ISO 270018 min read

ISO 27001 External Audits: What to Expect

External audits are the final step in achieving ISO 27001 certification. Understanding what auditors look for and how the process works helps you prepare effectively and approach audits with confidence.

Key Takeaways

Point Summary
Two-stage process Stage 1 (documentation review) + Stage 2 (implementation verification)
Typical duration Stage 1: 1 day; Stage 2: 2-5 days (varies by organization size)
Auditor approach Sampling-based—auditors verify representative evidence, not everything
Outcome options Certification recommended, minor nonconformities, major nonconformities
After certification Annual surveillance audits + recertification every 3 years

Quick Answer: ISO 27001 certification involves two audit stages. Stage 1 reviews your documentation for completeness. Stage 2 verifies your controls are actually implemented. Most organizations receive certification with minor findings that are easily addressed. Preparation is key—a thorough internal audit beforehand catches most issues.

The Two-Stage Audit Process

Why Two Stages?

The two-stage audit ensures organizations are genuinely ready before the full certification audit. It's designed to:

  • Confirm documentation is complete before detailed review
  • Identify major gaps that would prevent certification
  • Allow time to address issues between stages
  • Make Stage 2 more efficient and focused

Stage 1: Documentation Review

Purpose: Verify that your ISMS documentation is complete and you're ready for Stage 2.

What auditors review:

  • ISMS scope and context documentation
  • Information security policy
  • Risk assessment methodology and results
  • Statement of Applicability (SoA)
  • Risk treatment plan
  • Internal audit results
  • Management review records

Typical duration: 1 day for smaller organizations; 2-3 days for larger organizations.

Outcomes:

  • Ready for Stage 2 (with or without minor observations)
  • Not ready for Stage 2 (significant gaps identified)

Gap between Stage 1 and Stage 2: Typically 2-4 weeks, allowing time to address any issues identified.

Stage 2: Implementation Verification

Purpose: Verify that your documented controls are actually implemented and effective.

What auditors do:

  • Review evidence of control implementation
  • Conduct interviews with staff
  • Test controls through sampling
  • Verify processes match documentation
  • Assess effectiveness of the ISMS

Typical duration: 2-3 days for smaller organizations; 4-5 days for larger organizations.

Methods used:

  • Document review
  • Interviews with various roles
  • System demonstrations
  • Evidence sampling
  • Process observation

What Auditors Look For

Core ISMS Requirements

Clause What Auditors Verify
4. Context Scope defined, interested parties identified
5. Leadership Management commitment, policy approved
6. Planning Risk assessment complete, objectives set
7. Support Resources, competence, awareness, communication
8. Operation Controls implemented, processes followed
9. Evaluation Monitoring, internal audit, management review
10. Improvement Nonconformities addressed, continual improvement

Control Verification

Auditors verify Annex A controls through sampling:

Control Area Example Evidence Reviewed
Access control User access lists, privilege reviews, MFA configuration
Change management Change tickets, approval records, testing evidence
Incident response Incident records, response procedures, lessons learned
Security awareness Training records, completion rates, content
Vendor management Vendor assessments, contracts, monitoring records
Physical security Access logs, visitor procedures, facility controls

Key Documents Auditors Request

Document Purpose
Information security policy Foundation of ISMS
Risk assessment Understanding of threats and risks
Statement of Applicability Control selection rationale
Risk treatment plan How risks are being addressed
Internal audit report Self-assessment results
Management review minutes Leadership engagement evidence
Policies and procedures Documented controls
Evidence of control operation Proof controls are working

Audit Findings Explained

Types of Findings

Finding Type Definition Impact
Major Nonconformity Significant failure to meet a requirement Prevents certification until resolved
Minor Nonconformity Isolated issue that doesn't undermine ISMS Certification can proceed; must resolve by surveillance audit
Observation Area for potential improvement No action required; for consideration
Opportunity for Improvement Suggestion for enhancement No action required

Examples of Each

Major Nonconformity Examples:

  • No risk assessment conducted
  • Statement of Applicability missing
  • No internal audit performed
  • Management review not completed
  • Critical security control not implemented

Minor Nonconformity Examples:

  • Access review not completed for one quarter
  • Single policy document missing approval date
  • Training records incomplete for 2-3 employees
  • Evidence of one control partially missing

Observation Examples:

  • Risk assessment could include more detail
  • Security metrics could be more comprehensive
  • Documentation format could be standardized

Addressing Nonconformities

For Major Nonconformities:

  • Must be resolved before certification
  • Requires additional evidence submission
  • May require follow-up audit visit
  • Timeline: typically 4-12 weeks

For Minor Nonconformities:

  • Can receive certification with minor findings
  • Must resolve before next surveillance audit
  • Submit evidence of resolution
  • Timeline: typically within 90 days or by surveillance audit

Interview Expectations

Who Gets Interviewed

Role Topics Covered
Management/Executive Commitment, policy, resources, risk appetite
ISMS Owner/Manager ISMS operation, risk assessment, controls
IT/Security Technical controls, monitoring, incident response
HR People controls, screening, training, termination
Operations Business processes, change management
General staff Awareness, policy understanding, procedures

Common Interview Questions

For Management:

  • How is information security prioritized?
  • What resources are allocated to security?
  • How are you kept informed about security status?

