Skip to content

From Certification High to Surveillance Reality

An ISO 27001 surveillance audit is a scheduled health‑check that proves your information security management system (ISMS) still works in real life. For a managed service provider (MSP), the next 30 days are about showing auditors that your controls still operate as designed, still match your services and still support customers without disrupting day‑to‑day delivery.

An ISO 27001 surveillance audit is best seen as a routine checkpoint in a three‑year cycle, not a shock event. After the initial Stage 1 and Stage 2 audits, your certificate typically runs for three years, with shorter surveillance visits in years one and two and a fuller re‑certification in year three. Accreditation guidance for ISO/IEC 27001 audits, such as ISO/IEC 27006 overviews, describes this three‑year cycle with annual surveillance as the normal pattern. Auditors expect to see an ISMS that has matured since certification, not one that has been put back in the box.

Surveillance feels less threatening when you can see it coming and know what you will show.

For an MSP, those visits land while teams are already stretched delivering projects, managing incidents and hitting SLAs, so they can feel like an unwelcome interruption. The practical challenge is that auditors arrive to test governance while you are in the middle of customer change, not in a static environment.

Surveillance audits are not about re‑issuing your certificate from scratch. The focus is on whether the ISMS that earned certification is still in place, still aligned with your services and still effective. That means auditors look closely at what has changed since the last visit: services, customers, locations, tools, suppliers and organisational structure. They sample enough to decide whether your system is live, relevant and improving.

A useful starting point is to sketch your own ISO 27001 lifecycle on one page: when you achieved certification, when surveillance audits fall and when re‑certification is due. Add key business dates such as contract renewals, peak project seasons and major platform migrations. That simple timeline makes it easier to plan rather than react and gives leadership a shared view of when audit work will land.

It is also worth asking a blunt question: what has changed in the business since Stage 2? New managed security offerings, cloud migrations, acquisitions, outsourced support desks and new data centres all shift the risk landscape. If the ISMS scope and documentation have not kept pace, the surveillance audit will expose that gap quickly.

Another healthy mindset shift is to stop treating ISO 27001 as a one‑off project that finished when the certificate arrived. Surveillance audits are designed to test whether information security is now part of business‑as‑usual: risk‑based decisions, change management, supplier oversight and incident handling should all show up in day‑to‑day work, not just in a binder.

Sales and account management teams also benefit from this reframing. Regular, successful surveillance audits become part of your pitch: independent reassurance that security and governance are being checked every year. That matters when enterprise customers and regulators are asking tougher questions about resilience and supply‑chain risk. Public‑sector and agency reports, including ENISA’s analysis of the threat landscape for managed service providers, underline how concerns about MSP resilience and supply‑chain compromise have increased in recent years.

Finally, contact your certification body early. Ask how they intend to sample your environment this year, which locations or services they plan to visit and whether they will follow up specific nonconformities from last time. That information will shape how the next 30 days are used and stops you guessing what matters most.

Respondents to the 2025 ISMS.online State of Information Security survey reported that customers now commonly expect suppliers to align with formal frameworks like ISO 27001, ISO 27701, GDPR or SOC 2 instead of relying on informal assurances.

Why MSPs Feel Surveillance Audits More Acutely

MSPs feel surveillance audits more sharply because auditors test security while you are juggling constant customer change, not running a steady‑state environment. The core question is whether your ISMS has kept pace with shifting client estates, tools and services, or whether governance was quietly left behind while you focused on delivery.

For an MSP, the same three‑year certification cycle hits a far more dynamic environment than many traditional organisations. Client estates, cloud platforms, ticket volumes and service offerings may have shifted dramatically within a single year. Surveillance audits therefore land in the middle of that motion, testing whether governance kept up or was left behind during the rush.

Where a more static organisation might show the same systems and processes year after year, you are demonstrating how security and service management have adapted without losing control. That makes it especially important to highlight how scope, risk assessment and controls have been updated to reflect new services, platforms and customer commitments, rather than relying on a frozen view from certification.

Turning Surveillance Into an Operating Rhythm

Surveillance audits become far less painful when they reflect routines you already run, rather than creating parallel work that only happens once a year. Your goal is to embed risk, review and improvement into existing forums so the 30‑day window is about organising evidence, not inventing activity.

The most effective way to do this is to weave surveillance into existing rhythms rather than bolt it on. If quarterly business reviews, service review boards and roadmap planning already exist, those forums can host risk discussions, policy decisions and control reviews that double as audit evidence. The 30‑day preparation window then becomes a time to organise and sample that evidence, not to invent activity at the last minute.

When customers and internal leaders see that the same meetings which drive service decisions also surface security performance and improvement actions, surveillance naturally becomes a confirmation step. Over time, that rhythm turns annual audits into predictable checkpoints instead of disruptive events.

Book a demo


What ISO 27001 Surveillance Audits Really Are for MSPs

An ISO 27001 surveillance audit is a periodic external review that checks whether your ISMS still conforms to the standard and works day to day. For an MSP, that means showing auditors that the controls in your documentation match what actually happens in your tools, tickets and teams, especially over the last year.

Certification bodies follow internationally recognised rules that require them to revisit certified organisations at planned intervals, usually annually, to maintain confidence in certificates between full audits. Accredited certification bodies explain on their own ISO 27001 pages, for example NQA’s guidance, that certificates are maintained through planned, usually annual, surveillance visits to confirm ongoing conformity. The auditor arrives expecting to see a living system, not just the same documents they saw during certification. Their job is to confirm that your ISMS is still relevant, still operating and still improving in response to change.

