ISO 27001 IA/LA CertiProf – Comprehensive Study Notes (Version IA/LA 112022)
ISO 27001 INTERNAL AUDITOR / LEAD AUDITOR – Comprehensive Study Notes (CertiProf, Version IA/LA 112022)
This set of notes consolidates the CertiProf ISO 27001 IA/LA material into a structured study guide. It mirrors the content from the slide deck (phases, concepts, roles, processes, and exam-ready definitions) with key points, definitions, and practical implications. LaTeX is used for formulas and numerical references.
1) CertiProf and Network Overview
CertiProf® is a certifying entity founded in the United States in 2015, currently located in Sunrise, Florida.
Philosophy: knowledge creation in community; collaborative network of:
Lifelong Learners (LLLs): continuous learners, committed to lifelong learning; goal is learning regardless of exam outcome.
ATPs: Authorized Training Partners (universities, training centers, facilitators) worldwide.
Authors/Co-creators: industry experts who develop content for new certifications.
Internal staff: distributed team in India, Brazil, Colombia, and the United States.
Accreditations/Affiliations:
Agile Alliance: CertiProf is a corporate member; provides tools for professional development.
IT Certification Council (ITCC): supports industry certification value, exam safety, innovation, and best practices.
Credly: badges issuer; Credly badges are widely recognized by IBM, Microsoft, PMI, Nokia, Stanford, etc.
Credly badge links (examples):
https://www.credly.com/org/certiprof/badge/certified-iso-27001-internal-auditor-i27001ia
https://www.credly.com/org/certiprof/badge/certified-iso-27001-lead-auditor-i27001la
CertiProf branding: ISO 27001 Internal Auditor / Lead Auditor badges (CertiProf Professional Knowledge).
2) ISO 27001 Internal Auditor / Lead Auditor – What It Is
Roles covered: ISO 27001 Internal Auditor (IA) and ISO 27001 Lead Auditor (LA).
Version: IA-LA Version 11/2022 (ISO/IEC 27001:2022 alignment).
General description: Earners demonstrate understanding of ISO 27001 concepts, audit processes, and how to conduct and lead ISMS audits.
Certifications emphasize: audit process, lead auditor responsibilities, risk management alignment, and ISMS development.
3) ISO 27001: Key Concepts and Structure
ISMS defined: Information Security Management System – a set of policies, procedures, guidelines, resources, and activities to manage information security risks.
Core dimensions of information security: Confidentiality, Availability, and Integrity (the CIA triad):
ext{CIA} = ( ext{Confidentiality}, ext{Integrity}, ext{Availability})Core purpose: establish, implement, maintain, and continually improve information security; risk-based decisions guide controls.
PDCA (Deming) cycle in ISMS:
PDCA: ext{Plan}
ightarrow ext{Do}
ightarrow ext{Check}
ightarrow ext{Act}Management system concept: ISMS is part of the global management system; ties information security to organizational objectives, stakeholder needs, and continual improvement.
Relationship to risk management: information security risks drive control selection and treatment via a structured risk management process.
4) ISO 27001: 2022 Structural Highlights
93 controls in 4 groups (as updated in 2022) vs prior versions with more controls and clauses.
11 new controls added (e.g., threat intelligence, cloud information security, business continuity, physical security monitoring, data encryption, web filtering, etc.).
1 control removed (asset disposal).
58 controls updated; 24 controls merged.
Annex A groups: organizational, people, physical, technological controls (4 groups total).
The ISMS family covers: defining ISMS requirements, certification body assessment, and sector-specific guidance.
5) ISO 27001 Core Clauses (Overview)
0. Context: Understand the organization and its context; stakeholders and needs; scope of the ISMS.
4. Context of the organization
4.1 Understanding the Organization and its Context
4.2 Understanding Stakeholders’ Needs and Expectations
4.3 Determination of the ISMS Scope
4.4 Information Security Management System (ISMS)
5. Leadership
5.1 Leadership and Commitment
5.2 Policy
5.3 Roles, Responsibilities and Authorities
6. Planning
6.1 Actions to Treat Risks and Opportunities
6.2 Information Security Objectives and Achievement Planning
6.3 Planning of Changes
7. Support
7.1 Resources
7.2 Competence
7.3 Awareness
7.4 Communication
7.5 Documented Information
8. Operation
8.1 Operational Planning and Control
8.2 Information Security Risk Assessment
8.3 Information Security Risk Treatment
9. Performance Evaluation
9.1 Monitoring, Measurement, Analysis and Evaluation
9.2 Internal Audit
9.3 Management Review
Improvement
10.1 Continual Improvement
10.2 Non-conformity and corrective actions
6) Phase 1: Fundamentals of an ISMS (Phase 1 – ISO 27001 Fundamentals)
ISO/IEC 27001:2022 structure and its family context; relationship to other standards (e.g., ISO 9000, ISO 20000, ISO 22301).
