ISO 27001 IA/LA CertiProf – Comprehensive Study Notes (Version IA/LA 112022)

ISO 27001 INTERNAL AUDITOR / LEAD AUDITOR – Comprehensive Study Notes (CertiProf, Version IA/LA 112022)

This set of notes consolidates the CertiProf ISO 27001 IA/LA material into a structured study guide. It mirrors the content from the slide deck (phases, concepts, roles, processes, and exam-ready definitions) with key points, definitions, and practical implications. LaTeX is used for formulas and numerical references.


1) CertiProf and Network Overview

  • CertiProf® is a certifying entity founded in the United States in 2015, currently located in Sunrise, Florida.

  • Philosophy: knowledge creation in community; collaborative network of:

    • Lifelong Learners (LLLs): continuous learners, committed to lifelong learning; goal is learning regardless of exam outcome.

    • ATPs: Authorized Training Partners (universities, training centers, facilitators) worldwide.

    • Authors/Co-creators: industry experts who develop content for new certifications.

    • Internal staff: distributed team in India, Brazil, Colombia, and the United States.

  • Accreditations/Affiliations:

    • Agile Alliance: CertiProf is a corporate member; provides tools for professional development.

    • IT Certification Council (ITCC): supports industry certification value, exam safety, innovation, and best practices.

    • Credly: badges issuer; Credly badges are widely recognized by IBM, Microsoft, PMI, Nokia, Stanford, etc.

  • Credly badge links (examples):

    • https://www.credly.com/org/certiprof/badge/certified-iso-27001-internal-auditor-i27001ia

    • https://www.credly.com/org/certiprof/badge/certified-iso-27001-lead-auditor-i27001la

  • CertiProf branding: ISO 27001 Internal Auditor / Lead Auditor badges (CertiProf Professional Knowledge).


2) ISO 27001 Internal Auditor / Lead Auditor – What It Is

  • Roles covered: ISO 27001 Internal Auditor (IA) and ISO 27001 Lead Auditor (LA).

  • Version: IA-LA Version 11/2022 (ISO/IEC 27001:2022 alignment).

  • General description: Earners demonstrate understanding of ISO 27001 concepts, audit processes, and how to conduct and lead ISMS audits.

  • Certifications emphasize: audit process, lead auditor responsibilities, risk management alignment, and ISMS development.


3) ISO 27001: Key Concepts and Structure

  • ISMS defined: Information Security Management System – a set of policies, procedures, guidelines, resources, and activities to manage information security risks.

  • Core dimensions of information security: Confidentiality, Availability, and Integrity (the CIA triad):
    ext{CIA} = ( ext{Confidentiality}, ext{Integrity}, ext{Availability})

  • Core purpose: establish, implement, maintain, and continually improve information security; risk-based decisions guide controls.

  • PDCA (Deming) cycle in ISMS:
    PDCA: ext{Plan}
    ightarrow ext{Do}
    ightarrow ext{Check}
    ightarrow ext{Act}

  • Management system concept: ISMS is part of the global management system; ties information security to organizational objectives, stakeholder needs, and continual improvement.

  • Relationship to risk management: information security risks drive control selection and treatment via a structured risk management process.


4) ISO 27001: 2022 Structural Highlights

  • 93 controls in 4 groups (as updated in 2022) vs prior versions with more controls and clauses.

  • 11 new controls added (e.g., threat intelligence, cloud information security, business continuity, physical security monitoring, data encryption, web filtering, etc.).

  • 1 control removed (asset disposal).

  • 58 controls updated; 24 controls merged.

  • Annex A groups: organizational, people, physical, technological controls (4 groups total).

  • The ISMS family covers: defining ISMS requirements, certification body assessment, and sector-specific guidance.


5) ISO 27001 Core Clauses (Overview)

  • 0. Context: Understand the organization and its context; stakeholders and needs; scope of the ISMS.