Almost every organisation in the 2025 ISMS.online State of Information Security survey said achieving or maintaining security certifications like ISO 27001 or SOC 2 is a priority.

The structure of a surveillance visit is usually lighter than the initial Stage 2 audit. Instead of testing every requirement in depth, auditors sample selected clauses and controls, look at changes since the last visit and follow up on previous nonconformities. They may focus on particular sites, services, processes or risks agreed in the audit plan and will usually explain that plan in advance.

For MSPs, the “live system” dimension is especially important. Much of your control environment sits inside tools: PSA or IT service management platforms, remote monitoring and management, identity and access management, backup systems, security monitoring and logging solutions, HR systems and supplier portals. Auditors want to see that your documented processes are genuinely reflected in how those tools are used.

It helps to distinguish two styles of audit activity:

  • Document‑centric checks: – policies, scope statements, risk methodologies, the Statement of Applicability, procedures and formal records such as internal audit and management review minutes. These confirm that the ISMS is still defined and maintained.
  • Operational walkthroughs: – following the life of a change, incident, access request or supplier review through tickets, approvals, logs and reports. These confirm that controls are operating and that people follow the agreed process.

Both perspectives matter. If documents look perfect but tickets show unmanaged changes or inconsistent incident handling, auditors will question whether the ISMS is real. If operations look disciplined but documentation is out of date, they may question the governance framework and your ability to repeat good practice.

Another dimension for MSPs is the intersection with privacy and regulatory obligations. Many providers act as processors of personal data, handle regulated workloads or support customers in heavily regulated sectors. Surveillance auditors will not enforce privacy laws directly, but they will expect to see how your ISMS supports those obligations: data protection by design, secure handling of customer data, alignment with data processing agreements and robust supplier management.

Previous findings also guide the visit. Nonconformities and observations from past audits are rarely forgotten; auditors are expected to verify that corrective actions were implemented and effective. Certification bodies such as BSI highlight that surveillance visits are expected to follow up previous nonconformities and check that corrective actions have been closed out properly, not simply noted once and ignored.

If there were weaknesses in areas such as access control, backup, incident response or supplier oversight, those topics will almost certainly reappear.

Typical Focus Areas in Surveillance Audits

Most ISO 27001 surveillance audits for MSPs concentrate on a small set of core governance clauses, key Annex A controls, material changes since last year and any previous nonconformities. If you understand that short list, you can focus your 30‑day effort where it measurably reduces audit risk. Implementation guides aimed at MSPs, such as independent surveillance audit overviews, describe a very similar emphasis on core clauses, key Annex A controls, recent changes and earlier findings rather than re‑testing everything from scratch.

In practice, most surveillance audits for MSPs spend time on:

  • Clause 4–10 requirements such as scope, leadership commitment, risk management, internal audit, management review and continual improvement.
  • Annex A controls that govern access control, logging and monitoring, incident management, backup and supplier relationships.
  • Significant changes in services, locations, tools, structure or key personnel since the last visit.
  • Evidence that previous nonconformities have been addressed and similar issues are not recurring.

Together, these focus areas tell the auditor whether your ISMS is still relevant, still operating and still improving in line with ISO 27001 expectations. If you own the ISMS, treating this list as your 30‑day priority set will usually give you the best return on effort.

What This Means for Your 30‑Day Window

Knowing what auditors usually look at helps you treat the 30 days as a focused sprint rather than a vague scramble. You are trying to prove that the ISMS still matches reality, that core processes run consistently and that past issues have been handled.

Understanding the auditor’s objectives shapes your preparation. You are not trying to rebuild the entire ISMS in 30 days. Instead, you are aiming to:

  • Confirm that the defined ISMS still matches reality.
  • Show that core processes and controls have been operating over time.
  • Demonstrate that identified weaknesses have been handled professionally.
  • Make it easy for the auditor to navigate from requirement to evidence.

If you keep those four aims visible in every task list and meeting, it becomes easier to say “not now” to lower‑impact work and to use the 30‑day window to best effect.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




The 30‑Day Compression Problem for MSPs

The core challenge of a 30‑day surveillance window is balancing real audit work with existing customer commitments. You cannot rebuild an ISMS in a month, so you need a realistic, risk‑based plan that protects the certificate while keeping service delivery running smoothly.

Thirty days sounds like plenty of time until you factor in customer projects, incidents, holidays and other commitments. Surveillance notices often arrive with that kind of lead time, leaving ISMS owners to juggle audit preparation around an already busy schedule. Without structure, the result is a familiar pattern: late‑night evidence hunting, stressed engineers and leaders asking why this always becomes a fire drill.

In the 2025 ISMS.online State of Information Security survey, roughly two-thirds of organisations said the speed and volume of regulatory change are making compliance increasingly difficult to sustain.

A useful first step is to treat that fire drill as data. Estimate, even roughly, how many hours were spent on audit preparation last time, which roles were involved, which customer projects were delayed and how much overtime was incurred. This turns vague frustration into a concrete “cost of disorganisation” that leadership can recognise and address.

It is also important to be honest about what 30 days can and cannot do. A short window cannot replace the initial work of implementing an ISMS. The plan described here assumes that you are already certified, that basic processes exist and that some level of monitoring and review has continued. The aim is to tune, focus and organise, not to build from zero.

A simple way to explain this to leadership is to contrast the limits and possibilities of the window:

  • Thirty days cannot create a credible ISMS from nothing.
  • Thirty days cannot fix every technical weakness in your estate.
  • Thirty days can refresh scope, risk, SoA and key records.
  • Thirty days can organise evidence and close the most serious gaps.

