ISO/IEC 27001 Compliance Checklist
ISMS Scope and Policy Foundation
Document the Clause 4.3 scope: in-scope locations, business units, networks, and information assets, plus explicit exclusions and the rationale. Auditors look first for scope drift since the prior cycle — new SaaS sub-processors and acquired entities are the usual gaps.
Walk every Annex A:2022 control through the SoA: applicable / not applicable, justification, implementation status, and link to evidence. Not-applicable controls require a written reason — silence on a control is a finding.
Push the current policy set to the LMS or HRIS and capture timestamped acknowledgments from every employee and contractor in scope. Track non-acknowledgments — auditors sample this list and a 90%+ rate is the typical bar.
Leadership and Risk Management
Verify the ISMS owner, risk owners per asset class, and incident commander rotation. Departures and reorgs since the last audit are the most common source of orphaned accountabilities.
Re-rate each risk on the documented likelihood/impact scale (Clause 6.1.2) and confirm the treatment decision: accept, mitigate, transfer, or avoid. Every mitigated risk needs a target date and a named owner — open mitigations past their date are the second most common finding after access-review gaps.
Cover the Clause 9.3 inputs: prior actions, policy changes, audit results, KPIs, risk register changes, and improvement opportunities. Capture decisions and resource commitments in minutes signed by the executive sponsor.
Human Resource Security
Sample joiners since the last audit and confirm background-check completion before access was provisioned. Contractors brought in through staffing agencies are the usual gap — the agency does the check but the evidence never lands in your HRIS.
Pull the LMS report for the awareness module and any role-specific training (developer secure-coding, admin privileged access). Auditors expect ≥95% completion within 30 days of hire and annually thereafter.
Asset Management
Reconcile the inventory against MDM, the cloud asset graph (AWS Config / Wiz / Steampipe), and the SaaS catalog. Each asset needs a classification (Public / Internal / Confidential / Restricted) and an owner — unclassified assets get treated as Restricted by default.
Pull a sample of Confidential and Restricted assets and confirm encryption at rest, access controls, retention, and disposal match the handling matrix. Shared cloud storage buckets are the recurring offender.
Access Control
Generate the user-access report from Okta / Entra ID and route to system owners for line-by-line attestation. SCIM-deprovisioned apps still require sign-off — the absence of an account today doesn't prove there wasn't one yesterday.
Inventory IAM users with admin policies, GitHub org owners, database superusers, and break-glass accounts. Confirm MFA, last-used dates, and that break-glass credentials remain sealed. Service accounts with long-lived keys are the usual finding.
Disable the accounts, rotate any associated credentials, and capture the access-log review for the period of orphaning. File a corrective action ticket linked to the access-review run; auditors will follow the trail to closure.
Cryptography
Confirm the policy specifies approved algorithms (AES-256, RSA-2048+, TLS 1.2+), key lengths, and prohibitions (no MD5, no SHA-1, no static IVs). Annex A 8.24 expects the policy to be operationalized — not just published.
Pull the AWS KMS / GCP KMS / Vault rotation history and confirm CMKs rotated within the policy window (typically annual for envelope keys, 90 days for signing keys). Spot-check CloudTrail for unexpected Decrypt calls outside service principals.
Physical and Environmental Security
For colocation footprints, request the SOC 2 / ISO 27001 report and the visitor log from the provider. For owned offices, sample badge events for terminated employees and tailgating anomalies.
Match the asset disposal log to certificates of destruction from the shredding vendor. Laptops returning from remote employees need wipe attestation tied to the asset tag — a missing certificate per device is a per-device finding.
Operations Security
Reconcile the EDR console (CrowdStrike / SentinelOne / Defender) against the MDM device list. BYOD devices accessing corporate data through unmanaged browsers are the recurring scope-creep gap.
Pull open-finding counts by severity from Tenable / Qualys / Wiz / Snyk against the policy SLA (e.g., Critical = 7 days, High = 30 days). SLA breaches need a documented exception with a compensating control or an extended remediation date approved by the risk owner.
Pull the deploy log from the CD system and reconcile to Jira / Linear change tickets with approval evidence. Emergency changes need a backfilled ticket within the policy window — typically 24-48 hours.
