Exercises Key
Exercises Key
com
EXERCISES
Correction Key
Possible answer:
Page 2 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Exercise 2: Ethics
How should the auditor handle the following situations? Prepare to discuss your
answers in class.
1. The auditee asks the auditor to depersonalize the audit notes so they can use
the notes to create a case study. This case study will be used for internal
purposes only.
Possible answer:The auditor should reject this request because, firstly, their notes
are not the property of the auditee and, secondly, depersonalizing notes takes time
(the auditor is not paid to do that), and the process could be perceived as a potential
conflict of interest.
Possible answer: The auditor should document the evidence of bribery, providing
comprehensive details on the involved parties, transaction amounts, and the
resultant impact on financial statements. The auditor should promptly recognize the
discovered bribery as a notifiable illegal act and evaluate its standing within the
framework of applicable laws and regulations. Simultaneously, the auditor should
arrange a meeting with senior management to communicate the findings, affording
them an opportunity to respond and provide insights into the organization's stance on
the matter.
3. A former employee of the auditee contacts the auditor to inform them that the
auditee has several security problems that it is trying to conceal before the audit.
This person proposes to send documented evidence to prove their claims.
Possible answer: The conduct of an audit must not be based on hearsay. The
person in this situation might have personal issues with their former employer,
therefore, does not represent a reliable source of information. In addition, the
documents in their possession are, undoubtedly, held in violation of their old
employment contract. In that case, the auditor should politely refuse such help. The
auditor can inform the person that it is possible to file and send a formal complaint to
the certification body. This way, the auditor will demonstrate professional skepticism
during the audit.
Page 3 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
executive of the organization, a quick-tempered man, will get furious with the
employee and fire them.
Page 4 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Possible answer:
Documented
information • Review the topic-specific policy on logging
review
Page 5 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Findings:
1. The log-on procedure of the centralized platform provides detailed error
messages, indicating which part of the login data (username or password) is
incorrect, aiding potential unauthorized users in refining their intrusion strategies.
2. The company fails to keep records or monitor who enters and exists secure
areas, making it impossible to track unauthorized access or investigate security
incidents. BankPulse Solutions’ management is aware of the situation, and the
security manager has identified this issue as being a risk to be monitored and
included in the risk analysis report. BankPulse Solutions has no other
documentation of this situation.
3. BankPulse Solutions has two distinct processes for incident management, one
for the head office and one for the back office. In addition, the incident records
are kept in two separate information systems that do not communicate with each
other. In an interview with the person responsible for technical support, it was
stated that, within five years, the company will replace the two systems with an
integrated system for managing information security events.
Page 6 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
NONCONFORMITY REPORT #1
Client: BankPulse Solutions Site: Head office
Clause/control number: Annex A
Process: Secure authentication
8.5
Audit criteria: Secure authentication technologies and procedures shall be
implemented based on information access restrictions and the topic-specific policy
on access control.
Comments:
The situation is categorized as a minor nonconformity because the provision of
explicit error messages during the log-on process significantly aids potential
unauthorized users in refining their intrusion strategies, which could lead to
compromised system security.
Page 7 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
NONCONFORMITY REPORT #2
Client: BankPulse Solutions Site: Head office
Process: Physical entry Clause/control number: Annex A 7.2
Audit criteria: Secure areas should be protected by appropriate entry controls
and access points.
Description of the observed nonconformity: The company does not have any
records or documentation for monitoring the access of individuals to secure areas.
Comments:
This is considered to be a major nonconformity because the company should allow
only authorized access to its server room. In addition, it should be able to provide
evidence of how it ensures such authorized access.
Comments on situation 3:
According to the given information, there is no nonconformity. BankPulse Solutions
can have different procedures to manage the incidents. The planned system
integration in the future complies with control 5.24, aiming to establish an effective
incident management system, enabling the definition, establishment, and
communication of information security incident management protocols across the
organization, thereby enhancing efficiency and consistency.
Page 8 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Possible answer:
Page 9 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Potential
Scenario Vulnerabilities Threats C I A
consequences
Ian Kovalev and • Lack of controls regarding the • Revealing confidential data X • Loss of customers
Katie Harper were termination of employment to the competitor to a competitor
hired by BankPulse • Ian Kovalev, the former accounting VP • Financial losses
Solutions’ has knowledge of sensitive data
competitor, (payroll, financial results, etc.) and
EverNet. Katie Harper, the former marketing
assistant has knowledge of BankPulse
Solutions’ sales strategies and
marketing campaigns.
