Module 8: The Certification Battle

Stage 1: The First Test

18 min
+50 XP

Stage 1: The First Test

Introduction

Stage 1 is your first formal encounter with your certification auditor. Think of it as a "pre-flight check" before the main certification audit (Stage 2). It's designed to answer one critical question:

"Is this organization ready for the Stage 2 certification audit?"

While Stage 1 is less intense than Stage 2, it's far from a formality. A poorly executed Stage 1 can:

  • Delay your certification timeline by months
  • Reveal major gaps that require extensive rework
  • Damage confidence in your ISMS
  • Increase costs through additional preparation time

Conversely, a successful Stage 1:

  • Builds confidence across the organization
  • Provides valuable feedback for final improvements
  • Creates a positive relationship with your auditor
  • Sets you up for smooth Stage 2 success

This lesson gives you everything you need to prepare for and excel at your Stage 1 audit.


What is Stage 1 Audit?

Primary Purpose

Stage 1 has four main objectives:

  1. Document Review

    • Verify that all required ISMS documentation exists
    • Assess if documentation meets ISO 27001 requirements
    • Confirm scope and boundaries are clearly defined
  2. Understanding Your Context

    • Review your organization's context and risk environment
    • Understand your business, processes, and technology
    • Assess if the scope is appropriate
  3. Readiness Assessment

    • Determine if you're ready for Stage 2
    • Identify any major gaps that must be addressed
    • Verify that the ISMS has been operational
  4. Stage 2 Planning

    • Plan the approach for Stage 2 audit
    • Identify key processes and controls to examine
    • Determine Stage 2 audit schedule and resource needs

Duration

Stage 1 duration varies based on organization size:

Organization SizeTypical Stage 1 Duration
1-5 employees0.5 - 1 day
6-25 employees1 - 1.5 days
26-65 employees1.5 - 2 days
66-125 employees2 - 2.5 days
126-275 employees2.5 - 3 days
276-625 employees3 - 4 days
625-1175 employees4 - 5 days

Note: These are guidelines from IAF MD 5. Your certification body may adjust based on:

  • Complexity of operations
  • Number of locations
  • Technology environment
  • Industry regulatory requirements
  • Maturity of your ISMS

Location

Stage 1 can typically be conducted:

  • On-site at your main location
  • Remotely via video conference (increasingly common post-COVID)
  • Hybrid with some remote and some on-site activities

Remote Stage 1 Requirements:

  • Reliable video conferencing capability
  • Ability to share screens and documents electronically
  • Virtual access to key personnel
  • Document sharing platform or portal

Stage 1 Outcome

Stage 1 results in one of these outcomes:

1. Ready for Stage 2

  • All required documentation in place
  • ISMS has been operational long enough
  • No major gaps identified
  • Stage 2 can proceed as planned

2. Ready for Stage 2 with Minor Issues ⚠️

  • Documentation substantially complete
  • Some minor gaps or areas for improvement noted
  • Issues can be addressed before or during Stage 2
  • Stage 2 proceeds, but focus areas identified

3. Not Ready for Stage 2

  • Major documentation gaps
  • ISMS not operational long enough
  • Significant issues that must be addressed first
  • Stage 2 must be rescheduled (typically 1-3 months later)

Stage 1 Audit Process Timeline

Typical Stage 1 Day Schedule

For a 1-day Stage 1 Audit:

8:00 AM - 8:30 AM: Opening Meeting

  • Introductions and auditor credentials
  • Audit scope and objectives confirmation
  • Schedule review and logistics
  • Ground rules and communication

8:30 AM - 10:30 AM: Document Review Session 1

  • Core ISMS documents (Clauses 4-6)
  • Scope, policy, context analysis
  • Risk assessment and risk treatment plan

10:30 AM - 10:45 AM: Break

10:45 AM - 12:30 PM: Document Review Session 2

  • Supporting documentation (Clauses 7-8)
  • Policies and procedures
  • Statement of Applicability review

12:30 PM - 1:30 PM: Lunch Break

1:30 PM - 3:00 PM: Process Interviews

  • IT Manager/CISO
  • Key process owners
  • Understanding implementation status

3:00 PM - 3:15 PM: Break

3:15 PM - 4:15 PM: Site Tour (if on-site)

  • Physical security observations
  • Technology environment walkthrough
  • Operational process review

4:15 PM - 5:00 PM: Auditor Review Time

  • Auditor analyzes findings
  • Prepares closing meeting presentation
  • You can use this time to prepare questions

5:00 PM - 5:45 PM: Closing Meeting

  • Audit findings presentation
  • Discussion of gaps or concerns
  • Stage 2 readiness determination
  • Next steps and Stage 2 planning

