ISO 27001:2022 & AI Checklist – ISMS Security Audit

Progress 0 / 22 questions answered

ISO/IEC 27001:2022 AI Extension Checklist

Assess your AI system's ISO 27001 compliance. 22 questions, 5 categories.

ISO Control A.5.9: Inventory of information and other associated assets. AI systems often spread as "shadow IT". You cannot protect what you don't know exists.

ISO Control A.5.12: Classification of information. Not all AI systems are equally critical. Classification determines required controls.

ISO Control A.5.9: Asset ownership. ISO 27001 requires every asset to have an owner. In AI, responsibility is often unclear.

ISO Control A.5.37: Documented operating procedures. Models are often deployed to production without version control, or outdated models run for years.

ISO Control A.5.37: Documented operating procedures. First ISO audit question: "Show me the documentation". Critical to document the AI's purpose, limitations, and operation.

ISO Control A.5.19: Information security in supplier relationships. Third-party AI = third-party risk. A vendor outage or data leak is your responsibility too.

ISO Control A.5.20: Addressing information security within supplier agreements. Default contracts don't cover: who owns the model? Do you have audit rights?

ISO Control A.5.23: Information security for use of cloud services. Models from HuggingFace may contain backdoors; libraries may be vulnerable.

ISO Control A.8.24: Use of cryptography. An unencrypted (plaintext) API call creates a man-in-the-middle risk. Minimum TLS 1.2 or private endpoints are required.

ISO Control A.8.10/A.8.11: Training data often contains PII. If leaked, this is a GDPR breach + competitive disadvantage. Encryption at rest (AES-256) and RBAC are required.

ISO Control A.8.11: Data masking. GDPR Article 5(1)(c) - data minimization. If you don't need the email, don't collect/use it.

ISO Control A.8.11: Data masking. GDPR Article 25 - data protection by design. Anonymized data is not subject to the full rigor of GDPR.

ISO Control A.8.10: Information deletion. GDPR Article 17 - right to erasure. You cannot store data longer than necessary. An automated deletion policy is required.

ISO Control A.8.12: Data leakage prevention. LLMs "memorize" training data. Output filtering and anomaly detection are required.

ISO Control A.8.32: Change management. Without version control, there is no auditability or rollback capability. Git (code) + DVC (data) + MLflow (models) recommended.

ISO Control A.8.32: Change management. Ad-hoc deployment = outage risk. ISO 27001 requires a documented change process (CAB approval, rollback plan).

ISO Control A.8.16: Monitoring activities. AI models "rot" over time (data drift). Accuracy can drop from 95% → 70% in 6 months. This must be detected.

ISO Control A.8.15: Logging. Incident investigation is impossible without logs. Centralized logging (ELK, Splunk) + min 12 months retention + tamper-proof storage is required.

ISO Control A.5.24: Incident management planning. A generic IR plan doesn't cover AI-specific incidents. A playbook + escalation path + post-mortem are required.

ISO Control A.8.8: Management of technical vulnerabilities. Traditional scanners don't find AI-specific vulnerabilities. Prompt injection + adversarial testing are required.

ISO Control A.8.8: Management of technical vulnerabilities. AI library critical vulnerabilities require fast patching. Automated dependency updates + a 7-day SLA are required.

ISO Control A.5.28: Collection of evidence. ISO 27001 audit question: "Show me the metrics!" A KPI dashboard + quarterly review + trend analysis are required.

Does your ISO 27001 ISMS cover AI-specific risks?

Take our 3-Minute ISO 27001 & AI Checklist! Implementing AI introduces new risks to your Information Security Management System (ISMS). This quick audit helps you assess if your controls (based on ISO 27001:2022) adequately address AI-specific threats, such as data quality and model security. Complete it in just 3 minutes to get an instant evaluation!

We’ll email you the recommendations.