ISO 27001:2022 Annex A 8.34 – Protection of Information Systems During Audit Testing Explained

Audits are meant to reduce risk.
Handled badly, they create it.

Annex A 8.34 exists to ensure organisations protect information systems during audit testing, preventing unauthorised disclosure, system disruption, or integrity issues while still enabling effective and independent assurance.

This control is about safe assurance, not obstructing audits.

ISO 27001

Quick Guide: Annex A 8.34 at a Glance

Annex A 8.34 focuses on protecting systems and information during audit activities.

In practice, this includes:

  • Agreeing audit scope and access in advance
  • Restricting auditor access to what is necessary
  • Applying read-only access where possible
  • Securing devices used for audit access
  • Protecting extracted data and audit artefacts
  • Preventing audit activity from disrupting operations
  • Maintaining an audit trail of access and actions

The control supports auditing — it ensures audits do not become a security incident themselves.

In-Depth Guidance on Annex A 8.34

Why Audit Testing Introduces Risk

Audit activities often require:

  • Elevated or unusual access
  • Interaction with live systems
  • Use of specialist tools
  • Access to sensitive information

If poorly controlled, audit testing can:

  • Expose confidential data
  • Affect system availability
  • Alter system configuration or code
  • Introduce malware or insecure tooling
  • Undermine segregation and access controls

Annex A 8.34 ensures organisations retain control of their environment during audit activity, even when access is granted to trusted third parties.

This control replaces ISO 27001:2013 Annex A 12.7.1, with clearer expectations around device security and non-production environments.

Practical Implementation Guidance

1. Agree Audit Scope and Access in Advance

Before audit testing begins, organisations should agree with auditors:

  • Scope of systems and information
  • Type of testing to be performed
  • Access methods required
  • Timing and duration of access

Clear agreement reduces misunderstanding and uncontrolled access.

2. Restrict Access to What Is Necessary

Auditor access should be:

  • Limited to systems and information in scope
  • Time-bound
  • Role-appropriate

Broad or open-ended access increases exposure without adding audit value.

3. Apply Read-Only Access Where Possible

Annex A 8.34 strongly supports read-only access.

Where read-only access is feasible:

  • It reduces risk to integrity and availability
  • It limits accidental or intentional change

Where read-only access is not possible:

  • A system administrator may perform actions on behalf of the auditor
  • Activities should be monitored and logged
4. Verify Security of Auditor Devices

A key enhancement in ISO 27001:2022 is the expectation that:

  • Devices used by auditors to access systems
  • Meet defined security requirements

This may include:

  • Patch status
  • Malware protection
  • Configuration standards

Untrusted devices can introduce compromise during audit activity.

5. Control Use of Audit Tools and Scripts

Where auditors request use of:

  • Scanning tools
  • Scripts
  • Custom audit utilities

These should be:

  • Approved in advance
  • Understood by system owners
  • Used in a controlled manner

Unknown tools introduce unknown risk.

6. Protect Extracted Audit Data

If files, logs, or data are extracted:

  • Only isolated copies should be used
  • Access should be restricted
  • Retention should be minimised

Once the audit is complete:

  • Extracted data should be securely deleted
  • Unless there is a justified requirement to retain it

Read-only access may remove the need for extraction entirely.

7. Schedule Audit Testing to Protect Availability

If audit testing could:

  • Affect system performance
  • Disrupt operations
  • Trigger availability issues

Organisations should consider:

  • Performing testing outside of peak hours
  • Using non-production environments where appropriate

Availability is part of information security.

8. Record Audit Access and Activity

Requests for access and audit activity should be:

  • Logged
  • Traceable
  • Retained as part of the audit trail

This supports:

  • Accountability
  • Investigation if issues occur
  • Assurance and evidence for certification
9. Exercise Additional Caution in Development and Test Environments

ISO 27001:2022 explicitly highlights risk in:

  • Development environments
  • Test environments

These environments may:

  • Contain sensitive data
  • Have weaker controls
  • Be more vulnerable to integrity issues

Audit activity in non-production environments still requires protection and oversight.

10. Retain Organisational Control Throughout the Audit

Even where access is granted:

  • The organisation remains accountable
  • Responsibility for system protection does not transfer

Audit access should never bypass established security governance.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Common Challenges and How to Overcome Them

  • Granting broad access “for convenience”
  • Restrict access to agreed scope only
  • Allowing unmanaged auditor devices
  • Verify device security before access
  • Extracted audit data retained indefinitely
  • Securely remove data once no longer required
  • Audit tools used without approval
  • Approve and understand tooling in advance

Audit-related incidents are almost always process failures, not malicious intent.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 8.34 is about protecting systems while being transparent.

When audit testing is controlled effectively:

  • Assurance remains independent
  • Confidentiality is preserved
  • Integrity and availability are protected
  • Audit confidence increases rather than erodes

Audits are essential.
Uncontrolled audits are risky.

Annex A 8.34 ensures organisations gain assurance without creating new exposure.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls