{"id":206,"date":"2026-04-09T18:14:56","date_gmt":"2026-04-09T18:14:56","guid":{"rendered":"https:\/\/jdaadvisory.com\/?page_id=206"},"modified":"2026-04-14T20:08:32","modified_gmt":"2026-04-14T18:08:32","slug":"audit-iso-27001-checklist","status":"publish","type":"page","link":"https:\/\/jdaadvisory.com\/en\/audit-iso-27001-checklist\/","title":{"rendered":"Audit ISO 27001 checklist"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--1\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-6729bdbe wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading ext-animate--on\">Audit ISO 27001 checklist &#8211; Prepare thoroughly for your ISO 27001 audit and protect your data.<\/h2>\n\n\n\n<p class=\"has-text-align-left ext-animate--on\">The ISO 27001 checklist is a practical tool that supports effective audit preparation, ensuring compliance with standards and regulations &#8211; Audit ISO 27001 checklist<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-174606dc wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<div class=\"wp-block-cover is-style-ext-preset--image--natural-1--image-1--content-right ext-animate--on is-style-ext-preset--image--natural-1--image-1--content-right--2\" style=\"padding-top:0;padding-bottom:0;min-height:100%;aspect-ratio:unset;\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" class=\"wp-block-cover__image-background wp-image-216\" alt=\"\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c576ce971f7bd9c61c85df61c3868e35dec4266c.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c576ce971f7bd9c61c85df61c3868e35dec4266c.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c576ce971f7bd9c61c85df61c3868e35dec4266c-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c576ce971f7bd9c61c85df61c3868e35dec4266c-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c576ce971f7bd9c61c85df61c3868e35dec4266c-768x512.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-0 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:240px\" aria-hidden=\"true\" class=\"wp-block-spacer ext-animate--on\"><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--3\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h3 class=\"wp-block-heading ext-animate--on\">Audit ISO 27001 checklist &#8211; A comprehensive audit of compliance with the ISO 27001 standard.<\/h3>\n\n\n\n<p class=\"ext-animate--on\">Our checklist helps you verify all ISO 27001 requirements in detail, minimising the risk of non-compliance during an audit.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--4\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h3 class=\"wp-block-heading ext-animate--on\">Audit ISO 27001 checklist &#8211; Support in meeting the requirements of NIS-2 and DORA.<\/h3>\n\n\n\n<p class=\"ext-animate--on\">The checklist makes it easy to monitor compliance with current regulations, which contributes to the company\u2019s safety and operational stability.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--5\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group ext-animate--on is-nowrap is-layout-flex wp-container-core-group-is-layout-64fa2afa wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group ext-animate--on wp-container-content-958eb9dc has-global-padding is-layout-constrained wp-container-core-group-is-layout-c06d165c wp-block-group-is-layout-constrained\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<h3 class=\"wp-block-heading ext-animate--on\">Audit ISO 27001 checklist &#8211; Simplified implementation and improvement of management systems.<\/h3>\n\n\n\n<p class=\"ext-animate--on\">The tool helps to identify areas for improvement and to effectively implement the ISO 27001 and ISO 22301 standards.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.iso.org\/standard\/27001\">ISO 27001:2022<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--6\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-174606dc wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-119bc444 wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading ext-animate--on\">Information security management in accordance with the requirements of ISO 27001, to protect your company\u2019s data.<\/h2>\n\n\n\n<p class=\"has-text-align-left ext-animate--on\" style=\"margin-top:1.5rem\">This checklist highlights the key areas of an ISO 27001 audit, helping organisations to prepare for and comply with information security standards.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns ext-animate--on is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--7\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">Comprehensive ISO 27001 compliance audit<\/h3>\n\n\n\n<p class=\"ext-animate--on\">Our checklist helps you quickly identify and eliminate risks to ensure compliance with the standard and effective data protection.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--8\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik04MCw0MGE0MCw0MCwwLDEsMCw0MCw0MEE0MCw0MCwwLDAsMCw4MCw0MFptMCw2NGEyNCwyNCwwLDEsMSwyNC0yNEEyNCwyNCwwLDAsMSw4MCwxMDRabTk2LDE2YTQwLDQwLDAsMSwwLTQwLTQwQTQwLDQwLDAsMCwwLDE3NiwxMjBabTAtNjRhMjQsMjQsMCwxLDEtMjQsMjRBMjQsMjQsMCwwLDEsMTc2LDU2Wk04MCwxMzZhNDAsNDAsMCwxLDAsNDAsNDBBNDAsNDAsMCwwLDAsODAsMTM2Wm0wLDY0YTI0LDI0LDAsMSwxLDI0LTI0QTI0LDI0LDAsMCwxLDgwLDIwMFptMTM2LTI0YTgsOCwwLDAsMS04LDhIMTg0djI0YTgsOCwwLDAsMS0xNiwwVjE4NEgxNDRhOCw4LDAsMCwxLDAtMTZoMjRWMTQ0YTgsOCwwLDAsMSwxNiwwdjI0aDI0QTgsOCwwLDAsMSwyMTYsMTc2WiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">Optimisation of safety processes<\/h3>\n\n\n\n<p class=\"ext-animate--on\">With our guidance, you can streamline your information security procedures, minimising vulnerabilities and strengthening your defences.