Skip to content

How does the ISO 27701:2025 certification audit work?

The ISO 27701:2025 certification audit follows the same two-stage approach used for all ISO management system standards. Understanding what each stage involves removes the uncertainty and lets you prepare with confidence.

The process is carried out by an accredited certification body, and the auditors’ goal is not to catch you out — it is to confirm that your Privacy Information Management System (PIMS) meets the requirements of the standard and operates effectively in practice.

Stage 1: Documentation review

Stage 1 is sometimes called the “readiness review.” The auditor assesses whether your documentation and management system design are sufficient to proceed to Stage 2. This stage is typically conducted remotely, although some certification bodies may visit on-site.

During Stage 1, the auditor will review:

  • Your PIMS scope and Statement of Applicability
  • Privacy policy, objectives and risk assessment methodology
  • The management system requirements (Clauses 4–10) and how you have addressed them
  • Your internal audit programme and management review records
  • Evidence that your PIMS has been operational for a sufficient period (typically at least three months)

The auditor will produce a Stage 1 report identifying any areas of concern. These are not formal nonconformities, but they signal areas that need attention before Stage 2.

Stage 2: Implementation assessment

Stage 2 is the main audit. It confirms that your PIMS is not just documented but genuinely implemented and effective. Stage 2 is conducted on-site or via a combination of on-site and remote sessions, depending on your certification body and organisational setup.

The auditor will:

  • Interview staff across different functions to verify awareness and understanding
  • Sample evidence of control implementation (policies, procedures, records, system configurations)
  • Assess whether risks have been identified and treated appropriately
  • Evaluate the effectiveness of your Annex A privacy controls
  • Check corrective actions from your internal audit and management review

What do auditors actually look for?

Auditors assess your PIMS against the requirements of ISO 27701:2025. But beyond simple compliance, they are looking for evidence that your privacy management system is genuinely embedded in how your organisation operates.

Key areas auditors focus on include:

Area What the auditor checks Evidence they expect
Leadership commitment Is top management actively involved in privacy governance? Management review minutes, resource allocation decisions, privacy objectives
Risk assessment Are privacy risks identified, assessed and treated systematically? Risk register, risk treatment plan, risk acceptance criteria
Operational controls Are Annex A controls implemented and working? Procedure records, system configurations, training records
Monitoring and measurement Are you measuring whether controls are effective? KPIs, incident records, audit results, trend analysis
Continual improvement Are nonconformities addressed and lessons learned? Corrective action records, management review outputs, improvement plans

Auditors typically use a sampling approach. They will not check every control or interview every member of staff, but they will look at enough evidence to form a reasonable conclusion about the effectiveness of your PIMS.




ISMS.online's powerful dashboard

Start your free trial

Sign up for your free trial today and get hands on with all the compliance features that ISMS.online has to offer




How should you prepare your team for the audit?

The most common source of audit findings is not poor documentation — it is staff who are unaware of the policies and procedures that apply to their roles. Preparing your team is as important as preparing your evidence.

Before the audit

  • Brief all staff who may be interviewed. They should understand the PIMS scope, their role within it, and where to find relevant policies.
  • Run a mock audit. Simulate the auditor’s approach by interviewing staff and sampling evidence. This identifies gaps before the real audit does.
  • Confirm evidence is accessible. Auditors should not have to wait while someone searches for records. Organise evidence packs by clause and control.
  • Assign an audit liaison. Nominate one person to coordinate logistics, schedule interviews, and handle auditor queries.

During the audit

  • Answer the question asked. Avoid volunteering information beyond what the auditor requests.
  • Be honest. If a process is not fully implemented, say so. Auditors appreciate transparency far more than evasion.
  • Provide evidence promptly. Have records, screenshots, system access and documents ready for the areas being assessed.
  • Take notes. Record auditor observations and questions — these are valuable input for post-audit improvement.

ISMS.online makes audit preparation significantly easier by keeping all your policies, controls, risk assessments, evidence and audit records in one place. When the auditor asks for evidence, you can navigate directly to the relevant record rather than searching through shared drives and spreadsheets.

What are the most common audit findings?

