What are the 10 most common non-conformances identified at an annual ISO 27001 surveillance audit?

19.03.2021

Have you put the right policies, procedures and controls in place to protect your organisation against information security risks? Every day valuable data is at risk of being hacked, corrupted, lost or accessed by the wrong personnel. Here are the top 10 information security failings identified by ISO 27001 in today’s business:

Implement a process for monitoring Information
Security risks

To ensure risks are identified, managed and ideally avoided it is important that you create either a Risk Register or a similar formalised process to enable evidence-based decisions to be made in response to the risks that are identified.

Conduct training and provide evidence of staff competency

For an organisation to demonstrate staff competency and reduce internal risks they should consider introducing Role Specifications and/or Job Descriptions, Induction Checklists and Staff Handbooks. These can help to outline your Organisation’s expectations for staff to demonstrate appropriate levels of Information Security awareness, training and/or experience, in accordance with role.

Ensure you have a robust recruitment process

The Recruitment Process should determine the selection of new recruits based on appropriate education, training, or experience to include Information Security responsibilities of that role.

Put a process in place for the secure destruction of information and data

An organisation that takes Information Security seriously should have a defined process for the secure destruction of information and data that includes electronic media, physical media, confidential documentation and records of the disposals that have taken place.

Two people going over graphsIntroduce regular and structured training programmes

Although some staff may have received training within your Organisation, this is usually not specific to the subject and can be provided using various sources that are not approved. Therefore, it is very important that Information Security awareness training is carried out in a structured way.

A Business Continuity Plan and/or Disaster Recovery Plan

Having one of these plans developed and approved, that references the continuity of Information Security processes in the event of a disruptive incident, can be critical to the ongoing security of information and data in today’s business.

A system that records Information Security failings

The recording of Information Security failings is critical if you want to identify, overcome and prevent future threats to your Organisation and avoid any result and damage to your brand’s reputation. An Incident Reporting system can be used to record responses to Information Security events, incidents and non-conformances during operation of an Information Security system.

Establish an Information Exchange agreement

Increase customer confidence in your Organisation’s handling of their private data with an Information Exchange agreement. The agreement governs the transmission of information and data between your Organisation and your customers. In particular it specifies what, why and how customer information is collected and processed, how long it is kept for and how it is securely removed from your records.

Develop Information Security Management System policies

A set of policies that match your Organisation’s intentions towards the management of Information Security make it clear what your customers and employees can expect. These policies should be made available both internally and externally.

Define and Document legal requirements

Using either a Legal Register or an approved provider document any relevant legal, regulatory, statutory and other requirements that your Organisation must follow.

 

To help you stay on top of your non-conformances, we’ve created this handy info sheet that you can download.

If you feel like you could benefit from ISO 27001, visit our dedicated web page to find out more, or get in touch with us at 0333 344 3646 or [email protected].

Sign up to get the latest in your inbox

    • Email address

About the author

  • Name:

    Serena Cooper

  • Company:

    Citation ISO Certification

  • Bio:

    Serena has worked for Citation ISO Certification since 2022, writing creative and informative content on ISO certification and consultation to help businesses reach their potential.

Cookies

QMS International use cookies to provide you with a better site experience, enable features and to help us understand how our website is being used.

By continuing, you consent to the use of cookies in accordance with our Cookie Policy

Allow All Cookies

Allow Strictly Necessary Cookies Only