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns ext-animate--on is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--9\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">Support with the implementation of the standard<\/h3>\n\n\n\n<p class=\"ext-animate--on\">We offer practical tools and advice to help you implement ISO 27001 and improve the effectiveness of your management system.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--10\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0yNDgsMTI4YTU2LDU2LDAsMCwxLTk1LjYsMzkuNmwtLjMzLS4zNUw5Mi4xMiw5OS41NWE0MCw0MCwwLDEsMCwwLDU2LjlsOC41Mi05LjYyYTgsOCwwLDEsMSwxMiwxMC42MWwtOC42OSw5LjgxLS4zMy4zNWE1Niw1NiwwLDEsMSwwLTc5LjJsLjMzLjM1LDU5Ljk1LDY3LjdhNDAsNDAsMCwxLDAsMC01Ni45bC04LjUyLDkuNjJhOCw4LDAsMSwxLTEyLTEwLjYxbDguNjktOS44MS4zMy0uMzVBNTYsNTYsMCwwLDEsMjQ4LDEyOFoiPjwvcGF0aD48L3N2Zz4=\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">Risk and Compliance Management<\/h3>\n\n\n\n<p class=\"ext-animate--on\">Our checklist helps you effectively monitor and manage risks, ensuring ongoing compliance with regulations and standards.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--11\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<div class=\"wp-block-group alignwide ext-is-logical-start ext-animate--on has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-6729bdbe wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading ext-animate--on\">Get ready for ISO 27001 audits with our detailed checklist.<\/h2>\n\n\n\n<p class=\"ext-animate--on\">This section provides a comprehensive guide to help you prepare for ISO 27001 compliance audits.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--12\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">Information security<\/h3>\n\n\n\n<p class=\"ext-animate--on\">Find out about the key requirements and practices that will ensure your data is protected.<\/p>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-ext-preset--button--natural-1--button-1 ext-animate--on is-style-ext-preset--button--natural-1--button-1--13\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.iso.org\/standard\/27001\">ISO 27001:2022<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--14\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">Compliance with customer requirements<\/h3>\n\n\n\n<p class=\"ext-animate--on\">Find out how to meet your clients\u2019 information security requirements<\/p>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-start ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-start--15\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,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\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\">The audit process<\/h3>\n\n\n\n<p class=\"ext-animate--on\">A step-by-step guide to help you navigate every stage of the ISO 27001 audit.<\/p>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-ext-preset--button--natural-1--button-1 ext-animate--on is-style-ext-preset--button--natural-1--button-1--16\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.iso.org\/standard\/70017.html\">ISO 19011<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-tertiary-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e955bbaf wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--17\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--70);padding-bottom:var(--wp--preset--spacing--70)\">\n<h4 class=\"wp-block-heading has-text-align-center ext-animate--on\">How does an ISO 27001 audit work?<\/h4>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\" style=\"margin-top:1.5rem\">A step-by-step guide to help you understand the ISO 27001 audit process and prepare your company to meet the highest standards of information security.<\/p>\n\n\n\n<div class=\"wp-block-columns alignwide ext-animate--on is-layout-flex wp-container-core-columns-is-layout-08c01c1c wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--18\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlpNMTQwLDgwdjk2YTgsOCwwLDAsMS0xNiwwVjk1bC0xMS41Niw3LjcxYTgsOCwwLDEsMS04Ljg4LTEzLjMybDI0LTE2QTgsOCwwLDAsMSwxNDAsODBaIj48L3BhdGg+PC9zdmc+\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step one: Preparing for the audit<\/h5>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">Detailed preparation involving an analysis of the standard\u2019s requirements and the identification of key safety areas to be assessed during the audit.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--19\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlptMjUuNTYtOTIuNzRMMTIwLDE2OGgzMmE4LDgsMCwwLDEsMCwxNkgxMDRhOCw4LDAsMCwxLTYuNC0xMi44bDQzLjE3LTU3LjU2YTE2LDE2LDAsMSwwLTI3Ljg2LTE1LDgsOCwwLDAsMS0xNS4wOS01LjM0LDMyLDMyLDAsMSwxLDU1Ljc0LDI5LjkzWiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step two: Conducting an audit<\/h5>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">A thorough review of processes and information systems to confirm compliance with ISO 27001 and identify any gaps and risks.