Module 8: The Certification Battle

Stage 2: The Final Battle

20 min
+75 XP

Stage 2: The Final Battle

Stage 2 is your certification audit - the comprehensive assessment that determines whether you earn ISO 27001 certification. This is where auditors verify that your ISMS actually works as documented.

What is Stage 2 Audit?

Purpose: Verify that your ISMS is implemented, operating effectively, and achieving its intended outcomes

Scope:

  • All applicable ISO 27001 requirements
  • All applicable Annex A controls from your SoA
  • Evidence of ISMS operation over time
  • Effectiveness of controls
  • Continual improvement

Duration: Typically 60-80% of total audit days Location: Usually on-site (may include remote elements) Outcome: Certification decision (Approve/Minor NCs/Major NCs/Deny)

Timing Requirements

After Stage 1:

  • Minimum: 2 weeks (for document corrections)
  • Maximum: 6 months (per ISO 17021)
  • Typical: 4-8 weeks

Before Stage 2:

  • All Stage 1 nonconformities must be closed
  • ISMS must have been operating for sufficient time
  • Internal audit completed (if required)
  • Management review completed (if required)

Operating Period:

  • No fixed ISO requirement
  • Most CBs want 3-6 months of operation
  • Must have evidence of:
    • Monitoring and measurement
    • Internal audit (at least planned/started)
    • Management review (at least one cycle)
    • Incident handling (if incidents occurred)
    • Some control effectiveness evidence

Stage 2 Audit Process

Day 0: Final Preparation (Week Before)

1. Confirm Logistics

  • Audit schedule
  • Participant availability
  • Meeting rooms
  • System access
  • Evidence availability

2. Prepare Evidence

  • Organize by ISO clause and Annex A control
  • Index all evidence
  • Test system access
  • Prepare demonstrations
  • Have backup evidence ready

3. Brief Your Team

  • Review audit schedule
  • Clarify each person's role
  • Practice answering questions
  • Set expectations
  • Establish communication protocol

4. Prepare Workspace

  • Clean, professional environment
  • Privacy for interviews
  • Reliable internet
  • Backup power
  • Quiet space

Day 1: Opening Meeting & Leadership Assessment

Opening Meeting (1-2 hours)

Auditor Activities:

  • Introduce audit team
  • Confirm scope and objectives
  • Review schedule (may adjust)
  • Explain audit methodology
  • Discuss findings classification
  • Set communication protocols
  • Address questions
  • Confirm Stage 1 NCs closed

Your Activities:

  • Introduce your team
  • Provide ISMS overview update since Stage 1
  • Highlight improvements
  • Confirm logistics
  • Ask clarifying questions
  • Take detailed notes

Pro Tip: This sets the tone. Be professional, confident, and cooperative.

Top Management Interview (1-2 hours)

This is CRITICAL. Auditor must interview top management per ISO 17021.

Questions Top Management Will Face:

About ISMS Understanding:

  • "What are your organization's main information security risks?"
  • "Why did you decide to pursue ISO 27001 certification?"
  • "What are the key objectives of your ISMS?"
  • "How does information security support your business strategy?"

About Commitment:

  • "What resources have you allocated to information security?"
  • "How do you ensure the ISMS remains adequate?"
  • "What's your role in the ISMS?"
  • "How often do you review ISMS performance?"

About Results:

  • "What key security improvements have been achieved?"
  • "Have there been any security incidents? How handled?"
  • "How do you know the ISMS is effective?"
  • "What security metrics do you track?"

About Continuous Improvement:

  • "What improvements to the ISMS have been made?"
  • "What future security investments are planned?"
  • "How do you stay informed about emerging threats?"

What Auditor is Assessing:

  • Genuine management commitment (not just lip service)
  • Understanding of key risks
  • Awareness of ISMS status
  • Resource provision
  • Evidence of leadership

Red Flags:

  • Management doesn't know their risks
  • ISMS seen as "IT's thing"
  • No awareness of ISMS performance
  • Can't answer basic questions
  • Lack of engagement

Preparation Tips:

  • Brief executives thoroughly
  • Provide talking points document
  • Share common questions
  • Conduct practice interview
  • Ensure they understand "their" ISMS

Process Observation Begins

Auditor Starts Sampling:

  • Reviewing documented procedures
  • Observing actual practices
  • Comparing documentation to reality
  • Testing controls
  • Interviewing process owners

Day 2-3: Detailed Control Assessment

Control Testing Methodology

For Each Applicable Control:

1. Review Documentation

  • Policy or procedure
  • Work instructions
  • Guidelines

2. Interview Process Owners

  • How is this control implemented?
  • Who is responsible?
  • What tools are used?
  • How is effectiveness measured?

