ISO 27001 Content Hub

ISO 27001 Audit Preparation

Stage 1 and Stage 2 in detail: every checkpoint, typical nonconformities, and two print-ready CC-BY-4.0 checklists to download.

ISO 27001 certification always runs in two stages: Stage 1 (Documentation Review) and Stage 2 (Certification Audit). Treating them as isolated checks underestimates how they interact. Stage 1 examines conformity of your documentation with the standard; Stage 2 verifies that the documented ISMS is actually practised. This guide walks through the full checkpoints of both stages, the typical nonconformities, and how to prepare with two structured checklists (40-point Stage 1 and 60-point Stage 2). Both checklists are available as CC-BY-4.0 licensed PDFs.

Stage 1: Documentation Review (Readiness Audit)

The Stage 1 audit is a readiness check performed by the external auditor. It typically runs remotely or as a 1 to 2 day on-site engagement. The goal is not to collect findings, but to assess whether your ISMS is mature enough for Stage 2. The auditor reviews the full ISMS documentation, asks targeted questions about scope, risk methodology, and the implementation of the key management clauses, and identifies gaps that must be closed before Stage 2 begins.

Typical gap between Stage 1 and Stage 2: 4 to 8 weeks. That window gives you time to address any major findings and build additional evidence (such as a further management review cycle or internal audit). Choosing the window too short leaves no room for corrections; waiting too long forces you to re-pull evidence from an earlier period.

Stage 1 Checkpoints: Mandatory Documents

The auditor works through a fixed list of mandatory documents. Every ISO 27001 clause generates at least one document or piece of evidence. The following are the core documents that must be complete and current before Stage 1:

  • ISMS Scope Statement (Clause 4.3): Which departments, locations, systems, and processes are covered by your ISMS. Boundaries must be documented, including the interfaces to out-of-scope areas.
  • Risk Assessment Methodology (Clause 6.1.2): How you identify and evaluate risks. Criteria for likelihood, impact, and risk acceptance must be explicitly documented.
  • Statement of Applicability (Clause 6.1.3 d): All 93 Annex A controls with per-control justification. See our SoA guide.
  • Risk Treatment Plan: Which controls address which risks, with owners and deadlines.
  • Security Policy (Clause 5.2): Information security policy approved by top management, with a statement of commitment.
  • Internal Audit Plan (Clause 9.2): Multi-year audit plan, and at least one completed internal audit with report.
  • Management Review Minutes (Clause 9.3): At least one complete review cycle! Without management review minutes you will not pass to Stage 2.
  • Corrective Action Process (Clause 10.1): Documented procedure for corrective actions, with examples of closed nonconformities.
  • Evidence of Security Awareness Training (A.6.3): Training records for all employees, including onboarding evidence.

Stage 2: Certification Audit (On-Site)

The Stage 2 audit is the actual certification audit and takes place on site. Duration depends on headcount and scope: 3 to 8 days. A mid-sized organisation with 100 to 300 employees should expect 4 to 5 days. The auditor no longer checks documentation; they verify operational implementation through sampling, interviews, and technical verification.

Stage 2 Checkpoints: Operational Evidence

For Stage 2 you need not just documents, but proof that your ISMS is actually practised. The key evidence artifacts:

  • Asset Inventory (A.5.9): Complete inventory of all information assets with owner, classification, and last-review date.
  • Access Control Matrix (A.5.15 to A.5.18): Who has which access. The auditor samples entries and checks whether privileged accounts follow a clear need-to-know principle.
  • Supplier Register (A.5.19 to A.5.22): List of all critical suppliers with risk rating, DPA, and contractual security commitments.
  • Incident Log (A.5.24 to A.5.27): List of all security incidents with detection, response, and lessons learned. Even if you had no incidents, you still need the log and a documented escalation chain.
  • Backup Records (A.8.13): Evidence of successful backups and, critically, of at least one tested restore. A backup without a restore test is not a backup.
  • Change Management Records (A.8.32): History of change requests with risk assessment, approval, and rollback plan.
  • Vulnerability Scans (A.8.8): Ideally at least 6 months of scan history with documented remediation. A single scan directly before the audit is a red flag.
  • Penetration Test: Optional, but welcomed by TÜV and other certification bodies, particularly for internet-facing systems and web applications.
  • BCM / DR Test Results (A.5.30): Evidence of a performed business continuity or disaster recovery test with a protocol and lessons learned.
  • Audit Interviews: The auditor typically interviews the CISO, IT administrators, developers, HR, and procurement. Every role must be able to describe the processes relevant to them.