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-stretch ext-animate--on is-layout-flow wp-container-core-column-is-layout-f5bb311e wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-ext-preset--group--natural-1--item-card-1--align-center ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--item-card-1--align-center--20\">\n<div class=\"wp-block-group is-style-default ext-animate--on has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image aligncenter size-large ext-aspect-landscape ext-animate--on wp-duotone-primary-foreground\"><img decoding=\"async\" src=\"data:image\/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0OCIgaGVpZ2h0PSI0OCIgZmlsbD0iIzAwMDAwMCIgdmlld0JveD0iMCAwIDI1NiAyNTYiPjxwYXRoIGQ9Ik0xMjgsMjRBMTA0LDEwNCwwLDEsMCwyMzIsMTI4LDEwNC4xMSwxMDQuMTEsMCwwLDAsMTI4LDI0Wm0wLDE5MmE4OCw4OCwwLDEsMSw4OC04OEE4OC4xLDg4LjEsMCwwLDEsMTI4LDIxNlptMzItNjRhMzYsMzYsMCwwLDEtNjEuNzEsMjUuMTlBOCw4LDAsMSwxLDEwOS43MSwxNjYsMjAsMjAsMCwxLDAsMTI0LDEzMmE4LDgsMCwwLDEtNi41NS0xMi41OUwxMzYuNjMsOTJIMTA0YTgsOCwwLDAsMSwwLTE2aDQ4YTgsOCwwLDAsMSw2LjU1LDEyLjU5bC0yMSwzMEEzNi4wNywzNi4wNywwLDAsMSwxNjAsMTUyWiI+PC9wYXRoPjwvc3ZnPg==\" alt=\"\" style=\"object-fit:cover\"\/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading has-text-align-center ext-animate--on\">Step three: Reporting and improvement<\/h5>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">The preparation of a detailed audit report and recommendations for improvements that will help maintain and develop the information security management system.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\">Checklist ISO 27001:2022 Audit<\/h4>\n\n\n\n<p class=\"ext-animate--on\">A comprehensive, detailed, and ready-to-use ISO 27001 audit checklist.<\/p>\n\n\n\n<p class=\"ext-animate--on\"><strong>Kontekst organizacji (pkt 4)<\/strong><\/p>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>4.1 Understanding the organisation and its context<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Has the context been linked to security risks?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Have internal and external factors been identified?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Is the context updated on a regular basis?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: context analysis, strategic reports, risk registers.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>4.2 Stakeholders<\/strong> &#8211; Interested Parties<\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Is the list up to date?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Have the stakeholders been identified?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Have their information security requirements been defined?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: register of stakeholders, regulatory requirements.<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading ext-animate--on\"><strong>4.3 Scope of the ISMS<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Does the scope reflect the operational reality?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Is the scope clearly defined?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Does it cover processes, systems, locations and suppliers?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: scope document, process map, IT architecture.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>4.4 Information Security Management System<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Has the ISMS been established, implemented, maintained and improved?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: ISMS documentation, policies, procedures.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>5.1 Leadership and commitment<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Does it take part in reviews?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Does senior management actively support the ISMS?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Does it provide resources?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: meeting minutes, board decisions.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>5.2 Information Security Policy<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Does it reflect the security objectives?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Is the policy up to date, approved, and communicated?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: policy, internal communications.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>5.3 Roles, responsibilities, and powers<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Is there an ISMS owner?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Have roles been defined and assigned?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: RACI matrix, job descriptions, policies.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>6.1 Actions relating to risks and opportunities<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"ext-animate--on\">Are activities monitored?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there a risk analysis methodology in place?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Are risks identified, assessed and addressed?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: risk register, methodology, reports.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>6.2 Information security objectives<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Do they have owners and metrics?