Core purpose of Phase 1: understand the standard, its terms, and its structure; establish baseline knowledge for ISMS design.
ISO 19011 – Auditor Module integrated in Phase 1:
Auditing concepts, process, components, and auditor preparation.
Scope: general guidance; trainers may adapt material based on experience.
7) Phase 2: Design and Implementation of an ISMS
Purpose: define, design, and implement the ISMS; align with ISO/IEC 27003 guidance.
Core activities (as per the presentation):
Identify, analyze, and establish information security requirements.
Develop controls proposed in Annex A; map control objectives to concrete controls.
Elaborate the ISMS design: scope, boundaries, and ISMS policy.
Obtain management approval to initiate the ISMS project.
Perform information security requirements analysis.
Conduct risk assessment and treatment planning.
Define the ISMS scope and policy.
Produce the SoA (Statement of Applicability) including control objectives and selected controls.
Produce the final ISMS project implementation plan (timeline).
8) Phase 3: Information Security Risk Management (ISO 27005)
Purpose: provide risk management guidance to support ISO 27001 implementation and ISMS effectiveness.
Key concepts and phases (as per the slides):
Context establishment: define external/internal context and risk criteria.
Identification of assets: primary (mission-critical processes, proprietary tech) and secondary assets (hardware, software, networks, services, knowledge workers).
Threats and vulnerabilities: threats that exploit vulnerabilities; vulnerabilities are weaknesses that can be exploited.
Information threats and vulnerability examples; risk scenarios combining assets, threats, and vulnerabilities.
Risk assessment: analyze consequences and likelihood; determine risk levels.
Risk treatment: select controls and determine required controls to treat risk; compare with Annex A; draft SoA.
SoA: include required controls, inclusion/exclusion justifications, and a control implementation checklist.
Risk treatment plan and approval by risk owners; residual risk acceptance.
Alignment with ISO 31000: risk management principles (value creation, integration, decision support, uncertainty handling, etc.).
Risk treatment options include: Mitigate, Avoid, Transfer, and Accept.
SoA and risk treatment are aligned with a common risk management framework; the SoA is part of the formal ISMS documentation.
9) Annex A: Controls and their Organization
Annex A structures controls into four groups:
5. Organizational Controls
6. People Controls
7. Physical Controls
8. Technological Controls
Examples of control areas in Annex A (not exhaustive):
5.1 Policies for information security
5.2 Information security roles and responsibilities
5.3 Segregation of duties
5.4 Management responsibilities
5.5 Contact with authorities
5.6 Contact with interested parties
5.7 Threat intelligence
5.8 Information security in project management
5.9 Inventory of information and other assets
5.10 Acceptable use of information and assets
5.11 Return on assets
5.12 Classification of information
5.13 Labeling of information
5.14 Information transfer
5.15 Access control
5.16 Identity management
5.17 Authentication information
5.18 Access rights
5.19 Information security in supplier relationships
5.20 Information security in supplier agreements
5.21 ICT supply chain security
5.22 Supplier service monitoring/review/change management
5.23 Cloud information security
5.24 Incident management planning and preparation
5.25 Incident response decision-making
5.26 Incident response
5.27 Learning from incidents
5.28 Collection of evidence
5.29 Information security during disruption/breach
5.30 ICT readiness for business continuity
5.31 Legal/regulatory requirements
5.32 Intellectual property rights
5.33 Protection of records
5.34 Privacy/PII protection
5.35 Independent review of information security
5.36 Compliance with security policies/rules/standards
5.37 Documented operational procedures
The Annex A also includes the full set of 93 controls, organized by domain and objective, plus notes on applicability and Justifications in the SoA.
10) Documentation and Documentation Control (7.x) under Phase 4 and beyond
7.5 Documented Information: creation, updating, and control of documents and records.
7.5.1 General: Documented information required by the standard and necessary for ISMS efficacy.
7.5.2 Creation and Update: identification, form, review, and approval of documents.
7.5.3 Documented Information Control: ensure availability, protection, access, storage, change control, retention.
External documented information may also be controlled as required.
11) 7. Leadership and top-management responsibilities (5.x) – Details
5.1 Leadership and Commitment
Top management must demonstrate leadership and commitment to the ISMS:
Ensure information security policies and objectives align with strategic direction.
Integrate ISMS requirements into organizational processes.
Ensure necessary resources are available.
Communicate the importance of ISMS and its results.
Ensure ISMS achieves expected results and support continual improvement.
