ISO 27001 audits can be intimidating, especially if it’s the first time that your ISMS (information security management system) has come under scrutiny.
So how can you make sure you’re doing everything that you should? This blog helps settle your nerves, providing essential advice to ensure your audit is successful.
Reports that will impress your auditors
Being able to produce a set of accurate, concise and updated reports is sure to impress even the most critical of auditors.
Your auditor will pay particular attention to the information security risks you’ve identified during your risk assessment and the controls that have been applied to treat, tolerate, transfer or terminate these risks.
The auditor will also want to see that your SoA (Statement of Applicability) is clear about your justification for the Annex A controls you’ve included and excluded.
Let’s take a look at some of the important reports you should produce based on your risk assessment. Some of them are mandatory, whereas others will help you gain valuable audit brownie points.
1. The Statement of Applicability
Mandatory report for the audit, the SoA ensures the proper management and control of an ISMS.
The SoA identifies the controls that are relevant to your business, and explains why those controls have been selected (or omitted) to treat the identified risks.
Want to learn more?
2. The risk treatment plan
Another mandatory report for audit purposes, the RTP (risk treatment plan) provides a summary of:
- Each of the identified risks;
- The responses that have been designed for each risk;
- The parties responsible for those risks; and
- The target date for applying the risk treatment.
This document outlines how the organisation intends to manage information security.
3. The risk assessment report
The risk assessment report provides an overview of your findings.
This includes information on:
- The relevant assets;
- The treatment applied;
- The impact and likelihood of the risk affecting the confidentiality, integrity and availability of each asset before and after treatment;
- Comments related to the justification for the treatment;
- The owner of the risk;
- The order of priority of treating the risks;
- The control applied; and
- The target date for applying the treatment.
4. The risk summary report
The risk summary report provides detailed information about the residual risks, as determined by the risk assessment.
This is useful for assessing assets that remain moderately vulnerable, and for helping the organisation prepare its responses and continuity plans based on the likelihood or severity of those risks.
It is also useful for providing information regarding the residual risks to the board or other stakeholders, ensuring that this is accepted by the appropriate authority.
5. Comments report
Comments regarding the applications of controls you’ve implemented and omitted are incredibly useful, so you should collect them in this report.
Including comments here ensures that the organisation applies controls effectively and efficiently. It also provides a log that can be presented to an auditor to explain any variations.
6. Controls usage report
This controls usage report shows all of the controls from Annex A that you’ve implemented.
Unlike the SoA, it doesn’t include the controls you’ve omitted. That’s because the two documents have different purposes. The SoA is designed to document your thought process when applying controls, whereas the controls usage report provides an overview of the actions you’ve taken.
Creating a report dedicated to the controls you’ve implement is great for staying on top of your compliance activity.
The document is more streamlined than the SoA and contains only the information you need for monitoring the effectiveness of your security measures.
With vsRisk Cloud, this report is created automatically, as the tool populates all of the controls you have applied in one document.
Get started with vsRisk Cloud
By using vsRisk Cloud, you will simplify the ISMS risk assessment process, making it easy to produce all the documentation you need.
You don’t need to spend time developing a risk assessment methodology, instead getting straight to business.
The tool will also save you time maintaining your risk assessment. Its robust methodology means that upcoming risk reviews and further risk assessments can be performed quickly, consistently and cost-effectively.
A version of this blog was originally published on 31 May 2016.
*** This is a Security Bloggers Network syndicated blog from Vigilant Software – Compliance Software Blog authored by Julia Dutton. Read the original post at: https://www.vigilantsoftware.co.uk/blog/6-of-the-best-reports-for-your-iso-27001-audit