Back to Blog

How to Prepare for a Cybersecurity Audit

How to Prepare for a Cybersecurity Audit

A cybersecurity audit is one of the most important exercises your organisation can undertake to understand its true security posture. Whether you are preparing for a formal external audit, working toward Cyber Essentials certification, or conducting an internal review to satisfy board-level governance requirements, thorough preparation is the difference between a smooth process and a stressful, expensive ordeal.

For UK businesses, cybersecurity audits have become increasingly common — and increasingly necessary. Regulatory frameworks including UK GDPR, the NIS Regulations 2018, and sector-specific requirements from the FCA, NHS Digital, and the Ministry of Defence all drive the need for regular, rigorous security assessments. Clients and partners are also demanding evidence of security maturity before signing contracts, making audit readiness a genuine competitive advantage.

78%
Of UK businesses now undergo annual cybersecurity audits
43%
Of organisations fail their first external security audit
£28K
Average cost of audit remediation for unprepared SMEs

This guide walks you through exactly how to prepare for a cybersecurity audit, covering the documentation you need, the technical controls auditors will examine, and the common pitfalls that trip up even experienced IT teams. We have drawn on our experience helping UK businesses across multiple sectors prepare for and pass audits successfully.

Understanding the Types of Cybersecurity Audit

Before you begin preparation, you need to understand exactly what type of audit you are facing. Different audits have different scopes, methodologies, and expectations, and your preparation strategy should be tailored accordingly.

Cyber Essentials and Cyber Essentials Plus are the UK Government's flagship security certification schemes. Cyber Essentials is a self-assessment questionnaire covering five technical controls: firewalls, secure configuration, user access control, malware protection, and patch management. Cyber Essentials Plus adds hands-on technical testing by an accredited assessor. Both are increasingly required for UK Government contracts and are widely recognised across the private sector.

ISO 27001 audits assess your Information Security Management System (ISMS) against the international standard for information security. These are far more comprehensive than Cyber Essentials, examining your policies, risk assessment processes, management commitment, and operational controls. ISO 27001 certification involves an initial Stage 1 documentation review, a Stage 2 on-site assessment, and ongoing annual surveillance audits.

SOC 2 audits are increasingly relevant for UK technology companies serving American clients or operating in global markets. SOC 2 evaluates your controls against five Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy. The audit is conducted by a qualified CPA firm and results in either a Type I (point-in-time) or Type II (period-of-time) report.

PCI DSS assessments apply to any organisation that processes, stores, or transmits payment card data. The scope and rigour of the assessment depends on your transaction volume and processing model, ranging from a self-assessment questionnaire for smaller merchants to a full on-site assessment by a Qualified Security Assessor for larger organisations.

Cyber Essentials Plus

UK Government scheme
Scope5 technical controls
Duration1–2 days
Typical Cost£1,500–£3,500
Validity12 months
Best ForSMEs, gov contracts

ISO 27001

International standard
ScopeFull ISMS
Duration3–12 months to prepare
Typical Cost£8,000–£30,000+
Validity3 years (annual surveillance)
Best ForEnterprise, regulated sectors

Phase 1: Scoping and Gap Analysis (8–12 Weeks Before)

The first phase of audit preparation is understanding where you stand today. A thorough gap analysis compares your current security posture against the audit framework you are targeting, identifying areas that need improvement and helping you prioritise your remediation efforts.

Define your audit scope carefully. For Cyber Essentials, the scope includes all devices, software, and network equipment that can access the internet or process data. For ISO 27001, you need to define which business processes, locations, and systems fall within your ISMS scope. Getting the scope right is critical — too broad and you create unnecessary work; too narrow and the auditor may question whether you have deliberately excluded problem areas.

Conduct an asset inventory. You cannot protect what you do not know about. Document every hardware device, software application, cloud service, and data repository within your audit scope. For each asset, record the owner, classification, location, and the security controls applied to it. Microsoft Intune and Azure Active Directory can help automate this for managed devices and cloud applications.

