Sri Internal Audit Procedure
1 Purpose of this procedure
- To ensure that the company continually operates in accordance with the specified policies, procedures and external requirements in meeting company goals and objectives in relation to information security.
- Also to ensure that improvements to the Information Security Management System (ISMS) are identified, implemented and suitable to achieve objectives.
2.1 This procedure includes planning, execution, reporting and follow–up of ISMS internal audits and applies to all departments and business units within scope of the organization’s ISMS.
3 Roles and responsibilities
3.1 Information Security Management Representative (ISMR)
- Appoints the Lead Auditor and the Audit Team (note: the Lead Auditor and ISMR may be the same person).
- Together with the Lead Auditor, reviews the corrective and preventive actions and the follow-up audits done based on the internal audit report submitted.
- Maintains the confidentiality of the audit results.
3.2 Lead Auditor
- Prepares an Audit Plan/Notification as a basis for planning the audit and for disseminating information about the audit.
- Leads the ISMS internal audit activities
- Co-ordinates the audit schedule with concerned department/section heads
- Plans the audit, prepares the working documents and briefs the audit team.
- Consolidates all audit findings and observations and prepares internal audit report.
- Reports critical non-conformities to the auditee immediately.
- Report to the auditee the audit results clearly and without delay.
- Conducts the opening and closing meeting.
3.3 Audit Team Member
- Supports the Lead Auditor’s activities.
- Performs the audit using the consolidated audit checklist.
- Reports the non-conformities and recommends suggestions for improvement
- Retains the confidentiality of audit findings.
- Acts in an ethical manner at all times.
- Receives, considers and discusses the audit report.
- Determines, resources, drives and completes corrective actions as necessary.
- Is and remains accountable for protecting information assets.
4.1.1 An ISMS audit programme shall be created that contains all scheduled and potential audits for the whole calendar year. This shall include schedule of internal audits, audits of suppliers, audits to be performed by clients and third-party audits, as appropriate.
4.1.2 Internal audits shall be scheduled twice a year or as the need arises.
4.1.3 Only competent personnel who are truly independent of the subject area shall perform audits.
4.1.4 All members of the Internal Audit Team shall be appointed by the ISMR
4.1.5 The Lead Auditor shall supervise the activity of the Audit Team.
4.1.6 An Audit Notification Memo is sent to the department/section to be audited at least three working days in advance of the audit.
4.2 Planning and Preparing the Audit
4.2.1 An annual ISMS internal audit programme shall be prepared by the Lead Auditor and approved by the President or CEO. It should be revised to reflect any changes in the priorities or schedule during the year.
4.2.2 Based on the audit programme, the Lead Auditor shall prepare the respective audit plans.
4.2.3 The Audit Plan/Notification shall be prepared by the Lead Auditor, reviewed and approved by the ISMR. It shall be communicated to the auditors and the auditees. It shall be designed to be flexible in order to permit changes based on the information gathered during the audit. The plan shall include:
- Audit objective and scope
- Department/Section and responsible individuals in charge.
- Audit team members. The number of auditors depends on the audit area size.
- Type of management system to be audited
- Date, place, time of the audit and distribution date of the audit report
4.3 Pre-audit meeting
4.3.1 One or more pre-audit meetings between the ISMR, Lead Auditor and auditors shall take place not later than one day prior to the audit proper. Objectives are as follows:
- To ensure the availability of all the resources needed and other logistics that may be required by the auditor.
- The scope of the audit is verified from the Audit Plan
4.4 Opening meeting
4.4.1 An opening meeting, where deemed appropriate by the ISMR and Lead Auditor, shall be held on the day of the audit but before the audit proper. The following may be discussed during the opening meeting:
- The purpose and scope of the audit.
- Confirmation of the audit plan
- Clarification of other matters must be settled before the audit takes place.
4.5 Audit Execution
4.5.1 The auditors will perform the internal audit using several checklists:
- Internal Audit Checklist/Observation Form – contains specific items that are particular to the organizational unit to be audited. The assigned auditors are responsible for generating questions using this form.
- Systemic Requirements Checklist– contain items relating to the requirements of ISO/IEC 27001:2005
- Control Requirements Checklist– contain items pertaining to controls outlined in Appendix A of ISO/IEC 27001:2005 and described more fully in ISO/IEC 27002:2005.