5:45 PM - 6:00 PM: Administrative Closeout

  • Sign audit records
  • Confirm follow-up actions
  • Schedule Stage 2

Before the Audit: Preparation Checklist

4 Weeks Before Stage 1

Documentation Preparation:

  • Compile all ISMS documents in one location
  • Create a document index/register
  • Ensure all documents are current (latest versions)
  • Remove draft or obsolete documents
  • Organize documents by ISO 27001 clause
  • Prepare electronic copies if audit is remote

Evidence Gathering:

  • Collect evidence of ISMS operation:
    • Risk assessment records (at least one cycle complete)
    • Management review minutes (at least one completed)
    • Internal audit report (at least one completed)
    • Training records
    • Incident records
    • Access review records
    • Backup test records
    • Vulnerability scan results

Team Preparation:

  • Identify who will participate in the audit
  • Brief all participants on their roles
  • Schedule all participants' availability
  • Prepare process owners for interviews

Logistics:

  • Confirm audit date and time
  • Book meeting rooms (or video conference links)
  • Arrange for refreshments (if on-site)
  • Prepare guest Wi-Fi access
  • Test video conferencing technology (if remote)

2 Weeks Before Stage 1

Document Review:

  • Conduct final review of all documentation
  • Fix any obvious gaps or errors
  • Ensure document version control is clear
  • Create document cross-reference matrix

Mock Exercise:

  • Conduct internal mock Stage 1 review
  • Ask internal audit team to review documents
  • Practice explaining ISMS to outsider
  • Identify and fix any issues found

Stakeholder Preparation:

  • Brief executive management on Stage 1
  • Send calendar invites to all participants
  • Share Stage 1 agenda with team
  • Distribute auditor background information

1 Week Before Stage 1

Final Checks:

  • Confirm auditor arrival details
  • Reconfirm participant availability
  • Ensure all requested documents are accessible
  • Prepare the audit room/virtual meeting space

Document Pre-Submission:

Many certification bodies request documents in advance:

  • Submit requested documents by deadline
  • Organize in clear folder structure
  • Include document index
  • Ensure all links/references work

Team Final Brief:

  • Hold 30-minute team alignment meeting
  • Review audit schedule
  • Clarify everyone's roles
  • Address any last questions or concerns
  • Set expectations and confidence building

Day Before Stage 1

Final Preparation:

  • Set up audit room with required materials
  • Test all technology (especially for remote audits)
  • Print any needed documents
  • Prepare name cards/badges
  • Confirm catering/refreshments
  • Do a final document spot check

Mental Preparation:

  • Review your ISMS highlights and accomplishments
  • Get a good night's sleep
  • Remember: Stage 1 is about readiness, not perfection
  • Maintain confidence in your preparation

Opening Meeting: Setting the Tone

What Happens in the Opening Meeting

The opening meeting typically lasts 15-30 minutes and covers:

1. Introductions

  • Auditor introduces themselves and provides credentials
  • Your team introduces themselves and their roles
  • Establish who is the main point of contact

2. Audit Scope Confirmation

  • Auditor confirms the agreed scope
  • Any exclusions are discussed
  • Boundaries are clarified
  • You acknowledge and agree

3. Audit Plan Review

  • Auditor presents the day's schedule
  • Key activities are outlined
  • Document review approach is explained
  • Interview schedule is confirmed

4. Logistics and Ground Rules

  • Break times
  • Lunch arrangements
  • Access to facilities
  • How to handle questions during the audit
  • Confidentiality confirmation

5. Audit Approach Explanation

  • Sampling methodology
  • How findings will be classified
  • Opportunities for clarification
  • Closing meeting format

6. Questions and Concerns

  • Your opportunity to ask questions
  • Clarify any uncertainties
  • Raise any special considerations

Who Should Attend the Opening Meeting

From Your Organization:

  • ISMS Project Lead / Information Security Manager
  • IT Manager / CTO
  • Compliance Manager (if applicable)
  • Executive sponsor (CEO, COO, or delegate)
  • Anyone playing a key role during the audit day

Not Required:

  • All employees
  • Process owners (unless being interviewed)
  • External consultants (unless specifically involved)

Tips for a Successful Opening Meeting

Do:

  • ✓ Arrive 5-10 minutes early
  • ✓ Be professional and welcoming
  • ✓ Take notes during the meeting
  • ✓ Ask clarifying questions if needed
  • ✓ Confirm you understand the schedule
  • ✓ Express your readiness and confidence

Don't:

  • ✗ Be defensive or nervous
  • ✗ Over-explain or justify before questions are asked
  • ✗ Promise things you can't deliver
  • ✗ Argue about the audit approach
  • ✗ Interrupt or dominate the conversation

Document Review: What Auditors Look For

The bulk of Stage 1 is document review. Here's what auditors examine for each ISO 27001 clause:

Clause 4: Context of the Organization

Documents Reviewed:

  • Context analysis documentation
  • Stakeholder analysis
  • ISMS scope statement
  • Scope boundaries documentation

What Auditors Check:

4.1 Understanding the Organization and Its Context

  • External issues documented (market, regulatory, technology)
  • Internal issues documented (culture, resources, capabilities)
  • Issues are relevant to ISMS purpose
  • Issues influence ISMS design decisions

4.2 Understanding Needs and Expectations of Interested Parties

  • Interested parties identified (customers, regulators, partners, etc.)
  • Their requirements and expectations documented
  • Legal and regulatory requirements included
  • Requirements influence ISMS scope and controls

4.3 Determining the Scope of the ISMS

  • Scope clearly defined
  • Boundaries specified (physical, organizational, technical)
  • References Clause 4.1 and 4.2 inputs
  • Exclusions (if any) are justified
  • Scope is appropriate for the organization

4.4 Information Security Management System

  • Evidence that ISMS has been established
  • ISMS processes defined
  • ISMS is maintained and continually improved
  • Process interactions are documented

Common Issues Found:

  • Scope too broad or too narrow
  • Context analysis is generic, not specific to organization
  • Interested parties list is incomplete
  • No clear connection between context and ISMS design

Sample Questions You Might Get:

  • "Why did you choose this scope? Why not include [X]?"
  • "How did you determine these interested parties?"
  • "Can you explain your decision to exclude [Y] from scope?"
  • "How often do you review your context and scope?"

Clause 5: Leadership

Documents Reviewed:

  • Information security policy
  • Management commitment evidence
  • Roles, responsibilities, and authorities documentation
  • Management review records

What Auditors Check:

5.1 Leadership and Commitment

  • Top management demonstrates commitment
  • Security policy approved by leadership
  • Resources allocated to ISMS
  • Evidence of management engagement

5.2 Policy

  • Information security policy exists
  • Policy is appropriate to organization's purpose
  • Includes commitment to continual improvement
  • Includes commitment to comply with requirements
  • Policy is documented and communicated
  • Policy is available to interested parties

5.3 Organizational Roles, Responsibilities and Authorities

  • Roles and responsibilities assigned and communicated
  • Authority to implement ISMS defined
  • Authority to report on ISMS performance defined
  • Someone accountable for ISMS conformance

Common Issues Found:

  • Generic policy not tailored to organization
  • Policy not signed/approved by top management
  • No evidence of policy communication
  • Roles and responsibilities unclear or unassigned
  • No one clearly accountable for ISMS

Sample Questions You Might Get:

  • "Who is ultimately accountable for the ISMS?"
  • "How does management demonstrate commitment?"
  • "How is the policy communicated to employees?"
  • "Who has authority to make ISMS decisions?"

Clause 6: Planning

Documents Reviewed:

  • Risk assessment methodology
  • Risk assessment results
  • Risk treatment plan
  • Statement of Applicability (SoA)
  • Information security objectives
  • Plans to achieve objectives

What Auditors Check:

6.1.1 General (Actions to Address Risks and Opportunities)

  • ISMS planning considers Clause 4 context
  • Planning addresses risks and opportunities
  • Plans integrated into ISMS processes

6.1.2 Information Security Risk Assessment

  • Risk assessment process defined and documented
  • Risk criteria established (acceptance, evaluation)
  • Risk assessment method is repeatable and consistent
  • Risk assessment has been conducted
  • Results are documented

6.1.3 Information Security Risk Treatment

  • Risk treatment plan exists
  • Risk owners identified
  • Controls selected to treat risks
  • Residual risks identified
  • Risk acceptance by risk owners documented

6.2 Information Security Objectives

  • Information security objectives established
  • Objectives documented
  • Objectives are measurable
  • Objectives monitored and updated
  • Plans to achieve objectives exist

6.3 Planning of Changes

  • Process for managing ISMS changes defined
  • Changes considered systematically

Common Issues Found:

  • Risk assessment never actually performed
  • Risk assessment too generic, not specific to organization
  • No risk owners assigned
  • Statement of Applicability incomplete or inconsistent with risk treatment
  • No evidence of risk acceptance
  • Objectives not measurable or monitored

Sample Questions You Might Get:

  • "Walk me through your risk assessment process"
  • "How did you determine these risk criteria?"
  • "Who are the risk owners?"
  • "How do you know if you're achieving your objectives?"
  • "How does your SoA relate to your risk treatment plan?"

