© Abhishek Chopra, Mukund Chaudhary 2020
A. Chopra, M. ChaudharyImplementing an Information Security Management Systemhttps://doi.org/10.1007/978-1-4842-5413-4_9

9. External Audit

Abhishek Chopra1  and Mukund Chaudhary2
(1)
Faridabad, Haryana, India
(2)
Noida, India
 

"Uncontrolled access to data, with no audit trail of activity and no oversight, would be going too far. This applies to both commercial and government use of data about people.”

—John Poindexter

This chapter covers external audits, which is the last stage of your ISO 27001 implementation. This chapter also explains the external audit requirements, including how to prepare for an audit, the best practices to manage the audit, and closing an audit. The chapter covers the following topics: ...

Get Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.