According to ISO/IEC 27001, Clause 5.1 (Leadership and Commitment), which of the following is NOT a responsibility of top management?
Comprehensive and Detailed In-Depth
ISO/IEC 27001 Clause 5.1 (Leadership and Commitment) defines top management's role in ensuring the effectiveness of the Information Security Management System (ISMS). It requires top management to:
Ensure the availability of resources for the ISMS (Correct Responsibility).
Promote continual improvement of the ISMS (Correct Responsibility).
Direct and support employees to contribute to ISMS effectiveness (Correct Responsibility).
B . Conducting regular internal audits -- Incorrect Responsibility:
Internal audits are not a direct responsibility of top management. Instead, Clause 9.2 (Internal Audit) requires audits to be conducted independently of management.
Top management is responsible for ensuring audits are conducted but does not need to conduct them personally.
Thus, top management is responsible for oversight and support but not for conducting internal audits themselves.
Relevant Standard Reference:
ISO/IEC 27001:2022 Clause 5.1 (Leadership and Commitment)
ISO/IEC 27001:2022 Clause 9.2 (Internal Audit)
During a certification audit, the auditee proved to the auditor through documented information that it had conducted a risk assessment and had selected a number of controls to ensure information security. What should the auditor verify in this case?
The auditor should verify that the selected controls are included in the Statement of Applicability (SoA), making option C the correct answer. ISO/IEC 27001:2022 requires organizations to document which Annex A controls are applicable based on the results of the risk assessment and risk treatment process. The SoA is the formal document that records these decisions, including justification for inclusion or exclusion of controls.
The existence of a risk assessment alone is not sufficient. Auditors must confirm traceability between identified risks, selected controls, and their formal documentation in the SoA. This ensures transparency, consistency, and accountability in how the organization manages information security risks.
Option A is incorrect because ISO/IEC 27001 does not require organizations to use external consultants for risk assessments. Risk assessments may be conducted internally, provided they follow a defined and systematic methodology. Option B is incorrect because controls can be preventive, detective, or corrective; there is no requirement that selected controls be corrective only.
Therefore, verifying that selected controls are properly reflected in the Statement of Applicability is a mandatory audit activity and a core requirement of ISO/IEC 27001 compliance.
Scenario 7: Lawsy is a leading law firm with offices in New Jersey and New York City. It has over 50 attorneys offering sophisticated legal services to clients in business and commercial law, intellectual property, banking, and financial services. They believe they have a comfortable position in the market thanks to their commitment to implement information security best practices and remain up to date with technological developments.
Lawsy has implemented, evaluated, and conducted internal audits for an ISMS rigorously for two years now. Now, they have applied for ISO/IEC 27001 certification to ISMA, a well-known and trusted certification body.
During stage 1 audit, the audit team reviewed all the ISMS documents created during the implementation. They also reviewed and evaluated the records from management reviews and internal audits.
Lawsy submitted records of evidence that corrective actions on nonconformities were performed when necessary, so the audit team interviewed the internal auditor. The interview validated the adequacy and frequency of the internal audits by providing detailed insight into the internal audit plan and procedures.
The audit team continued with the verification of strategic documents, including the information security policy and risk evaluation criteria. During the information security policy review, the team noticed inconsistencies between the documented information describing governance framework (i.e., the information security policy) and the procedures.
Although the employees were allowed to take the laptops outside the workplace, Lawsy did not have procedures in place regarding the use of laptops in such cases. The policy only provided general information about the use of laptops. The company relied on employees' common knowledge to protect the confidentiality and integrity of information stored in the laptops. This issue was documented in the stage 1 audit report.
Upon completing stage 1 audit, the audit team leader prepared the audit plan, which addressed the audit objectives, scope, criteria, and procedures.
During stage 2 audit, the audit team interviewed the information security manager, who drafted the information security policy. He justified the Issue identified in stage 1 by stating that Lawsy conducts mandatory information security training and awareness sessions every three months.
Following the interview, the audit team examined 15 employee training records (out of 50) and concluded that Lawsy meets requirements of ISO/IEC 27001 related to training and awareness. To support this conclusion, they photocopied the examined employee training records.
Based on the scenario above, answer the following question:
The audit team photocopied the examined employee training records to support their conclusion. Should the audit team obtain an approval from Lawsy before taking this action? Refer to scenario 7.
Yes, the audit team should obtain approval from Lawsy before photocopying documents. This is a best practice to ensure that the auditee agrees to the duplication of documents, which might contain sensitive or confidential information. Although auditors can observe and note down information, copying documents typically requires explicit permission to maintain trust and ensure compliance with confidentiality agreements.
References: ISO 19011:2018, Guidelines for auditing management systems
Which one of the following options is the definition of the context of an organisation?
