Icon

Start your compliance journey with us—explore workflows tailored for you!

Icon

December 17, 2025

ISO 27001 Questionnaire Guide: Your Step-by-Step Guide (2026)

This article explains ISO 27001 Questionnaire Guide in plain language. You’ll learn what it means, why it matters, the exact steps to do it, and get checklists, examples, and templates to move fast wi.

Most large buyers now ask for proof that vendors manage information properly. Deals stall when teams are unable to show how they control access, safeguard patient data or handle user information across the supply chain. As someone who has built and operated programmes under ISO 27001, SOC 2, HIPAA and GDPR for 25 years, I see that successful assurance starts with clear processes rather than checklists. This article presents a hands-on ISO 27001 Questionnaire Guide that helps busy teams map requirements, collect evidence and stay audit‑ready. By the end, you will have a repeatable method, sample questions and a template you can use right away to support enterprise deals and healthcare obligations.

Why use an ISO 27001 questionnaire

Enterprise clients evaluate vendors on confidentiality, integrity and availability. A structured questionnaire gives them confidence that your organisation understands risks and has the right controls. According to the 2025 IBM Cost of a Data Breach report, the average breach cost dropped 9 % to USD 4.44 million, partly because organisations improved detection and response. However, phishing remains the most common initial attack vector and costs roughly USD 4.8 million per breach. In healthcare, breaches average USD 7.42 million and take nine months to contain. Third‑party breaches cost USD 4.91 million, and incidents involving multiple environments average USD 5.05 million. These figures underline why understanding your posture before an auditor or buyer evaluates you saves money and builds trust.

Using a questionnaire offers several benefits:

  • Clarifies your security posture – You can confirm whether confidentiality, integrity and availability are addressed across your people, processes and technology before a formal audit.

  • Streamlines risk management – A single questionnaire allows you to assess technical, administrative and vendor‑related risks consistently. You can reference the NIST Risk Management Framework’s seven‑step process for context; it offers a repeatable way to manage information security and privacy risk.

  • Produces evidence for audits and client due diligence – The responses, attachments and comments provide a record that can be shared with auditors, procurement teams or regulators.

  • Supports business continuity and incident response – Questions about backups, disaster recovery and incident handling ensure you are prepared when systems fail or ransomware hits.

  • Maintains internal controls and training – Documenting policy development, access reviews and awareness programmes helps you sustain an information security management system (ISMS) over time.
Why use an ISO 27001 questionnaire

Understanding ISO 27001 basics

ISO 27001 sets requirements for establishing, operating and continually improving an ISMS. An ISMS encompasses three pillars: people, process and technology. It defines how you identify risks, implement controls, monitor results and update the programme. Enterprise clients care about all three pillars because a weakness in any of them can expose their data. For example, a strong firewall does little good if staff can share passwords, or if an outdated incident response playbook sits unused.

At the heart of information security is the “CIA” triad: Confidentiality, Integrity and Availability. Confidentiality protects sensitive data from unauthorized disclosure. Integrity ensures information remains accurate and unaltered. Availability guarantees that systems and data are accessible when needed. Buyers expect vendors to maintain all three, not just encryption or uptime, because each supports trust.

Recent updates – ISO 27001:2022 and the new Annex A structure

ISO 27001:2022 was released on 25 October 2022, and ISO 27002:2022 followed on 15 February 2022. Organisations seeking certification after April 2024 must use the 2022 version; those certified under the 2013 version must transition by 31 October 2025. The biggest change is the reduction of controls from 114 to 93. Secureframe explains that 57 controls were merged into 24, 11 new controls were added, one was split and 58 remained mostly unchanged. The new Annex A divides controls into four categories: Organisational (37 controls), People (8 controls), Physical (14 controls) and Technological (34 controls). This thematic structure replaces the previous 14 domains, making it easier to map responsibilities across teams.

The update introduces 11 new controls such as Threat intelligence (A.5.7), Information security for cloud services (A.5.23), ICT readiness for business continuity (A.5.30), Physical security monitoring (A.7.4) and Secure coding (A.8.28). When building your questionnaire, ensure you address these new areas, particularly if you use cloud services or develop software. Moreover, the revised standard emphasises attributes such as preventive/detective/corrective control types and information security properties (confidentiality, integrity, availability).

