Use when adding new error messages to React, or seeing "unknown error code" warnings.
npx skills add ovachiever/droid-tings --skill "isms-audit-expert"
Install specific skill from multi-skill repository
# Description
Senior ISMS Audit Expert for internal and external information security management system auditing. Provides ISO 27001 audit expertise, security audit program management, security control assessment, and compliance verification. Use for ISMS internal auditing, external audit preparation, security control testing, and ISO 27001 certification support.
# SKILL.md
name: isms-audit-expert
description: Senior ISMS Audit Expert for internal and external information security management system auditing. Provides ISO 27001 audit expertise, security audit program management, security control assessment, and compliance verification. Use for ISMS internal auditing, external audit preparation, security control testing, and ISO 27001 certification support.
Senior ISMS Audit Expert
Expert-level Information Security Management System (ISMS) auditing with comprehensive knowledge of ISO 27001, security audit methodologies, security control assessment, and cybersecurity compliance verification.
Core ISMS Auditing Competencies
1. ISO 27001 ISMS Audit Program Management
Design and manage comprehensive ISMS audit programs ensuring systematic security evaluation and continuous improvement.
ISMS Audit Program Framework:
ISMS AUDIT PROGRAM MANAGEMENT
βββ Security Audit Planning
β βββ Risk-based audit scheduling
β βββ Security domain scope definition
β βββ Technical auditor competency
β βββ Security testing resource allocation
βββ Audit Execution Coordination
β βββ Technical security assessment
β βββ Administrative control evaluation
β βββ Physical security verification
β βββ Security documentation review
βββ Security Finding Management
β βββ Security gap identification
β βββ Vulnerability assessment integration
β βββ Risk-based finding prioritization
β βββ Security improvement recommendations
βββ ISMS Audit Performance
βββ Security audit effectiveness
βββ Technical auditor development
βββ Security methodology enhancement
βββ Industry best practice adoption
2. Risk-Based Security Audit Planning
Develop strategic security audit plans based on information security risks, threat landscape, and ISMS performance.
Security Audit Risk Assessment:
1. Information Security Risk Evaluation
- Asset criticality and threat exposure analysis
- Security control effectiveness assessment
- Previous security incident and audit analysis
- Decision Point: Determine audit priority and frequency based on security risk
- Security Audit Scope Definition
- High-Risk Assets: Quarterly technical security assessments
- Critical Security Controls: Semi-annual control effectiveness testing
- Standard Security Processes: Annual compliance verification
-
Emerging Threats: Event-driven security evaluations
-
Technical Security Testing Integration
- Vulnerability assessment and penetration testing coordination
- Security control technical verification
- Threat simulation and red team exercises
- Compliance scanning and automated testing
3. ISO 27001 Audit Execution and Methodology
Conduct systematic ISMS audits using proven methodologies ensuring comprehensive security assessment.
ISMS Audit Execution Process:
1. Security Audit Preparation
- Pre-audit Security Review: Follow scripts/security-audit-prep.py
- Technical Assessment Planning: Security testing scope and methods
- Security Auditor Assignment: Technical competency and independence
- ISMS Documentation Review: Policy, procedure, and control documentation
- Security Audit Conduct
- ISMS Process Assessment: Security management process evaluation
- Security Control Testing: Technical and administrative control verification
- Security Compliance Verification: Regulatory and standard compliance
-
Security Culture Assessment: Security awareness and training effectiveness
-
Security Audit Documentation
- Security Finding Documentation: Technical and administrative findings
- Risk Assessment Integration: Security risk impact and likelihood
- Security Improvement Recommendations: Control enhancement and optimization
- Compliance Status Reporting: ISO 27001 and regulatory compliance
4. Security Control Assessment and Testing
Conduct comprehensive security control assessments ensuring effective security implementation and operation.
Security Control Assessment Framework:
ISO 27002 CONTROL ASSESSMENT
βββ Organizational Security Controls
β βββ Information security policies
β βββ Information security organization
β βββ Human resource security
β βββ Asset management
βββ Technical Security Controls
β βββ Access control systems
β βββ Cryptography implementation
β βββ Systems security configuration
β βββ Network security controls
β βββ Application security measures
β βββ Secure development practices
βββ Physical Security Controls
β βββ Physical security perimeters
β βββ Physical entry controls
β βββ Equipment protection
β βββ Secure disposal procedures
βββ Operational Security Controls
βββ Operational procedures
βββ Change management
βββ Capacity management
βββ System segregation
βββ Malware protection
βββ Backup and recovery
Advanced ISMS Audit Applications
Technical Security Testing Integration
Integrate technical security assessments with ISMS auditing ensuring comprehensive security verification.
Technical Security Assessment:
1. Vulnerability Assessment Integration
- Network vulnerability scanning and analysis
- Application security testing and code review
- Configuration assessment and hardening verification
- Decision Point: Determine technical testing scope based on risk and compliance
- Penetration Testing Coordination
- For External Networks: Follow references/external-pentest-guide.md
- For Internal Systems: Follow references/internal-pentest-guide.md
- For Web Applications: Follow references/webapp-security-testing.md
-
Social engineering and phishing simulation
-
Security Control Verification
- Access control effectiveness testing
- Encryption implementation verification
- Monitoring and logging system assessment
- Incident response procedure validation
Cybersecurity Compliance Auditing
Conduct specialized cybersecurity compliance audits addressing regulatory and industry requirements.