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Are the objectives measurable?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: KPIs\/KRIs, dashboards.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>7.1 Resources<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Are the resources commensurate with the risks and objectives?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: budgets, resource plans.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>7.2 Competences<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Are training courses provided?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Do employees have the necessary skills?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: skills matrices, training records.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>7.3 <\/strong>Awareness<\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Do employees understand the policies and their responsibilities?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: knowledge tests, security awareness campaigns.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>7.4 Communication<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Has internal and external communication been defined?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: communication plan, procedures.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>7.5 ISMS<\/strong> <strong>documentation<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Does version control work?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Are documents managed?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: document register, repository.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>8.1 Operational planning and control<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Are security processes defined and operational?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: procedures, logs, records.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>8.2 Information security risk assessment<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Is the risk analysis up to date and carried out on a regular basis?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: risk register, reports.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>8.3 Risk management<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Are the measures appropriate and have they been implemented?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: SoA, action plans.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>9.1 Moni<\/strong>toring, measurement, analysis,<strong> and evaluation<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Are there any KPIs\/KRIs?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Are they reported?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: dashboards, reports.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>9.2 Internal audit<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Are audits planned and carried out?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Are corrective actions implemented?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: audit plan, reports, NC.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>9.3 Management review<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Is the review being carried out in accordance with the requirements?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: reports, decisions.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>10.1 Non-conformities and corrective actions<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Are non-conformities recorded?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Are the measures effective?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: NC register, root cause analysis.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>110.2 Continuous improvement<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Does the organisation continuously improve its ISMS?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: roadmaps, initiatives.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>Anneks A \u2013 Security Controls &#8211; (Annex A)<\/strong><\/h4>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>A.5 \u2013 A.8 (Organisational, Human, Physical, Technical)<\/strong><\/h4>\n\n\n\n<p class=\"ext-animate--on\">For each inspection:<\/p>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Has the control been implemented?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Is it working effectively?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Is there operational evidence?<\/li>\n\n\n\n<li class=\"ext-animate--on\">Is the control proportionate to the risk?<\/li>\n<\/ul>\n\n\n\n<p class=\"ext-animate--on\"><strong>Examples of checks:<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>A.5.7 \u2013 Risks posed by suppliers<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Contracts include security requirements<\/li>\n\n\n\n<li class=\"ext-animate--on\">SLAs\/KPIs are monitored<\/li>\n\n\n\n<li class=\"ext-animate--on\">Suppliers are classified by risk<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: contracts, supplier register, monitoring results.