Cross‑framework context – SOC 2, HIPAA and other requirements

Many enterprise buyers ask for SOC 2 reports, which evaluate controls relevant to security, availability, processing integrity, confidentiality and privacy. The AICPA publishes SOC 2 and requires a third‑party audit. HIPAA and GDPR introduce further obligations for handling protected health information and personal data. While ISO 27001 focuses on an ISMS, these frameworks share core principles: risk assessments, control implementation, evidence collection and continuous monitoring. Building a questionnaire around ISO 27001 helps you address overlapping requirements once, reducing duplication when your team pursues SOC 2, HIPAA or GDPR attestations.

Key security domains to include in your questionnaire

The ISO 27001 Questionnaire Guide outlines important domains that help you map controls.

An effective ISO 27001 Questionnaire Guide should cover multiple control areas. Based on the updated structure and cross‑framework practices, ensure your questions touch on these topics:

  • Security controls & internal controls – policies, procedures and record keeping to support consistent operations.

  • Access control & encryption – who has access to systems, how credentials are managed and whether sensitive data is encrypted at rest and in transit.

  • Incident response & business continuity – plans for detecting, responding to and recovering from incidents; how often they are tested.

  • Vendor management & third‑party risk – inventory of vendors, contractual requirements for security, frequency of assessments and evidence review.

  • Training & awareness – employee education on policies, incident reporting and compliance obligations.

  • Document control & policy development – versioning, approval processes and retention schedules for policies, procedures and records.

  • Risk assessment & treatment – methodology, frequency and results of identifying, analysing and mitigating risks.

  • Auditing & compliance – internal audit schedules, management review, tracking of non‑conformities and corrective actions.

Steps to create your ISO 27001 questionnaire

The following step‑by‑step process reflects the way my team at Konfirmity conducts readiness assessments for enterprises and healthcare providers. We have supported more than 6,000 audits and draw on over 25 years of combined expertise, so these steps are grounded in practice rather than theory.

Steps to create your ISO 27001 questionnaire

Step 1 – Assemble your team and define scope

Start by forming a cross‑functional team. At minimum include an executive sponsor (CTO, CISO or VP Engineering), IT leads, operations managers, legal or compliance counsel, vendor management and HR. Identify all systems, processes, departments and third‑party relationships that handle sensitive data. Define physical locations and cloud services in scope. Enterprise buyers often ask to see not only production systems but also development, staging and backup environments. Document your scope early; a narrow scope can miss critical assets and lead to audit findings.

Step 2 – Map ISO 27001 clauses and Annex A controls to questionnaire sections

Use Clauses 4–10 to structure questions about the ISMS. Clause 4 covers context and the scope of the ISMS, Clause 5 addresses leadership and policy, Clause 6 deals with planning and risk assessment, Clause 7 covers support (resources, awareness, communication), Clause 8 focuses on operation, Clause 9 on performance evaluation and Clause 10 on improvement. Map each clause to a section in your questionnaire. Then map the 93 controls from Annex A to technical and operational domains such as access control, cryptography, physical security, supplier management and business continuity. The four categories (organisational, people, physical, technological) can help allocate ownership among departments.

Step 3 – Draft questions by domain

For each control area, create questions that capture both status and evidence. Use a mix of yes/no, multiple choice, rating scales (e.g., fully implemented / partially implemented / not implemented) and free‑text fields for comments. Below is a sample set covering critical areas:

Domain / Control Area Sample Questions / Prompts
Context & Scope Have you identified all relevant business units, systems and vendors within the scope of the ISMS? Is this scope documented and approved by leadership?
Leadership & Policy Is an information security policy established and approved by top management? Does the policy define responsibilities and match business objectives?
Risk Management Do you use a documented risk assessment methodology? Have recent risks affecting confidentiality, integrity and availability been identified and recorded?
Access Control & Encryption Are user access rights reviewed at least quarterly? Is encryption applied to sensitive data at rest and in transit?
Internal Controls & Document Control Are policies, procedures and records versioned and accessible? Is there a defined retention period for each record type?
Incident Response & Business Continuity Do you have an incident response plan? Is there a business continuity or disaster recovery plan that is tested and updated regularly?
Vendor Management Do you maintain a list of third-party vendors? Are security requirements defined in contracts, and are there regular assessments or audits for them?
Training & Awareness Are employees trained on security policies, controls, incident response and compliance responsibilities?
Auditing & Assessment Is there a schedule for internal audits? Are records of audits maintained? Are non-conformities tracked and remediated?
Compliance & Review Is there a management review process? Are security objectives defined, tracked and measured?

