Stage 2 Audit” consists of the ISO 27001 auditor performing tests of effectiveness to ensure that controls have been implemented to meet the requirements of the ISMS. 

Additional ISO 27001 Certification Requirements

In addition to the Stage 1 and Stage 2 audits, the following must be performed in order to become ISO 27001 certified:

  • A periodic and independent internal audit of the ISMS against the requirements of the ISO 27001 standard.

Many organizations have trouble meeting the internal audit requirement do to the following reasons:

  • They do not have personnel that are truly independent. Those responsible for conducting the internal audit should not be auditing functions over which they have operational control or ownership.

To combat these issues, organizations are outsourcing the internal audit requirement to CPA firms, such as Schneider Downs, that possess the appropriate knowledge of internal audit and ISO 27001.

ISO 27001 Internal Audit Approach

We begin our assessment by working closely with you to understand your business processes in order to understand your ISO 27001 compliance scope.  We will work with and interview key individuals within the business and information technology services responsible for implementing the ISO 270001 controls to understand information security policies, procedures, and practices.  We will evaluate your compliance with all control requirements through review of documentation supporting the operating effectiveness of controls.  When our evaluation is complete, we will provide your organization with a detailed ISO 27001 compliance assessment report outlining corrective action plans with a detailed roadmap for achieving ISO 27001 compliance.