Clause 7: Support

Documents Reviewed:

  • Resource allocation evidence
  • Competency requirements and training records
  • Awareness program materials
  • Communication plan
  • Document and record controls

What Auditors Check:

7.1 Resources

  • Resources needed for ISMS identified
  • Resources have been allocated

7.2 Competence

  • Competence requirements determined
  • Training provided where needed
  • Evidence of competence (training records, certifications)

7.3 Awareness

  • Awareness program exists
  • People aware of security policy
  • People aware of their contribution to ISMS
  • People aware of implications of non-conformity

7.4 Communication

  • Communication needs determined
  • What to communicate defined
  • When to communicate defined
  • Who communicates defined
  • Communication process exists

7.5 Documented Information

  • Required documented information exists
  • Documents controlled (creation, update, version)
  • Documents distributed appropriately
  • Records controlled and protected
  • External documents controlled

Common Issues Found:

  • No documented competency requirements
  • Training records missing or incomplete
  • No evidence of awareness program
  • Document control process not followed consistently
  • No external document control

Sample Questions You Might Get:

  • "How do you ensure people are competent in information security?"
  • "How do you make employees aware of the ISMS?"
  • "How do you control document versions?"
  • "Show me evidence that staff have been trained on the policy"

Clause 8: Operation

Documents Reviewed:

  • Operational planning documentation
  • Risk assessment and treatment execution
  • Control implementation evidence
  • Change management procedures
  • Vendor/supplier controls

What Auditors Check:

8.1 Operational Planning and Control

  • Processes planned, implemented, and controlled
  • Changes controlled
  • Outsourced processes controlled

8.2 Information Security Risk Assessment

  • Risk assessments performed at planned intervals
  • Evidence of assessments being conducted

8.3 Information Security Risk Treatment

  • Risk treatment plan implemented
  • Controls from Annex A implemented as planned

Common Issues Found:

  • Risk assessment and treatment conducted once but not repeated
  • Controls selected but not actually implemented
  • No evidence of operational processes running
  • Changes not controlled
  • Outsourced processes not managed

Sample Questions You Might Get:

  • "When was your last risk assessment?"
  • "How do you manage changes to the ISMS?"
  • "Show me evidence that [Control X] is actually operational"
  • "How do you manage third-party security?"

Clause 9: Performance Evaluation

Documents Reviewed:

  • Monitoring and measurement procedures
  • Performance metrics and results
  • Internal audit program and reports
  • Management review records

What Auditors Check:

9.1 Monitoring, Measurement, Analysis and Evaluation

  • What to monitor determined
  • Methods for monitoring defined
  • When to monitor determined
  • Who monitors defined
  • Results retained as evidence

9.2 Internal Audit

  • Internal audit program exists
  • Internal audits conducted at planned intervals
  • Audit criteria and scope defined
  • Auditors are objective and impartial
  • Results reported to management
  • Evidence of at least one complete internal audit

9.3 Management Review

  • Management reviews conducted at planned intervals
  • Reviews include required inputs (9.3.2)
  • Reviews produce required outputs (9.3.3)
  • Evidence of at least one management review
  • Results documented

Common Issues Found:

  • No internal audit conducted yet (Stage 1 blocker)
  • No management review conducted yet (Stage 1 blocker)
  • Internal audit not comprehensive
  • Management review just a formality, no real review
  • No evidence retained

Sample Questions You Might Get:

  • "When was your internal audit?"
  • "Who conducted it? How did you ensure objectivity?"
  • "When was your management review?"
  • "What decisions came out of the management review?"

Clause 10: Improvement

Documents Reviewed:

  • Nonconformity and corrective action records
  • Evidence of continual improvement
  • Process for managing nonconformities

What Auditors Check:

10.1 Nonconformity and Corrective Action

  • Process for handling nonconformities defined
  • Corrective actions taken when needed
  • Effectiveness of corrective actions evaluated
  • Evidence of the process in action

10.2 Continual Improvement

  • Evidence of continual improvement of ISMS

Common Issues Found:

  • Process defined but no evidence of use yet (acceptable at Stage 1)
  • No process for corrective actions
  • Corrective actions taken but effectiveness not evaluated

Sample Questions You Might Get:

  • "Have you identified any nonconformities yet?"
  • "How do you ensure corrective actions are effective?"
  • "What improvements have you made to the ISMS?"

Process Interviews: Who and What

Who Gets Interviewed at Stage 1

Typically Interviewed:

  • ISMS Project Lead / Information Security Manager (primary interview)
  • IT Manager / CTO (understanding technical environment)
  • Executive Sponsor (leadership commitment)
  • Internal Auditor (if different from above)

Possibly Interviewed:

  • Key process owners (HR, Operations, Development)
  • Compliance manager
  • Risk manager

Not Usually Interviewed at Stage 1:

  • General staff members
  • All process owners (that's Stage 2)
  • Customers or partners

Typical Stage 1 Interview Questions

For ISMS Project Lead:

  1. "Walk me through how you developed the ISMS."
  2. "How did you determine the scope?"
  3. "Explain your risk assessment process."
  4. "How have you ensured the ISMS is operational?"
  5. "What challenges have you faced?"
  6. "How ready do you feel for Stage 2?"

