ISO 27001
Benefit from Our Experience
An ISO 27001 Internal Audit is
a systematic, independent, and documented review of your Information Security Management System. Ensuring it
conforms to ISO 27001 requirements
is effectively implemented
is efficient
drives continuous improvement.
(616) 365-9822
Our Guarantee
"We offer a no cost, no obligation initial analysis as well as accomplishment Guarantees."
Brandon Kerkstra - President of MSG


ISO 27001
ISO/IEC 27001:2022 is the global benchmark for Information Security Management Systems (ISMS), empowering organizations to protect sensitive data with a risk-based, systematic approach to confidentiality, integrity, and availability. Published by ISO and IEC, it equips businesses—from startups to healthcare providers—with proven controls to combat cyber threats, ensure regulatory compliance (like GDPR and HIPAA), and build unbreakable trust in an era of rising digital risk.
Structures 10 clauses aligned with ISO’s high-level framework
Mandates leadership commitment and active risk ownership
Requires comprehensive risk assessments (Clause 6.1.2) to identify threats and vulnerabilities
Implements 93 Annex A controls — access, encryption, incident response, training
Enforces operational security (Clause 8.2) with tailored, effective safeguards
Drives continual improvement via internal audits (Clause 9.2) and management reviews (Clause 9.3)
Supports global certification through BSI, DNV, and other accredited bodies
Scales to any organization, enabling customized, context-aware information protection
Core Purpose
ISO/IEC 27001 safeguards sensitive information by ensuring its confidentiality, integrity, and availability, empowering organizations to proactively neutralize cyber threats, prevent data breaches, and protect financial and reputational assets. Through a structured, risk-based framework, it drives the implementation of robust controls to secure data in high-stakes sectors like healthcare, finance, and government—ensuring compliance and resilience in a digital-first world.
Prevents data breaches and unauthorized access through layered security controls
Ensures data integrity to avoid tampering or corruption
Maintains availability of critical systems during attacks or failures
Mitigates financial and reputational damage from security incidents
Enables proactive risk management to stay ahead of evolving cyber threats
Supports compliance with GDPR, HIPAA, PCI-DSS, and other regulations
Builds stakeholder trust with certified, transparent security practices
What Triggers an ISO 27001 Internal Audit?
| Event | Frequency | Scope | Typical Responsibility |
| Scheduled Internal Audit | Annually or as defined in the audit program (typically every 12 months to cover the full ISMS) | Entire ISMS, covering all ISO 27001 clauses (e.g., 4-10) and Annex A controls, including risk management and security processes | Information Security Manager or Internal Audit Team Lead |
| Significant Change in ISMS Scope | As needed (e.g., after new IT systems, processes, or organizational changes) | Affected ISMS components, such as new assets, processes, or controls (e.g., clause 4.4 ISMS, Annex A controls) | Information Security Manager or Process Owner |
| Security Incident or Nonconformity | Upon identification of major security incidents, breaches, or nonconformities | Specific areas related to the incident or nonconformity (e.g., clause 10.1 nonconformity and corrective action, Annex A.16 incident management) | Information Security Manager or Incident Response Team |
| Regulatory or Legal Changes | After updates to information security regulations (e.g., GDPR, HIPAA, or local data protection laws) | Processes impacted by new compliance obligations (e.g., clause 6.1.3 legal requirements) | Compliance Officer or Information Security Manager |
| Management Review Follow-Up | After management review meetings (typically annually) | Areas identified for improvement in management reviews (e.g., clause 9.3 management review) | Information Security Manager or Management Review Team |
| New or Modified Security Controls | Upon implementation of new or revised security controls (e.g., new software, access controls) | Specific controls or processes affected (e.g., Annex A.12 operations security, A.14 system acquisition) | Information Security Manager or IT Security Team |
| Third-Party or Supplier Changes | When changes in supplier services or third-party relationships impact security | Supplier management and related controls (e.g., Annex A.15 supplier relationships) | Information Security Manager or Procurement Manager |
| Pre-Certification or Surveillance Audit | Prior to initial certification, recertification, or surveillance audits (e.g., every 1-3 years) | Full ISMS or areas flagged in prior external audits | Information Security Manager or Internal Audit Team |
Triggers to cause an ISO 27001 Internal Audit
| Event / Trigger | Typical Frequency | Scope | Responsibility |
|---|---|---|---|