Perform a risk assessment. Every cybersecurity framework requires evidence of risk-based decision making. Your risk assessment should identify threats to your information assets, evaluate the likelihood and impact of each threat, and determine whether existing controls adequately mitigate the risk. The NCSC provides excellent risk management guidance tailored to UK organisations, and frameworks like NIST SP 800-30 offer structured methodologies.

Start With Quick Wins

During your gap analysis, categorise findings into quick wins (fixable in days), medium-term improvements (weeks), and strategic changes (months). Tackling quick wins first builds momentum and demonstrates progress to management. Common quick wins include enabling MFA on all cloud accounts, reviewing and removing unused user accounts, and updating password policies.

Phase 2: Documentation and Policy Review (6–8 Weeks Before)

Auditors love documentation. Whether you are facing a Cyber Essentials self-assessment or a full ISO 27001 audit, having well-structured, up-to-date documentation is essential. Many organisations have the right technical controls in place but fail audits because their documentation is incomplete, outdated, or inconsistent with actual practice.

At a minimum, you should have the following policies documented and approved by senior management:

DocumentCyber EssentialsISO 27001Key Content
Information Security PolicyRecommendedRequiredOverall security objectives, management commitment, scope
Acceptable Use PolicyRecommendedRequiredRules for using IT systems, internet, email, mobile devices
Access Control PolicyRequiredRequiredUser provisioning, least privilege, admin account management
Patch Management PolicyRequiredRequiredUpdate timelines, testing procedures, exception handling
Incident Response PlanRecommendedRequiredDetection, containment, eradication, recovery, lessons learned
Business Continuity PlanNot requiredRequiredRecovery objectives, backup procedures, disaster recovery
Risk Assessment ReportNot requiredRequiredThreat identification, risk evaluation, treatment decisions
Data Protection Impact AssessmentNot requiredRecommendedGDPR compliance for high-risk processing activities

Each document should include a version number, approval date, next review date, and the name of the responsible owner. Auditors will check that policies have been reviewed within the past 12 months and that staff have acknowledged them. Using a document management system or even a simple SharePoint library with version control makes this much easier to demonstrate.

Ensure policies match practice. The most common audit finding is a disconnect between what policies say and what actually happens. If your access control policy states that all users must have MFA enabled but 15% of your accounts do not, the auditor will flag this as a non-conformity. Before the audit, walk through each policy and verify that every statement reflects current practice. Where practice deviates from policy, either change the practice or update the policy (with proper justification).

Phase 3: Technical Remediation (4–6 Weeks Before)

With your gap analysis complete and documentation in order, it is time to address the technical findings. This is where most of the hands-on work happens, and it is critical to allow adequate time for implementation, testing, and verification.

Firewall and network security. Auditors will examine your firewall rules, looking for overly permissive configurations, unused rules, and default credentials. For Cyber Essentials, every device that connects to the internet must be protected by a properly configured firewall. Review your rules, remove any that allow unnecessary inbound or outbound traffic, and ensure that default administrative passwords have been changed on all network equipment.

Secure configuration. Ensure that all devices and software are configured securely, with unnecessary features disabled and default settings hardened. The Centre for Internet Security (CIS) publishes detailed benchmarks for hardening Windows, macOS, Linux, and common applications. Microsoft Intune's compliance policies can enforce secure configuration baselines across managed devices and report on any deviations.

User access control. Review all user accounts, removing any that belong to former employees or are no longer needed. Verify that administrative privileges are restricted to those who genuinely need them and that admin accounts are not used for day-to-day tasks. The principle of least privilege should be evident throughout your environment.

Malware protection. Ensure that anti-malware software is installed on all in-scope devices, that it is set to update automatically, and that real-time scanning is enabled. Microsoft Defender for Endpoint is the most common choice for UK businesses in the Microsoft ecosystem, providing both endpoint protection and advanced threat detection capabilities.