Seen this way, the sprint becomes a risk‑based clean‑up, not an unrealistic rebuild.

One way to think about the constraint is to imagine a more generous, idealised cycle. In an ideal world, there would be 90 days of rolling readiness: regular risk reviews, internal audits on a planned schedule, management reviews at least annually and continuous evidence capture. The 30‑day window would simply be time to pull samples and double‑check the most recent records.

Reality for many MSPs is different. Risk registers may not have been updated in several months; internal audits might have slipped; backups and access reviews may be happening but not recorded in a way that is easy to demonstrate. Given that, the 30‑day sprint has to be risk‑based, concentrating effort where it will most reduce the chance of serious findings.

Time and Workload Constraints

Time and workload constraints are real risk factors in a surveillance audit, not just scheduling annoyances. If you do not recognise them early, surveillance quickly becomes another exhausting, last‑minute project.

Start by mapping the 30‑day period against real commitments: major customer migrations, renewal seasons, staff holidays, peak support periods and internal projects. This helps you see when key people will actually be available for risk reviews, internal audits and evidence collection, and where you might need to move work or bring in support.

By treating the time pressure as a planning input rather than an inconvenience, you can set expectations early. Leadership is more likely to free up capacity when they see the alternative is overtime, project delays and a stressful audit that could damage client confidence. If you run operations, this is your chance to negotiate realistic workloads instead of absorbing everything silently.

Focusing on the Highest‑Risk Areas

Because the window is short, the sensible approach is to focus first on areas most likely to generate major nonconformities. If you can get those right, the risk of serious surprises drops sharply even if lower‑risk items wait until after the audit.

Around 41% of organisations in the 2025 ISMS.online State of Information Security survey said managing third-party risk and tracking supplier compliance is one of their main challenges.

Start with the question: if you only have time to get a few things right, what would most reduce the chance of major findings or serious questions? For most MSPs, the answer lies in a handful of areas:

  • A scope statement that reflects current services, locations and key platforms.
  • A recent risk assessment and treatment plan covering significant changes.
  • Evidence that internal audits and management reviews have taken place.
  • Clear records for access control, change management, incidents, backup and suppliers.
  • Documented corrective actions for any previous nonconformities.

At the same time, think about where evidence lives. Tickets might be in a PSA platform; logs in several monitoring or logging tools; HR records in a separate system; supplier assessments in spreadsheets or contract repositories. You do not need to move everything, but you do need a way to point auditors quickly from a control or process to specific records.

Finally, recognise that audit preparation cannot be allowed to break service delivery. Overlay the 30‑day plan on your real calendar. If major customer migrations, renewal seasons or new service launches are already planned, adjust the schedule or negotiate internal support so that compliance work and operational commitments do not clash.

Leadership teams appreciate clarity and dislike surprises. You can secure better support if you present the 30‑day plan as a measured, high‑risk‑first effort rather than an open‑ended request for time.

Position the 30‑day plan as:

  • A way to protect the certificate and client confidence.
  • A measured effort, focused on high‑risk areas.
  • A step towards a more predictable, less painful surveillance cycle next year.

If you handle customer bids or executive reporting, framing the plan in these terms also helps you explain to clients and stakeholders why audit work is essential and how it supports their interests rather than competing with them.




Week 1: Stabilise the ISMS Foundation

Week 1 is where you make sure the spine of your ISMS is straight before you start pulling evidence. You are checking that scope, risk, the Statement of Applicability (SoA), internal audits and management reviews are current so everything you show in the audit hangs together.

If core documents and processes are out of date, evidence collection later on will sit on shaky ground. Starting with fundamentals also allows you to spot any serious issues early enough to act. For an MSP that has grown or changed since certification, this first week is often where the most impactful corrections are made.

Begin with the fundamentals: scope, risk and the SoA. Check that the written scope describes the services, locations, systems and organisational units that are actually in play today. For an MSP, that should explicitly cover managed services, key platforms, data centres or cloud environments and any third‑party providers that materially affect information security.

Next, review the latest risk assessment and risk treatment plan. Confirm that they were updated within a reasonable timeframe and that major changes in your environment are reflected. New services, high‑value clients, changes in hosting arrangements, new tooling or the use of subcontractors should all have been considered. Auditors will expect to see that risk has been revisited since certification, not left untouched.

The SoA deserves particular attention. It summarises which Annex A controls are applicable and how they are implemented. Verify that it aligns with the current control set and that reasons for non‑applicable controls still make sense. If you have transitioned to the 2022 revision of ISO 27001, ensure the SoA reflects the updated control structure and any new controls introduced.

Internal audits and management reviews are another cornerstone. Check when the last internal audit was completed, what findings arose and what actions were taken. Do the same for management reviews: look for records of discussions about ISMS performance, changes in context, risk levels, incidents and improvement opportunities. If either of these activities has slipped, plan how to complete them before the audit or at least show that they are in progress with documented actions and dates.

Bringing the Right Stakeholders Together

A short, focused readiness meeting in Week 1 brings the people you rely on for evidence and decisions into the same conversation. It is your chance to align expectations, share the plan and make sure no one is surprised when the auditor arrives.

Week 1 should include a readiness meeting with key stakeholders: ISMS owner, operations or service delivery lead, HR, finance and legal or data protection. Use this session to agree:

  • What the auditor is likely to focus on.
  • Which processes will be used as primary examples, such as client onboarding, high‑risk changes or incident handling.
  • Who will act as process owners and subject matter experts during the audit.
  • How evidence will be collected and shared internally.

