This document is under active development and has not been finalized.
Skip to content

Audit Program

Audit Types

TypeDescriptionIntervalConducted by
Internal AuditReview of ISMS conformity and measure implementationAnnuallyISO
Technical AuditConfiguration review, hardening check, vulnerability assessmentSemi-annuallyIT + ISO
Penetration TestSimulated attack on infrastructure and applicationsAnnuallyExternal provider
Authorization AuditReview of all access rights for currency and necessitySemi-annuallyISO
Backup AuditRestore tests and backup integrity verificationQuarterlyIT Operations
Vendor AuditReview of critical vendors for contractual complianceAnnuallyISO + Procurement

Audit Scope

Internal ISMS Audit

Review AreaAudit Points
Information security policyCurrency, management sign-off, dissemination
Risk analysisCompleteness, currency, risk treatment plans
Incident managementProcess documentation, exercises, reporting deadlines
Access controlMFA enforcement, permissions, on-/offboarding
TrainingCompletion rates, content currency
Business continuityBackup tests, DR plan, crisis exercises

Penetration Test Scope

ScopeDescription
External attack surfacePublicly reachable services, web applications, APIs
Internal infrastructureNetwork segmentation, lateral movement, privilege escalation
Social engineeringPhishing simulation (optional, by arrangement)
ExcludedDenial-of-service tests against production systems

Audit Documentation

Every audit is documented with:

  • Audit scope and timeframe
  • Audit methodology
  • Findings with severity rating (Critical / High / Medium / Low / Informational)
  • Recommended remediation measures
  • Responsible party and remediation deadline
  • Follow-up date

Finding Management

SeverityRemediation DeadlineEscalation
Critical48 hoursImmediate escalation to management
High30 daysTo ISO in next regular report
Medium90 daysQuarterly report
LowNext audit cycleNone

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT