Internal Audit Checklist
Internal Audit Checklist
ISO 27001:2022
Information Security, Cybersecurity,
and Privacy Protection
☐ Have we determined internal and external issues that will impact on our information
security management system? “NO/YES”
Interested Parties
☐ Have we determined what internal and external interested parties are relevant to the
information security management system and what their requirements are? “NO/YES”
Scope
Leadership
Leadership and Commitment
☐
Can we demonstrate top management is providing leadership and commitment to the
information security management system? “NO/YES”
☐ Have we determined the information security risks and opportunities related to our
organization? “NO/YES”
Statement of Applicability
☐ Have we documented a risk treatment plan and Statement of Applicability with regard to
controls? “NO/YES”
Planning of changes
☐ Have we determined and ensured necessary resources are in place for the information
security management system? “NO/YES”
Competence
☐ Do we ensure competence of personnel? “NO/YES”
☐ Have we ensured that personnel are aware of our policy, relevant objectives, and their
responsibilities? “NO/YES”
Communication
Control of Documents
☐ Do we ensure documents and records are controlled? “NO/YES”
Operations
Operational Planning and Control
☐ Have we established criteria for processes, and do we maintain control of the processes in
accordance with these criteria? “NO/YES”
Risk Assessment
☐ Do we assess risk at planned intervals and when significant changes occur, and do we
maintain records? “NO/YES”
Risk Treatment
☐ Do we monitor things such as processes, operational controls, access, usage, change? “NO/YES”
☐ Do we plan and conduct internal audits to ensure the information security system conforms
to requirements and is implemented effectively? “NO/YES”
☐
Does our top management review our information security management system at planned
intervals? “NO/YES”