:
We offer compliance audit services that can help your organization to ensure its conformity with standards, regulations, and local legislation related to information security.
Our experts are ready to perform compliance audits against:
Our audit methodology thoroughly follows the next phases:
Planning phase – setup the audit team and establish the project’s calendar and necessary resources, define the audit’s objectives, and agree upon the Audit Plan;
Execution phase – carry out visits and interviews on-site, collect and review relevant data, identify implemented controls, and assess their effectiveness;
Reporting phase – analyze relevant data, issues, and present the Audit Report.
Audit Plan – includes a clear definition of the audit’s scope and constraints, audit’s objectives and risk criteria (based on the regulatory requirements and guidelines), as well as an outline of the necessary activities to be carried out according to the established calendar.
Audit Report – describes the audit results and provides conclusions, as well as recommendations for remediation or further improvement. The report includes a summary of findings, it points out areas of compliance and non-compliant aspects, as well as evidence records on the basis of which the auditor’s opinion was issued.
Note: The Audit Report covers the audit process and its findings, while any accreditation or certification aimed by the organization remains out the audit’s scope, as a separate process.