The software • Insufficient software testing • Abuse of rights X X X • Invasion of privacy
delivered to • Widely distributed software • Corruption of data of clients
BankPulse • Lack of data encryption • Error in use • Confidential
Solutions’ clients in • Lack of documentation • Tampering with software information
Brazil had some • Lack of backup copies leakage
serious flaws and • Disruption of
made clients services
vulnerable to
external attacks.
Julia Robinson, the • No segregation of duties • Lack of available personnel X X X • Unavailable
website designer, • Only one person available for this • Abuse of rights website: loss in
was ill for one function • Unauthorized use of revenues
month. • Failure to produce management equipment • Inability to fulfill
reports contractual
obligations
Page 10 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Potential
Scenario Vulnerabilities Threats C I A
consequences
• Disruption of
operations
Customer • Lack of data encryption • Database injection attacks X X X • Service
information (names, • Single point of failure • Corruption of data interruption
addresses, and • No backup procedures in place • Confidential
credit card information
numbers) is kept in leakage
a database that • Deliberate
does not have a changes
proper encryption • Loss of data
or access control in • Information theft
place. • Corrupted
database
Page 11 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Possible answer:
Page 12 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Potential
Scenario Vulnerabilities Threats C I A Controls
consequences
Ian Kovalev and Katie • Lack of controls regarding • Revealing X • Loss of customers to Annex A 6.2
Harper were hired by the termination of confidential a competitor Annex A 6.5
BankPulse Solutions’ employment data to the • Financial losses Annex A 6.6
competitor, EverNet. • Ian Kovalev, the former competitor
accounting VP has
knowledge of sensitive data
(payroll, financial results,
etc.) and Katie Harper, the
former marketing assistant
has knowledge of
BankPulse Solutions’ sales
strategies and marketing
campaigns.
The software • Insufficient software testing • Abuse of X X X • Invasion of privacy of Annex A 5.8
delivered to • Widely distributed software rights clients Annex A 8.4
BankPulse Solutions’ • Lack of data encryption • Corruption of • Confidential Annex A 8.18
clients in Brazil had • Lack of documentation data information leakage Annex A 8.29
some serious flaws • Lack of backup copies • Error in use • Disruption of services
and made clients • Tampering
vulnerable to external with software
attacks.
Julia Robinson, the • No segregation of duties • Lack of X X X • Unavailable website: Annex A 5.3
website designer, was • Only one person available available loss in revenues Annex A 5.37
ill for one month. for this function personnel • Inability to fulfill Annex A 8.2
contractual obligations Annex A 8.15
Page 13 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Potential
Scenario Vulnerabilities Threats C I A Controls
consequences
• Failure to produce • Abuse of • Disruption of
management reports rights operations
• Unauthorize
d use of
equipment
Customer information • Lack of data encryption • Database X X X • Service interruption Annex A 5.15
(names, addresses, • Single point of failure injection • Confidential Annex A 8.13
and credit card • No backup procedures in attacks information leakage Annex A 8.24
numbers) is kept in a place • Corruption of • Deliberate changes
database that does data • Loss of data
not have a proper • Information theft
encryption or access • Corrupted database
control in place.
Page 14 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Possible answer:
1. Annex A 5.1 Policies for information security
• Review of documented information security policy to validate its
development and content
• Interview with the person(s) in charge of information security to validate the
approval of the policy and its communication to the auditee’s employees and
relevant external parties
• Verification of the policy distribution media (website, hard copy version,
email, etc.)
Page 15 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Possible answer:
1. Clause 6.1.3 Information security risk treatment
• Review of the risk treatment plan (documentary evidence)
• Interview with the person(s) in charge of information security (verbal
evidence)
• Verification of a sample of action plans specified in the risk treatment plan
(analytical evidence)
Page 16 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Possible answer:
1. The information security policy
The organization’s policy does not comply with two requirements of the standard:
a statement that stipulates that the organization takes into account the
requirements linked to the activity and the legal or regulatory requirements
(Annex A 5.31) and does not include a commitment to continual improvement
(Clause 5.2d).
5. The incident management process related to the ISMS (with the incident
declaration form)
The incident management process and the form are compliant, even though the
process involves a lot of steps. However, there is a lack of consistency between
documents (the forms do not seem to support the process). This may lead the
auditor to believe that they were written by more than one person who
apparently did not communicate with each other at all, or they did so
ineffectively.