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>A.8.16 \u2013 Activity monitoring<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Logs are collected, correlated and analysed<\/li>\n\n\n\n<li class=\"ext-animate--on\">Incidents are detected and escalated<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: SIEM logs, SOC reports.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading ext-animate--on\"><strong>A.8.28 \u2013 Backup<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\">Backups are performed, tested and secured<\/li>\n\n\n\n<li class=\"ext-animate--on\">Evidence: backup logs, restore test reports.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading ext-animate--on\"><strong>Assessment statuses<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list ext-animate--on\">\n<li class=\"ext-animate--on\"><strong>N\/A<\/strong> \u2013 not applicable<\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>OK<\/strong> \u2013 compliant<\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>OBS<\/strong> \u2013 observation<\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>MINOR NC<\/strong> \u2013 minor non-conformity<\/li>\n\n\n\n<li class=\"ext-animate--on\"><strong>MAJOR NC<\/strong> \u2013 major non-conformity<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-style-ext-preset--group--natural-1--section ext-animate--on has-background-background-color has-background has-global-padding is-layout-constrained wp-container-core-group-is-layout-e96f6837 wp-block-group-is-layout-constrained is-style-ext-preset--group--natural-1--section--21\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-cover alignfull is-style-ext-preset--cover--natural-1--cover-overlay-1 ext-animate--on is-style-ext-preset--cover--natural-1--cover-overlay-1--22\" style=\"padding-top:var(--wp--preset--spacing--70);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--30)\"><img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"960\" class=\"wp-block-cover__image-background wp-image-217\" alt=\"\" src=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/6722d3f8c5eb9581d050446d1769a6a24df381e9.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/6722d3f8c5eb9581d050446d1769a6a24df381e9.jpg 1440w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/6722d3f8c5eb9581d050446d1769a6a24df381e9-300x200.jpg 300w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/6722d3f8c5eb9581d050446d1769a6a24df381e9-1024x683.jpg 1024w, https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/6722d3f8c5eb9581d050446d1769a6a24df381e9-768x512.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-80 has-background-dim\" style=\"background-color:#010101\"><\/span><div class=\"wp-block-cover__inner-container has-global-padding is-layout-constrained wp-container-core-cover-is-layout-5cffc2c1 wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-group alignwide ext-animate--on is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-c9ee0c5a wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group ext-animate--on has-global-padding is-layout-constrained wp-container-core-group-is-layout-2287c683 wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center ext-animate--on\">Start your ISO 27001 audit with our checklist today.<\/h2>\n\n\n\n<p class=\"has-text-align-center ext-animate--on\">Use our detailed checklist to prepare for your ISO 27001 audit \u2014 ensure compliance and information security.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons ext-animate--on is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-ext-preset--button--natural-1--button-1 ext-animate--on is-style-ext-preset--button--natural-1--button-1--23\"><a class=\"wp-block-button__link wp-element-button\" href=\"#\">See details<\/a><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Audit ISO 27001 checklist &#8211; Prepare thoroughly for your ISO 27001 audit and protect your data. The ISO 27001 checklist is a practical tool that supports effective audit preparation, ensuring compliance with standards and regulations &#8211; Audit ISO 27001 checklist Audit ISO 27001 checklist &#8211; A comprehensive audit of compliance with the ISO 27001 standard. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-with-title","meta":{"footnotes":""},"class_list":["post-206","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Audit ISO 27001 checklist - JDA Advisory<\/title>\n<meta name=\"description\" content=\"Audit ISO 27001 Checklist from JDA Advisory \u2013 a practical ISMS checklist, requirements, gaps and certification readiness. Increase resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jdaadvisory.com\/en\/audit-iso-27001-checklist\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Audit ISO 27001 checklist - JDA Advisory\" \/>\n<meta property=\"og:description\" content=\"Audit ISO 27001 Checklist from JDA Advisory \u2013 a practical ISMS checklist, requirements, gaps and certification readiness. Increase resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jdaadvisory.com\/en\/audit-iso-27001-checklist\/\" \/>\n<meta property=\"og:site_name\" content=\"JDA Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T18:08:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c576ce971f7bd9c61c85df61c3868e35dec4266c.