There’s a common misconception about ISO 27001 audits: that if your documentation is in order, you’ll pass.
Documentation matters…. but experienced auditors know that documentation is the easiest part to get right. What separates organisations that sail through their audit from those that collect nonconformities is whether the ISMS is actually operating — not just documented. It’s about evidence.
This guide explains how auditors think, what they look for beyond the documents, and where most organisations come unstuck.
The Auditor’s Mindset
An ISO 27001 auditor’s job is to form an independent opinion on whether your ISMS conforms to the standard and is effectively implemented, maintained, and continually improved.
That word — implemented — is doing a lot of work. It means auditors aren’t just checking whether you have a policy. They’re checking whether the policy is followed, whether the controls it describes actually exist in your systems, and whether staff know what they’re supposed to do.
Their primary tool for this is sampling. An auditor can’t review everything, so they take representative samples: a few user accounts to check access controls, a handful of incidents to see how they were managed, several suppliers to see whether they’ve been assessed. If the samples look good, they’ll typically gain confidence in the broader picture. If they don’t, they’ll dig deeper.
The three questions an auditor is always asking:
- Does the documentation say the right thing?
- Does practice match the documentation?
- Is there evidence that it actually happened?
The answer to the first question is usually yes, especially by Stage 2. The second and third are where things get interesting.
What They Always Check First
Before detailed testing begins, every auditor reviews the mandatory documentation that ISO 27001 requires to exist. This is the baseline:
- ISMS scope document — is the boundary clearly defined and appropriate?
- Information security policy — signed off by senior management, current, accessible to staff
- Risk assessment and risk register — is there a documented methodology? Has it been applied and kept current?
- Statement of Applicability — does it cover all 93 Annex A controls with justification for inclusions and exclusions?
- Risk treatment plan — are the controls from the SoA linked to actual implementation?
- Internal audit records — has an internal audit been conducted? Were findings raised and closed?
- Management review minutes — has senior management reviewed the ISMS with the required inputs covered?
If any of these are missing or clearly inadequate, the auditor will raise a finding before going further. Most organisations that have prepared properly will have these in place. The audit gets more interesting once this layer is confirmed.
What ISO 27001 Auditors Check in Each Area
The questions they ask and the evidence they expect to see — by ISMS area
The Operational Evidence Layer
This is where most organisations are caught out. An auditor who finds good documentation will then ask: “Can you show me this working?”
Risk assessment
Your risk register isn’t just a document to produce at audit time. Auditors look for signs that it’s a living process:
- When was it last updated?
- Has it been reviewed after significant events — a new system, a supplier change, a security incident?
- Are the risk owners real, named individuals with identifiable roles?
- Do the residual risk levels reflect the controls actually in place?
A risk register untouched for 18 months, or containing generic risks copy-pasted from a template with no relation to your actual business, will attract scrutiny.
Access control
Access control is one of the most frequently tested areas — it’s both critical and often poorly managed in practice. Auditors commonly ask to see:
- A list of current user accounts on a key system (email, finance, case management)
- Evidence that accounts of former employees have been promptly disabled
- Confirmation that admin and privileged access is appropriately restricted
- MFA configuration in your admin console
A common finding: an active user account belonging to someone who left the organisation months ago. Most auditors will find this if they look, and it’s a significant lapse.
Incident management
Auditors know that every organisation has incidents. If you tell them you’ve had none in the past year, they become more sceptical, not less. The question isn’t whether incidents occurred — it’s whether they were properly managed.
They’ll want to see your incident log and walk through one or two entries:
- Was the incident detected and recorded?
- Was the response proportionate and documented?
- Was there a post-incident review for significant events?
- Were lessons learned fed back into the ISMS?
Internal audit
The internal audit is your own quality check before the external auditor arrives. External auditors look carefully at how you’ve conducted it:
- Was the auditor independent of the areas they audited?
- Was the scope adequate — did it cover all parts of the ISMS?
- Were findings raised honestly, or is the report suspiciously all-green?
- Are nonconformities and observations from the internal audit being actively closed?
An internal audit that is entirely clean, or that contains open findings with no closure progress, are both red flags.
Management review
Management review is where the ISMS receives senior leadership attention. Auditors aren’t looking for a beautifully formatted report — they’re looking for evidence of genuine engagement:
- Were the right people present — not just the IT team?
- Were the required inputs actually discussed: audit results, risk positions, incidents, objectives, changes?
- Were decisions made and outputs documented?
- Does the review reflect what’s really happening in the ISMS, or is it a rubber stamp?
A management review conducted entirely by the IT team, without director or senior management involvement, will typically attract a finding.
Supplier management
If your SoA includes Controls 5.19–5.22 (and it almost certainly should), auditors will test whether supplier management is actually happening:
- Can you show a list of suppliers who process or access your information?
- Have the significant ones been assessed for information security?
- Are data processing agreements or equivalent in place?
- Are assessments being reviewed periodically — not just at onboarding?
Good contracts without any actual security review of suppliers will be challenged.
Training and awareness
Control 6.3 requires information security awareness for all staff. Auditors will ask:
- What training have staff received, and when?
- How do you know it was understood — not just clicked through?
- Were the topics relevant to your actual risk areas?
- Can you show completion records for a sample of staff?
“We sent an email” is not training evidence. Completion records from a learning platform, phishing simulation results, or signed attendance sheets carry significantly more weight.
What Makes an Auditor Comfortable
Auditors are human. Certain things put them at ease and lead to a smoother audit.