| Planned internal audit per ISMS audit program | At least annually; risk-based cadence by process/control domain | ISMS processes and Annex A controls; scope boundaries; SoA alignment | ISMS Manager plans; trained Internal Auditor(s) execute; Process Owners support |
| Significant change to ISMS scope, context, or interested parties | Upon change | Clause 4 context/scope, risk criteria, objectives, SoA updates | ISMS Manager; Internal Auditor validates changes |
| Major information security incident or near-miss | Upon incident | Incident response, forensic readiness, corrective actions, lessons learned | Incident Response Lead & ISMS Manager; Auditor checks effectiveness |
| Material risk assessment update or new high risks | At risk review (e.g., quarterly) or upon spike | Risk identification, treatment plans, residual risk acceptance, KPIs | Risk Owner(s) & ISMS Manager; Auditor samples decisions |
| New systems, applications, or significant change releases | Pre-release and post-deployment | Secure SDLC, change management, access control, logging/monitoring | Change Manager/IT; Internal Auditor reviews evidence |
| Vulnerability scan / penetration test with critical findings | Upon report | Patch & remediation process, exceptions, verification of fixes | Security Operations; Auditor validates closure |
| Business continuity or disaster recovery activation / major exercise | Upon activation or after planned exercise | BCP/DRP effectiveness, RTO/RPO attainment, communications | BC/DR Lead & ISMS Manager; Auditor performs follow-up |
| Supplier/subprocessor issue affecting confidentiality, integrity, or availability | Upon issue; supplier review at least annually | Third-party due diligence, contracts, SLAs, monitoring, exit plans | Vendor Manager & ISMS Manager; Auditor samples controls |
| Legal/regulatory/contractual changes (e.g., data protection, sector rules) | Upon change | Compliance obligations, policies, records, awareness and training | Compliance Officer & ISMS Manager; Auditor checks alignment |
| Management review decisions requiring verification | After each management review (typically semi-annual/annual) | Actions on risks/opportunities, resources, objectives, performance | Top Management assigns; ISMS Manager schedules targeted audits |
| Trends of nonconformities, user errors, or policy violations | Upon detection; trending monthly/quarterly | Root cause, corrective actions, awareness, technical controls | Process Owners & ISMS Manager; Auditor validates effectiveness |
| Identity & access management anomalies (privilege escalations, dormant accounts) | Upon anomaly; periodic (e.g., quarterly) access recertification | Joiner-Mover-Leaver, privileged access, MFA, segregation of duties | IAM Owner; Internal Auditor samples reviews |
| Cloud service change (region, data residency, service tier, major feature) | Upon change | Shared responsibility, configuration baselines, encryption, logging | Cloud Owner; ISMS Manager triggers focused audit |
| Key role changes (CISO/ISMS Manager, control owners) or staffing shifts | Upon change | Competence, responsibilities, delegation, continuity of operations | HR & ISMS Manager; Auditor checks handover evidence |
| Data classification scheme or asset inventory overhaul | Upon change; periodic (e.g., annual) review | Asset register completeness, owners, handling rules, disposal | Asset Owner(s) & ISMS Manager; Auditor samples assets |
| Policy/SoA updates introducing or retiring controls | Upon update | Control design & operation, documentation at point of use | ISMS Manager & Control Owners; Auditor verifies implementation |
| Customer/regulator audit findings or security questionnaire gaps | After each external audit/review | CAPA planning, systemic issues, evidence of closure | ISMS Manager coordinates; Internal Auditor follows up |
| Objectives/KPIs not met (e.g., incident MTTR, patch SLA, training completion) | Upon KPI review (monthly/quarterly) | Related processes, resources, improvements, risk impact | Process Owners & ISMS Manager; Auditor confirms actions |
| M&A, divestiture, or major organizational restructuring | Upon event | Scope/context, access, data transfers, contract novation, risks | Executive Sponsor & ISMS Manager; Auditor assesses changes |
| New or changed cryptographic practices/PKI | Upon change | Key management, algorithms, rotations, custody, backups | Crypto Owner/SecOps; Auditor verifies compliance |
| Training & awareness program overhaul or low completion rates | Upon issue or annually | Competence needs, effectiveness, phishing simulations, records | Training Owner & ISMS Manager; Auditor samples evidence |
Management Solutions Group
Professional Services

Focused On
Our Clients
With a combined 100 years of experience in quality and process management systems, MSG presents practical solutions to companies that want help or are struggling to obtain their first certification or working to be certified or improve in new areas of business.


