Many businesses aim for ISO 27001 certification to demonstrate commitment to information security, often driven by client requirements or internal best practices. However, before engaging a certification body, a thorough internal cybersecurity audit is crucial to identify and remediate potential non-conformities. Ignoring this step can lead to costly delays and rework, as discovered by many companies only during the formal audit.

From Softline IT’s experience, the key mistake at this stage is focusing solely on documentation without verifying the actual technical implementation of security controls. Our engineers frequently encounter situations where policies exist on paper, but the underlying IT infrastructure lacks the necessary configurations or monitoring to enforce them effectively.

Understanding your assets and risks

The first step in any pre-certification audit is a comprehensive inventory of information assets and an assessment of associated risks. This goes beyond just hardware; it includes data, software, intellectual property, and even personnel. Each asset needs to be classified by its criticality, confidentiality, integrity, and availability requirements.

A risk assessment should identify potential threats (e.g., malware, insider threats, hardware failure) and vulnerabilities (e.g., unpatched systems, weak passwords, lack of MFA). For each identified risk, evaluate the likelihood of occurrence and the potential business impact. This provides a data-driven basis for prioritizing security controls.

Perimeter and internal network security

Network security is foundational. An audit must verify the effectiveness of perimeter defenses and internal segmentation. This includes firewalls, intrusion detection/prevention systems, and secure network configurations.

FeaturePerimeter DefenseInternal Segmentation
Primary GoalBlock external threatsLimit lateral movement
Key TechNGFW, UTM, VPNVLANs, ACLs, micro-segmentation
Traffic FocusNorth-South (external)East-West (internal)
Example RiskDDoS, external breachInsider threat, malware spread

Ensure your next-generation firewalls (NGFW) or unified threat management (UTM) solutions are properly configured with up-to-date threat intelligence. Verify that virtual local area networks (VLANs) are correctly implemented to separate different departments or types of traffic (e.g., guest Wi-Fi from corporate data). Multi-factor authentication (MFA) should be enforced for all remote access and privileged accounts.

Endpoint and server hardening

Every workstation and server is a potential entry point for attackers. The audit should confirm that all endpoints and servers adhere to security baselines. This includes regular patching, robust antivirus/endpoint detection and response (EDR) solutions, and secure configuration management.

  • Patch Management: Verify a consistent process for applying security updates to operating systems and applications across all devices.
  • Antivirus/EDR: Ensure corporate antivirus solutions are centrally managed, updated, and configured with appropriate policies for real-time scanning and threat remediation. EDR capabilities provide deeper visibility into endpoint activities.
  • Server Hardening: Confirm that server operating systems are securely configured, unnecessary services are disabled, and access controls are strictly enforced. Review RAID configurations for data redundancy and performance.
  • Workstation Security: Implement strong password policies, screen lock settings, and ensure disk encryption (e.g., BitLocker) is active on laptops.

Backup and disaster recovery

Data loss, whether accidental or malicious, can cripple a business. ISO 27001 requires robust backup and disaster recovery (DR) plans. The audit must verify that these plans are not only documented but also regularly tested and proven effective.

  • Backup Strategy: Confirm adherence to the 3-2-1 rule (3 copies of data, on 2 different media, 1 copy offsite). Verify backup frequency (RPO – Recovery Point Objective) and recovery time (RTO – Recovery Time Objective) align with business needs.
  • Immutable Backups: For ransomware protection, assess if your backup solutions support immutable backups, preventing deletion or modification for a defined period.
  • Disaster Recovery Plan: Review the DR plan for clarity, completeness, and feasibility. Conduct simulated recovery drills to validate the process, including restoring critical systems and data from backups.
  • Offsite Storage: Ensure offsite backup copies are physically and logically secure, with appropriate access controls.

Before engaging a certification body, conduct a thorough internal audit of your IT infrastructure against ISO 27001 requirements. Identify all gaps in technical controls, from network segmentation to backup verification. Create a clear remediation plan with assigned responsibilities and timelines. This proactive approach will save time and resources during the actual certification process and significantly strengthen your overall cybersecurity posture. Consider engaging an experienced system integrator to perform a pre-certification technical assessment, ensuring your systems are truly aligned with security best practices, not just paper policies.