Known weaknesses should be addressed openly. If access reviews are behind schedule, supplier assessments incomplete or certain controls not fully implemented, hiding these facts is risky. Instead, document interim measures, risk acceptance decisions and realistic completion plans. Auditors are more comfortable with transparent, managed gaps than with surprises, especially when they see clear corrective actions.

Week 1 Checklist at a Glance

A concise checklist for Week 1 makes it easier to track progress and delegate effectively, especially when several people are contributing to audit readiness.

The following table summarises the main Week 1 activities:

Area Key Question Outcome You Need
Scope Does it reflect current services and locations? Updated, accurate scope statement
Risk & Treatment Are major changes reflected in risk decisions? Current risk register and treatment plan
Statement of Applicability Does it match the control environment? SoA aligned to current controls and version
Internal Audit Has an audit been completed or planned? Completed audit or documented plan and actions
Management Review Has performance been reviewed by leadership? Recent review minutes and decisions
Known Weaknesses Are gaps acknowledged and managed? Interim controls and action plans documented

Using Week 1 to stabilise these elements means Weeks 2 and 3 can focus on demonstrating control operation rather than debating fundamentals. As you move forward, you can refer back to this checklist and avoid revisiting the same ground from scratch.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




Weeks 2–3: Proving Annex A 5–8 Are Alive in Your MSP

Weeks 2 and 3 are about showing auditors that the Annex A controls you committed to are genuinely operating across your organisation, people, physical environment and technology. You are moving from what you say you do to what you can prove you do, using real examples from your MSP.

With the foundation stabilised, attention can move to the controls that most directly touch how services are delivered. In the 2022 revision, Annex A is grouped into organisational (A.5), people (A.6), physical (A.7) and technological (A.8) controls. The 2022 edition of ISO/IEC 27001 explicitly reorganises Annex A into these four groups (A.5–A.8), as described in ISO’s overview of the revision. Surveillance auditors tend to sample across these groups rather than exhaustively testing each one, so well‑chosen examples carry real weight.

Sampling Evidence Across Annex A 5–8

Auditors usually sample a small number of controls and stories across Annex A 5–8 rather than expecting you to evidence everything. To use your limited time well, focus on curated samples that show how controls work in real scenarios instead of assembling a huge, unfocused pile of records.

For organisational controls (A.5), gather artefacts that show governance and risk management in action. Useful examples include recent risk logs or registers with updates and decisions, minutes from governance forums or change advisory boards where information security topics were discussed, and updates to policies and procedures tied to changes in services or risk.

People controls (A.6) focus on how individuals with access to information and systems are screened, trained and managed. For an MSP, engineers often have privileged access into multiple client environments, which makes these controls especially important. Evidence might include onboarding records showing background checks and policy acknowledgements, offboarding records showing timely removal of access and training logs covering security awareness and incident reporting.

Physical controls (A.7) remain relevant even in a cloud‑heavy world. MSPs often operate offices, labs, on‑site comms rooms and co‑located racks. Auditors may ask about definitions of secure areas, visitor logs, access‑card assignments and equipment registers with processes for secure disposal or re‑use of hardware.

Technological controls (A.8) usually take the most time. These controls govern access management, logging and monitoring, backup and recovery, system hardening, vulnerability management and technical operations more broadly. Instead of trying to show everything, prepare curated samples covering user provisioning and de‑provisioning, change tickets, backup reports and restore tests, vulnerability scans with remediation records and incident tickets that show detection, containment and lessons learned.

Using End‑to‑End Stories to Link Controls

End‑to‑end stories that cut across multiple controls help auditors see how your ISMS operates in real life. You want a handful of scenarios where you can walk from risk to control to evidence in a single, coherent narrative.

For example, you might showcase a new client onboarding. Start with the risk assessment and contract review, then show account creation, network configuration, access setup and documentation. Along the way you will touch governance, people, physical and technological controls in a way that mirrors how your MSP really works.

Another useful storey is a critical incident affecting a key client. Demonstrate how it was detected, how communications were handled, how service was restored and what preventive measures were taken. That single narrative can evidence logging and monitoring, incident management, backup and recovery, communication and improvement, all of which auditors expect to see working together.

Each of these stories can be mapped to relevant Annex A controls in A.5 to A.8. That mapping gives auditors a route they can follow and reduces the need for ad‑hoc searches during the audit. It also reassures you that your evidence is grounded in real work, not in theoretical examples designed purely for the auditor’s benefit.

Avoiding Common Control Pitfalls in MSPs

Most surveillance audit findings in MSPs arise from a familiar set of control weaknesses, rather than exotic technical failures. If you spend a little time sampling and tightening those areas, you dramatically reduce the chance of awkward nonconformities on the day.

The 2025 ISMS.online State of Information Security survey found that most organisations had been affected by at least one third-party or vendor-related security incident in the previous year.

Surveillance audits of MSPs frequently highlight recurring issues:

  • Access that has not been revoked promptly after role changes or leavers.
  • Inconsistent change management between customer environments and internal systems.
  • Backup and recovery processes that are well‑designed but poorly evidenced.
  • Incidents that were handled operationally but not logged and analysed for improvement.
  • Supplier oversight that misses key cloud platforms or security vendors.

MSP‑focused ISO 27001 guidance, including practical implementation articles, repeatedly calls out the same themes as common findings during audits.