4.5.2 Audit findings are collected through interviews, examination of documents and observation of activities and conditions in the areas of concern and will be written on the above-mentioned checklists.
4.5.3 Evidence suggesting other non-conformities should be noted if they seem significant, even though not covered by the checklist. Other objective evidence and/or observations that may reflect positively or negatively on the information security management system shall also be listed on the space provided for on the above-mentioned checklists.
4.6 Audit Reporting
4.6.1 The auditors shall have a wash-up meeting after the audit. Agenda includes:
- Review and analysis of findings
- Consolidation of all findings including grouping and tabulation.
- Classification of findings.
- Preparation of recommendation and audit report
- Classification of findings (see section 4.6.4)
- Preparation of recommendation and audit report
4.6.2 The audit team shall review all of their findings whether they are to be reported as non-conformities or as observations. Audit finding should likewise be supported by objective evidence.
4.6.3 The Lead Auditor consolidates all the audit findings for the preparation of the audit report.
4.6.4 Classification of findings shall be:
- Major non-conformity – This pertains to a major deficiency in the ISMS. A non-conformity also pertains to one or more element of the ISO 27001 is not implemented. Non-conformities have a direct effect on information security specifically on the preservation of confidentiality, integrity and availability of information assets.
- Minor non-conformity – A minor deficiency. One or more elements of the ISMS is/are only partially complied. Minor non- conformity has an indirect effect on information security.
Note: Both major and minor non-conformities require appropriate corrective actions to be documented on the NCPAR form.
- Improvement potential – A hint for improvement which may or may not be implemented by the auditee.
Note: Improvement potentials which pertain to an information security weakness shall require appropriate preventive actions to be documented on the NCPAR form.
- Positive findings – Findings that pertain to processes and/or systems that go beyond what is required by the standard.
4.6.4 The Lead Auditor shall prepare a standard internal audit Report containing the following information:
- Audit Reference Number
- Date of Audit
- Department/Section Audited/Process Name
- Name of Auditee and auditors
- Statement of findings (all non conformities found)
- Reference to the information security management system and standard
- Corrective and Preventive Actions with completion date
- Follow-up actions for non conformities
- Verification of follow-up actions
4.6.5 Auditors shall follow a code of conduct in the manner of reporting as stated in this document:
- The report should be concise but factual and presented in a constructive manner.
- The findings should be within the scope of audit and shows the relationship of the standard used.
- The report should not show bias by the individual auditor.
4.6.6 The Lead Auditor shall issue a formal Audit Report to the ISMR (if the ISMR is not the Lead Auditor).
4.6.7 The internal audit report shall be maintained and controlled by the ISMR in accordance with the Control of Records Procedure.
4.7 Closing Meeting
4.7.1 The Lead Auditor shall preside over the closing meeting attended by the audit team and the auditees.
4.7.2 The auditors shall report their findings, observations and recommendations, summarising the good points before discussing non-conformities supported by the audit evidence.
4.7.3 All parties shall safeguard the confidentiality of the internal audit report.
5 Audit Follow-up and Closure
5.1.1 Whereas the auditors are responsible for identifying non-conformities, auditees are responsible for resolving non-conformities.
5.1.2 Approved corrective actions shall be based on time scales agreed with the auditors.
5.1.3 The Lead Auditor shall follow-up to check the implementation of corrective action as stated on the Non-conformity/Corrective and Preventive Action report or NCPAR. Normally, follow-ups will use an abbreviated form of this audit procedure to verify the completion and effectiveness of the agreed corrective or preventive actions according to the agreed timescales.
5.1.4 The lead auditor shall issue a new NCPAR if corrective actions are not fully implemented by the committed date, and/or are not effective.
5.1.5 “Re-issue” shall be noted on the remarks column of the NCPAR log if any of the situations noted here become apparent.
5.1.6 An audit will not be considered complete and closed until all corrective actions or measures have been successfully implemented to the satisfaction of the Lead Auditor.