  • 4. Context of the organization

    • 4.1 Understanding the Organization and its Context

    • 4.2 Understanding Stakeholders’ Needs and Expectations

    • 4.3 Determination of the ISMS Scope

    • 4.4 Information Security Management System (ISMS)

  • 5. Leadership

    • 5.1 Leadership and Commitment

    • 5.2 Policy

    • 5.3 Roles, Responsibilities and Authorities

  • 6. Planning

    • 6.1 Actions to Treat Risks and Opportunities

    • 6.2 Information Security Objectives and Achievement Planning

    • 6.3 Planning of Changes

  • 7. Support

    • 7.1 Resources

    • 7.2 Competence

    • 7.3 Awareness

    • 7.4 Communication

    • 7.5 Documented Information

  • 8. Operation

    • 8.1 Operational Planning and Control

    • 8.2 Information Security Risk Assessment

    • 8.3 Information Security Risk Treatment

  • 9. Performance Evaluation

    • 9.1 Monitoring, Measurement, Analysis and Evaluation

    • 9.2 Internal Audit

    • 9.3 Management Review

  1. Improvement

  • 10.1 Continual Improvement

  • 10.2 Non-conformity and corrective actions


6) Phase 1: Fundamentals of an ISMS (Phase 1 – ISO 27001 Fundamentals)

  • ISO/IEC 27001:2022 structure and its family context; relationship to other standards (e.g., ISO 9000, ISO 20000, ISO 22301).

  • Core purpose of Phase 1: understand the standard, its terms, and its structure; establish baseline knowledge for ISMS design.

  • ISO 19011 – Auditor Module integrated in Phase 1:

    • Auditing concepts, process, components, and auditor preparation.

  • Scope: general guidance; trainers may adapt material based on experience.


7) Phase 2: Design and Implementation of an ISMS

  • Purpose: define, design, and implement the ISMS; align with ISO/IEC 27003 guidance.

  • Core activities (as per the presentation):

    • Identify, analyze, and establish information security requirements.

    • Develop controls proposed in Annex A; map control objectives to concrete controls.

    • Elaborate the ISMS design: scope, boundaries, and ISMS policy.

    • Obtain management approval to initiate the ISMS project.

    • Perform information security requirements analysis.

    • Conduct risk assessment and treatment planning.

    • Define the ISMS scope and policy.

    • Produce the SoA (Statement of Applicability) including control objectives and selected controls.

    • Produce the final ISMS project implementation plan (timeline).


8) Phase 3: Information Security Risk Management (ISO 27005)

  • Purpose: provide risk management guidance to support ISO 27001 implementation and ISMS effectiveness.

  • Key concepts and phases (as per the slides):

    • Context establishment: define external/internal context and risk criteria.

    • Identification of assets: primary (mission-critical processes, proprietary tech) and secondary assets (hardware, software, networks, services, knowledge workers).

    • Threats and vulnerabilities: threats that exploit vulnerabilities; vulnerabilities are weaknesses that can be exploited.

    • Information threats and vulnerability examples; risk scenarios combining assets, threats, and vulnerabilities.

    • Risk assessment: analyze consequences and likelihood; determine risk levels.

    • Risk treatment: select controls and determine required controls to treat risk; compare with Annex A; draft SoA.

    • SoA: include required controls, inclusion/exclusion justifications, and a control implementation checklist.

    • Risk treatment plan and approval by risk owners; residual risk acceptance.

  • Alignment with ISO 31000: risk management principles (value creation, integration, decision support, uncertainty handling, etc.).

  • Risk treatment options include: Mitigate, Avoid, Transfer, and Accept.

  • SoA and risk treatment are aligned with a common risk management framework; the SoA is part of the formal ISMS documentation.