With two to three weeks available, focus on sampling these areas, closing gaps where possible and documenting risk acceptance where immediate fixes are unrealistic. Refer back to your Annex A mapping so that any improvements you make now are captured as part of the ISMS, not treated as one‑off fixes that will be forgotten before the next surveillance visit.




Evidence & Documentation: From Chaos to Clickable in the Audit

Even a well‑run ISMS will feel fragile if you cannot quickly show evidence on demand. The heart of your 30‑day preparation is turning scattered records into something your auditor can navigate in a few clicks, without you having to scramble through drives and tools.

Many MSPs have plenty of data but little structure: policies in one place, risk registers in another, tickets in several tools, logs in multiple systems and reports scattered across shared drives. Auditors know this pattern well and will quickly sense whether your evidence is organised or improvised. The goal for this stage is to make that evidence easy to navigate. You want to be able to move immediately from a clause or control to a specific ticket, log or record that proves what you do.

A simple but powerful approach is to build an evidence map. For each relevant ISO 27001 requirement and Annex A control, note:

  • A short description in plain language.
  • The main process or owner in your organisation.
  • The primary artefacts that show operation, such as documents, tickets, logs or reports.
  • Where those artefacts live, including system and location.

This map can live in a spreadsheet, a documentation tool or a dedicated ISMS platform. The important thing is that auditors and internal teams can start from a control and quickly see where to look for proof. If you are the person owning the ISMS, this also becomes your quick reference during customer due diligence and internal reporting.

Logs and tickets deserve special treatment. They are often the richest source of evidence but also the hardest to interpret if naming and tagging are inconsistent. Agree conventions for:

  • Incident types and severities.
  • Change categories such as standard, normal and emergency.
  • Client identifiers for work affecting customer environments.
  • Tagging of security‑relevant tickets.

Over time, these conventions make it much simpler to pull meaningful samples without manual trawling. They also help new staff understand how to record work in a way that supports both customers and audits.

It also helps to implement a single evidence register. Rather than copying files into multiple audit folders and risking out‑of‑date versions, store records once in their natural systems and maintain a register of links. That register can include:

  • Control or clause reference.
  • Evidence description.
  • Link or path to the record.
  • Owner.
  • Date last checked.

During a surveillance audit, the register becomes your starting point. For each topic an auditor raises, you can navigate directly to the relevant records. This not only reduces stress but signals maturity: auditors are more confident when they see that you can find what you need without hunting.

Before the audit, standardise how ad‑hoc evidence such as screenshots or exports is created. Simple practices like embedding dates, system names and responsible individuals in file names or headers make it far easier to re‑use that evidence later and to prove that it relates to the period under review.

An “evidence orientation” pack can further smooth the process. A short slide deck or document that explains how the ISMS is structured, which systems hold which types of records and how the evidence register is organised can save time on the day. It also serves as a useful induction resource for new staff involved in the ISMS.

Finally, rehearse. Ask evidence owners to walk through a few examples using the register, opening records live. This quickly reveals broken links, permission issues or confusing naming. It is much better to discover those during an internal run‑through than in front of the auditor.

Building an Evidence Map Your Team Can Actually Use

An evidence map is only valuable if people across your MSP understand it and can use it under pressure. The aim is not a perfect document, but a practical guide that shortens conversations and helps everyone find what they need during a surveillance visit.

When you build the map, write descriptions in plain language and name owners by role rather than individual wherever possible. That way, if team members change, the map still makes sense. Focus on the controls the auditor is most likely to sample, then expand gradually in quieter periods rather than trying to cover everything in one go.

Over time, treat the evidence map as a living artefact. Update it after internal audits and surveillance visits, especially if the auditor struggled to find something or praised a particular example. That feedback loop steadily improves your audit experience and reduces the amount of remedial work you need to do in each 30‑day sprint.

Rehearsing Your Evidence Navigation

Rehearsal turns an evidence map from a static document into muscle memory. A short internal mini‑audit before the surveillance visit can surface issues quickly and build confidence across the team.

Ask each evidence owner to walk through two or three controls using the register, opening tickets, logs or records as if the auditor were watching. This quickly reveals missing permissions, confusing names or obsolete links. You can then fix these quietly before the actual audit, instead of stumbling through them in front of the certification body.

This rehearsal step also helps new staff understand how the ISMS works in practice. When people have practised finding evidence at speed, they are more relaxed and confident on the day of the audit, and auditors generally respond well to that confidence.

Choosing Tools That Support Evidence, Not Just Documents

The tools you use should make it easy to move from a clause or control to current, trustworthy records in one or two clicks. Whether you rely on carefully structured folders or a dedicated ISMS platform, the real test is how quickly an auditor can see what they ask for.

Some organisations manage evidence through disciplined shared drives and spreadsheets. Others use a central ISMS workspace to house scope, risk, the SoA, audits and management reviews, and then link out to tickets and logs in operational tools. If you recognise your own environment in the “scattered files” picture, exploring how a dedicated platform such as ISMS.online can organise this evidence may be one of the most effective ways to reduce future audit stress.




ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.




Designing a Reusable 30‑Day Surveillance Playbook

Your first structured 30‑day surveillance sprint teaches you which activities actually matter and which can wait. Capturing that experience as a reusable playbook turns hard‑won lessons into a calmer, repeatable cycle instead of another one‑off scramble next year.

