Back to blog
Team preparing for ISO 27001 surveillance audit in a meeting room with documents and laptop
iso-27001

How to Prepare for an ISO 27001 Surveillance Audit

Ilkka Sillanpää
Ilkka SillanpääCEO
Published on March 29, 2026

ISO 27001 surveillance audits cause stress in many organizations—and with good reason. If documentation is scattered, responsibilities unclear, and evidence of practical implementation lacking, the audit day can quickly turn hectic and costly. Often, the problem isn’t that things haven’t been done, but that they can’t be clearly demonstrated.

This article walks you through how to prepare for an ISO 27001 surveillance audit so that you know what the auditor is likely to ask, what evidence to gather in advance, and how to organize the day without unnecessary hassle. You’ll get both background information and a concrete action plan you can apply immediately in your own company.

What Does an ISO 27001 Surveillance Audit Actually Mean?

A surveillance audit is a certification maintenance check that verifies your organization’s information security management system (ISMS) is still functioning as planned. It’s not just about documents existing, but about using, updating, and monitoring them in everyday operations.

In SMEs, this usually appears through practical questions. The auditor may want to see, for example, your risk assessment, incident handling, access rights management, or minutes from management reviews. They will also typically want to confirm that agreed-upon practices are actually being followed.

A surveillance audit typically reviews at least the following:

  • Whether the scope covered by ISO 27001 is still current
  • Whether the risk assessment has been updated within the last 12 months or after significant changes
  • Whether internal audits have been conducted as scheduled
  • Whether management has reviewed information security status at least once per year
  • Whether incidents, observations, and corrective actions are documented and closed within agreed timelines
  • Whether selected controls are justified and effectively implemented

Note

An ISO 27001 surveillance audit is not the same as an initial certification audit. The auditor expects the basic structure to be in place and focuses on how the management system operates in practice.

Where Do Companies Usually Stumble?

The most common challenge is not a single missing document but inconsistencies across the system. Your risk register may be updated, but resulting actions aren’t visible in task lists. The access rights process might be described, but accounts for former employees haven’t been removed within 24 hours as the company policy requires.

Another typical problem is over-reliance on one person’s knowledge. If only the information security officer knows how things work, the auditor may conclude the system isn’t embedded in the organization.

Check especially these risk areas before the audit:

  • Documented processes that don’t reflect current practices
  • Metrics defined but not regularly monitored
  • Internal audit findings left unresolved without deadlines
  • No evidence of staff information security training within the past 12 months
  • Supplier assessments performed once but not updated when contracts change
  • Backup in place but no recovery tests done in the last 6–12 months

Warning

A common mistake is preparing only from the documents’ perspective. Without practical evidence like tickets, approvals, logs, or training records, even good documentation remains incomplete.

What Evidence Should You Gather in Advance?

Good preparation means having key materials quickly accessible in one place. Practically, this might be a folder structure, a workspace compiled for the audit, or a system like Tietoturvapankki where documents, tasks, and monitoring appear in one view.

Think from the auditor’s perspective: if they ask about something, can you show the answer in 2–5 minutes? If not, your materials are probably too scattered.

The following table helps highlight what to collect:

Area to ReviewSample EvidenceRecommended PeriodResponsible Person
Risk Managementrisk register, treatment plan, approvalslatest version + changes in last 12 monthsinformation security officer
Internal Auditaudit plan, report, corrective actionslatest audit cyclequality or information security officer
Management Reviewminutes, decisions, metrics, resource decisionsat least once per yearmanagement
Access Rights Managementaccount requests and removals, approvals, checklistsample from last 3–6 monthsIT
Incident Managementincident log, root cause, corrective actionslast 12 monthsprocess owner
Training and Competenceattendance lists, training materials, acknowledgementslast 12 monthsHR / supervisors
Supplier Managementassessments, contracts, information security requirementsactive suppliersprocurement / IT

How to Organize the Audit Day Smoothly?

A surveillance audit goes better when the day is scripted in advance. This doesn’t mean rehearsing answers by heart but ensuring the right people are available at the right time and materials can be found without delay.

A good practice is to appoint one main coordinator and 2–4 key personnel responsible for their respective areas. In SMEs, these roles often include management, IT, information security officer, and if needed HR or customer service.

