โ† All skills
Tencent SkillHub ยท Security & Compliance

Isms Audit Expert

Information Security Management System auditing for ISO 27001 compliance, security control assessment, and certification support

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Information Security Management System auditing for ISO 27001 compliance, security control assessment, and certification support

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
SKILL.md, references/cloud-security-audit.md, references/iso27001-audit-methodology.md, references/security-control-testing.md, scripts/isms_audit_scheduler.py

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
2.1.1

Documentation

ClawHub primary doc Primary doc: SKILL.md 18 sections Open source page

ISMS Audit Expert

Internal and external ISMS audit management for ISO 27001 compliance verification, security control assessment, and certification support.

Table of Contents

Audit Program Management Audit Execution Control Assessment Finding Management Certification Support Tools References

Risk-Based Audit Schedule

Risk LevelAudit FrequencyExamplesCriticalQuarterlyPrivileged access, vulnerability management, loggingHighSemi-annualAccess control, incident response, encryptionMediumAnnualPolicies, awareness training, physical securityLowAnnualDocumentation, asset inventory

Annual Audit Planning Workflow

Review previous audit findings and risk assessment results Identify high-risk controls and recent security incidents Determine audit scope based on ISMS boundaries Assign auditors ensuring independence from audited areas Create audit schedule with resource allocation Obtain management approval for audit plan Validation: Audit plan covers all Annex A controls within certification cycle

Auditor Competency Requirements

ISO 27001 Lead Auditor certification (preferred) No operational responsibility for audited processes Understanding of technical security controls Knowledge of applicable regulations (GDPR, HIPAA)

Pre-Audit Preparation

Review ISMS documentation (policies, SoA, risk assessment) Analyze previous audit reports and open findings Prepare audit plan with interview schedule Notify auditees of audit scope and timing Prepare checklists for controls in scope Validation: All documentation received and reviewed before opening meeting

Audit Conduct Steps

Opening Meeting Confirm audit scope and objectives Introduce audit team and methodology Agree on communication channels and logistics Evidence Collection Interview control owners and operators Review documentation and records Observe processes in operation Inspect technical configurations Control Verification Test control design (does it address the risk?) Test control operation (is it working as intended?) Sample transactions and records Document all evidence collected Closing Meeting Present preliminary findings Clarify any factual inaccuracies Agree on finding classification Confirm corrective action timelines Validation: All controls in scope assessed with documented evidence

Control Testing Approach

Identify control objective from ISO 27002 Determine testing method (inquiry, observation, inspection, re-performance) Define sample size based on population and risk Execute test and document results Evaluate control effectiveness Validation: Evidence supports conclusion about control status For detailed technical verification procedures by Annex A control, see security-control-testing.md.

Finding Classification

SeverityDefinitionResponse TimeMajor NonconformityControl failure creating significant risk30 daysMinor NonconformityIsolated deviation with limited impact90 daysObservationImprovement opportunityNext audit cycle

Finding Documentation Template

  • Finding ID: ISMS-[YEAR]-[NUMBER]
  • Control Reference: A.X.X - [Control Name]
  • Severity: [Major/Minor/Observation]
  • Evidence:
  • [Specific evidence observed]
  • [Records reviewed]
  • [Interview statements]
  • Risk Impact:
  • [Potential consequences if not addressed]
  • Root Cause:
  • [Why the nonconformity occurred]
  • Recommendation:
  • [Specific corrective action steps]

Corrective Action Workflow

Auditee acknowledges finding and severity Root cause analysis completed within 10 days Corrective action plan submitted with target dates Actions implemented by responsible parties Auditor verifies effectiveness of corrections Finding closed with evidence of resolution Validation: Root cause addressed, recurrence prevented

Stage 1 Audit Preparation

Ensure documentation is complete: ISMS scope statement Information security policy (management signed) Statement of Applicability Risk assessment methodology and results Risk treatment plan Internal audit results (past 12 months) Management review minutes

Stage 2 Audit Preparation

Verify operational readiness: All Stage 1 findings addressed ISMS operational for minimum 3 months Evidence of control implementation Security awareness training records Incident response evidence (if applicable) Access review documentation

Surveillance Audit Cycle

PeriodFocusYear 1, Q2High-risk controls, Stage 2 findings follow-upYear 1, Q4Continual improvement, control sampleYear 2, Q2Full surveillanceYear 2, Q4Re-certification preparation Validation: No major nonconformities at surveillance audits.

scripts/

ScriptPurposeUsageisms_audit_scheduler.pyGenerate risk-based audit planspython scripts/isms_audit_scheduler.py --year 2025 --format markdown

Audit Planning Example

# Generate annual audit plan python scripts/isms_audit_scheduler.py --year 2025 --output audit_plan.json # With custom control risk ratings python scripts/isms_audit_scheduler.py --controls controls.csv --format markdown

References

FileContentiso27001-audit-methodology.mdAudit program structure, pre-audit phase, certification supportsecurity-control-testing.mdTechnical verification procedures for ISO 27002 controlscloud-security-audit.mdCloud provider assessment, configuration security, IAM review

Audit Performance Metrics

KPITargetMeasurementAudit plan completion100%Audits completed vs. plannedFinding closure rate>90% within SLAClosed on time vs. totalMajor nonconformities0 at certificationCount per certification cycleAudit effectivenessIncidents preventedSecurity improvements implemented

Category context

Identity, auth, scanning, governance, audit, and operational guardrails.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
4 Docs1 Scripts
  • SKILL.md Primary doc
  • references/cloud-security-audit.md Docs
  • references/iso27001-audit-methodology.md Docs
  • references/security-control-testing.md Docs
  • scripts/isms_audit_scheduler.py Scripts