6 Auditors’ Qualifications
6.1 Personal attributes
6.1.1 Auditors shall possess the personal attributes, skills and competencies necessary to uphold the principles of auditing. An auditor should be:
- Ethical i.e. fair, truthful, sincere, honest and discreet;
- Open-minded i.e. willing to consider alternative ideas or points of view;
- Diplomatic i.e. tactful in dealing with people, particularly those who are senior or over-committed;
- Observant i.e. actively aware of physical surroundings and activities;
- Perceptive, i.e. instinctively aware of and able to understand situations;
- Versatile i.e. able to adjust readily to different situations;
- Tenacious i.e. persistent, focused on achieving objectives;
- Decisive i.e. reaches timely conclusions based on logical reasoning and analysis; and
- Self-reliant i.e. acts and functions independently while interacting effectively with others.
6.2 General knowledge and skills of an ISMS auditor. Auditors should have knowledge and skills in the following areas.
6.2.1 Audit principles, procedures and techniques: to enable the auditor to apply those appropriate to different audits and ensure that audits are conducted consistently and systematically. An auditor should be able to:
- Apply audit principles, procedures and techniques;
- Plan and organize the work effectively;
- Conduct the audit within the agreed time schedule;
- Prioritize and focus on matters of significance;
- Collect information through effective interviewing, listening, observing and reviewing documents, records and data;
- Understand the appropriateness and consequences of using sampling techniques for auditing;
- Verify the accuracy of collected information;
- Confirm the sufficiency and appropriateness of audit evidence to support audit findings and conclusions;
- Assess those factors that can affect the reliability of the audit findings and conclusions;
- Use work documents to record audit activities;
- Prepare audit reports of suitable quality and professionalism;
- Maintain the confidentiality and security of information, and
- Communicate effectively, either through personal linguistic skills or through an interpreter.
6.2.2 Management system and reference documents: to enable the auditor to comprehend the scope of the audit and apply audit criteria. Knowledge and skills in this area should cover:
- Interaction between the parts of the management system;
- ISMS standards, applicable procedures or other documents used as audit criteria;
- Recognizing differences between and priority of the reference documents;
- Application of the reference documents to different audit situations, and
- Information systems and technology for, authorization, security, distribution and control of documents, data and records.
6.2.3 Organization/business context: to enable the auditor to comprehend the organization’s operational context. Knowledge and skills in this area should cover aspects such as:
- Organization size, structure, functions and relationships,
- General business processes and related terminology, and
- Cultural and social customs of the auditee.
6.2.4 Applicable laws, regulations and other obligations: to enable the auditor to work within, and be aware of, various obligations towards information security, privacy, governance and other requirements that apply to the organization being audited. Knowledge and skills in this area should cover relevant:
- Local, regional and national codes, laws and regulations;
- Contracts and agreements;
- International treaties and conventions; and
- Other compliance requirements such as applicable standards.
6.3 Lead Auditors’ Qualifications
6.3.1 Audit team leaders should have additional knowledge and skills in audit leadership to facilitate the efficient and effective conduct of the audit. An audit team leader should be able to:
- Plan the audit and make effective use of resources during the audit;
- Represent the audit team in communications with the audit client and auditee;
- Organize, direct and motive audit team members;
- Mentor and provide guidance to auditor team members;
- Lead the audit team to reach the audit conclusions;
- Prevent or resolve conflicts; and
- Prepare and complete the audit report.
6.4 Specific Knowledge and Skills of ISMS Auditors.
6.4.1 Information security management system auditors should have knowledge and skills in Information security-related methods and techniques. To enable the auditor to examine information security management systems and to generate appropriate audit findings and conclusions. Knowledge and skills in this area should cover
- Information security terminology and concepts;
- Information security management principles and their application; and
- Information security management tools and their application.
6.4.2 Processes and products, including services: to enable the auditor to comprehend the technological context in which the audit is being conducted. Knowledge and skills in this area should cover:
- Industry-specific terminology;
- Technical characteristics of processes and products, including services, and industry-specific processes and practices.
7.1 As well as miscellaneous audit evidence (such as copies of documents, audit notes, records of interviews, system printouts etc.), ISMS internal audits generate the following formal records:
- Audit programme
- Audit plan/Notification
- Audit checklist/Observation sheet
- Systemic requirements checklist
- Control requirements checklist
- Internal audit Report
- Non-conformity/Corrective and Preventive Action report (NCPAR)
7.2 All information shall be appropriately secured given its often confidential nature.
7.3 All information shall be properly filed and indexed.