
They can perform their mock audit before the actual ISO audit with this knowledge. This course aims to educate individuals on conducting an internal audit for ISO 27001:2013. Performing the audit (Included: How to conduct a mock audit based on a compiled checklist?) General concepts and principles of auditing With this need for implementation comes a need for understanding of the requirements.įrom this course, we will walk you through: We will also provide a step-by-step guide on how individuals can conduct a proper internal audit. We hope to impart our knowledge/guide on how an organisation can achieve a robust information security management system through this course. Organisations must ensure that they have a robust information security management system to safeguard the interest of all stakeholders involved. The adoption of digital technology has become more prevalent in recent years. In essence, the standard provides a model framework for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system.

The ISO 27001:2013 standard specifies requirements for managing an organisation’s information security system structure.