The context of the organisation is the business environment in which the organisation operates and defines its information security management system (ISMS). It includes the internal and external factors and conditions that can influence the organisation's information security objectives, strategies, and policies. The context of the organisation helps the organisation to identify the scope, boundaries, and requirements of the ISMS, as well as the interested parties and their expectations. The context of the organisation is determined by considering both internal and external issues, such as the organisational structure, culture, values, mission, vision, objectives, strategies, resources, capabilities, processes, activities, products, services, markets, customers, competitors, suppliers, partners, regulators, laws, regulations, standards, guidelines, best practices, risks, opportunities, threats, vulnerabilities, etc. Reference: ISO 27001:2022 Clause 4 Context of the organization, ISO 27001 Requirement 4.1 -- Understanding the Context of the Organisation, ISO 27001 context of the organization -- How to define it - Advisera
Scenario 9: Techmanic is a Belgian company founded in 1995 and currently operating in Brussels. It provides IT consultancy, software design, and hardware/software services, including deployment and maintenance. The company serves sectors like public services, finance, telecom, energy, healthcare, and education. As a customer-centered company, it prioritizes strong client relationships and leading security practices.
Techmanic has been ISO/IEC 27001 certified for a year and regards this certification with pride. During the certification audit, the auditor found some inconsistencies in its ISMS implementation. Since the observed situations did not affect the capability of its ISMS to achieve the intended results, Techmanic was certified after auditors followed up on the root cause analysis and corrective actions remotely During that year, the company added hosting to its list of services and requested to expand its certification scope to include that area The auditor in charge approved the request and notified Techmanic that the extension audit would be conducted during the surveillance audit
Techmanic underwent a surveillance audit to verify its iSMS's continued effectiveness and compliance with ISO/IEC 27001. The surveillance audit aimed to ensure that Techmanic's security practices, including the recent addition of hosting services, aligned seamlessly with the rigorous requirements of the certification
The auditor strategically utilized the findings from previous surveillance audit reports in the recertification activity with the purpose of replacing the need for additional recertification audits, specifically in the IT consultancy sector. Recognizing the value of continual improvement and learning from past assessments. Techmanic implemented a practice of reviewing previous surveillance audit reports. This proactive approach not only facilitated identifying and resolving potential nonconformities but also aimed to streamline the recertification process in the IT consultancy sector.
During the surveillance audit, several nonconformities were found. The ISMS continued to fulfill the ISO/IEC 27001*s requirements, but Techmanic failed to resolve the nonconformities related to the hosting services, as reported by its internal auditor. In addition, the internal audit report had several inconsistencies, which questioned the independence of the internal auditor during the audit of hosting services. Based on this, the extension certification was not granted. As a result. Techmanic requested a transfer to another certification body. In the meantime, the company released a statement to its clients stating that the ISO/IEC 27001 certification covers the IT services, as well as the hosting services.
Based on the scenario above, answer the following question:
Is the internal auditor responsible for following up on action plans resulting from external audits?
Comprehensive and Detailed In-Depth
A . Correct Answer:
Internal auditors focus on internal audit nonconformities, while external auditors oversee external audit follow-ups.
B . Incorrect:
Minor nonconformities do not change the role of internal auditors.
C . Incorrect:
Internal auditors do not follow up on external audit findings---this is the certification body's responsibility.
Relevant Standard Reference:
ISO/IEC 27001:2022 Clause 9.2.2 (Internal Audit Responsibilities)
Gary Moore
2 days agoNancy Allen
16 days agoThomas Adams
8 days agoRachel Hernandez
9 days agoKris
1 month agoDiego
1 month agoJani
2 months agoSabrina
2 months agoJoesph
2 months agoHector
3 months agoJettie
3 months agoMammie
3 months agoTwanna
3 months agoAudry
4 months agoBettina
4 months agoShonda
4 months agoLaurel
4 months agoLeatha
5 months agoPeggie
5 months agoAlida
5 months agoFrank
5 months agoLera
6 months agoBette
6 months agoYoko
6 months agoWillodean
6 months agoJames
7 months agoIsaiah
7 months agoMarsha
7 months agoMarvel
7 months agoNan
8 months agoFranchesca
8 months agoNelida
8 months agoStephania
8 months agoLoren
10 months agoLashaun
11 months agoTina
1 year agoGearldine
1 year agoAileen
1 year agoLai
1 year agoTwanna
1 year agoAngelica
1 year agoPaz
1 year agoBernardo
1 year agoJulie
1 year agoElfriede
1 year agoCarmelina
2 years agoLouann
2 years agoBarabara
2 years agoJaney
2 years agoRoselle
2 years agoZachary
2 years agoEmeline
2 years agoLisandra
2 years agoJulio
2 years agoMy
2 years agoVi
2 years agoGlynda
2 years agoStephen
2 years agoJody
2 years agoSusy
2 years agoOnita
2 years agoHarrison
2 years agoTori
2 years agoReuben
2 years ago