article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

They include: ISO 27005: Information security risk management these standard guides companies that are maturing their ISMS and controls programs. Rather than implementing controls as a checkbox activity, risk-driven organizations proactively choose controls that best mitigate their risks. Perform a Gap Analysis.

Audit 52
article thumbnail

Audit Checklist for SOC 2

Reciprocity

Risk assessment. Risk mitigation. Perform a SOC 2 Gap Analysis. Once you’ve completed your audit preparation, you should perform a gap analysis. While performing your SOC 2 gap analysis, you must select an audit firm to conduct your SOC 2. Monitoring activities. Change management.

Audit 52