Page 17 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
AUDIT INFORMATION
Organization: BankPulse Solutions
Address: Montreal, Canada
Client ID: 202204_BS27001
Number of employees within the
scope: 20
Auditee representative: Alan Brown
Standard(s) audited: ISO/IEC 27001:2022
Audit team leader: Chloe Roy
Other audit team member(s): N/A
Audit type: Stage 2 audit
Date(s) of audit: March 6 to March 22, 2023
Audit duration: Four days
Language: English
The scope of the ISMS established by
BankPulse Solutions includes all data
Audit scope:
processing facilities of the organization’s
headquarters in Montreal.
Audit preparation
a. Audit objectives
The objectives of this audit are to:
• Confirm that the ISMS complies with the audit criteria
• Confirm that the ISMS meets applicable statutory, regulatory, and
contractual requirements
• Confirm the effectiveness of the ISMS in meeting its specified objectives
• Identify the information security areas that need potential improvement
b. Audit criteria
The audit criteria are all normative clauses of the ISO/IEC 27001 standard:
• Clause 4: Context of the organization
• Clause 5: Leadership
• Clause 7: Support
• Clause 8: Operation
• Clause 9: Performance evaluation
• Clause 10: Improvement
• Annex A: Excerpt containing applicable controls related to the scope
Page 18 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
AUDIT PLAN
Date: March 6, 2023
Key
Time Auditor Steps
contact
Chloe Alan
8:30 – 8:40 Meet and greet
Roy Brown
Chloe Alan
8:40 – 9:00 Conduct the opening meeting
Roy Brown
Verify conformity to clause 4 Context of the
organization to evaluate if:
• The internal and external issues have
been identified, including those related to
climate change
• The ISMS addresses the needs and
Chloe expectations of interested parties Alan
9:00 – 10:00
Roy • The relevant requirements of interested Brown
parties have been determined, including
legal, regulatory, and contractual
requirements and those related to
climate change
• The scope has been determined in
accordance with standard requirements
• Verify conformity to clause 5 Leadership
by interviewing the top management to
evaluate their commitment to the ISMS
• Review:
Information security policy
10:00 – Chloe Alan
Roles and responsibilities (through
11:00 Roy Brown
assessing the organizational
structure and conducting interviews
with a group of employees to assess
their awareness and understanding
of their roles and responsibilities)
• Verify conformity to clause 6 Planning by
reviewing the following:
11:00 – Chloe Planning of actions to address risks Alan
12:00 Roy and opportunities Brown
Information security objectives
Planning of changes
12:00 – Chloe Alan
Lunch break
13:00 Roy Brown
Page 19 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
AUDIT PLAN
Date: March 7, 2023
Key
Time Auditor Steps
contact
• Verify conformity to clause 10
Improvement by reviewing:
Chloe Nonconformities and corrective Alan
8:30 –10:00
Roy actions taken or planned Brown
Other evidence of continual
improvement
Page 20 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
AUDIT PLAN
Date: March 20, 2023
Key
Time Auditor Steps
contact
Page 21 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Page 22 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
AUDIT PLAN
Date: March 21, 2023
Key
Time Auditor Steps
contact
• Interview a representative sample of
employees engaged in key processes
related to the ISMS; spend
approximately 10 minutes per person
• The interview should focus on:
Chloe Their ISMS roles and responsibilities Alan
8:30 – 9:30
Roy Processes for identifying the Brown
opportunities for improvement
Management and protection of
passwords
Reporting of security incidents and
events
Verify conformity to Annex A 7 controls:
• 7.10 Storage media
• 7.11 Supporting utilities
Chloe Alan
9:30 – 10:30 • 7.12 Cabling security
Roy Brown
• 7.13 Equipment maintenance
• 7.14 Secure disposal or re-use of
equipment
Page 23 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Possible answer:
Based on the audit plan, the auditor reviewed solely the Annex A controls identified
as applicable in the Statement of Applicability, but neglected to assess the
justifications for deeming other controls as not applicable. It is crucial in an audit to
not only evaluate the implementation and effectiveness of the selected controls but
also to understand and verify the rationale behind the exclusion of certain controls.
The auditor applied the same level of effort and techniques uniformly across all
clauses, instead of emphasizing a risk-based approach where auditors prioritize
high-risk areas. This could overlook or undermine the importance of varying risk
levels across different audit areas, potentially leading to inefficiencies and reduced
effectiveness in the audit process.
The closing meeting in the fourth day is scheduled before reviewing the controls
8.19, 8.20, and 8.21 of Annex A. The closing meeting should be conducted at the
end of the audit. Thus, this point needs be rescheduled, as well.