For IT Manager / CTO:

  1. "Describe your technology environment."
  2. "How are the technical controls implemented?"
  3. "How do you manage changes to IT systems?"
  4. "What security tools and technologies do you use?"
  5. "How do you monitor security events?"

For Executive Sponsor:

  1. "Why did you decide to pursue ISO 27001?"
  2. "How do you demonstrate commitment to the ISMS?"
  3. "What resources have you allocated?"
  4. "How do you see information security fitting into business strategy?"

For Internal Auditor:

  1. "How did you approach the internal audit?"
  2. "What did you find?"
  3. "How did you ensure objectivity?"
  4. "What is your background in auditing?"

Tips for Interview Success

Do:

  • ✓ Answer clearly and concisely
  • ✓ Provide examples when helpful
  • ✓ Admit if you don't know something
  • ✓ Refer to documentation when appropriate
  • ✓ Be honest about challenges and how you addressed them

Don't:

  • ✗ Ramble or over-explain
  • ✗ Make up answers
  • ✗ Blame others for gaps
  • ✗ Be defensive about decisions
  • ✗ Volunteer problems that weren't asked about

Site Tour: What Auditors Observe

If your Stage 1 is on-site, the auditor will likely do a brief site tour.

What Auditors Look At

Physical Security:

  • Building access controls
  • Visitor management
  • Badge/access card systems
  • Security awareness signage
  • Clear desk/clear screen practices

Technology Environment:

  • Server room/data center security
  • Environmental controls
  • Equipment protection
  • Cable management
  • Network equipment security

Operational Practices:

  • How people actually work
  • Security practices in action
  • Compliance with policies
  • Security awareness in practice

Site Tour Checklist

Before the Tour:

  • Tidy up the office (professional appearance)
  • Ensure sensitive information isn't visible
  • Brief staff that auditor will be touring
  • Test access controls
  • Prepare to demonstrate key controls

During the Tour:

  • Have the right person lead (usually IT Manager)
  • Point out security controls proactively
  • Be ready to explain what auditor sees
  • Don't hide issues, but don't advertise problems either
  • Keep the tour focused and efficient (30-45 minutes)

Good Signs to Demonstrate:

  • Clean desks with no visible passwords
  • Locked server room with access logs
  • Security awareness posters
  • Visitor logs and badges
  • Locked filing cabinets for sensitive documents
  • Screen locks activating
  • Security cameras (if applicable)

Closing Meeting: Understanding the Results

What Happens in the Closing Meeting

The closing meeting (30-45 minutes) is where the auditor shares findings:

1. Overall Assessment

  • Summary of what was reviewed
  • General observations
  • Overall readiness for Stage 2

2. Findings Presentation

  • Any nonconformities identified
  • Observations and improvement opportunities
  • Areas of strength

3. Classification of Findings

Major Nonconformity:

  • A significant gap in ISMS documentation or implementation
  • Must be corrected before Stage 2 can proceed
  • Example: No risk assessment has been performed

Minor Nonconformity:

  • A partial or isolated gap
  • Should be corrected, but Stage 2 can proceed
  • Example: One procedure missing from SoA

Observation:

  • Not a nonconformity, but an improvement opportunity
  • No corrective action required
  • Example: "Consider adding metrics for [X] objective"

4. Stage 2 Readiness Decision

  • Ready to proceed
  • Ready with conditions (minor items to address)
  • Not ready (major items must be corrected first)

5. Stage 2 Planning

  • Proposed dates
  • Focus areas
  • Any special arrangements needed

6. Next Steps

  • Timeline for addressing findings
  • Evidence required
  • Communication plan

Who Should Attend the Closing Meeting

Required:

  • ISMS Project Lead
  • Executive Sponsor
  • Anyone who can make decisions about next steps

Optional:

  • IT Manager
  • Other key team members
  • Consultant (if involved)

How to Handle Findings

During the Closing Meeting:

If you understand and agree:

  • Acknowledge the finding
  • Thank the auditor for identifying it
  • Commit to addressing it
  • Ask for clarification on expectations if needed

If you don't understand:

  • Ask for clarification
  • Request specific examples
  • Seek to understand the requirement
  • Don't argue, seek to understand

If you disagree:

  • Listen fully first
  • Ask questions to understand the auditor's perspective
  • Provide additional context or evidence if relevant
  • If still in disagreement, note it for formal dispute process
  • Don't argue extensively in the meeting

Professional Response Examples:

"Thank you for identifying that gap. We'll address it before Stage 2."

"Can you help me understand specifically what's missing from [X]?"