Patch management. All operating systems and applications should be running supported versions with the latest security patches applied. For Cyber Essentials, critical and high-severity patches must be applied within 14 days of release. Create a list of all software in your environment, verify that nothing has reached end of life, and address any outstanding patches.

Patch Management Failures62%
Access Control Issues54%
Missing Documentation48%
Firewall Misconfigurations35%
Inadequate Logging29%

Phase 4: Evidence Collection (2–4 Weeks Before)

Auditors work on evidence. Every claim you make about your security controls needs to be supported by verifiable proof. Start collecting evidence well before the audit to avoid a last-minute scramble that increases the risk of gaps and errors.

Screenshots and exports. Capture screenshots of key security configurations — firewall rules, MDM policies, conditional access policies, anti-malware settings, and patch management dashboards. Date-stamp everything and organise it by control area. For Microsoft 365 environments, the Security and Compliance Centre provides exportable reports on many key metrics.

Access review evidence. Export a list of all user accounts from Active Directory or Azure AD, highlighting which have administrative privileges. Include evidence of your most recent access review, showing that accounts have been checked and unnecessary access removed. Auditors will often randomly select accounts and ask you to justify their access level.

Training records. Maintain records of security awareness training completion for all staff. For ISO 27001, you need to demonstrate that training is regular, relevant, and that new starters receive induction training. Many UK businesses use platforms like KnowBe4, Proofpoint Security Awareness, or the NCSC's free Top Tips for Staff e-learning module.

Incident logs. Even if you have not experienced a significant security incident, auditors will want to see evidence that you have a process for recording and managing incidents. If you have experienced incidents, demonstrate that they were handled according to your incident response plan and that lessons learned were incorporated into your security improvements.

Evidence Organisation Matters

Create a structured evidence folder that maps directly to the audit framework you are targeting. For Cyber Essentials, organise evidence by the five control themes. For ISO 27001, map evidence to the Annex A controls. Auditors will be far more efficient — and favourably disposed — if they can easily find the evidence they need without asking you to hunt for it during the audit itself.

Phase 5: Pre-Audit Testing (1–2 Weeks Before)

In the final weeks before your audit, conduct your own internal testing to identify any remaining issues. This is your last chance to find and fix problems before the auditor does.

Vulnerability scanning. Run authenticated vulnerability scans across your entire in-scope environment using tools such as Tenable Nessus, Qualys, or Microsoft Defender Vulnerability Management. Focus on critical and high-severity vulnerabilities and remediate them before the audit. For Cyber Essentials Plus, the assessor will run their own external vulnerability scans, so ensure your internet-facing systems are clean.

Phishing simulation. If your audit includes assessment of user awareness (particularly for ISO 27001), run a phishing simulation to measure how your staff respond to social engineering attempts. This also provides evidence that you actively test and improve security awareness.

Mock audit walkthrough. Conduct an internal mock audit where someone plays the role of the external auditor. Walk through each control area, review the evidence, and identify any gaps. This is particularly valuable for staff who will be interviewed during the audit, giving them practice in articulating your security processes clearly and confidently.

Gap Analysis Complete100%
Documentation Updated100%
Technical Remediation95%
Evidence Collection90%
Pre-Audit Testing85%

During the Audit: What to Expect

On audit day, the auditor will typically begin with an opening meeting to confirm scope, schedule, and logistics. They will then work through the control areas methodically, requesting evidence, asking questions, and in the case of Cyber Essentials Plus, conducting hands-on technical tests.

Be honest and transparent. If the auditor identifies something you know is a weakness, acknowledge it and explain what you are doing to address it. Trying to hide or minimise issues is counterproductive and damages trust. Auditors generally respond well to organisations that demonstrate self-awareness and a commitment to continuous improvement.

Designate a single point of contact. Appoint someone to coordinate the audit, manage evidence requests, and ensure the auditor has everything they need. This person should have detailed knowledge of your security controls and the authority to make decisions if questions arise about scope or access.

Keep detailed notes. Record all findings, observations, and recommendations as the auditor shares them. These notes will be invaluable when you receive the formal audit report and need to plan remediation activities.