Page 24 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Possible answer:
The top management of BankPulse Solutions should be briefed by the audit team
leader on how the audit activities will be undertaken. Additionally, there are other
aspects that the opening meeting agenda should include, such as:
• Introduction of the audit team members
• Confirmation of the audit plan, objectives, scope, and criteria
• Confirmation of the audit plan and logistics
• Introduction of the audit methods
• Determination of the communication channels between the audit team and the
auditee during the audit
• Information on the availability of resources
• Information on audit findings and the closing meeting
Page 25 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Possible answer:
1. How does BankPulse Solutions manage access to source code, development
tools, and software libraries?
2. Regarding access permissions, how does the company differentiate read access
and write access to source code based on personnel roles?
3. Specifically, how are authorization procedures managed when updating source
code and associated items, in line with the change control procedures?
4. How are networks and network devices secured, managed, and controlled to
protect information in systems and applications?
5. How does BankPulse Solutions establish controls to safeguard the confidentiality
and integrity of data passing over public networks, third-party networks, or
wireless networks?
6. How has BankPulse Solutions determined the application security requirements?
7. What are the information security requirements that the company has identified,
specified, and approved for developing and acquiring applications?
8. Could you discuss the measures in place to ensure the protection of data while in
transit, at rest, or during testing phases of the applications?
Page 26 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Define the target population, the sample, and the sample size. In addition, choose
the sampling method and justify your decision. Briefly explain how you would
conduct the sampling process.
Possible answer:
The sampling population of this audit will be all BankPulse Solutions employees who
were subject to background verification checks conducted by the company. The
auditor decides to use the systematic selection method of sampling, because it is
statistically reliable and easy to execute. Moreover, this selection is based on a fixed
interval.
Page 27 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
Possible answer:
• Confirmation of questionnaire completion: Verify with the management team
whether all planned questions pertinent to the audit have been addressed. This
is essential to ensure that all areas of concern have been thoroughly explored
and discussed.
• Summary of findings: Present a concise overview of the main conclusions
derived from the audit process. This will involve summarizing the key findings
and insights gathered. I will request confirmation from the management to
validate the accuracy and alignment of the conclusions.
• Arrangements for follow-up information: Discuss and agree on the procedure for
obtaining any additional information required, such as documents or further data.
Clear steps and timelines will be established to ensure the smooth acquisition of
necessary information.
• Opportunity for questions and comments: Invite the top management to ask any
questions or provide comments regarding the audit process, its outcomes, or any
related concerns. This open discussion will allow for clarification and further
insights from their perspective.
• Acknowledgment and gratitude: Express my sincere appreciation for the top
management's participation, cooperation, and valuable input throughout the audit
process. Their time and collaboration have been fundamental in achieving a
comprehensive assessment.
Page 28 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
1. In the IT department, the same individual who has the authority to approve
system changes also has unrestricted access to implement those changes. This
lack of segregation of duties could lead to unauthorized or erroneous
modifications to critical systems.
Possible answer: While disciplinary actions might create awareness, the primary
issue is the absence of a structural control to prevent unauthorized or accidental
modifications in critical systems. By implementing a clear segregation of duties
policy, the company addresses the root cause, reducing the risk of errors or
intentional malfeasance within the IT systems.
Possible answer: I agree with the proposed corrective action since it addressed the
root cause of the nonconformity.
Page 29 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
3. The HR Department did not consistently verify applicants’ CVs and business
references due to a lack of awareness of the procedure.
Root cause: Inadequate and inconsistent training and communication within the HR
Department.
Corrective action: Inform (time frame: immediately) the HR team about the critical
importance and scope of background verification checks procedure for all potential
candidates prior to employment, emphasizing their legal, regulatory, and ethical
significance in accordance with company policies, train them (time frame: within
three months), and require that each member of the team follows the procedure
strictly.
Possible answer: I agree with the proposed corrective action. Attending trainings
and being constantly informed regarding the procedure helps in increasing
employees’ awareness.
Root cause: The employee, knowing the internal regulations of the organization,
has violated the rules.
Corrective action: Fire the employee based on internal rules and policies (time
frame: immediately).
Root cause: The current process for categorizing the latest information security
events as information security incidents is ineffective.
Page 30 of 31
Certified ISO/IEC 27001 Lead Auditor |
PECB Group Inc., ©2024
training sessions or workshops for relevant personnel to ensure they understand the
new incident categorization process (time frame: within 12 months).
Possible answer: I agree with the proposed corrective action, except that the
completion deadline is too extended. The auditor should ask the organization to
provide additional justifications regarding such extended deadlines.
Page 31 of 31