Back to blog
Information security expert conducting an ISO 27001 compliance audit on a laptop
iso-27001

How to Audit Your Information Security According to ISO 27001

Ilkka Sillanpää
Ilkka SillanpääCEO
Published on March 29, 2026

In many SMEs, information security is built piece by piece: access rights are managed somehow, backups mostly work, and instructions exist here and there. The problem arises at the latest when a customer asks for evidence, management wants an overview, or preparations for certification begin. Then a systematic way is needed to verify what is actually done and whether the activities meet the requirements of the ISO 27001 standard.

In this article, we walk you through how to practically audit your information security according to ISO 27001. You’ll get a clear step-by-step model, an audit checklist, a sample schedule, and the most common pitfalls to ensure your audit delivers more than just a pile of observations.

Prerequisites

  • Defined scope: which business areas, locations, systems, and services the audit covers
  • Assigned responsible person for coordinating the audit, such as IT manager, quality manager, or information security officer
  • Access to key documents: risk assessment, information security policy, access control guidelines, incident handling, and supplier list
  • At least 1–2 working days for preparation and 0.5–1 working days for the audit itself in a small organization
  • Decision on how findings will be handled and corrective actions closed, for example in monthly management or information security reviews

What Does ISO 27001 Auditing Mean in Practice?

An audit is a systematic review that evaluates whether an organization’s information security management system meets the requirements of the standard, its own policies, and practical operations. It’s not just about reading documents. The audit compares three things:

  • what you have decided to do
  • what ISO 27001 requires
  • what actually happens on a daily basis

A good audit answers at least the following questions:

  • Have risks been identified and addressed?
  • Are controls, i.e. protective practices, in place?
  • Are agreed procedures consistently followed?
  • Is there evidence of activities, such as logs, approvals, training records, or tickets?
  • Are incidents responded to and processes improved?

From ISO 27001’s perspective, auditing is not a one-off project but part of continuous improvement. In practice, this means internal audits should be conducted at least once a year, while high-risk areas like access rights or supplier management can be checked quarterly.

Note

ISO 27001 does not require that every control in the standard’s annex is implemented identically in all companies. The audit primarily assesses whether the chosen controls are justified considering your own risk environment and whether they work in practice.

What Should You Audit First?

If you try to check everything at once, the audit easily becomes overwhelming, and the most important things get lost. In an SME, it’s best to start with the areas where the risk is greatest or where customers most frequently request evidence.

A typical first audit round usually covers these 3–5 key areas:

AreaWhat to CheckExample EvidenceRecommended Frequency
Access Rights ManagementGranting, changes, removalsHR exit notifications, AD groups, ticketsQuarterly
Risk ManagementIdentified risks, treatment decisions, monitoringRisk register, action listTwice a year
Incident ManagementIdentification and handling of information security incidentsIncident tickets, root cause analysisQuarterly
Supplier ManagementContracts, requirements, evaluationsDPAs, supplier assessmentsOnce a year
Backups and RecoveryBackups, test restoresBackup reports, recovery tests2–4 times a year

Start by asking yourself: where would an error show quickest to the customer, business, or authorities? For example, if an employee's credentials remain active after employment ends, this poses a concrete risk. Then, the audit should verify if accounts are actually removed within 24 hours of departure.

What Kind of Evidence Does the Auditor Need?

One common misconception is that auditing is just document inspection. Documents are only the beginning. ISO 27001 audits require proof that agreed practices are actually implemented.

Collect evidence for the audit from at least these sources:

  • policies and guidelines
  • system logs and reports
  • ticket or service management system entries
  • training and onboarding records
  • contracts and approvals
  • interviews with responsible persons
  • spot checks, such as reviewing 5–10 user accounts

For example, in access rights management, a policy saying “supervisor approves accounts” is not enough. The auditor checks a few actual cases: who requested, who approved, when the account was created and when it was removed. This quickly shows if the process is truly under control.

Tip

Select a small sample from each audit area, for example 3 incidents, 5 users, or 2 suppliers. A small but verifiable sample usually reveals much more than general discussions.

Define the Audit Scope and Objective

First, specify what you are auditing and why. In a small organization, a scope might be “access rights management and removal process” or “information security incident handling in the last 12 months.” Also record the audit criteria: ISO 27001 requirements, your own guidelines, and any customer demands.

Prepare a Checklist Based on the Standard and Your Operations

Create a practical checklist where each question leads to verifiable evidence. For example, has the risk assessment been updated within the last 12 months? Is there an assigned approver for access rights, and are removals made within agreed timeframes? Keep the list concise: 10–20 questions per audit area suffice for most SMEs.