After the Audit: Handling Findings

Most audits result in some findings, ranging from minor observations to major non-conformities. How you respond to these findings demonstrates your organisation's commitment to security and can influence the auditor's overall assessment.

Major non-conformities indicate a significant failure to meet the audit standard's requirements. For ISO 27001, these must be resolved before certification can be granted. For Cyber Essentials Plus, they result in a failure that requires re-testing once issues are addressed.

Minor non-conformities are less serious issues that do not fundamentally undermine your security posture but still need attention. For ISO 27001, you typically have a defined period (usually 90 days) to address these and provide evidence of remediation to the certification body.

Observations and opportunities for improvement are suggestions from the auditor that are not formal findings but represent areas where your security could be strengthened. These are valuable input for your continuous improvement programme.

Create a formal remediation plan for all findings, assigning owners, deadlines, and resources to each item. Track progress regularly and ensure that remediation evidence is properly documented for the auditor's review.

Maintaining Audit Readiness Year-Round

The most effective approach to cybersecurity audits is to maintain audit readiness continuously rather than scrambling to prepare each time an audit approaches. This requires embedding security practices into your daily operations rather than treating them as periodic compliance exercises.

Regular internal audits should be conducted at least quarterly, covering a rotation of control areas. These do not need to be as formal as external audits but should follow a structured methodology and result in documented findings and remediation actions.

Continuous monitoring through tools like Microsoft Secure Score, Defender for Cloud, and Intune compliance dashboards provides real-time visibility into your security posture. Set up alerts for compliance drift so you can address issues as they arise rather than discovering them during audit preparation.

Management review meetings should be held at least annually (quarterly is better) to review security performance, risk assessment updates, incident trends, and audit findings. For ISO 27001, formal management reviews are a mandatory requirement and auditors will examine the minutes and outcomes.

NCSC Resources

The National Cyber Security Centre provides extensive free resources to help UK organisations prepare for cybersecurity audits. Their Cyber Assessment Framework (CAF) is particularly useful for organisations in essential services sectors, while their Small Business Guide and Board Toolkit provide accessible guidance for SMEs and senior leadership respectively.

Common Audit Preparation Mistakes

Starting too late. The most common and most damaging mistake is leaving preparation until the last few weeks. Meaningful security improvements take time to implement, test, and bed in. For Cyber Essentials Plus, allow a minimum of 8 weeks; for ISO 27001, plan for 6–12 months of preparation.

Treating it as an IT-only exercise. Cybersecurity audits require input and commitment from across the organisation, not just the IT department. HR needs to provide training records, finance needs to approve budgets, and senior management needs to demonstrate leadership commitment. Make sure all stakeholders understand their role well before the audit.

Over-scoping. Including systems and processes that do not need to be in scope creates unnecessary work and increases the risk of findings. Be strategic about your scope, particularly for ISO 27001 where the scope statement is a critical foundation document.

Ignoring third-party risks. Auditors will ask about your supply chain security. If you rely on third-party IT providers, cloud services, or managed security services, you need to demonstrate that you have assessed their security posture and included appropriate contractual requirements. Request and review SOC 2 reports, ISO 27001 certificates, or Cyber Essentials certifications from key suppliers.

Focusing on technology over process. While technical controls are important, auditors also assess your processes, procedures, and people. A well-documented process that is consistently followed will often score better than a technically sophisticated control that is poorly managed or inconsistently applied.

Need Help Preparing for Your Cybersecurity Audit?

Cloudswitched has helped dozens of UK businesses achieve Cyber Essentials, Cyber Essentials Plus, and ISO 27001 certification. Our team provides gap analysis, remediation support, documentation preparation, and pre-audit testing to ensure you pass first time.

GET IN TOUCH
Tags:SecurityCybersecurity AuditCompliance
CloudSwitched
CloudSwitched

Centrally located in London, Shoreditch, we offer a range of IT services and solutions to small/medium sized companies.