9) Annex A: Controls and their Organization

  • Annex A structures controls into four groups:

    • 5. Organizational Controls

    • 6. People Controls

    • 7. Physical Controls

    • 8. Technological Controls

  • Examples of control areas in Annex A (not exhaustive):

    • 5.1 Policies for information security

    • 5.2 Information security roles and responsibilities

    • 5.3 Segregation of duties

    • 5.4 Management responsibilities

    • 5.5 Contact with authorities

    • 5.6 Contact with interested parties

    • 5.7 Threat intelligence

    • 5.8 Information security in project management

    • 5.9 Inventory of information and other assets

    • 5.10 Acceptable use of information and assets

    • 5.11 Return on assets

    • 5.12 Classification of information

    • 5.13 Labeling of information

    • 5.14 Information transfer

    • 5.15 Access control

    • 5.16 Identity management

    • 5.17 Authentication information

    • 5.18 Access rights

    • 5.19 Information security in supplier relationships

    • 5.20 Information security in supplier agreements

    • 5.21 ICT supply chain security

    • 5.22 Supplier service monitoring/review/change management

    • 5.23 Cloud information security

    • 5.24 Incident management planning and preparation

    • 5.25 Incident response decision-making

    • 5.26 Incident response

    • 5.27 Learning from incidents

    • 5.28 Collection of evidence

    • 5.29 Information security during disruption/breach

    • 5.30 ICT readiness for business continuity

    • 5.31 Legal/regulatory requirements

    • 5.32 Intellectual property rights

    • 5.33 Protection of records

    • 5.34 Privacy/PII protection

    • 5.35 Independent review of information security

    • 5.36 Compliance with security policies/rules/standards

    • 5.37 Documented operational procedures

  • The Annex A also includes the full set of 93 controls, organized by domain and objective, plus notes on applicability and Justifications in the SoA.


10) Documentation and Documentation Control (7.x) under Phase 4 and beyond

  • 7.5 Documented Information: creation, updating, and control of documents and records.

    • 7.5.1 General: Documented information required by the standard and necessary for ISMS efficacy.

    • 7.5.2 Creation and Update: identification, form, review, and approval of documents.

    • 7.5.3 Documented Information Control: ensure availability, protection, access, storage, change control, retention.

  • External documented information may also be controlled as required.


11) 7. Leadership and top-management responsibilities (5.x) – Details

  • 5.1 Leadership and Commitment

    • Top management must demonstrate leadership and commitment to the ISMS:

    • Ensure information security policies and objectives align with strategic direction.

    • Integrate ISMS requirements into organizational processes.

    • Ensure necessary resources are available.

    • Communicate the importance of ISMS and its results.

    • Ensure ISMS achieves expected results and support continual improvement.

    • Demonstration mechanisms include: approving information security policy, guaranteeing ISMS resources, defining roles/authorities, communicating security importance, enabling participation, and setting conditions for ISMS success.

  • 5.2 Policy

    • Top management must establish a suitable information security policy with objectives, commitment to compliance, and continuous improvement. The policy must be available as documented information, communicated, and accessible to stakeholders as appropriate.

  • 5.3 Roles, Responsibilities and Authorities

    • Top management must ensure clear assignment and communication of responsibilities and authorities for information security.

    • Define responsibilities for ISMS compliance, reporting ISMS behavior, and potentially appoint an ISMS committee.

    • Emphasize independence of information security roles from IT when possible to maintain duty segregation.


12) 7.1–7.4 Resources, Competence, Awareness, and Communication

  • 7.1 Resources: Determine and provide required resources to implement, maintain, and improve the ISMS.

  • 7.2 Competence: Ensure staff competence through education, training, or experience; evidence must be kept.

  • 7.3 Awareness: Staff must be aware of the Information Security Policy and their role in ISMS performance and consequences of non-compliance.

  • 7.4 Communication: Determine needs for internal/external ISMS communications (content, timing, recipients, responsible sender, processes).


13) 8. Operation – Planning, Risk Assessment, and Risk Treatment

  • 8.1 Operational Planning and Control

    • Plan, implement, and control processes to meet ISMS requirements and ISMS objectives (6.1 and 6.2). Include outsourced process control.

  • 8.2 Information Security Risk Assessment

    • Conduct risk assessments at planned intervals; document results; consider significant changes.

  • 8.3 Information Security Risk Treatment

    • Define and implement risk treatment options; determine required controls (from Annex A or new); compare with Annex A to ensure coverage; draft SoA with inclusion/exclusion justifications; obtain approval of risk treatment plan and residual risk acceptance; keep documented information.

  • Note: The risk management approach aligns with ISO 31000 and the ISMS risk management process is integrated with business context.