Plan at least the following ahead:

  • Hourly audit schedule
  • Who attends the opening and closing meetings
  • Who presents documents and where they are located
  • Who handles technical questions like logs or backups
  • How additional requests are handled during the day
  • Where the auditor’s observations and follow-ups are recorded immediately

Tip

Hold a 30-minute internal dry run about a week before the surveillance audit. Cover three questions: what is the auditor likely to ask, who answers, and where is the evidence found.

Conduct a 2–4 Week Audit Review

Gather key responsible people and review changes from the past 12 months: new systems, organizational changes, incidents, and open actions. The goal is to identify 3–5 critical risks or gaps that need closing before the surveillance audit.

Update Critical Documents and Ensure Consistency

Check that the risk assessment, scope, applicability statement, internal audit results, and management review are up to date. Make sure documented practices reflect current operations and outdated systems or roles are removed.

Collect Practical Evidence in an Audit Folder

Create a single, clear view or folder structure where you can find requested materials within 2–5 minutes. Include, for example, access requests, examples of removed accounts, training acknowledgments, incident handling, and backup test results.

Prepare Key Personnel to Answer About Their Work

Review each participant’s responsibilities, recent changes, and likely questions. It’s enough if they can clearly explain what is done, the timeline, and how the process is verified.

Agree on Rules and Follow-Up Actions for Audit Day

Assign one person to document observations, additional requests, and deadlines in real time. If the auditor raises an issue, agree on an owner and target date the same day, for example starting corrective actions within 5 business days.

Questions to Prepare Answers For in Advance

The auditor usually doesn’t expect perfect answers but consistent evidence that your organization controls its information security. Prepare short, practical answers for the most common questions.

You can even test these internally before the audit:

  • How do you identify and assess information security risks?
  • When was the risk assessment last updated?
  • How do you ensure access rights for departing employees are closed within 24 hours?
  • How is staff trained regarding information security, and how do you show this?
  • What happens when an information security incident is detected?
  • How does management monitor information security objectives and metrics?
  • How do you assess critical suppliers?
  • When was the last time backups were tested for recovery?

A good answer is often brief and verifiable. For example: “The departing employee’s manager submits a service request, IT closes the accounts the same workday, and the ticket system records the confirmation.” This is much stronger than a general claim that “we have a process.”

Common Last-Minute Fixes Before the Audit

In the final week, don’t try to rebuild the whole management system. Instead, focus on gaps that most affect the audit’s smoothness and number of findings.

Here is a practical prioritization model:

PriorityIssue to FixWhy This?Target Timeframe
1Open incidents with no ownerShows lack of controlAssign an owner immediately
2Missing management review or internal auditCore ISO 27001 requirementArrange before the audit
3Inconsistency between document and practiceCauses additional questionsUpdate document within 1 week
4Missing training evidenceEasy for auditor to checkGather acknowledgments in 3–5 days
5Scattered evidenceSlows auditCompile folder before the audit

If you can’t fix everything, be open. Auditors usually value a realistic status and clear improvement plan over rushed superficial fixes.

How Does Tietoturvapankki Make Preparation Easier?

In many SMEs, the biggest challenge is time, not lack of understanding. When documents, tasks, responsibilities, and monitoring are scattered, preparing for a surveillance audit can easily take several workdays. This also increases the risk of missing something important.

Tietoturvapankki is designed specifically for this problem. It combines an application with expert support so that maintaining an ISO 27001 management system isn’t left to scattered Excel sheets or sticky notes. When risks, actions, documents, and audit evidence are managed in one place, preparing for surveillance audits transforms from a project into a routine.

If your organization also applies ISO 9001 quality management, the same mindset supports both systems. Tietoturvapankki is operated by Softapankki Oy and QMClouds Oy, also part of the group that includes Laatupankki, the group’s quality management brand.

Summary

  • ISO 27001 surveillance audits go best when documents, evidence, and responsibilities are ready before audit day.
  • Pay special attention to risk management, internal audits, management reviews, access rights, and incident handling in the last 12 months.
  • A good goal is to find requested materials within 2–5 minutes and demonstrate how practices work in everyday operations.
  • Prepare 2–4 key personnel to clearly and evidence-based answer about their processes.
  • Avoid last-minute superficial fixes; prioritize critical gaps and document corrective actions realistically.

Need help with information security management?

Our experts are here to assist you.

Get in touch