Once you have survived one surveillance audit with a structured 30‑day sprint, it is tempting to relax and forget the details. That would be a missed opportunity. Capturing what worked and what did not turns hard‑won experience into a reusable playbook that protects you next year and helps new team members on board faster. Guidance from certification bodies and auditors, including providers such as SGS, emphasises that a documented, repeatable approach makes it easier to demonstrate control over your ISMS than improvised, one‑off preparation.

Start by documenting the timeline you actually followed. Use a countdown format: T‑30, T‑21, T‑14, T‑7, T‑1. For each point, note which activities were completed, who was responsible and what dependencies existed. Include tasks such as requesting the audit plan, updating the scope, checking risk assessments, closing internal audit actions, collecting evidence samples and scheduling briefings.

Capturing What Actually Happened This Time

The most honest version of your playbook is the one based on what you really did, not what you wish you had done. Writing that down soon after the audit keeps the plan grounded and credible.

Short crib notes for common audit questions are another valuable asset. Examples include:

  • How scope is defined and maintained over time.
  • How new clients and services are onboarded securely.
  • How changes affecting client environments are assessed and approved.
  • How incidents are detected, escalated and reviewed.
  • How access is managed for staff and subcontractors.

These notes, with clear references to supporting records, help ensure consistent, confident answers no matter who speaks. They also shorten preparation for future audits because you are not rebuilding explanations from scratch. If you run the ISMS, these become your go‑to prompts when training colleagues to handle audit interviews.

A simple countdown step‑list can make the next cycle more predictable:

T‑30: Confirm scope and audit plan

Confirm surveillance dates, scope, locations and focus areas with the certification body and share them with stakeholders.

T‑21: Update risks and close key internal actions

Refresh the risk register and progress internal audit and management review actions that affect high‑risk areas.

T‑14: Build and test your evidence map

Populate the evidence register, check links and run a short internal rehearsal against sample controls.

T‑7: Finalise briefings and logistics

Confirm who will attend which sessions and ensure access to all systems, locations and records the auditor may need.

T‑1: Sanity‑check samples and communications

Verify key evidence samples still look good and that your team understands the running order and hand‑offs.

Making the Playbook Part of Business‑as‑Usual

A playbook only adds value if it shapes what people do between audits. The real goal is to move more of the work earlier in the cycle so the 30‑day window becomes a tidy‑up, not a rescue mission.

Clarity on roles is important here. Define a RACI (responsible, accountable, consulted, informed) matrix for key activities before, during and after the audit. Typical roles include:

  • Executive sponsor such as the managing director or operations director.
  • ISMS owner or information security manager.
  • Service or operations lead.
  • HR representative.
  • Finance or procurement owner for supplier matters.
  • Data protection or legal lead.
  • Technical subject matter experts.

For each task in the 30‑day plan, note who is responsible for doing the work, who is accountable for outcomes, who needs to be consulted and who should be kept informed. This reduces confusion and avoids overloading a single individual.

Communication during the audit also deserves a plan. Establish which channels will be used for coordinating responses, how questions from the auditor will be triaged and who can make decisions on the spot if issues arise. Agree in advance how to handle unexpected findings or requests for additional evidence so that operations are not disrupted.

After the audit, capture lessons while they are fresh. Ask which evidence impressed the auditor, where they probed deeper than expected, which controls felt fragile and where the team struggled to find records quickly. Use the answers to refine the evidence map, update procedures and adjust the 30‑day plan.

Lastly, build audit readiness into performance objectives for relevant leaders. If targets exist for closing corrective actions, keeping evidence current and maintaining engagement with ISMS activities, the playbook is more likely to be used consistently. Surveillance audits then become a shared responsibility, not a burden on a single compliance champion. If you later choose to manage this playbook in a central ISMS platform, you can align those responsibilities with visible tasks and reminders instead of relying on memory.




Book a Demo With ISMS.online Today

ISMS.online helps you turn ISO 27001 surveillance audits into predictable 30‑day sprints by putting scope, risks, controls and evidence in one structured place. When risks, controls and records are organised in a central ISMS workspace rather than scattered across tools and folders, it becomes much easier to see what is covered, where gaps exist and which records best demonstrate control operation, so you can move quickly from audit question to reliable proof for both auditors and customer due diligence.

ISMS.online is designed to act as that organising layer. It gives you a structured home for your scope, risk assessments, SoA, policies, internal audits, management reviews and improvement actions, while connecting naturally to tickets, logs and records generated in your existing MSP tools. That combination makes it simpler to map Annex A controls to real‑world processes and to keep evidence up to date between audits.

Running your next surveillance audit preparation in a dedicated environment like this also makes it easier to rehearse. You can walk through the 30‑day plan with stakeholders, follow sample stories from risk to control to record and check that permissions and links work end‑to‑end before the auditor arrives. Over time, the same workspace supports other assurance needs such as customer due diligence, additional standards and regulatory requirements.

How ISMS.online Reduces Surveillance Audit Stress

Different roles in your MSP feel surveillance pressure in different ways, and a shared ISMS helps each of them in a concrete, practical way. When everyone can see the same picture of risks, controls and evidence, the audit becomes a coordinated effort instead of a last‑minute scramble.

If you own the ISMS, ISMS.online reduces late‑night evidence hunting by giving you a single place to manage the 30‑day plan, corrective actions and audit history. If you run operations, it reduces disruption by aligning audit preparation with existing processes and making it easier to schedule work around service peaks. If you handle customer bids, repeated surveillance success backed by clear evidence becomes part of your reassurance storey in tenders and renewals.

