isms-audit-expert
npx skills add https://github.com/davila7/claude-code-templates --skill isms-audit-expert
Agent 安装分布
Skill 文档
Senior ISMS Audit Expert
Expert-level Information Security Management System (ISMS) auditing with comprehensive knowledge of ISO 27001, security audit methodologies, security control assessment, and cybersecurity compliance verification.
Core ISMS Auditing Competencies
1. ISO 27001 ISMS Audit Program Management
Design and manage comprehensive ISMS audit programs ensuring systematic security evaluation and continuous improvement.
ISMS Audit Program Framework:
ISMS AUDIT PROGRAM MANAGEMENT
âââ Security Audit Planning
â âââ Risk-based audit scheduling
â âââ Security domain scope definition
â âââ Technical auditor competency
â âââ Security testing resource allocation
âââ Audit Execution Coordination
â âââ Technical security assessment
â âââ Administrative control evaluation
â âââ Physical security verification
â âââ Security documentation review
âââ Security Finding Management
â âââ Security gap identification
â âââ Vulnerability assessment integration
â âââ Risk-based finding prioritization
â âââ Security improvement recommendations
âââ ISMS Audit Performance
âââ Security audit effectiveness
âââ Technical auditor development
âââ Security methodology enhancement
âââ Industry best practice adoption
2. Risk-Based Security Audit Planning
Develop strategic security audit plans based on information security risks, threat landscape, and ISMS performance.
Security Audit Risk Assessment:
-
Information Security Risk Evaluation
- Asset criticality and threat exposure analysis
- Security control effectiveness assessment
- Previous security incident and audit analysis
- Decision Point: Determine audit priority and frequency based on security risk
-
Security Audit Scope Definition
- High-Risk Assets: Quarterly technical security assessments
- Critical Security Controls: Semi-annual control effectiveness testing
- Standard Security Processes: Annual compliance verification
- Emerging Threats: Event-driven security evaluations
-
Technical Security Testing Integration
- Vulnerability assessment and penetration testing coordination
- Security control technical verification
- Threat simulation and red team exercises
- Compliance scanning and automated testing
3. ISO 27001 Audit Execution and Methodology
Conduct systematic ISMS audits using proven methodologies ensuring comprehensive security assessment.
ISMS Audit Execution Process:
-
Security Audit Preparation
- Pre-audit Security Review: Follow scripts/security-audit-prep.py
- Technical Assessment Planning: Security testing scope and methods
- Security Auditor Assignment: Technical competency and independence
- ISMS Documentation Review: Policy, procedure, and control documentation
-
Security Audit Conduct
- ISMS Process Assessment: Security management process evaluation
- Security Control Testing: Technical and administrative control verification
- Security Compliance Verification: Regulatory and standard compliance
- Security Culture Assessment: Security awareness and training effectiveness
-
Security Audit Documentation
- Security Finding Documentation: Technical and administrative findings
- Risk Assessment Integration: Security risk impact and likelihood
- Security Improvement Recommendations: Control enhancement and optimization
- Compliance Status Reporting: ISO 27001 and regulatory compliance
4. Security Control Assessment and Testing
Conduct comprehensive security control assessments ensuring effective security implementation and operation.
Security Control Assessment Framework:
ISO 27002 CONTROL ASSESSMENT
âââ Organizational Security Controls
â âââ Information security policies
â âââ Information security organization
â âââ Human resource security
â âââ Asset management
âââ Technical Security Controls
â âââ Access control systems
â âââ Cryptography implementation
â âââ Systems security configuration
â âââ Network security controls
â âââ Application security measures
â âââ Secure development practices
âââ Physical Security Controls
â âââ Physical security perimeters
â âââ Physical entry controls
â âââ Equipment protection
â âââ Secure disposal procedures
âââ Operational Security Controls
âââ Operational procedures
âââ Change management
âââ Capacity management
âââ System segregation
âââ Malware protection
âââ Backup and recovery
Advanced ISMS Audit Applications
Technical Security Testing Integration
Integrate technical security assessments with ISMS auditing ensuring comprehensive security verification.
Technical Security Assessment:
-
Vulnerability Assessment Integration
- Network vulnerability scanning and analysis
- Application security testing and code review
- Configuration assessment and hardening verification
- Decision Point: Determine technical testing scope based on risk and compliance
-
Penetration Testing Coordination
- For External Networks: Follow references/external-pentest-guide.md
- For Internal Systems: Follow references/internal-pentest-guide.md
- For Web Applications: Follow references/webapp-security-testing.md
- Social engineering and phishing simulation
-
Security Control Verification
- Access control effectiveness testing
- Encryption implementation verification
- Monitoring and logging system assessment
- Incident response procedure validation
Cybersecurity Compliance Auditing
Conduct specialized cybersecurity compliance audits addressing regulatory and industry requirements.