Knowledgeable staff. When the person being interviewed can explain their own controls in plain English — not just recite policy text — it builds confidence that the ISMS is genuinely understood. Auditors quickly distinguish between someone who runs the process and someone who was briefed the day before.
Evidence that predates the audit. Records with version histories, timestamps, and email threads that clearly existed before the audit week are far more credible than records that appear freshly created. Auditors are experienced at identifying back-populated documentation.
Honest acknowledgment of gaps. Organisations that say “we know this area needs work and here’s our plan” are often better received than those insisting everything is perfect. Continual improvement is a core ISO 27001 principle. Pretending there’s nothing to improve is unconvincing.
A consistent story across people. If the ISMS lead says access reviews happen quarterly and the IT administrator has never heard of them, there’s a problem. Auditors deliberately cross-check answers between interviewees.
Common Nonconformities to Avoid
The findings that come up most often.
Major nonconformities (require closure before certificate can be issued):
- Risk assessment not reviewed or updated after significant organisational changes
- Internal audit not completed before Stage 2
- Management review not covering the inputs required by the standard
- Statement of Applicability not reflecting the controls actually implemented
Minor nonconformities (require a closure plan; certificate can be issued):
- Leavers’ accounts not disabled promptly
- Supplier security assessments not documented
- Training records incomplete or absent for some staff
- Policy documents not formally approved or inaccessible to staff
- Incident log absent, sparse, or clearly not reflecting real events
Observations (not formal findings but worth addressing):
- Risk register lacking ownership or detailed treatment rationale
- Controls described in policies that aren’t technically enforced in systems
- Manual processes that introduce unnecessary risk and would benefit from automation
Common ISO 27001 Audit Findings — and How to Avoid Them
The findings that come up most frequently, by severity
Get Started
Free Templates
Free
The 14 mandatory documents. The starting point for any ISO 27001 project.
A great way to get started without the commitment.
Templates
Full Toolkit
£85
130+ documents; policies, risk register, audit pack, staff communications and everything else you need to build a working ISMS.
Buy now →Do-It-Yourself
DIY Course
£285
The Do-It-Yourself course introduces the standard, its requirements, and then shows you how to implement it, stage by stage.
Includes the full toolkit & email consultancy.
More support?
Coaching
~£3,500
I can guide you through the standard and help you tailor it to your business through a series of coaching workshops.
Includes the full toolkit, personal consultancy, and first-pass guarantee.
How to Prepare
The most effective preparation for Stage 2 is to conduct a thorough internal audit that genuinely mimics what the external auditor will do — including sampling records, interviewing staff, and checking that system configurations match your written policies.
Specifically before your audit:
- Pull your user access lists and check them against HR records for recent leavers
- Verify technical controls (MFA, password length, lockout policies) match what your policies state
- Review your incident log and confirm it has been actively maintained
- Check training records for gaps and resolve them before the audit date
- Walk your risk register and confirm every entry is current, owned, and linked to a treatment decision
The goal is to find your own nonconformities before the auditor does, so you have time to close them. An organisation that goes into audit having already run this exercise is almost always better placed than one relying on its documentation alone.
Frequently Asked Questions
What is the difference between a Stage 1 and Stage 2 audit?
Stage 1 is a documentation review, typically conducted remotely. The auditor checks that your mandatory ISMS documents exist, are complete, and are sufficient to support Stage 2. They’re not testing whether your controls are operational — that comes next. If Stage 1 raises significant gaps, you’ll need to address them before Stage 2 proceeds. Stage 2 is the full operational audit. The auditor visits (or connects remotely), interviews staff, samples records, reviews system configurations, and forms their opinion on whether your ISMS is effectively implemented. A certificate is issued, or findings are raised, based on Stage 2.
What questions do auditors typically ask staff?
Auditors tend to ask open questions rather than yes/no ones. Common examples: “Can you walk me through what happens when a new member of staff joins?” “If you received a suspicious email, what would you do?” “How do you decide what data can be shared with a supplier?” “When did you last receive information security training and what did it cover?” The goal is to hear a natural, informed response — not a recited answer. If someone has to look up the policy to answer a basic question about their own job, that tells the auditor something.
How long does a Stage 2 audit take?
It depends on organisation size and scope. For a 10–30 person organisation, Stage 2 is typically one to two days. For a 50–100 person organisation, two to three days is common. Larger or more complex scopes take longer. Your certification body will confirm the audit duration when they issue the audit plan, which you should receive at least a week in advance. The audit plan will also tell you which areas and controls they intend to focus on — it’s worth reviewing it carefully and ensuring the right people are available.
What happens if we receive a nonconformity?
It depends on severity. A major nonconformity means the certificate cannot be issued until the finding is closed — you’ll need to demonstrate to the auditor’s satisfaction that the issue has been resolved, typically within 90 days. A minor nonconformity allows the certificate to be issued but requires a documented corrective action plan and evidence of closure, usually at the next surveillance audit. Receiving findings is not unusual — most first-time certifications involve at least a few minor nonconformities. What matters is that you respond to them seriously and close them properly.
Can we see the audit questions in advance?
You’ll receive an audit plan that outlines which clauses, controls, and business areas the auditor intends to cover on each day. You won’t receive a script of exact questions, but the audit plan gives you enough information to ensure the right people and evidence are ready. For a Stage 2 audit, reviewing the audit plan carefully and preparing a brief for each session — who will be present, what evidence they should have ready — is time well spent. Auditors expect you to prepare; it’s not gaming the process.
Related Guides
- How to Prepare for a Stage 2 Audit
- ISO 27001 Internal Audit Programme
- ISO 27001 Management Review
- ISO 27001 Risk Assessment