14) 9. Performance Evaluation – Monitoring, Internal Audit, Management Review

  • 9.1 Monitoring, Measurement, Analysis and Evaluation

    • Establish what to monitor and measure; define methods; ensure results are valid and comparable; maintain documented information.

  • 9.2 Internal Audit

    • Plan, establish, implement, and maintain one or more audit programs; define criteria and scope; select auditors; ensure objective reporting to management; maintain documented information of audits and results.

    • Internal audit is a systematic, independent process to determine conformity with ISMS and continuous improvement opportunities.

  • 9.3 Management Review

    • Top management must review ISMS at planned intervals for continued suitability, adequacy, and effectiveness.

    • Inputs include status of actions, changes in external/internal context, information security behavior/trends (non-conformities, corrective actions, audit results, objective compliance), stakeholder feedback, risk results, and improvement opportunities.

    • Outputs include decisions on continuous improvement and ISMS changes; maintain documented results.


15) 10. Improvement – Continual Improvement and Non-Conformities

  • 10.1 Continual Improvement: The organization shall continually improve the adequacy, sustainability, and effectiveness of the ISMS.

  • 10.2 Non-conformity and Corrective Actions:

    • React to non-conformities and, where applicable, implement corrective actions and address consequences.

    • Assess causes; determine if similar non-conformities may occur elsewhere; implement actions; verify effectiveness.

    • If needed, make changes to the ISMS; keep evidence of non-conformity, actions taken, and results.


16) ISMS Risk Management – Key Terms and Concepts (ISO 27005 alignment)

  • Risk concepts:

    • Risk = uncertainty that could affect objectives; expressed as a function of likelihood and impact.

    • Risk owner: person or organization responsible for managing a risk.

    • Threat: potential cause of an undesirable incident.

    • Vulnerability: weakness that could be exploited by threats.

    • Control: measure that modifies risk (mitigates, reduces likelihood, reduces impact, or transfers risk).

  • Risk management cycle: context establishment → asset identification → threat/vulnerability assessment → risk analysis → risk evaluation → risk treatment → risk communication → risk monitoring and review.

  • Risk acceptance and residual risk: after treatment, remaining risk is the residual risk; formal acceptance may be required from risk owners.

  • Link to ISO 31000: generic risk management framework and language for cross-organization applicability.


17) Risk Criteria, Scales, and the Matrix (Illustrative Concepts)

  • Probability of occurrence (illustrative scales): Rare, Unlikely, Possible, Likely, Very Likely (used to rate likelihood). Display-oriented example matrices appear in the material as follows:

    • Probability (P) scale and Impact (I) scale feed a risk rating.

    • The matrix yields a risk rating such as Low, Moderate, High, or Extreme, guiding treatment decisions.

  • Impact categories (illustrative): Insignificant, Minor, Moderate, Severe, Catastrophic.

  • Risk rating notations shown in slides include labels like B (Low), M (Moderate), A (High), E (Extreme).

  • Example risk assessment formulas (conceptual):

    • Risk can be viewed as a combination of likelihood and impact:
      R riangleq f(L, I) ext{ with } L ext{ and } I ext{ on a fixed scale}.

    • A common simplification is the product rating, e.g., R ext{ (qualitative)} = L imes I, with corresponding bands (Low/Moderate/High/Extreme).

  • The matrices guide risk treatment decisions, such as:

    • Reduce/mitigate risks (implement controls)

    • Avoid risks (change processes)

    • Share/transfer risks (insurance, outsourcing)

    • Accept risks (residual risk acceptable)


18) Audit Theory and ISO 19011 Guidelines (Audit Principles)

  • ISO 19011:2018 provides guidance on auditing management systems and audit programs.

  • Audit principles include:

    • Integrity: ethical behavior, honesty, impartiality, and competence.

    • Fair presentation: truthfulness and accuracy in findings and reporting.

    • Professional due care: diligence and sound judgment.

    • Confidentiality: safeguard information and sensitive data.

    • Independence: objective and unbiased auditing.

    • Evidence-based focus: conclusions based on verifiable evidence.