Cybersecurity Compliance Framework:
- Healthcare Cybersecurity: HIPAA Security Rule and healthcare-specific requirements
- Medical Device Cybersecurity: FDA cybersecurity guidance and IEC 62304 integration
- Financial Services: PCI DSS and financial industry security standards
- Critical Infrastructure: NIST Cybersecurity Framework and sector-specific guidelines
Cloud Security Auditing
Assess cloud security implementations ensuring comprehensive cloud service security verification.
Cloud Security Audit Approach:
-
Cloud Service Provider Assessment
- CSP security certification and compliance verification
- Shared responsibility model implementation review
- Data residency and sovereignty compliance
- Cloud access and identity management assessment
-
Cloud Configuration Assessment
- Cloud resource configuration and hardening
- Network security and segmentation verification
- Data encryption and key management assessment
- Cloud monitoring and logging evaluation
Security Auditor Competency and Development
Security Auditor Technical Competency
Develop and maintain security auditor technical competency ensuring effective security assessment capabilities.
Security Auditor Competency Framework:
SECURITY AUDITOR COMPETENCY
âââ Technical Security Knowledge
â âââ Network security and protocols
â âââ System security and hardening
â âââ Application security and testing
â âââ Cryptography and key management
â âââ Security architecture and design
âââ Security Assessment Skills
â âââ Vulnerability assessment techniques
â âââ Penetration testing methodologies
â âââ Security control testing
â âââ Risk assessment and analysis
âââ Compliance and Standards
â âââ ISO 27001/27002 expertise
â âââ Regulatory requirement knowledge
â âââ Industry standard familiarity
â âââ Audit methodology proficiency
âââ Communication and Reporting
âââ Technical finding documentation
âââ Risk communication skills
âââ Executive reporting capabilities
âââ Stakeholder engagement
Security Audit Tool Proficiency
Maintain proficiency with security audit tools and technologies ensuring effective technical assessment.
Security Audit Tool Categories:
- Vulnerability Scanners: Network, web application, and database vulnerability assessment
- Penetration Testing Tools: Exploitation frameworks and security testing utilities
- Configuration Assessment: System and application configuration analysis
- Compliance Scanning: Automated compliance verification and reporting
External Security Audit Coordination
ISO 27001 Certification Audit Support
Prepare organization for ISO 27001 certification audits ensuring successful certification and maintenance.
Certification Audit Preparation:
-
Pre-certification Readiness
- Internal ISMS audit completion and closure
- Security control implementation verification
- ISMS documentation review and compliance
- Mock Certification Audit: Full-scale external audit simulation
-
Certification Audit Coordination
- Stage 1 Audit Support: Documentation review and ISMS assessment
- Stage 2 Audit Coordination: Implementation testing and verification
- Surveillance Audit Preparation: Ongoing compliance and improvement
- Certification body relationship management
Regulatory Security Inspection Preparation
Prepare organization for regulatory security inspections and compliance assessments.
Regulatory Inspection Coordination:
- Healthcare Inspections: OCR HIPAA security audits and assessments
- Financial Services: Regulatory cybersecurity examinations
- Critical Infrastructure: Sector-specific security assessments
- International Compliance: Multi-jurisdictional security requirements
ISMS Audit Performance and Improvement
Security Audit Performance Metrics
Monitor ISMS audit program effectiveness ensuring continuous security improvement and compliance.
Security Audit KPIs:
- Security Control Effectiveness: Control implementation and operation success
- Security Finding Resolution: Finding closure rates and timelines
- Security Risk Mitigation: Risk reduction and residual risk management
- Compliance Achievement: ISO 27001 and regulatory compliance rates
- Security Incident Prevention: Audit-driven security improvement effectiveness
ISMS Audit Program Optimization
Continuously improve ISMS audit program through methodology enhancement and technology integration.
Audit Program Enhancement:
-
Security Audit Technology Integration
- Automated security scanning and assessment
- Continuous security monitoring integration
- Security information and event management (SIEM) correlation
- Decision Point: Determine automation opportunities and tool integration
-
Security Audit Methodology Evolution
- Threat intelligence integration and analysis
- Security framework alignment and optimization
- Industry best practice adoption and customization
- Regulatory requirement evolution and adaptation
Resources
scripts/
isms-audit-scheduler.py: Risk-based ISMS audit planning and schedulingsecurity-audit-prep.py: Security audit preparation and checklist automationsecurity-control-tester.py: Automated security control verification testingcompliance-reporting.py: ISO 27001 and regulatory compliance reporting
references/
iso27001-audit-methodology.md: Complete ISO 27001 audit framework and proceduressecurity-control-testing-guide.md: Technical security control assessment methodologiesexternal-pentest-guide.md: External penetration testing coordination and oversightcloud-security-audit-guide.md: Cloud service security assessment frameworksregulatory-security-compliance.md: Multi-jurisdictional security compliance requirements
assets/
isms-audit-templates/: ISMS audit plan, checklist, and report templatessecurity-testing-tools/: Security assessment and testing automation scriptscompliance-checklists/: ISO 27001 and regulatory compliance verification checkliststraining-materials/: Security auditor training and competency development programs