3. Observe Actual Practice

  • Watch the control in action
  • Physical inspection
  • System demonstrations
  • Walkthroughs

4. Examine Evidence/Records

  • Logs
  • Reports
  • Tickets
  • Configurations
  • Test results

5. Test Samples

  • Select samples (users, systems, transactions)
  • Verify control application
  • Check consistency
  • Look for exceptions

Example: Testing A.8.5 Secure Authentication

Documentation Review:

  • Access control policy
  • Authentication standards
  • Password requirements

Interview (IT Manager):

  • "How do users authenticate?"
  • "What password requirements exist?"
  • "How is MFA implemented?"
  • "How are privileged accounts managed?"

Observation:

  • Watch user login process
  • See MFA in action
  • Review authentication logs

Evidence Examination:

  • MFA enrollment reports (100% coverage?)
  • Failed authentication logs
  • Password policy config screenshots
  • Account provisioning tickets

Sample Testing:

  • Select 10 random users - verify MFA enabled
  • Check 5 admin accounts - verify MFA + strong passwords
  • Review 20 authentication events - verify logging

Conformity Assessment: ☐ Fully Implemented ☐ Partially Implemented (Minor NC) ☐ Not Implemented (Major NC)

Typical Audit Trail

Day 2 Morning: Organizational Controls (Clause A.5)

  • Policies and procedures
  • Roles and responsibilities
  • Risk management process
  • Asset management
  • Access control
  • Supplier relationships

Day 2 Afternoon: People & Physical Controls (A.6 & A.7)

  • Employment screening
  • Terms of employment
  • Security awareness and training
  • Disciplinary process
  • Physical security (if applicable)
  • Equipment security

Day 3 Morning: Technology Controls (A.8)

  • User endpoint devices
  • Access rights management
  • Authentication
  • Cryptography
  • Configuration management
  • Vulnerability management
  • Malware protection
  • Logging and monitoring
  • Backup

Day 3 Afternoon: Development & Operations Controls (remaining)

  • Secure development (if applicable)
  • Supplier security
  • Incident management
  • Business continuity
  • Compliance

Key Documents Auditor Will Review

Mandatory Records:

  • Risk assessment results
  • Risk treatment plan
  • Statement of Applicability
  • ISMS objectives and monitoring
  • Evidence of competence
  • Monitoring and measurement results
  • Internal audit program and results
  • Management review results
  • Nonconformity and corrective action records

Operational Records (Samples):

  • Access logs
  • Change tickets
  • Incident tickets
  • Backup logs
  • Vulnerability scan results
  • Training completion records
  • Visitor logs (if applicable)
  • Equipment disposal records
  • Supplier assessment records

Configuration Evidence:

  • Firewall rule sets
  • Patch levels
  • Encryption settings
  • Password policies
  • User access lists
  • System configurations
  • Network diagrams

Day 3-4: ISMS Process Audit

Internal Audit Verification (Clause 9.2)

Auditor Checks:

  • Is there an audit program?
  • Was internal audit conducted?
  • Did it cover all ISMS areas?
  • Were competent auditors used?
  • Were findings documented?
  • Were corrective actions taken?
  • Was management informed?

Evidence Needed:

  • Internal audit plan/schedule
  • Internal audit reports
  • Nonconformity records from internal audit
  • Corrective action closure evidence
  • Auditor competence records

Common Findings:

  • Internal audit not conducted (Major NC if required)
  • Audit too shallow or incomplete
  • Auditor not independent
  • Findings not followed up
  • No evidence of corrective actions

Management Review Verification (Clause 9.3)

Auditor Checks:

  • Was management review conducted?
  • Did top management participate?
  • Were required inputs considered?
  • Were decisions made?
  • Was output documented?

Required Inputs (per 9.3.2):

  • Status of actions from previous reviews
  • Changes in external and internal issues
  • Feedback on information security performance
  • Feedback from interested parties
  • Risk assessment and treatment results
  • Opportunities for continual improvement

Required Outputs (per 9.3.3):

  • Decisions on improvement opportunities
  • Needs for changes to ISMS
  • Resource needs

Evidence Needed:

  • Management review meeting minutes
  • Attendance records
  • Presentations/reports to management
  • Decisions and action items
  • Follow-up on previous actions

Common Findings:

  • Management review not conducted (Major NC if required)
  • Top management didn't attend
  • Missing required inputs
  • No decisions or actions
  • Not documented adequately

Improvement Process (Clause 10)

Auditor Checks:

  • Nonconformity process defined?
  • Incidents handled appropriately?
  • Root causes analyzed?
  • Corrective actions effective?
  • Evidence of continual improvement?

