Information

  • Audit Title

  • Document No.

  • Client / Site

  • Conducted on

  • Prepared by

  • Location
  • Personnel

4.3 Documentation Requirements

4.3.1 General Documentation Requirements

  • 4.3.1(a) Documented statements of the ISMS policy (4.2.1b) and objectives?

  • 4.3.1(b) The scope of the ISMS (4.2.1a)?

  • 4.3.1 (c) Procedures and controls in support of the ISMS?

  • 4.3.1(d) A description of the risk assessment methodology (4.2.1c)?

  • 4.3.1(e) The risk assessment report (4.2.1 c to g)?

  • 4.3.1(f) The risk treatment plan (4.2.2b)?

  • 4.3.1(g) Documented procedures needed by the organisation to ensure the effective planning, operations and control of its information security processes and describe how to measure the effectiveness of control (4.2.3c)?

  • 4.3.1(h) Records required by this standard (4.3.3)?

  • 4.3.1(i) The statement of applicability (4.2.1j)

4.3.2 Control of Documents (QSP-01)

  • 4.3.2(a) Approval of documents for adequacy prior to issue?

  • 4.3.2(b) Review and update documents as necessary and re-approve documents?

  • 4.3.2(c) Ensure that changes and the current revision status of documents are identifed?

  • 4.3.2(d) Ensure that the relevant versions of applicable documents are available at points of use?

  • 4.3.2(e) Ensure that documents remain legible and readily identifiable?

  • 4.3.2(f) Ensure that documents are available to those who need them, and are transferred, stored and ultimately disposed of in accordance with the procedures applicable to their classification?

  • 4.3.2(g) Ensure that documents of external origin are identified?

  • 4.3.2(h) Ensure that the distribution of documents is controlled?

  • 4.3.2(i) Prevent the unintended use of obsolete documents and apply suitable identification to them if they are retained for any purpose?

4.3.3 Control of Records (QSP-02)

  • 4.3.3 Are records protected and controlled?

  • 4.3.3 Are relevant legal or regulatory requirements and contractual obligations taken into account for control of records?

  • 4.3.3 Are records legible, readily identifiable and retrievable?

  • 4.3.3 Are controls needed for the identification, storage, protection, retrieval, retention time and disposition of records documented and implemented?

A5 Security Policy

  • A5.1 Is there an IS policy to provide management direction and support for information security in accordance with business requirements, relevant laws and regulations?

  • A5.1.1 Is an IS security policy document approved by management, published and communicated to all employees and relevant external parties?

  • A5.1.2 Is the IS policy reviewed at planned intervals or if significant changes occur to ensure its continuing suitability, adequacy and effectiveness?

A6 Organisation of Information security

A6.1 Internal Organisation

  • A6.1.1 Is management actively supporting security within the organisation through clear direction, demonstrated commitment, explicit assignment and acknowledgement of information security responsibilities?

  • A6.1.2 Is information security activities co-ordinated by representatives from different parts of the organisation with relevant roles and job functions?

  • A6.1.3 Are all information security responsibilities clearly defined?

  • A6.1.4 Is management authorisation process for new information processing facilities defined and implemented?

  • A6.1.5 Are requirements for confidentiality or non-disclosure agreements reflecting the organisation's needs for the protection of information defined and regularly reviewed?

  • A6.1.6 Are appropriate contacts with relevant authorities maintained?

  • A6.1.7 Are appropriate contacts with special interest groups or other specialist security forum and professional associations maintained?

  • A6.1.8 Is the organisation's approach to managing information security and its implementation reviewed independently at planned intervals or when significant changes to the security implementation occur?

A6.2 External Parties

  • A6.2.1 Are the risks to the organisation' information and information processing facilities identified and appropriate controls implemented before granting access to external parties?

  • A6.2.2 Have all identified security requirements been addressed before giving customer access to the organisation's information or assets?

  • A6.2.3 Do agreements with 3rd parties involving accessing, processing communicating or managing the organisation's information or information processing facilities cover all relevant security requirements?

7 Management review of the ISMS

7.1 General management review requirements

  • 7.1 Does management review the organisation's ISMS at planned intervals (at least once per year) to ensure its continuing suitability, adequacy and effectiveness?

  • 7.1 Does this review include assessing opportunities for improvement, need for changes to the ISMS, review of information security policy and objecitves?

  • 7.1 Are the results of the reviews clearly documented and records maintained?

  • Have management reviews of the ISMS been conducted and recorded?

7.2 Review input

  • 7.2 Give details of the inputs to management review

7.3 Review output

  • 7.3 Does the output from the review include decisions and actions relating to (a) improving the effectiveness of the ISMS, (b) Update of the risk assessment and risk treatment plan, (c) Modification of procedures and controls that effect IS, as necessary, to respond to internal/external events that may impact the ISMS, (d) Changes to business requirements, security requirements, business processes, regulatory/legal requirements, contractual obligations and level of risk and/or criteria for accepting risks, (e) Resource needs and (f) improvements to how the effectiveness of controls is measured,

  • Give the date of the latest management review

A15 Compliance

A15.1 Compliance with legal requirements

  • A15.1.1 Are all relevant statutory, regulatory and contractual requirements and the organisation's approach to meet these requirements explicitly defined, documented and kept up to date for each information system and the organisation?

  • A15.1.2 Are appropriate procedures implemented to ensure compliance with legislative, regulatory and contractual requirements on the use of material with respect to the intellectual property rights and use of propriety s/w products?

  • A15.1.3 Are important organisational records protected from loss, destruction and falsification, in accordance with statutory, regulatory, contractual and business requirements?

  • A15.1.4 Are data protection and privacy ensured as required in relevant statutory, regulatory, and if applicable contractual requirements?

  • A15.1.5 Are users deterred from using information processing facilities for unauthorised purposes?

  • A15.1.6 Are cryptographic controls used in compliance with all relevant agreements, laws and regulations?

A15.2 Compliance with security policies and standards

  • A15.2.1 Do manager ensure that all security procedures within their area of responsibility are carried out correctly to achieve compliance with security policies and standards?

  • A15.2.2 Are information systems regularly checked for compliance with security implementation standards?

A15.3 System audit consideration

  • A15.3.1 Are audit requirements and activities involving checks on operational systems carefully planned and agreed to minimise the risk of interruption to business processes

  • A15.3.2 Are access to information system audit tools protected to prevent possible misuse or compromise?

Major non-conformances

Minor non-Conformances

Observations and opportunities for improvemement

  • Sign off the audit

The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions. The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice. You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction. You should independently determine whether the template is suitable for your circumstances.