"I appreciate that observation. We'll consider that improvement."

"We may have a different interpretation of that requirement. Can we discuss the specific clause?"

After the Closing Meeting

Immediate Actions (Same Day):

  • Debrief with your team
  • Document all findings and feedback
  • Prioritize action items
  • Update project timeline if needed

Next 1-2 Days:

  • Create action plan for all findings
  • Assign ownership for corrections
  • Set deadlines for completion
  • Communicate plan to stakeholders

Within 1 Week:

  • Begin addressing findings
  • Update documentation as needed
  • Gather evidence of corrections
  • Keep certification body informed of progress

After Stage 1: Critical Actions

Understanding the Stage 1 Report

Within 1-2 weeks, you'll receive a formal Stage 1 report containing:

Report Contents:

  • Audit scope and objectives
  • Audit team and participants
  • Documents reviewed
  • Interviews conducted
  • Findings (major NCRs, minor NCRs, observations)
  • Stage 2 readiness conclusion
  • Recommendations for Stage 2 preparation

Reviewing the Report:

  • Read it thoroughly
  • Ensure you understand all findings
  • Check that facts are accurate
  • Note any factual errors for correction
  • Understand timelines for responses

Addressing Findings

For Major Nonconformities (if any):

  1. Root Cause Analysis

    • Understand why the gap exists
    • Don't just fix the symptom
  2. Corrective Action

    • Address the root cause
    • Implement the correction
    • Document what was done
  3. Evidence Gathering

    • Collect proof of correction
    • Make evidence clear and accessible
  4. Verification

    • Have internal audit review
    • Test that correction is effective
  5. Submission

    • Send evidence to certification body
    • Request confirmation of acceptance
    • Don't schedule Stage 2 until accepted

For Minor Nonconformities:

  1. Plan Correction

    • Determine what needs to be done
    • Set realistic timeline
  2. Implement

    • Make the correction
    • Document the action
  3. Prepare Evidence

    • Have evidence ready for Stage 2
    • Make easy for auditor to find

For Observations:

  1. Evaluate

    • Decide if you'll address it
    • Prioritize based on value
  2. Implement if Valuable

    • Make improvements that add value
    • Don't just check boxes
  3. Document

    • Keep record of improvements made

Preparing for Stage 2

Timeline Considerations:

Minimum Time Between Stage 1 and Stage 2:

  • At least 28 days (per IAF MD 5)
  • Longer if you have major findings to correct
  • Typical: 4-8 weeks

Use This Time To:

Weeks 1-2 After Stage 1:

  • Address all Stage 1 findings
  • Complete any missing documentation
  • Strengthen areas of weakness identified
  • Build more operational evidence

Weeks 3-4 After Stage 1:

  • Conduct second internal audit (if possible)
  • Hold second management review (if possible)
  • Gather strong evidence of ISMS operation
  • Ensure all controls have evidence

Weeks 5-6 After Stage 1:

  • Conduct mock Stage 2 audit internally
  • Final documentation review
  • Team preparation and briefing
  • Logistics planning for Stage 2

Week 7 Before Stage 2:

  • Submit pre-audit documents to certification body
  • Confirm Stage 2 schedule
  • Final team preparation
  • Mental preparation and confidence building

Common Stage 1 Issues and How to Prevent Them

Issue 1: "Your ISMS hasn't been operational long enough"

The Problem: Auditor determines the ISMS is too new; insufficient evidence of operation.

ISO 27001 Requirement: The ISMS must have been operational for at least one complete cycle of:

  • Risk assessment
  • Internal audit
  • Management review

How to Prevent:

  • Don't schedule Stage 1 too early
  • Ensure at least 2-3 months of ISMS operation before Stage 1
  • Have clear evidence of:
    • Completed risk assessment
    • At least one internal audit covering all ISMS areas
    • At least one management review
    • Controls operating and generating evidence

Timeline Guidance:

  • Month 1-2: Build ISMS documentation
  • Month 3: Implement controls
  • Month 4: Internal audit
  • Month 5: Management review, gather evidence
  • Month 6: Stage 1 audit

Issue 2: "Your scope is not clearly defined"

The Problem: Auditor can't determine what's in and out of scope.

Why It Happens:

  • Vague scope statement
  • Unclear boundaries
  • Inconsistency between scope and other documents
  • Scope doesn't reflect actual operations

How to Prevent:

  • Define scope with specificity:
    • ✓ "Development and support of XYZ SaaS platform for healthcare clients"
    • ✗ "Information technology services"
  • Specify boundaries clearly:
    • Physical locations
    • Organizational units
    • Technology systems
    • Business processes
  • Ensure consistency across:
    • Scope statement
    • Certificate application
    • Context documentation
    • Risk assessment
    • SoA

Issue 3: "Your risk assessment is not adequate"

The Problem: Risk assessment is too generic, incomplete, or not actually conducted.