For vendor management, include questions about business associate agreements for HIPAA or data processing addenda for GDPR. For healthcare clients, ask whether technical safeguards meet the HIPAA Security Rule and whether audit logs are maintained.

Step 4 – Build your questionnaire template

Create a spreadsheet or document with columns that support data collection and analysis. A typical layout includes:

  • Question ID – unique identifier for each question.

  • Domain – the control area (e.g., risk management, access control).

  • Question text – the prompt itself.

  • Response – options such as Yes/No/Not Applicable, multiple choice or rating scale.

  • Evidence – link to documents, screenshots or system outputs that support the response.

  • Comments – space for context, clarifications or remediation plans.

  • Responsible person – the team member accountable for the response.

  • Due date – when the question must be answered or remediated.

You may also add fields for likelihood and impact if you want to integrate risk scoring. Use conditional formatting to flag high‑risk areas or overdue responses. Keep the template simple so busy teams can complete it without extensive training.

Step 5 – Run the questionnaire and collect responses

Distribute the questionnaire across the organisation. For large enterprises, schedule interviews with system owners and process leads. For smaller teams, a self‑assessment with evidence upload may suffice. Provide clear instructions on how to answer each question and what evidence to attach. Remind participants that incomplete or inaccurate answers slow down audits and procurement. Use a central repository or GRC tool to collect documentation. Consider using our managed service to automate evidence collection from systems (e.g., retrieving access logs or backup reports) and reduce manual work.

Step 6 – Analyse results and identify gaps

Once responses are collected, compare them against the ISO 27001 requirements and Annex A controls. Identify missing or partially implemented controls. Prioritise findings based on risk — confidentiality, integrity and availability — and business impact. For example, if encryption at rest is missing for a database containing patient data, assign a high priority because healthcare breaches cost more and take longer to resolve. Document gaps in a report that lists the issue, affected system, risk rating, recommended remediation, responsible team and target date.

Step 7 – Plan and implement remediation

With gaps identified, develop a remediation plan. This may involve writing or updating policies, implementing technical controls (e.g., enabling multi‑factor authentication), updating vendor contracts, performing employee training, or improving incident response procedures. Assign clear ownership and timelines. For third‑party vendors, include them in the remediation plan by requesting evidence of their own controls. Maintain version control on documents and track changes. At Konfirmity, we often build Terraform modules for business continuity or implement identity provider integrations on behalf of clients; our managed approach reduces internal effort to about 75 hours per year versus 650 hours with typical self‑service tools.

Step 8 – Conduct internal audit and continuous monitoring

After remediation, perform an internal audit to validate controls. Review policies, inspect system configurations, test incident response plans and verify that evidence supports the stated controls. Track non‑conformities and assign corrective actions. Maintain a cycle of assessment → remediation → audit → review → improvement. This is consistent with Clauses 9 and 10 of ISO 27001 and ensures that the ISMS adapts as your organisation grows or regulations change. Continuous monitoring tools can automate checks like access reviews, vulnerability scanning and logging. However, tools alone do not guarantee security; human oversight is needed to interpret results and drive action.

Sample questionnaire and template

This sample in the ISO 27001 Questionnaire Guide demonstrates how to collect structured responses.

Below is a condensed example of a questionnaire covering 15 questions. Each question is consistent with a control area, includes a proposed response scale and suggests evidence to attach. Use this as a starting point and expand based on your scope.