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AdvisoryJd65783\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/audit-iso-27001-checklist\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/audit-iso-27001-checklist\\\/\",\"name\":\"Audit ISO 27001 checklist - JDA Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/audit-iso-27001-checklist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/audit-iso-27001-checklist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/c576ce971f7bd9c61c85df61c3868e35dec4266c.jpg\",\"datePublished\":\"2026-04-09T18:14:56+00:00\",\"dateModified\":\"2026-04-14T18:08:32+00:00\",\"description\":\"Audit ISO 27001 Checklist from JDA Advisory \u2013 a practical ISMS checklist, requirements, gaps and certification readiness. Increase resilience.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/audit-iso-27001-checklist\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jdaadvisory.com\\\/audit-iso-27001-checklist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/audit-iso-27001-checklist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/c576ce971f7bd9c61c85df61c3868e35dec4266c.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/c576ce971f7bd9c61c85df61c3868e35dec4266c.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/audit-iso-27001-checklist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/jdaadvisory.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Audit ISO 27001 checklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"name\":\"JDA Advisory\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#organization\",\"name\":\"JDA Advisory\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"contentUrl\":\"https:\\\/\\\/jdaadvisory.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"JDA Advisory\"},\"image\":{\"@id\":\"https:\\\/\\\/jdaadvisory.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/AdvisoryJd65783\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Audit ISO 27001 checklist - JDA Advisory","description":"Audit ISO 27001 Checklist from JDA Advisory \u2013 a practical ISMS checklist, requirements, gaps and certification readiness. Increase resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jdaadvisory.com\/en\/audit-iso-27001-checklist\/","og_locale":"en_GB","og_type":"article","og_title":"Audit ISO 27001 checklist - JDA Advisory","og_description":"Audit ISO 27001 Checklist from JDA Advisory \u2013 a practical ISMS checklist, requirements, gaps and certification readiness. Increase resilience.","og_url":"https:\/\/jdaadvisory.com\/en\/audit-iso-27001-checklist\/","og_site_name":"JDA Advisory","article_modified_time":"2026-04-14T18:08:32+00:00","og_image":[{"width":1440,"height":960,"url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c576ce971f7bd9c61c85df61c3868e35dec4266c.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@AdvisoryJd65783","twitter_misc":{"Estimated reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jdaadvisory.com\/audit-iso-27001-checklist\/","url":"https:\/\/jdaadvisory.com\/audit-iso-27001-checklist\/","name":"Audit ISO 27001 checklist - JDA Advisory","isPartOf":{"@id":"https:\/\/jdaadvisory.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jdaadvisory.com\/audit-iso-27001-checklist\/#primaryimage"},"image":{"@id":"https:\/\/jdaadvisory.com\/audit-iso-27001-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c576ce971f7bd9c61c85df61c3868e35dec4266c.jpg","datePublished":"2026-04-09T18:14:56+00:00","dateModified":"2026-04-14T18:08:32+00:00","description":"Audit ISO 27001 Checklist from JDA Advisory \u2013 a practical ISMS checklist, requirements, gaps and certification readiness. Increase resilience.","breadcrumb":{"@id":"https:\/\/jdaadvisory.com\/audit-iso-27001-checklist\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jdaadvisory.com\/audit-iso-27001-checklist\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jdaadvisory.com\/audit-iso-27001-checklist\/#primaryimage","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c576ce971f7bd9c61c85df61c3868e35dec4266c.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/c576ce971f7bd9c61c85df61c3868e35dec4266c.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/jdaadvisory.com\/audit-iso-27001-checklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/jdaadvisory.com\/"},{"@type":"ListItem","position":2,"name":"Audit ISO 27001 checklist"}]},{"@type":"WebSite","@id":"https:\/\/jdaadvisory.com\/en\/#website","url":"https:\/\/jdaadvisory.com\/en\/","name":"JDA Advisory","description":"","publisher":{"@id":"https:\/\/jdaadvisory.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jdaadvisory.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/jdaadvisory.com\/en\/#organization","name":"JDA Advisory","url":"https:\/\/jdaadvisory.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","contentUrl":"https:\/\/jdaadvisory.com\/wp-content\/uploads\/2026\/04\/JDA-Advisory-business-logotype-information-security-and-business-continuity-4.jpg","width":1024,"height":1024,"caption":"JDA Advisory"},"image":{"@id":"https:\/\/jdaadvisory.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/AdvisoryJd65783"]}]}},"_links":{"self":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":5,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/206\/revisions"}],"predecessor-version":[{"id":501,"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/pages\/206\/revisions\/501"}],"wp:attachment":[{"href":"https:\/\/jdaadvisory.com\/en\/wp-json\/wp\/v2\/media?parent=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}