    • Risk-based focus: auditing priorities aligned with risks and opportunities.


19) Audit Program, Plan, and Execution (Key Elements for IA/LA Exam)

  • Audit program basics:

    • Audit scope defines locations, processes, time period, and boundaries.

    • Audit plan details objectives, scope, criteria, locations, schedule, team responsibilities, resources, language, and methods.

    • The audit team may include an audit team leader, auditors, guides, observers, and technical experts.

  • Roles within the audit team:

    • Auditor: conducts audit activities and collects evidence.

    • Audit team leader: oversees planning, execution, and reporting.

    • Guides/Observers: provide access and support but should not influence audit conclusions.

    • Technical experts: support specialized audit aspects.

  • Audit planning considerations:

    • Consider team competence, sampling techniques, risks to the audit objectives, and confidentiality.

    • Ensure availability of resources, facilities, and information.


20) Audit Activities and Evidence (Practical Audit Knowledge)

  • Audit activities include:

    • Opening meeting; documented information review; interviews; observation of activities; review of records and documents.

    • Data collection methods: interviews, observations, document reviews, and testing.

    • Audit evidence must be verifiable and sufficient to support conclusions.

  • Types of audit findings:

    • Conformities (compliance), non-conformities (non-compliance), observations (potential issues), and opportunities for improvement.

  • Drafting non-conformities requires a structured approach: description, reference to the standard/criterion, evidence, and a clear conclusion.


21) The ISMS Improvement Loop (Practical Cycle)

  • Continuous improvement cycle driven by:

    • Management reviews

    • Internal audits

    • Corrective and preventive actions

    • Monitoring and measurement results

  • Documentation requirements emphasize maintaining evidence of actions and results for accountability and traceability.


22) Practical lessons and exam-ready takeaways

  • Focus areas for IA/LA exams include:

    • ISMS concepts, risk management lifecycle (ISO 27005 alignment), and Annex A control structure.

    • Understanding the relationship between leadership, planning, support, operation, performance evaluation, and improvement.

    • Ability to articulate the SoA, risk treatment planning, and control selection process.

    • Familiarity with audit principles, audit program management, and the types of audits (internal vs external) and their criteria.

  • Key exam-ready definitions:

    • ISMS: a risk-based information security management system.

    • Risk owner: who is responsible for managing a given risk.

    • SoA: Statement of Applicability – documents which controls are applied, justification, and exclusions.

    • PDCA: Plan-Do-Check-Act cycle for continual improvement of ISMS.

    • CIA: Confidentiality, Integrity, Availability as fundamental information security objectives.


23) Quick Reference: Important Numbers and Facts

  • ISO 27001:2022 changes (highlights):

    • 93 controls total; 4 control groups.

    • 11 new controls; 24 controls merged; 58 controls updated; 1 control removed.

  • Annex A groups: 5.x Organizational Controls; 6.x People Controls; 7.x Physical Controls; 8.x Technological Controls.

  • Typical audit documentation components:

    • Audit Plan; Audit Criteria; Audit Scope; Audit Evidence; Audit Findings; Audit Conclusions; Audit Report; Follow-up actions.

  • Key outputs:

    • SoA (Statement of Applicability)

    • Risk Treatment Plan

    • Internal Audit Report

    • Management Review Minutes


24) How these notes map to exam preparation

  • Use this as a single consolidated study aid that mirrors the sequence of ISO 27001 IA/LA content, including:

    • Fundamentals of ISMS and ISO 27001 structure

    • Leadership, policy, and roles (5.x clauses)

    • Planning, risk treatment, and objective setting (6.x clauses)

    • Support and documentation controls (7.x clauses)

    • Operation and risk assessment (8.x clauses)

    • Performance evaluation and continual improvement (9.x-10.x clauses)

    • Annex A controls overview and practical examples

    • ISO 19011 guidelines and audit program management

    • ISO 27005 risk management lifecycle and practical matrices


If you want, I can tailor these notes into a shorter cram sheet or expand any section with more examples, diagrams, or exam-style questions (e.g., multiple-choice or short-answer prompts).