Interview Responsible Persons and Verify Evidence

Conduct the audit with those who actually perform the work. Interview IT, HR, service owners, and management if needed. At the same time, verify documents, logs, and spot checks to avoid relying only on descriptions.

Document Findings Clearly and Classify Them

Divide findings into at least three categories: nonconformity, improvement opportunity, and strength. A good record states what was found, which requirement applies, the associated risk, and what should be done. For example: "In two out of five reviewed cases, user accounts were removed more than 72 hours after employment ended, while the target is 24 hours."

Agree on Corrective Actions, Owners, and Deadlines

An audit delivers value only when findings lead to changes. Assign a responsible person, action, and deadline to each nonconformity, e.g., 30 days for small fixes and 60–90 days for broader changes. Verify closure later with evidence, not just notifications.

Sample Audit Schedule for an SME

Breaking the audit into clear phases keeps the workload manageable. The model below works well for companies with 20–250 employees and a defined ISO 27001 scope.

WeekTaskResponsibilityGoal
1Define scope and scheduleAudit LeadScope and participants decided
1Prepare checklistAudit Lead10–20 audit questions
2Collect documentsArea ownersRequired evidence gathered
2Interviews and spot checksAuditorFindings recorded
3Reporting and classificationAuditorNonconformities and improvements identified
4Agree on corrective actionsManagement + ownersResponsibilities and deadlines set
8–12Follow-up checkAudit LeadCorrections closed or escalated

If resources are limited, do 4 smaller audits per year rather than one large one. This allows time for findings to be addressed before the next round.

Common Mistakes in Auditing

Many audits fail for the same reasons. Do any of these sound familiar?

  • Audit done only for certification, not as a management tool.
  • Only documents are reviewed, practical implementation is not checked.
  • Findings are written too vaguely without deadlines or owners.
  • Auditor reviews only their own area without independent perspective.
  • Trying to cover the entire standard at once, leaving important risks unaddressed.

A particularly common mistake is copying the checklist directly from a template. Then the audit fails to consider your own environment, such as cloud services, subcontractors, or remote work. ISO 27001 works best when the audit is linked to your risk assessment and business reality.

Warning

A common pitfall is noting observations vaguely as “process should be improved.” Such entries do not lead to action. Always document what is missing, where it was seen, how many cases were affected, and by when the correction will be made.

Should You Conduct the Audit Yourself or Use an External Party?

Internal audits can be conducted by your own team as long as sufficient independence is ensured. In practice, this means for example an IT manager should preferably not audit their own access control process alone but have another person involved, such as a quality manager, information security officer, or external expert.

The simple comparison below helps choose the right approach:

OptionSuitable ForBenefitsLimitations
Internal AuditWhen basic process existsCost-effective, fast, teaches organizationBlind spots, challenges in independence
External AuditFirst round or preparing for certificationObjective perspective, benchmarking experienceHigher cost
Hybrid ModelSME wanting continuityInternal team learns, expert coachesRequires coordination

For many SMEs, the most effective solution is the hybrid model: internal reviews are done regularly, and an external expert reviews the overall picture, for example, once a year. This keeps the audit light while ensuring quality is not left to internal opinions alone.

In a solution like Tietoturvapankki, the advantage is that audit required materials, responsibilities, and actions stay in one place. This reduces time otherwise spent searching documents from different folders, emails, and ticketing systems.

How to Make Auditing a Continuous Practice?

The best audit is not an annual panic exercise but part of normal management. When the rhythm is clear, auditing doesn’t feel like a separate project.

In practice, this can be done as follows:

  • create an annual calendar with 4–6 checkpoints per year
  • monitor at least 3 metrics, such as open incidents, delayed access removals, and completed trainings
  • present findings in management reviews at least 1–2 times a year
  • ensure corrective actions are closed with evidence, not assumptions

A small but effective set of metrics might look like this:

MetricTargetMonitoring Frequency
Access removals within deadline95% within 24 hoursMonthly
High-risk incident handling100% within 7 daysMonthly
Mandatory security training completion98% within 30 daysQuarterly
Open audit nonconformities0 critical, others on scheduleMonthly

When metrics are visible, auditing changes from a retrospective check to proactive governance. This is precisely where ISO 27001 begins to deliver business value.

Summary

  • ISO 27001 audits compare requirements, your own practices, and day-to-day activities.
  • Start with the 3–5 most critical risk areas such as access control, incidents, and backups.
  • Always collect verifiable evidence: beyond documents, include logs, tickets, interviews, and spot checks.
  • Document findings precisely and assign each corrective action an owner and deadline, e.g., 30–90 days.
  • Make auditing a continuous practice with an annual calendar and clear metrics, not just for certification.

Need help with information security management?

Our experts are here to assist you.

Get in touch