Why It Happens:

  • Using a template without customization
  • Not actually assessing YOUR risks
  • Missing key assets or threats
  • No evidence of risk owner involvement
  • Risk treatment doesn't align with assessment

How to Prevent:

  • Conduct a real risk assessment of YOUR environment:
    • Identify YOUR specific assets
    • Assess YOUR actual threats and vulnerabilities
    • Evaluate impact and likelihood based on YOUR context
  • Involve real risk owners
  • Document the process and results clearly
  • Ensure risk treatment plan flows from assessment
  • Make SoA consistent with risk treatment

Issue 4: "No evidence of internal audit or management review"

The Problem: Required internal audit or management review hasn't been completed.

Why It Happens:

  • Scheduling Stage 1 too early
  • Not understanding the requirements
  • Thinking these can be done later

How to Prevent:

  • Conduct internal audit before Stage 1:
    • Cover all ISMS processes
    • Include Clauses 4-10
    • Document findings
    • Take corrective actions
  • Hold management review before Stage 1:
    • Include all required inputs (9.3.2)
    • Document decisions and actions (9.3.3)
    • Demonstrate real management engagement
  • These are absolute requirements for Stage 1 success

Issue 5: "Documentation doesn't match implementation"

The Problem: What's documented isn't what's actually happening.

Why It Happens:

  • Documentation created without understanding operations
  • Copying someone else's documents
  • Documentation not communicated to teams
  • Processes changed but documents not updated

How to Prevent:

  • Document what you DO, then do what you document
  • Involve process owners in documentation
  • Test procedures before finalizing
  • Walk through processes to verify documentation accuracy
  • Update documents to reflect actual practice

Issue 6: "Statement of Applicability is incomplete or inaccurate"

The Problem: SoA is missing controls, justifications are weak, or it doesn't match risk treatment.

Why It Happens:

  • Not understanding SoA purpose
  • Copying without thinking
  • Not connecting to risk assessment
  • Generic justifications

How to Prevent:

  • Include all 93 Annex A controls
  • For each control:
    • State: Applicable or Not Applicable
    • Provide genuine justification
    • Reference risk treatment plan
    • Explain implementation approach
  • Ensure consistency:
    • SoA ↔ Risk Treatment Plan
    • SoA ↔ Implemented Controls
    • SoA ↔ Control Objectives

Issue 7: "Roles and responsibilities are unclear"

The Problem: Can't determine who is responsible for what in the ISMS.

Why It Happens:

  • Generic role descriptions
  • No names assigned
  • Overlapping or conflicting assignments
  • Key roles missing

How to Prevent:

  • Create clear RACI matrix for all ISMS activities
  • Assign real people to roles
  • Ensure no critical gaps
  • Document in organization chart or responsibility matrix
  • Communicate assignments to role holders
  • Get acknowledgment from assignees

Issue 8: "No evidence of ISMS operation"

The Problem: Documents exist but no proof that ISMS is actually working.

Why It Happens:

  • Documentation project only, no implementation
  • Evidence not collected
  • Controls implemented too recently
  • No operational records

How to Prevent:

  • Build evidence from day one of operation:
    • Access reviews conducted → logs
    • Backups tested → test records
    • Training delivered → attendance records
    • Incidents managed → incident logs
    • Changes managed → change records
    • Vendors assessed → assessment records
  • Organize evidence by control
  • Create evidence index for easy reference

Stage 1 Preparation Checklist

Use this comprehensive checklist in the final weeks before Stage 1:

4 Weeks Before Stage 1

ISMS Documentation Complete:

Core Documents:

  • ISMS Scope Statement (4.3)
  • Information Security Policy (5.2)
  • Risk Assessment Methodology (6.1.2)
  • Risk Assessment Results (6.1.2)
  • Risk Treatment Plan (6.1.3)
  • Statement of Applicability (6.1.3d)
  • Information Security Objectives (6.2)
  • Evidence of Competence (7.2)
  • Operational Planning and Control (8.1)
  • Risk Assessment Records (8.2)
  • Risk Treatment Results (8.3)
  • Monitoring and Measurement Results (9.1)
  • Internal Audit Program (9.2)
  • Internal Audit Results (9.2)
  • Management Review Results (9.3)
  • Nonconformities and Corrective Actions (10.1)

Supporting Documentation:

  • Context and Interested Parties Analysis (4.1, 4.2)
  • Roles, Responsibilities, and Authorities (5.3)
  • Communication Plan (7.4)
  • Document Control Procedure (7.5)
  • Required Annex A Policies (based on SoA)
  • Required Annex A Procedures (based on SoA)
  • Required Annex A Records (based on SoA)

