This spreadsheet contains a set of security questions and an evaluation method, which could be used to support your efforts in assessing whether your company complies with the requirements of ISO Security standard ISO 27001/27002.
It is made up of 2 parts. The first part contains a summary of the questionnaires included in the second part and instructions on using this spreadsheet.
The second part contains 17 questionnaires with 372 questions on all aspects of information security, as defined in the ISO standard.
The questionnaires included in this spreadsheet are:
Q1. General Security Framework Questionnaire (222 questions)
Q2. Information Security Policies (A5) Questionnaire (5 questions)
Q3. Organization of Information Security (A6) Questionnaire (8 questions)
Q4. Human resources security (A7) Questionnaire (8 questions)
Q5. Asset management (A8) Questionnaire (12 questions)
Q6. Access control (Section A9) Questionnaire (15 questions)
Q7. Cryptography (Section A10) Questionnaire (3 questions)
Q8. Physical security (Section A11-part 1) Questionnaire (12 questions)
Q9. Environmental security (Section A11-part 2) Questionnaire (8 questions)
Q10. Data Protection (Section A11-part 3) Questionnaire (6 questions)
Q11. Operations security (Section A12) Questionnaire (10 questions)
Q12. Communications security (Section A13) Questionnaire (8 questions)
Q13. System acquisition, development and maintenance (A14) Questionnaire (16 questions)
Q14. Supplier relationships (A15) Questionnaire (7 questions)
Q15. Information security incident management (A16) Questionnaire (6 questions)
Q16. Information security aspects of business continuity management
(A17) Questionnaire (10 questions)
Q17. Compliance (A18) Questionnaire (9 questions)
This template offers a comprehensive grading system to evaluate your organization's adherence to each questionnaire section. The evaluation grades provide a clear, quantifiable measure of compliance, making it easier to identify areas needing improvement. The tool is designed for ease of use, ensuring that your team can efficiently conduct thorough security audits. This structured approach helps in maintaining robust information security management practices, aligning with ISO standards.
Got a question about the product? Email us at support@flevy.com or ask the author directly by using the "Ask the Author a Question" form. If you cannot view the preview above this document description, go here to view the large preview instead.
Source: Best Practices in ISO 27001, IEC 27001, ISO 27002, IEC 27002 Excel: ISO 27001/27002 Security Audit Questionnaire Excel (XLSX) Spreadsheet, John Kyriazoglou
ISO 27001 IEC 27001 ISO 27002 IEC 27002 Bain PowerPoint McKinsey PowerPoint Bain Presentations Bain Frameworks Boston Consulting Group PowerPoint Consulting Frameworks Strategy Frameworks Mercer PowerPoint PwC PowerPoint Bain Templates Accenture Templates McKinsey Templates Boston Consulting Group Templates Consulting Methodologies Accenture PowerPoint Booz Documents PwC Templates Capgemini PowerPoint Strategy Frameworks Compilation Oliver Wyman Presentations Boston Consulting Group Frameworks E&Y PowerPoint Consulting Training IBM Presentations Oliver Wyman Templates Strategy Consulting Frameworks Bain Documents IBM Documents Capgemini Documents Roland Berger PowerPoint A.T. Kearney PowerPoint BCG Documents Accenture Frameworks BCG Frameworks BCG PowerPoint Oliver Wyman PowerPoint Consulting Documents BCG Presentations A.T. Kearney Documents Management Consulting Frameworks BCG Templates E&Y Templates Roland Berger Presentations Capgemini Templates Boston Consulting Group Documents LEK Frameworks Booz Allen Presentations E&Y Frameworks McKinsey Presentations Booz Allen Frameworks A.T. Kearney Frameworks IBM Templates Booz Allen PowerPoint Accenture Documents Accenture Presentations A.T. Kearney Templates McKinsey Frameworks Boston Consulting Group Presentations McKinsey Documents LEK PowerPoint Mercer Templates Roland Berger Frameworks Capgemini Frameworks Booz Presentations Roland Berger Templates Strategy Methodologies PwC Frameworks Booz Allen Templates Strategy& Presentations Booz Templates Management Consulting Training Oliver Wyman Documents Mercer Presentations LEK Documents LEK Templates PwC Presentations IBM PowerPoint Capgemini Presentations E&Y Documents Oliver Wyman Frameworks Booz Allen Documents PwC Documents IBM Frameworks Mercer Frameworks Mercer Documents LEK Presentations Booz PowerPoint Booz Frameworks Strategy Documents A.T. Kearney Presentations Roland Berger Documents Business Frameworks E&Y Presentations Strategy& PowerPoint Deloitte PowerPoint Consulting Process A.T. Kearney Frameworks A.T. Kearney PowerPoint A.T. Kearney Templates A.T. Kearney Documents A.T. Kearney Presentations Gap Analysis PowerPoint Diagrams Compilation Consulting PowerPoint Templates Consulting PowerPoint Diagrams PowerPoint Diagrams Library Cyber Security Cybersecurity IT Security Audit Management CMMI Capability Maturity Model Integration CMM Business Capability Model Capability Maturity Model Governance Corporate Governance
![]() |
Download our FREE Digital Transformation Templates
Download our free compilation of 50+ Digital Transformation slides and templates. DX concepts covered include Digital Leadership, Digital Maturity, Digital Value Chain, Customer Experience, Customer Journey, RPA, etc. |