Communications Security
Diff the current security-group / VPC peering / firewall ruleset against the approved network architecture. Long-lived 0.0.0.0/0 rules and wide cross-VPC peering opened for a one-off project are the recurring offenders.
Cross-reference cross-border data flows against the GDPR Article 46 mechanisms in place (SCCs, BCRs). Confirm DLP policy exceptions still have business justification and an owner.
Secure Development and System Acquisition
Verify the CI configuration enforces required status checks (Snyk / Semgrep / CodeQL / Dependabot) and that branch protection prevents merging on failure. Forks and bot-authored PRs are common holes in the policy.
Confirm staging and dev databases use masked or synthetic data — production snapshots restored to dev for debugging are the classic Annex A 8.33 gap. Document the masking pipeline and the last successful run.
Supplier Relationships
Pull current SOC 2 Type II reports, ISO 27001 certificates, and pentest summaries for tier-1 sub-processors. Flag any whose attestation expired or who issued a qualified opinion since the last cycle.
For every sub-processor handling personal data, confirm a current DPA with Standard Contractual Clauses where applicable. New AI / LLM vendors are the usual fresh exposure — many were onboarded without legal review.
Present each High-rated vendor with the proposed treatment: compensating controls, contractual remediation, replacement, or formal acceptance signed by the risk owner. Acceptance memos go into the audit binder.
Incident Management
Walk a realistic scenario (ransomware on an endpoint, exposed S3 bucket, credential leak in a public repo) through the IR runbook with the on-call rotation. Capture the gaps — most teams discover their PagerDuty schedule routes to a former employee.
Confirm legal and DPO contacts, the supervisory authority list, and customer-notification templates are current. GDPR Article 33 starts the 72-hour clock at awareness — the runbook needs to define what 'awareness' means operationally.
Business Continuity
Restore the most recent backup of a tier-1 datastore into an isolated environment and validate row counts, application boot, and data integrity. Time the restore against the documented RTO. Backups that succeed nightly but fail to restore are the textbook Annex A 8.13 finding.
Re-confirm RTO and RPO targets with service owners and reconcile against the current architecture. Multi-region failover that was documented but never tested is a recurring contributing factor in real outages.
Compliance and Internal Audit
Cross-walk the SoA against current evidence in Vanta / Drata / Secureframe (or your manual register). The 2022 revision collapsed 114 controls into 93 across 4 themes — confirm any 2013-vintage mappings have been migrated.
The internal audit (Clause 9.2) must be independent of the controls being audited — bring in a second-line reviewer or external assessor. Capture findings in the corrective-action register with owner, due date, and root-cause analysis before the certification body arrives.
Use this template in Manifestly
- Risk Management Checklist
- Regulatory Compliance Checklist
- Quarterly Internal Control Review Checklist
- Sales Tax Reporting Checklist
- Legal Entity Management Checklist
- Employee File Audit Checklist
- Anti-Money Laundering Compliance Checklist
- SOX Compliance Checklist
- GDPR Compliance Review Checklist
- IT Security Audit Checklist
- HR Compliance Checklist
- Payroll Processing Checklist
- Building Code Compliance Checklist
- Employee Records Management Checklist
- Legal Document Storage Checklist
- Security Audit Checklist
- Property Risk Assessment Checklist
- Property Safety Inspection Checklist
- Cybersecurity Protocol Checklist
- Fair Housing Compliance Checklist
- Legal Compliance Checklist for New Properties
- Lease Agreement Checklist
- Software Licensing Compliance Checklist
- PCI DSS Compliance Checklist
- Real Estate Legal Compliance Checklist
- HIPAA Compliance Checklist
- MLS Listing Review Checklist
- Real Estate License Renewal Checklist
- GDPR Compliance Checklist
- Real Estate Contract Review Checklist
- Fair Housing Compliance Audit
- Listing Agreement Intake Checklist
- HR Compliance Checklist
- Real Estate Ethics & Compliance Review
- Brokerage Trust Account Management Checklist
- Real Estate Professional Development Checklist