Documentation Quality:

  • All documents have version control
  • All documents have approval signatures
  • All documents have review dates
  • All cross-references are accurate
  • Document register/index is current
  • No draft or obsolete documents in circulation

2 Weeks Before Stage 1

Evidence of Operation:

Clause 9 Requirements (Critical):

  • Internal audit completed (all ISMS areas covered)
  • Internal audit report finalized
  • Corrective actions from internal audit addressed
  • Management review held
  • Management review minutes documented
  • Management review decisions implemented

Control Evidence:

  • Risk assessment conducted (at least one complete cycle)
  • Training records for all staff
  • Access reviews conducted and documented
  • Backup testing evidence
  • Vulnerability scanning results
  • Incident records (even if no incidents, document that)
  • Change management records
  • Vendor assessment records

Team Readiness:

  • Key participants identified and briefed
  • Everyone knows their role in the audit
  • Interview preparation completed
  • Process owners can explain their processes
  • Team understands ISMS and can articulate it

1 Week Before Stage 1

Final Preparation:

  • All requested documents sent to auditor
  • Documents organized in logical structure
  • Document index provided
  • Audit schedule confirmed
  • Participants' calendars blocked
  • Meeting rooms/video links arranged
  • Technology tested (especially for remote audit)

Accessibility:

  • All evidence easily accessible
  • Filing system organized
  • Know where everything is
  • Can quickly find any requested document
  • Electronic files organized and named clearly

Site Preparation (if on-site audit):

  • Audit room prepared
  • Guest Wi-Fi access arranged
  • Refreshments planned
  • Parking/access instructions sent to auditor
  • Building security notified of visitor

Day Before Stage 1

Final Checks:

  • Review audit agenda one more time
  • Confirm all participants are ready
  • Technology test (for remote audit)
  • Print any needed materials
  • Set up audit room
  • Mental preparation

Last-Minute Review:

  • Quick review of key ISMS elements
  • Review of your organization's ISMS story
  • Review of scope and boundaries
  • Refresh on risk assessment results
  • Review internal audit and management review outcomes

Mindset for Stage 1 Success

Remember: This Is About Readiness, Not Perfection

Stage 1 is designed to:

  • Verify you have documentation
  • Confirm you're ready for Stage 2
  • Identify any major gaps
  • Plan Stage 2 approach

Stage 1 is NOT:

  • A detailed examination of effectiveness (that's Stage 2)
  • Looking for minor issues or opportunities (that's Stage 2)
  • Testing of controls (that's Stage 2)

Confidence Builders

You've Done the Work:

  • Your ISMS is documented
  • Your controls are implemented
  • Your team knows the ISMS
  • You're prepared

Stage 1 is Collaborative:

  • Auditors want you to succeed
  • This is a professional conversation
  • Questions are opportunities to demonstrate knowledge
  • Feedback helps you improve

You're Not Alone:

  • Thousands of organizations go through this
  • Your certification body has experience guiding you
  • Your team is prepared
  • You have support

If Something Goes Wrong

Minor Issue Found:

  • This is normal and expected
  • Easy to fix before Stage 2
  • Shows the process is working
  • Opportunity to improve

Major Issue Found:

  • Better to find it now than at Stage 2
  • Time to fix before Stage 2
  • Shows thoroughness of audit
  • Certification will be stronger as a result

Worst Case (Not Ready for Stage 2):

  • Rare if you've prepared properly
  • Gives you clear roadmap of what's needed
  • Delay is temporary
  • Final certification will be more credible

Summary: Keys to Stage 1 Success

1. Timing is Everything

  • Don't rush Stage 1 too early
  • Ensure ISMS operational for 2-3 months minimum
  • Complete internal audit and management review first

2. Documentation Must Be Complete

  • All required documents exist
  • Documents are specific to your organization
  • Version control is clear
  • Everything is accessible

3. Evidence is Critical

  • ISMS is not just documents, it's operational
  • Collect evidence from day one
  • Organize evidence logically
  • Make it easy for auditor to verify

4. Team Preparation Matters

  • Everyone knows their role
  • Key people can articulate ISMS
  • Confidence comes from preparation
  • Practice helps

5. Professional Engagement

  • Be welcoming and cooperative
  • Answer questions clearly
  • Don't be defensive
  • View auditor as partner, not adversary

6. Learn and Improve

  • Welcome feedback
  • Address findings promptly
  • Use Stage 1 to strengthen Stage 2 readiness
  • Continuous improvement starts here

Next Lesson: In Lesson 8.4, you'll get a comprehensive Stage 1 Readiness Worksheet to self-assess your preparation and ensure you're truly ready for this critical first audit.

Complete this lesson

Earn +50 XP and progress to the next lesson