Cybersecurity Compliance Framework:
- Healthcare Cybersecurity: HIPAA Security Rule and healthcare-specific requirements
- Medical Device Cybersecurity: FDA cybersecurity guidance and IEC 62304 integration
- Financial Services: PCI DSS and financial industry security standards
- Critical Infrastructure: NIST Cybersecurity Framework and sector-specific guidelines
Cloud Security Auditing
Assess cloud security implementations ensuring comprehensive cloud service security verification.
Cloud Security Audit Approach:
1. Cloud Service Provider Assessment
- CSP security certification and compliance verification
- Shared responsibility model implementation review
- Data residency and sovereignty compliance
- Cloud access and identity management assessment
- Cloud Configuration Assessment
- Cloud resource configuration and hardening
- Network security and segmentation verification
- Data encryption and key management assessment
- Cloud monitoring and logging evaluation
Security Auditor Competency and Development
Security Auditor Technical Competency
Develop and maintain security auditor technical competency ensuring effective security assessment capabilities.
Security Auditor Competency Framework:
SECURITY AUDITOR COMPETENCY
βββ Technical Security Knowledge
β βββ Network security and protocols
β βββ System security and hardening
β βββ Application security and testing
β βββ Cryptography and key management
β βββ Security architecture and design
βββ Security Assessment Skills
β βββ Vulnerability assessment techniques
β βββ Penetration testing methodologies
β βββ Security control testing
β βββ Risk assessment and analysis
βββ Compliance and Standards
β βββ ISO 27001/27002 expertise
β βββ Regulatory requirement knowledge
β βββ Industry standard familiarity
β βββ Audit methodology proficiency
βββ Communication and Reporting
βββ Technical finding documentation
βββ Risk communication skills
βββ Executive reporting capabilities
βββ Stakeholder engagement
Security Audit Tool Proficiency
Maintain proficiency with security audit tools and technologies ensuring effective technical assessment.
Security Audit Tool Categories:
- Vulnerability Scanners: Network, web application, and database vulnerability assessment
- Penetration Testing Tools: Exploitation frameworks and security testing utilities
- Configuration Assessment: System and application configuration analysis
- Compliance Scanning: Automated compliance verification and reporting
External Security Audit Coordination
ISO 27001 Certification Audit Support
Prepare organization for ISO 27001 certification audits ensuring successful certification and maintenance.
Certification Audit Preparation:
1. Pre-certification Readiness
- Internal ISMS audit completion and closure
- Security control implementation verification
- ISMS documentation review and compliance
- Mock Certification Audit: Full-scale external audit simulation
- Certification Audit Coordination
- Stage 1 Audit Support: Documentation review and ISMS assessment
- Stage 2 Audit Coordination: Implementation testing and verification
- Surveillance Audit Preparation: Ongoing compliance and improvement
- Certification body relationship management
Regulatory Security Inspection Preparation
Prepare organization for regulatory security inspections and compliance assessments.
Regulatory Inspection Coordination:
- Healthcare Inspections: OCR HIPAA security audits and assessments
- Financial Services: Regulatory cybersecurity examinations
- Critical Infrastructure: Sector-specific security assessments
- International Compliance: Multi-jurisdictional security requirements
ISMS Audit Performance and Improvement
Security Audit Performance Metrics
Monitor ISMS audit program effectiveness ensuring continuous security improvement and compliance.
Security Audit KPIs:
- Security Control Effectiveness: Control implementation and operation success
- Security Finding Resolution: Finding closure rates and timelines
- Security Risk Mitigation: Risk reduction and residual risk management
- Compliance Achievement: ISO 27001 and regulatory compliance rates
- Security Incident Prevention: Audit-driven security improvement effectiveness
ISMS Audit Program Optimization
Continuously improve ISMS audit program through methodology enhancement and technology integration.
Audit Program Enhancement:
1. Security Audit Technology Integration
- Automated security scanning and assessment
- Continuous security monitoring integration
- Security information and event management (SIEM) correlation
- Decision Point: Determine automation opportunities and tool integration
- Security Audit Methodology Evolution
- Threat intelligence integration and analysis
- Security framework alignment and optimization
- Industry best practice adoption and customization
- Regulatory requirement evolution and adaptation
Resources
scripts/
isms-audit-scheduler.py: Risk-based ISMS audit planning and schedulingsecurity-audit-prep.py: Security audit preparation and checklist automationsecurity-control-tester.py: Automated security control verification testingcompliance-reporting.py: ISO 27001 and regulatory compliance reporting
references/
iso27001-audit-methodology.md: Complete ISO 27001 audit framework and proceduressecurity-control-testing-guide.md: Technical security control assessment methodologiesexternal-pentest-guide.md: External penetration testing coordination and oversightcloud-security-audit-guide.md: Cloud service security assessment frameworksregulatory-security-compliance.md: Multi-jurisdictional security compliance requirements
assets/
isms-audit-templates/: ISMS audit plan, checklist, and report templatessecurity-testing-tools/: Security assessment and testing automation scriptscompliance-checklists/: ISO 27001 and regulatory compliance verification checkliststraining-materials/: Security auditor training and competency development programs
# Supported AI Coding Agents
This skill is compatible with the SKILL.md standard and works with all major AI coding agents:
Learn more about the SKILL.md standard and how to use these skills with your preferred AI coding agent.