Typical Nonconformities and Remediation Deadlines

Audit findings fall into three categories. The category determines how much time you have for remediation.

CategoryTypical ExamplesRemediation Deadline
MajorMissing management review, incomplete SoA, no completed internal audit.usually 90 days
MinorIncomplete logs, backup tests not documented, gaps in training records.usually 6 months
ObservationImprovement suggestions without a remediation obligation.no deadline

With a major finding the certificate is not issued until the corrective action has been verified by the auditor, either by submitting additional evidence or by a follow-up audit. Minor findings are typically re-examined at the next surveillance audit.

Download: Audit Checklists (CC-BY-4.0)

For a structured preparation, two checklists are available as print-ready PDFs. Both are licensed under CC-BY-4.0 and can be used freely with attribution to Kopexa GmbH.

Stage 1 Readiness Checklist

Around 40 items covering ISO 27001 Clauses 4 to 10 and Annex A documentation prerequisites.

CC-BY-4.0 licence, free use with attribution to Kopexa GmbH.

Stage 2 Evidence Checklist

Around 60 items grouped by Annex A theme: A.5 Organisational, A.6 People, A.7 Physical, A.8 Technological.

CC-BY-4.0 licence, free use with attribution to Kopexa GmbH.

Tips for Audit Week

Even with the best preparation, audit week determines how the whole engagement plays out. The following principles come from field experience and save findings:

  1. 1.Designate an Audit Host: Usually the CISO or ISMS manager. The audit host stays with the auditor throughout, facilitates interviews, brings in the right SMEs, and manages the room logistics.
  2. 2.Pre-Audit Walk-Through: One week before the audit, go through the likely questions with every interviewee. Not to memorise answers, but to clear up uncertainties.
  3. 3.Never Improvise: The sentence "we do this, we just never documented it" is a finding. If it is not documented, it does not exist for the auditor.
  4. 4.The Auditor Is Right in the Hour: Arguing during the audit achieves nothing. Substantive objections go into the open-points list AFTER the audit. In the room: listen, document, clarify, do not debate.
  5. 5.Prepare Interviewees: Staff should know the auditor is asking about their processes, not the verbatim policy text. Honest, concrete answers beat rehearsed phrases.

Want the full audit preparation in one platform?

Kopexa links the Statement of Applicability, risk register, incident log, supplier register, and evidence archive in a single tool. 14-day free trial, from EUR 249 per month. Self-service or with partner support, both work.

Start for free

Frequently Asked Questions

How long does the Stage 2 audit take?

Depending on headcount and scope, between 3 and 8 days. Small organisations with 20 to 50 employees get by with 3 days, mid-sized organisations with 100 to 300 employees typically 4 to 5 days, and large organisations with distributed sites 6 to 8 days or more.

What does the certification audit cost?

For mid-sized organisations, the certification audit typically falls in the range of EUR 10,000 to 25,000. See our honest cost comparison for more. On top come the annual surveillance audits, which usually amount to around one third of the Stage 2 cost.

Can Stage 1 and Stage 2 be done on the same day?

No. The gap between Stage 1 and Stage 2 is typically 4 to 8 weeks. You need that time to address any major findings. Certification bodies also do not accept combined audits because Stage 1 is explicitly a readiness check whose results feed into the planning of Stage 2.

What happens with a major finding?

With a major finding the certificate is not issued. You receive a remediation window, usually 90 days, to implement the corrective action. Verification happens either by submitting evidence or through a follow-up audit. Only then is the certificate issued.

Who should attend the audit interviews?

The CISO or ISMS manager is mandatory. Beyond that, bring in subject-matter experts per control area: IT administrators (A.5.15 to A.5.18, A.8), developers (A.8.25 to A.8.28), HR (A.6), procurement (A.5.19 to A.5.22), facility management (A.7). Top management should be available for the management review topic, even if they do not join every session.

Can we combine the audit with NIS2 or TISAX?

Yes. An ISO 27001 certification covers around 85 percent of NIS2 requirements for essential-importance entities and a significant portion of TISAX. Joint audits are possible, but must be agreed in advance with the certification body. See our ISO 27001 vs. NIS2 comparison.

Related Resources

Let's talk about your ISO 27001 implementation

Free & non-binding

By submitting, you agree to our Privacy Policy .