What to Expect From an ISMS.online Demo

A short demo is usually enough to see how your current documentation and tools would fit into a structured ISMS and where you could gain immediate value. The aim is not to overwhelm you with features, but to show how a more organised approach could support the 30‑day playbook described here.

During a session, you can explore how scope, risk, the SoA, audits and management reviews sit together, how evidence registers link out to tickets and logs in your existing platforms and how tasks and reminders keep everyone aligned ahead of surveillance dates. You can also discuss what a 30‑day surveillance preparation workflow would look like for your organisation and how to move from project‑based compliance to continuous, evidence‑driven assurance powered by ISMS.online.

If you want to reduce audit stress, protect your certificate and give customers greater confidence in how their information is managed, arranging a short demonstration is a practical next step. It is a straightforward way to see whether a central ISMS workspace could turn surveillance audits from annual fire drills into predictable, well‑managed checkpoints for your MSP, with ISMS.online as the partner that keeps everything in one place.

Book a demo



Frequently Asked Questions

How is an ISO 27001 surveillance audit different from full certification for an MSP?

An ISO 27001 surveillance audit is a focused health‑check on your live ISMS, not a repeat of your original build‑and‑certify project.

For a managed service provider, Stage 1 and Stage 2 certification are about designing and proving your Information Security Management System from scratch: agreeing scope, building policies, defining risk, standing up Annex A controls and demonstrating they work across the whole environment. The auditor spends a lot of time checking that the foundations exist and are reasonably complete.

A surveillance audit assumes those foundations are in place. The question shifts from “have you built an ISMS?” to “is your ISMS still accurate, operating and improving?” For an MSP, that typically means the auditor will:

  • Check that your scope still reflects current services, locations, platforms and key suppliers
  • Confirm that risk assessment, internal audit and management review are happening and driving actions
  • Follow up on last year’s nonconformities and observations
  • Sample high‑impact controls (often around access, backup, monitoring, supplier oversight and incident handling) using recent evidence

Because of this, preparation is less about re‑writing documents and more about curating the last 6–12 months of real activity. You focus on updated scope and risk, your latest internal audit and management review, and a small number of clear examples that show how you actually manage security for customers today. If that currently means hunting through multiple tools and shared drives every year, moving to a structured ISMS platform such as ISMS.online lets you keep those foundations and day‑to‑day records together so surveillance feels like a routine check‑up, not a second full certification.

What does this difference change in how you prepare?

The main shift is from “project mode” to “lifecycle mode”.

Instead of treating the audit as an event you cram for, you concentrate on:

  • What has changed since the last visit (services, customers, suppliers, incidents)
  • Whether your core processes (risk, internal audit, management review, corrective actions) are running on schedule
  • Whether your Annex A controls are visible in real tickets, logs and decisions

That mindset usually reduces stress for your team and makes surveillance audits feel like confirmation that your system is doing its job, rather than a repeat of the hardest parts of initial certification.


How often will your MSP face ISO 27001 surveillance audits in the three‑year cycle?

Most MSPs on ISO 27001 will see one surveillance audit a year for two years, followed by a deeper recertification in year three.

When you first certify, your ISO 27001 certificate is normally issued with a three‑year validity period. To keep it valid, you agree a surveillance plan with your chosen certification body. A common pattern looks like this:

  • Year 1: Surveillance audit focused on changes, core processes and a sample of higher‑risk controls
  • Year 2: Second surveillance audit with similar breadth, plus closer attention to recurring themes or issues
  • Year 3: Recertification audit that feels closer to an initial Stage 2 in depth, before the next three‑year cycle begins

For an MSP with constant changes in customers, platforms and suppliers, the practical risk is not “will the auditor turn up?”, but “will we only remember the date when the confirmation email lands?”. The simplest defence is to treat audit dates the way you treat major releases and contract renewals: get them into the same calendar, with clear internal milestones.

Once you know your approximate month for each visit, you can work backwards. For example, you might run an internal audit three to four months before, a management review two months before, and targeted control checks 30–14 days out so that your evidence is fresh. If you do not know your current schedule, your certification body can usually provide the planned dates and windows in a single email. Many MSPs then mirror that plan inside a central ISMS workspace like ISMS.online, where calendars, tasks and evidence live together, so there are fewer surprises and less last‑minute scrambling when the surveillance window opens.


What are the most important actions for an MSP in the first 7 days after a surveillance audit date is set?

In the first week, your most valuable move is to check that the “skeleton” of your ISMS still matches how your MSP actually runs today, before you get lost in individual tickets and logs.

That skeleton usually covers:

  • Scope and boundaries: of the ISMS (services, locations, systems, suppliers, customer types)
  • Current risk assessment and treatment plan: , including any major changes in the last year
  • Statement of Applicability: that matches the control set and standard edition you really use
  • Recent internal audit activity: , results and follow‑up actions
  • Most recent management review: , decisions and assigned owners

A practical way to start is to read your scope and risk register as if you were a newly hired engineer or account manager. Would they recognise the services, platforms and customer patterns described there, or would it feel a version behind reality? Any big changes-such as a new cloud platform, a major client win, a data centre move or increased outsourcing-should be visible in your risk assessment and treatment decisions.

Next, confirm that your Statement of Applicability lines up with the version of ISO 27001 your certificate references and reflects how you really manage access control, backup, logging, supplier oversight and incident response. Then check the timing and outcomes of your last internal audit and management review, paying close attention to open actions and who owns them.