What They'll Review:

  • Corrective action procedure
  • Nonconformity records (if any)
  • Incident records (if any)
  • Root cause analysis
  • Effectiveness verification

Note: Having zero incidents/nonconformities is okay IF:

  • ISMS is genuinely new
  • You have a process ready to handle them
  • You can demonstrate the process works (simulation/example)

Final Day: Wrap-up and Closing

Final Evidence Review (Morning)

Auditor:

  • Reviews remaining evidence
  • Clarifies unclear items
  • Verifies pending samples
  • Finalizes findings
  • Prepares report

You:

  • Provide any additional evidence requested
  • Answer final questions
  • Prepare for closing meeting
  • Assemble leadership for closing

Closing Meeting (2-3 hours)

This is CRUCIAL. Most important meeting of the entire audit.

Attendees Required:

  • Top management
  • ISMS Manager
  • Key process owners
  • Anyone who can authorize corrective actions

Auditor Presentation:

1. Audit Summary

  • Scope confirmation
  • Areas covered
  • People interviewed
  • Evidence reviewed

2. Positive Observations

  • Strengths identified
  • Good practices
  • Effective controls
  • Improvements since Stage 1

3. Opportunities for Improvement

  • Recommendations (not requirements)
  • Suggestions for enhancement
  • Best practices to consider

4. Nonconformities (The Critical Part)

Minor Nonconformities:

  • Isolated lapses
  • Partial implementation
  • Documentation gaps
  • Technical errors
  • Impact: Certification possible with correction plan

Major Nonconformities:

  • Systematic failures
  • Complete absence of requirements
  • Critical control failures
  • Serious effectiveness issues
  • Impact: Certification denied until corrected

No Nonconformities:

  • Rare but possible
  • Means certification recommended
  • Impact: Certificate issued

5. Certification Recommendation

Possible Outcomes:

A) Recommended for Certification

  • Zero NCs or only minor NCs
  • All requirements met
  • Minor NCs have acceptable correction plan

B) Conditional Recommendation

  • Minor NCs need correction before certificate issue
  • Correction plan accepted
  • Certificate issued after verification

C) Not Recommended - Additional Audit

  • Major NCs identified
  • Additional audit day(s) needed after correction
  • Adds cost and time

D) Not Recommended - Reaudit Required

  • Significant major NCs
  • Fundamental ISMS issues
  • Must substantially re-audit

6. Next Steps

  • NC correction timeline (typically 90 days)
  • Evidence submission process
  • Certificate issuance timeline
  • Surveillance audit schedule

Your Response:

  • Accept findings professionally
  • Ask clarifying questions
  • Dispute if genuinely incorrect (politely!)
  • Propose correction plans
  • Thank the auditor

After Stage 2

If Zero or Minor NCs Only

Timeline:

Week 1-2: Submit NC corrections

  • Root cause analysis
  • Corrective actions taken
  • Evidence of correction
  • Evidence of effectiveness (if possible)

Week 3-4: Auditor reviews corrections

  • Evaluates adequacy
  • May request additional evidence
  • Approves or requests revision

Week 5-6: Certificate issuance

  • CB issues certificate
  • Certificate valid 3 years
  • Surveillance audit scheduled (Year 1 & 2)
  • Recertification audit scheduled (Year 3)

Celebrate! You earned it!

If Major NCs

Must:

  1. Conduct root cause analysis
  2. Implement corrective actions
  3. Gather evidence of correction
  4. Demonstrate effectiveness
  5. Submit evidence to CB

Then:

  • CB determines if additional audit needed
  • May be desk review if well-documented
  • May require on-site follow-up (costs extra)
  • May require re-audit if fundamental issues

Timeline: Can take 3-6 months

What Auditors Look For

Evidence of Actual Operation

Not Just Documentation:

  • Policies are great, but are they followed?
  • Procedures exist, but are they used?
  • Controls documented, but are they working?

They Want to See:

  • Dated records over time
  • Regular operational evidence
  • Consistency in application
  • People actually following processes
  • Controls integrated into operations

Red Flags:

  • Evidence all created last month
  • "We just started doing this"
  • Processes not known by staff
  • Documentation doesn't match practice
  • Controls obviously not embedded

Control Effectiveness

Not Just Implementation:

  • Control exists (good)
  • Control works as designed (better)
  • Control achieves intended outcome (best)

Example - Vulnerability Management:

  • Bad: "We have a vulnerability scanner"
  • Okay: "We scan monthly and have a patching process"
  • Good: "95% of critical vulnerabilities patched within 7 days, evidence shows declining vulnerability counts over time"

They'll Ask:

  • "How do you know this control is working?"
  • "Show me evidence of effectiveness"
  • "What metrics do you track?"
  • "Have there been any failures?"