Understanding common findings helps you address them before the auditor arrives. Many of these overlap with common implementation mistakes. These are the issues certification bodies report most frequently:

Finding Why it happens How to avoid it
Incomplete risk assessment Privacy risks are treated separately from information security risks, or not all processing activities are considered Ensure your risk assessment covers all PII processing activities and aligns with your data inventory
Weak management review Management reviews are superficial or do not cover the required inputs Use a structured agenda that covers all inputs specified in the standard (audit results, risk changes, improvement opportunities)
Missing internal audit evidence Internal audits are conducted but not properly documented Record audit plans, findings, corrective actions and follow-up. ISMS.online provides built-in audit management to track this
Staff awareness gaps Staff cannot explain the policies or controls that apply to their roles Run awareness sessions before the audit and ensure policy acceptance records are up to date
Outdated documentation Policies or procedures reference superseded processes or organisational structures Schedule regular document reviews and use version control to track changes



ISMS.online's powerful dashboard

One of our onboarding specialists will walk you through our platform to help you get started with confidence.




What happens after the audit?

After Stage 2, the auditor will present their findings in a closing meeting and issue a formal audit report. The possible outcomes are:

  • Recommendation for certification — No major nonconformities found. Minor observations may be noted for improvement.
  • Conditional recommendation — Minor nonconformities identified. You will need to submit evidence of corrective action within a defined timeframe (typically 90 days).
  • Certification not recommended — Major nonconformities found. A follow-up audit will be required after you address the issues.

Once certified, your certificate is valid for three years, subject to annual surveillance audits. These are shorter than the initial certification audit and focus on a subset of requirements to confirm continued compliance.

Surveillance and recertification

Audit type When Scope
Surveillance audit 1 ~12 months after certification Subset of requirements, plus any areas flagged in initial audit
Surveillance audit 2 ~24 months after certification Different subset of requirements
Recertification audit ~36 months (before expiry) Full reassessment, similar to initial certification

ISMS.online helps you stay audit-ready between assessments by maintaining a continuous record of policy reviews, risk updates, corrective actions and management review outputs — so you are never scrambling to prepare when the next surveillance audit is due.

Why choose ISMS.online for audit preparation?

  • Centralised evidence: All policies, controls, risk assessments and audit records in one platform, ready for auditor review.
  • Built-in audit management: Plan, execute and track internal audits with findings, corrective actions and follow-up — all linked to the relevant controls.
  • Policy rollout and acceptance: Distribute policies to staff, track who has read and accepted them, and export adoption reports for auditors.
  • Risk register with treatment plans: Demonstrate a systematic approach to privacy risk with linked controls, owners and review dates.
  • Management review templates: Structured agendas and outputs that cover every input the standard requires.
  • Continuous monitoring: Dashboards and KPIs show the current health of your PIMS at a glance, supporting surveillance audit readiness.
  • Version-controlled documentation: Automatic version history and document check-out ensure auditors always see the current, approved version.

FAQs

How long does the ISO 27701:2025 certification audit take?

Stage 1 typically takes one to two days, and Stage 2 takes two to five days depending on the size and complexity of your organisation. There is usually a gap of four to eight weeks between Stage 1 and Stage 2 to allow you to address any findings.


Can the audit be conducted remotely?

Stage 1 is commonly conducted remotely. Stage 2 typically requires on-site presence, although many certification bodies now offer hybrid approaches combining remote and on-site assessment. Your certification body will confirm the approach during planning.


What happens if we receive a major nonconformity?

A major nonconformity means certification cannot be granted until the issue is resolved. You will need to implement corrective action and undergo a follow-up audit (or provide sufficient evidence) before the certification body can make a recommendation. This is not uncommon and does not mean your implementation has failed.


Do we need ISO 27001 before we can be audited for ISO 27701:2025?

ISO 27701:2025 can now be certified as a standalone standard, so ISO 27001 certification is no longer a prerequisite. However, if you already hold ISO 27001, the audit scope for ISO 27701 will focus on the privacy-specific additions.


How should we choose a certification body?

Look for a certification body accredited by a national accreditation body (such as UKAS in the UK). Consider their experience with ISO 27701 specifically, their auditor availability, and whether they offer integrated audits if you hold other ISO certifications. Request proposals from two or three bodies to compare approach, timeline and cost.



Max Edwards

Max works as part of the ISMS.online marketing team and ensures that our website is updated with useful content and information about all things ISO 27001, 27002 and compliance.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Spring 2026
High Performer - Spring 2026 Small Business UK
Regional Leader - Spring 2026 EU
Regional Leader - Spring 2026 EMEA
Regional Leader - Spring 2026 UK
High Performer - Spring 2026 Mid-Market EMEA

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.