Finally, bring the right people together for a short call: ISMS owners, operations, service desk leadership, HR and someone from finance or legal. Use that conversation to agree where you are strongest, where there are known gaps and what the auditor is most likely to probe. If your ISMS content, risks, actions and meeting records sit in one organised platform such as ISMS.online, that first‑week review becomes a structured walkthrough rather than a hunt through shared drives and individual inboxes.


How can an MSP show strong Annex A 5–8 evidence without drowning the team in extra work?

You can present Annex A 5–8 convincingly by building a few clear, end‑to‑end stories from real work your MSP already does, instead of inventing special “for audit” paperwork.

Those four sections cover:

  • A.5 Organisational controls: – how you govern security (policies, risk decisions, supplier oversight, change forums)
  • A.6 People controls: – how you vet, onboard, train and offboard staff and contractors
  • A.7 Physical controls: – how you protect offices, data centres and equipment handling client data
  • A.8 Technological controls: – how you manage access, changes, backups, monitoring, vulnerabilities and incidents

A practical tactic is to select two or three real events from the last 6–12 months that matter to customers, such as:

  • Onboarding a new managed customer with sensitive workloads
  • Migrating to, or expanding, a cloud platform or data centre
  • Responding to a security incident or major service outage

For each event, collect the tickets, approvals, logs, reports and meeting notes that show how you handled it from end to end. One customer onboarding, for example, might naturally include:

  • Risk assessment entries and treatment decisions (A.5)
  • Training or briefing records for the team handling that customer (A.6)
  • Site access controls for any locations storing their data (A.7)
  • Access provisioning, backup verification, monitoring and change records (A.8)

Auditors tend to appreciate this approach because it shows controls working together in a realistic scenario rather than as isolated samples. To make it sustainable, keep a simple control‑to‑evidence map that lists, for each control, the normal sources of proof (PSA, RMM, SIEM, HR, documentation) and an example record. Using an ISMS platform like ISMS.online, you can attach those mappings and a small number of curated examples directly to each control so, at surveillance time, you are re‑using familiar stories instead of starting a new evidence hunt from scratch.


Which documents and records should an MSP have ready for ISO 27001 surveillance, and how can they be organised so audits stay calm?

You need a small, well‑linked bundle of formal ISMS documents and operational records that make it easy for an auditor to follow the trail from policy to practice.

On the formal side, most MSPs will have:

  • A current ISMS scope and boundaries
  • An information security policy and a concise set of supporting policies (access, acceptable use, incident management, etc.)
  • A defined risk assessment method, a live risk register and an up‑to‑date treatment plan
  • A Statement of Applicability that aligns with ISO 27001 and your implemented controls
  • Internal audit: plans, reports and follow‑up actions
  • Management review: minutes and decisions
  • A corrective action and improvement log showing issues, owners and status

On the operational side, you normally show samples rather than everything you have:

  • Service tickets for incidents, changes, access requests and problem management
  • System logs and reports for authentication, monitoring, backup and vulnerability scanning
  • HR records for joiners, movers and leavers, plus security awareness training completion
  • Supplier evaluations, onboarding checks and contract reviews for critical and cloud vendors

To keep the process calm, tie these items together in an evidence register so anyone involved can quickly answer “where do we show this?”. A simple structure is often enough:

  • Clause or Annex A control reference
  • Plain‑language topic, such as “administrator offboarding” or “client backup verification”
  • System or repository (PSA, RMM, SIEM, HR, ISMS, file path)
  • Example record IDs or report names
  • Responsible role or team

If you maintain that register inside a central ISMS workspace such as ISMS.online, each clause and control can link directly to its documents and example records. That means, when your auditor asks to see how you handle a specific area, you can navigate straight there, rather than pausing the session while someone searches folders and emails. The calmer and more predictable that experience feels for your team, the easier it is to treat surveillance as a routine part of running a managed security service.


How should an MSP manage previous nonconformities and known gaps when only 30 days remain before a surveillance audit?

With a month to go, your best strategy is to show disciplined control of known issues, not to pretend you have none.

Start by assembling one consolidated view of:

  • Nonconformities and observations from the last external audit
  • Findings from recent internal audits or penetration tests
  • Significant risks and issues highlighted in your management reviews

For each item, check three things:

  • Status: Is it closed, in progress or not started?
  • Evidence: If you claim it is closed, can you show the change that resolved it?
  • Ownership and timing: Is there a named owner, a realistic due date and visibility at the right level of management?

Where actions are still in progress, describe plainly what has been delivered so far, what remains and what temporary measures you have in place to reduce risk while you finish the work. It is helpful to flag which open items represent the highest risk to customers or to your own business and to show how leadership has been informed and involved in prioritising them.

Most auditors know that managed service environments move quickly and that issues are inevitable. What worries them is when the same problem reappears year after year, when due dates slip without explanation or when different logs tell conflicting stories about what is happening. If your corrective action log, risk register and management review minutes all line up, they see a managed improvement process rather than an ad‑hoc reaction.

Using a platform such as ISMS.online to hold your corrective actions, risks and management review outputs in one place makes this easier. You can show the auditor how items are raised, prioritised, assigned, tracked and closed, and you can demonstrate that leadership sees and discusses the most important gaps. That turns the final 30 days before surveillance into a tidy‑up and storytelling exercise about managed risk, instead of a frantic attempt to fix everything in a few weeks.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Spring 2026
High Performer - Spring 2026 Small Business UK
Regional Leader - Spring 2026 EU
Regional Leader - Spring 2026 EMEA
Regional Leader - Spring 2026 UK
High Performer - Spring 2026 Mid-Market EMEA

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.