Consistency

Across the Organization:

  • Same control applied consistently
  • Not working in one area but not another
  • Uniform understanding
  • Standard practices

Over Time:

  • Sustained operation
  • Not just prepared for audit
  • Regular cadence
  • Historical evidence

Integration into Business

Not a Separate "Compliance Thing":

  • Security integrated into operations
  • Staff understand why, not just what
  • Embedded in business processes
  • Part of culture

Good Signs:

  • People speak naturally about security
  • Security considerations in regular decisions
  • Proactive security behavior
  • Security seen as enabling business

Common Stage 2 Findings

Minor NCs - Typical Examples

Documentation Gaps:

  • "Internal audit report doesn't document all required elements"
  • "Management review minutes don't show all required inputs"
  • "A.8.8 vulnerability management procedure doesn't define timelines"

Implementation Gaps:

  • "3 of 25 sampled users don't have MFA enabled (A.5.17)"
  • "2 servers found without current malware protection (A.8.7)"
  • "Training completion rate is 85%, target is 95% (A.6.3)"

Process Gaps:

  • "Risk assessment conducted but not all assumptions documented"
  • "SoA shows A.8.13 implemented but no backup tests conducted"
  • "Corrective action procedure exists but no evidence of use"

Major NCs - Typical Examples

Systematic Failures:

  • "No access reviews conducted (A.5.18) - systematic failure across all systems"
  • "Logging not enabled on 80% of critical systems (A.8.15)"
  • "No evidence of management review conducted (Clause 9.3)"

Absence of Requirements:

  • "Internal audit not conducted (Clause 9.2)"
  • "No risk assessment for new cloud migration project (Clause 6.1.2)"
  • "Backup process exists but no backups tested in 12 months (A.8.13)"

Control Effectiveness Failures:

  • "MFA implemented but easily bypassed using alternative methods"
  • "Vulnerability scanning conducted but critical vulnerabilities not remediated (8+ months old)"
  • "Change management process documented but changes made outside process regularly"

Tips for Stage 2 Success

Before the Audit

1. Operate Your ISMS

  • Don't prepare "for the audit"
  • Run your ISMS normally
  • Let evidence accumulate naturally
  • Fix issues as they arise

2. Conduct Mock Audit

  • Internal or external
  • Identify gaps early
  • Practice interviews
  • Test evidence availability

3. Know Your Evidence

  • Where everything is located
  • How to access it quickly
  • Backup copies available
  • Index or evidence map

4. Prepare Demonstrations

  • Key systems
  • Critical controls
  • Technical implementations
  • Practice showing them

During the Audit

1. Be Honest

  • Don't hide issues
  • Don't exaggerate capabilities
  • Admit gaps if found
  • Show how you'll fix them

2. Stay Calm

  • Auditor finding issues is normal
  • It's not personal
  • Focus on facts
  • Professional demeanor

3. Listen Carefully

  • Take detailed notes
  • Ask clarifying questions
  • Understand the concern
  • Don't argue defensively

4. Provide Context

  • Explain your reasoning
  • Show what you've considered
  • Describe constraints
  • Demonstrate understanding

5. Don't Volunteer Problems

  • Answer questions asked
  • Provide requested evidence
  • Don't introduce new concerns
  • Stay focused

If Findings Arise

1. Understand the Finding

  • What requirement is not met?
  • What evidence is lacking?
  • Is it minor or major?
  • What would close it?

2. Verify Accuracy

  • Is the finding correct?
  • Politely challenge if wrong
  • Provide counter-evidence
  • Seek clarification

3. Accept Gracefully

  • If valid, acknowledge it
  • Don't make excuses
  • Focus on solutions
  • Propose correction plan

4. Immediate Correction (If Possible)

  • Some findings can be corrected during audit
  • Simple configuration changes
  • Missing documentation
  • Quick implementations
  • Ask if immediate correction acceptable

Certificate Issuance

If Successful

You'll Receive:

  • ISO 27001:2022 Certificate
  • Valid for 3 years from issue date
  • Includes your scope
  • Shows accreditation body logo
  • Certificate number

Certificate Shows:

  • Your organization name
  • Certificate scope
  • Issue date
  • Expiry date
  • CB and accreditation body logos
  • Certificate number
  • ISO 27001:2022 standard

You May:

  • Display certificate
  • Use "ISO 27001 Certified" in marketing
  • Use CB and accreditation logos per usage rules
  • List in CB's certified organization directory
  • Reference in proposals and contracts

You Must:

  • Maintain your ISMS
  • Prepare for surveillance audits (annual)
  • Report significant changes to CB
  • Not misuse or misrepresent certification

Surveillance Audits

Year 1 & Year 2:

  • Annual surveillance audits
  • Shorter duration (1-2 days typically)
  • Verify continued compliance
  • Check corrective actions
  • Review changes
  • Sample different areas than Stage 2

Year 3:

  • Recertification audit
  • Similar scope to Stage 2
  • Full reassessment
  • New 3-year certificate issued

Next Lesson: Prepare comprehensive evidence packages to support your audit responses.

Complete this lesson

Earn +75 XP and progress to the next lesson