- Brokerage Technology Inventory Audit
- Real Estate Website Audit Checklist
- Continuing Education Checklist
- Employee Termination Checklist
- Employee Records File Audit
- Regulatory Compliance Checklist
- Brokerage HR Policy Compliance Checklist
- Employee Handbook Annual Review
- Employee Termination Checklist
- Data Privacy Compliance Checklist
- Risk Management Checklist
- Insurance Compliance Checklist
- Complaint Resolution Checklist
- Financial Audit Checklist
- Data Security Checklist
- Risk Mitigation Checklist
- Claims Auditing Checklist
- Quarterly Industry Standards Compliance Review
- Insurance Training and Development Checklist
- Anti-Money Laundering Checklist
- Training Evaluation Checklist
- Manufacturing Regulatory Compliance Checklist
- Training Needs Assessment Checklist
- Skills Development Checklist
- Audit Preparation Checklist
- Network Security Checklist
- Employee Offboarding Checklist
- IT Asset Inventory Management Checklist
- Regulatory Reporting Checklist
- Compliance Audit Checklist
- Insurance Program Initiation Checklist
- Insurance Program Launch Project Monitoring Checklist
- Training Materials Checklist
- Quarterly Risk Monitoring Checklist
- System Backup Checklist
- Employee Benefits Checklist
- Insurance Program Launch Execution Checklist
- Insurance Marketing Campaign Checklist
- Email Compliance Checklist
- Law Firm Compliance Checklist
- Anti-Money Laundering Compliance Checklist
- Law Firm Compliance Checklist
- Professional Responsibility Compliance Review
- Data Privacy Compliance Checklist
- Law Firm Risk Management Checklist
- HR Audit Checklist
- HR Compliance Checklist
- Email Deliverability Checklist
- Law Firm Ethics Compliance Review
- Document Retention Policy Checklist
- Employee File Audit Checklist
- Law Firm Risk Management Checklist
- Cloud Security Checklist
- User Access Review Checklist
- IT Regulatory Compliance Review
- Compliance Audit Checklist
- Security Audit Checklist
- Business Continuity Checklist
- Employee Termination Checklist
- Quarterly Operations and Compliance QA Review
- Expense Management Checklist
- Advisor and Employee Onboarding Checklist
- Client Satisfaction Survey Checklist
- Operational Risk Checklist
- Know Your Customer (KYC) Checklist
- Litigation Preparation Checklist
- Contract Review Checklist
- New Hire Onboarding Checklist
- Client Onboarding Checklist
- Contract Review Checklist
- Regulatory Compliance Checklist
- Monthly Financial Reporting Checklist
- Regulatory Reporting Checklist
- Intellectual Property Management Checklist
- Internal Audit Checklist
- Lead Generation Checklist
- Annual Financial Reporting Checklist
- Annual Compliance Program Review
- Annual Risk Assessment Checklist
- Data Security Review Checklist
- Quarterly Performance Measurement Checklist
- Financial Services Project Initiation Checklist
- IT Policy Review Checklist
- Data Protection Checklist
- E-commerce Sales Tax Reporting Checklist
- Project Execution Checklist
- Project Planning Checklist
- Project Monitoring Checklist
- Financial Statement Review Checklist
- Quarterly Compliance Monitoring Checklist
- Cybersecurity Risk Assessment Checklist
- Project Closure Checklist
- Financial Services IT Security Audit Checklist
- PCI DSS Compliance Checklist
- Advisor and Staff Onboarding Checklist
- Cybersecurity Incident Response Checklist
- E-commerce Risk Management Checklist
- CRM Data Entry Checklist
- Business Continuity Plan Checklist
- E-commerce Legal Compliance Checklist
- Vendor Contract Review Checklist
- Annual Risk Management Review Checklist
- Risk Assessment Checklist
- Agency Compliance and Risk Management Checklist
- Annual School Compliance Audit
- School First Aid and Emergency Medication Audit
- Motor Carrier TSA Security Compliance Checklist
- Internal Controls Checklist
- Client Communication Checklist
- Restaurant Permit and Licensing Renewal Checklist
- New Hire Paperwork Checklist
- Restaurant Policy Update Checklist
- Restaurant New Hire Checklist
- Annual Attorney Professional Conduct Review
- International Fuel Tax Agreement (IFTA) Quarterly Filing Checklist
- Restaurant Licensing Renewal Checklist
- Marketing Strategy Checklist
- Department of Transportation (DOT) Audit Checklist
- Retail Policy Update and Compliance Checklist
Ready to take control of your recurring tasks?
Start Free 14-Day TrialUse Slack? Sign up with one click