Demonstration mechanisms include: approving information security policy, guaranteeing ISMS resources, defining roles/authorities, communicating security importance, enabling participation, and setting conditions for ISMS success.
5.2 Policy
Top management must establish a suitable information security policy with objectives, commitment to compliance, and continuous improvement. The policy must be available as documented information, communicated, and accessible to stakeholders as appropriate.
5.3 Roles, Responsibilities and Authorities
Top management must ensure clear assignment and communication of responsibilities and authorities for information security.
Define responsibilities for ISMS compliance, reporting ISMS behavior, and potentially appoint an ISMS committee.
Emphasize independence of information security roles from IT when possible to maintain duty segregation.
12) 7.1–7.4 Resources, Competence, Awareness, and Communication
7.1 Resources: Determine and provide required resources to implement, maintain, and improve the ISMS.
7.2 Competence: Ensure staff competence through education, training, or experience; evidence must be kept.
7.3 Awareness: Staff must be aware of the Information Security Policy and their role in ISMS performance and consequences of non-compliance.
7.4 Communication: Determine needs for internal/external ISMS communications (content, timing, recipients, responsible sender, processes).
13) 8. Operation – Planning, Risk Assessment, and Risk Treatment
8.1 Operational Planning and Control
Plan, implement, and control processes to meet ISMS requirements and ISMS objectives (6.1 and 6.2). Include outsourced process control.
8.2 Information Security Risk Assessment
Conduct risk assessments at planned intervals; document results; consider significant changes.
8.3 Information Security Risk Treatment
Define and implement risk treatment options; determine required controls (from Annex A or new); compare with Annex A to ensure coverage; draft SoA with inclusion/exclusion justifications; obtain approval of risk treatment plan and residual risk acceptance; keep documented information.
Note: The risk management approach aligns with ISO 31000 and the ISMS risk management process is integrated with business context.
14) 9. Performance Evaluation – Monitoring, Internal Audit, Management Review
9.1 Monitoring, Measurement, Analysis and Evaluation
Establish what to monitor and measure; define methods; ensure results are valid and comparable; maintain documented information.
9.2 Internal Audit
Plan, establish, implement, and maintain one or more audit programs; define criteria and scope; select auditors; ensure objective reporting to management; maintain documented information of audits and results.
Internal audit is a systematic, independent process to determine conformity with ISMS and continuous improvement opportunities.
9.3 Management Review
Top management must review ISMS at planned intervals for continued suitability, adequacy, and effectiveness.
Inputs include status of actions, changes in external/internal context, information security behavior/trends (non-conformities, corrective actions, audit results, objective compliance), stakeholder feedback, risk results, and improvement opportunities.
Outputs include decisions on continuous improvement and ISMS changes; maintain documented results.
15) 10. Improvement – Continual Improvement and Non-Conformities
10.1 Continual Improvement: The organization shall continually improve the adequacy, sustainability, and effectiveness of the ISMS.
10.2 Non-conformity and Corrective Actions:
React to non-conformities and, where applicable, implement corrective actions and address consequences.
Assess causes; determine if similar non-conformities may occur elsewhere; implement actions; verify effectiveness.
If needed, make changes to the ISMS; keep evidence of non-conformity, actions taken, and results.
16) ISMS Risk Management – Key Terms and Concepts (ISO 27005 alignment)
Risk concepts:
Risk = uncertainty that could affect objectives; expressed as a function of likelihood and impact.
Risk owner: person or organization responsible for managing a risk.
Threat: potential cause of an undesirable incident.
Vulnerability: weakness that could be exploited by threats.
Control: measure that modifies risk (mitigates, reduces likelihood, reduces impact, or transfers risk).
Risk management cycle: context establishment → asset identification → threat/vulnerability assessment → risk analysis → risk evaluation → risk treatment → risk communication → risk monitoring and review.
Risk acceptance and residual risk: after treatment, remaining risk is the residual risk; formal acceptance may be required from risk owners.
Link to ISO 31000: generic risk management framework and language for cross-organization applicability.
17) Risk Criteria, Scales, and the Matrix (Illustrative Concepts)
Probability of occurrence (illustrative scales): Rare, Unlikely, Possible, Likely, Very Likely (used to rate likelihood). Display-oriented example matrices appear in the material as follows:
Probability (P) scale and Impact (I) scale feed a risk rating.
The matrix yields a risk rating such as Low, Moderate, High, or Extreme, guiding treatment decisions.
Impact categories (illustrative): Insignificant, Minor, Moderate, Severe, Catastrophic.
Risk rating notations shown in slides include labels like B (Low), M (Moderate), A (High), E (Extreme).