For Security/IT:

  • Walk me through your access provisioning process
  • How do you handle security incidents?
  • Show me evidence of recent vulnerability management

For Staff:

  • What would you do if you suspected a security incident?
  • What security training have you received?
  • How do you protect sensitive information?

Interview Tips

  • Answer honestly—auditors appreciate candor
  • If you don't know, say so and offer to find out
  • Demonstrate practical understanding, not just policy recitation
  • Have evidence ready to support your answers
  • Ask for clarification if questions are unclear

Audit Preparation Best Practices

Pre-Audit Checklist

Documentation:

  • All required documents complete and current
  • Version control and approval dates in place
  • Documents accessible and organized
  • Statement of Applicability accurate

Evidence:

  • Evidence collected for all applicable controls
  • Evidence covers the relevant time period
  • Evidence is organized and accessible
  • Gaps identified and addressed

People:

  • Key personnel available during audit
  • Staff briefed on audit process
  • Interview questions practiced
  • Roles and responsibilities clear

Technical:

  • Systems accessible for demonstration
  • Screen sharing/remote access working
  • Configuration evidence prepared
  • Security tools ready to demonstrate

Common Audit Pitfalls

Pitfall How to Avoid
Missing evidence Collect evidence before the audit
Outdated documentation Review and update all docs beforehand
Staff unaware of policies Conduct awareness training
No internal audit Complete internal audit 4-6 weeks prior
Management review missing Schedule review before audit
Technical issues Test systems and access beforehand

After the Audit

Receiving Your Certificate

After successful Stage 2:

  1. Auditor submits report to certification body
  2. Technical review by certification body
  3. Minor nonconformity evidence submitted (if any)
  4. Certificate issued
  5. Listed in certification body's registry

Timeline: Typically 2-4 weeks after Stage 2 (assuming no major nonconformities).

Surveillance Audits (Years 2-3)

Annual surveillance audits maintain certification:

Aspect Surveillance Audit
Duration 1-2 days (50-70% of initial)
Focus Changes since last audit, sample of controls
Scope Partial ISMS coverage (different areas each year)
Outcome Continued certification or findings

Recertification (Year 4)

Full recertification audit every three years:

Aspect Recertification Audit
Duration Similar to initial certification
Focus Full ISMS coverage
Scope Complete review of all requirements
Outcome New 3-year certificate

Choosing a Certification Body

What to Consider

Factor Consideration
Accreditation Must be accredited by recognized body (UKAS, ANAB, etc.)
Experience Familiarity with your industry and size
Availability Timeline alignment with your needs
Cost Competitive pricing for similar scope
Reputation Customer references and reviews
Approach Collaborative vs. adversarial style

Accreditation Bodies

Ensure your certification body is accredited by a recognized accreditation body:

  • UKAS (UK)
  • ANAB (US)
  • DAkkS (Germany)
  • COFRAC (France)
  • Other national accreditation bodies

Common Questions

Can audits be conducted remotely?

Yes. Remote audits have become common, especially for cloud-native organizations. Some certification bodies may prefer one on-site day for Stage 2, but fully remote audits are increasingly accepted.

How much notice do we get before audits?

You typically schedule audits 4-8 weeks in advance for initial certification. Surveillance audits are scheduled annually during your certification cycle.

What happens if we fail?

Major nonconformities prevent certification until resolved. You'll have the opportunity to address findings and submit evidence or undergo a follow-up audit. Failing outright is rare with proper preparation.

Can we change certification bodies?

Yes, through a "transfer audit." The new certification body reviews your existing certification and conducts an audit to take over. It adds some friction but is possible.

Working with Bastion

We help organizations prepare for and navigate external audits:

Support Area What We Provide
Pre-audit review Identify and address gaps before the audit
Evidence preparation Organize documentation and evidence
Audit coordination Schedule and manage auditor logistics
Interview preparation Brief team members on audit expectations
Finding resolution Help address any nonconformities
Ongoing support Prepare for surveillance audits

Ready to prepare for your ISO 27001 audit? Talk to our team


Sources