Example risk assessment formulas (conceptual):
Risk can be viewed as a combination of likelihood and impact:
R riangleq f(L, I) ext{ with } L ext{ and } I ext{ on a fixed scale}.A common simplification is the product rating, e.g., R ext{ (qualitative)} = L imes I, with corresponding bands (Low/Moderate/High/Extreme).
The matrices guide risk treatment decisions, such as:
Reduce/mitigate risks (implement controls)
Avoid risks (change processes)
Share/transfer risks (insurance, outsourcing)
Accept risks (residual risk acceptable)
18) Audit Theory and ISO 19011 Guidelines (Audit Principles)
ISO 19011:2018 provides guidance on auditing management systems and audit programs.
Audit principles include:
Integrity: ethical behavior, honesty, impartiality, and competence.
Fair presentation: truthfulness and accuracy in findings and reporting.
Professional due care: diligence and sound judgment.
Confidentiality: safeguard information and sensitive data.
Independence: objective and unbiased auditing.
Evidence-based focus: conclusions based on verifiable evidence.
Risk-based focus: auditing priorities aligned with risks and opportunities.
19) Audit Program, Plan, and Execution (Key Elements for IA/LA Exam)
Audit program basics:
Audit scope defines locations, processes, time period, and boundaries.
Audit plan details objectives, scope, criteria, locations, schedule, team responsibilities, resources, language, and methods.
The audit team may include an audit team leader, auditors, guides, observers, and technical experts.
Roles within the audit team:
Auditor: conducts audit activities and collects evidence.
Audit team leader: oversees planning, execution, and reporting.
Guides/Observers: provide access and support but should not influence audit conclusions.
Technical experts: support specialized audit aspects.
Audit planning considerations:
Consider team competence, sampling techniques, risks to the audit objectives, and confidentiality.
Ensure availability of resources, facilities, and information.
20) Audit Activities and Evidence (Practical Audit Knowledge)
Audit activities include:
Opening meeting; documented information review; interviews; observation of activities; review of records and documents.
Data collection methods: interviews, observations, document reviews, and testing.
Audit evidence must be verifiable and sufficient to support conclusions.
Types of audit findings:
Conformities (compliance), non-conformities (non-compliance), observations (potential issues), and opportunities for improvement.
Drafting non-conformities requires a structured approach: description, reference to the standard/criterion, evidence, and a clear conclusion.
21) The ISMS Improvement Loop (Practical Cycle)
Continuous improvement cycle driven by:
Management reviews
Internal audits
Corrective and preventive actions
Monitoring and measurement results
Documentation requirements emphasize maintaining evidence of actions and results for accountability and traceability.
22) Practical lessons and exam-ready takeaways
Focus areas for IA/LA exams include:
ISMS concepts, risk management lifecycle (ISO 27005 alignment), and Annex A control structure.
Understanding the relationship between leadership, planning, support, operation, performance evaluation, and improvement.
Ability to articulate the SoA, risk treatment planning, and control selection process.
Familiarity with audit principles, audit program management, and the types of audits (internal vs external) and their criteria.
Key exam-ready definitions:
ISMS: a risk-based information security management system.
Risk owner: who is responsible for managing a given risk.
SoA: Statement of Applicability – documents which controls are applied, justification, and exclusions.
PDCA: Plan-Do-Check-Act cycle for continual improvement of ISMS.
CIA: Confidentiality, Integrity, Availability as fundamental information security objectives.
23) Quick Reference: Important Numbers and Facts
ISO 27001:2022 changes (highlights):
93 controls total; 4 control groups.
11 new controls; 24 controls merged; 58 controls updated; 1 control removed.
Annex A groups: 5.x Organizational Controls; 6.x People Controls; 7.x Physical Controls; 8.x Technological Controls.
Typical audit documentation components:
Audit Plan; Audit Criteria; Audit Scope; Audit Evidence; Audit Findings; Audit Conclusions; Audit Report; Follow-up actions.
Key outputs:
SoA (Statement of Applicability)
Risk Treatment Plan
Internal Audit Report
Management Review Minutes
24) How these notes map to exam preparation
Use this as a single consolidated study aid that mirrors the sequence of ISO 27001 IA/LA content, including:
Fundamentals of ISMS and ISO 27001 structure
Leadership, policy, and roles (5.x clauses)
Planning, risk treatment, and objective setting (6.x clauses)
Support and documentation controls (7.x clauses)
Operation and risk assessment (8.x clauses)
Performance evaluation and continual improvement (9.x-10.x clauses)
Annex A controls overview and practical examples
ISO 19011 guidelines and audit program management
ISO 27005 risk management lifecycle and practical matrices
If you want, I can tailor these notes into a shorter cram sheet or expand any section with more examples, diagrams, or exam-style questions (e.g., multiple-choice or short-answer prompts).