Question ID Domain Question Response Options Evidence Suggestion
Q1 Context & Scope Have all systems, vendors and locations handling sensitive data been identified and documented? Yes / Partially / No Scope document, asset inventory
Q2 Leadership & Policy Is there an information security policy approved by the CEO or equivalent? Yes / Partially / No Signed policy document
Q3 Leadership & Policy Does the policy assign responsibilities for security across departments? Yes / Partially / No RACI matrix
Q4 Risk Management Do you have a formal risk assessment methodology? Yes / Partially / No Methodology document
Q5 Risk Management Were risks assessed in the last 12 months? Yes / Partially / No Latest risk register
Q6 Access Control Are user access rights reviewed at least quarterly? Yes / Partially / No Access review logs
Q7 Access Control Is multi-factor authentication enabled for privileged accounts? Yes / Partially / No System configuration screenshots
Q8 Encryption Is sensitive data encrypted at rest and in transit? Yes / Partially / No Encryption policy, system settings
Q9 Incident Response Do you maintain an incident response plan that covers detection, communication and recovery? Yes / Partially / No Incident response plan, test reports
Q10 Business Continuity Do you test backup and restoration procedures? Yes / Partially / No Backup logs, restoration test results
Q11 Vendor Management Is there an inventory of third-party vendors with assigned risk levels? Yes / Partially / No Vendor list, risk assessments
Q12 Vendor Management Are security requirements included in vendor contracts? Yes / Partially / No Contract templates
Q13 Training & Awareness Are employees trained on security policies and incident reporting annually? Yes / Partially / No Training records
Q14 Document Control Are policies and procedures versions-controlled and stored securely? Yes / Partially / No Document management tool screenshot
Q15 Audit & Improvement Is there a schedule for internal audits and management review? Yes / Partially / No Audit calendar, meeting minutes

When using a rating scale, define what each tier means. For instance, a “Yes” could mean the control is fully implemented and evidenced, “Partially” may mean implementation has started but gaps exist, and “No” means no implementation. Encourage respondents to provide context in the comments field.

Common mistakes and how to avoid them

The ISO 27001 Questionnaire Guide also highlights common mistakes and how to avoid them.

  1. Narrow scope – Failing to include critical systems or third parties often leads to audit findings. Avoid this by conducting a thorough asset inventory and involving process owners early.

  2. Lack of stakeholder buy‑in – Questionnaires created by a single department may not capture operational realities. Include IT, operations, vendor management and leadership when drafting questions.

  3. Superficial answers – Yes/No answers without evidence or context are useless. Ask for documents, screenshots and logs to support claims.

  4. Poor documentation practices – Without version control and retention schedules, teams lose track of policies and evidence. Use a document management system and assign ownership.

  5. One‑time approach – Compliance is continuous. Treat the questionnaire as a living document that changes with your business, technology and regulatory environment.

  6. Ignoring vendor risk – Many breaches involve third parties. Include vendor assessments and demand comparable controls from your suppliers.

Tips for busy teams

Tips for busy teams
  • Start with critical systems and vendors – You don’t have to cover every process at first. Focus on services that handle customer data, financial records or regulated information, then expand the scope.

  • Use a shared spreadsheet or light tool – Avoid complex software when starting. A simple spreadsheet with comments and evidence links works well.

  • Assign clear owners – Each question or domain should have a responsible person. This distributes workload and reduces bottlenecks.

  • Combine self‑assessment with evidence upload – Ask respondents to provide proof (policy documents, logs, screenshots) alongside their answers. This reduces follow‑up questions during audits.

  • Keep the document alive – Update questions, controls and evidence requirements when you add new vendors, implement new systems or expand to new geographies.

  • Automate where possible – Use tools for access reviews, vulnerability scanning and log collection, but pair them with human oversight. Our managed service reduces internal effort by automating evidence capture while our team interprets results.

How this questionnaire supports vendor management, client trust and sales

For companies selling to enterprise clients, a strong questionnaire does more than tick compliance boxes. It demonstrates that you manage risk across the supply chain, keep clear records and are ready for an audit at any time. Vendors with mature programmes reduce breach costs and containment times, an important differentiator in negotiations. A structured questionnaire helps you:

  • Show buyers you take security seriously – Detailed answers and supporting evidence signal maturity. Many procurement teams insist on reviewing such documents before signing a contract.

  • Streamline due diligence – When you have an up‑to‑date questionnaire and supporting documentation, you can respond quickly to security addenda, business associate agreements and data processing agreements.

  • Reduce risk in third‑party relationships – By holding your vendors to the same standard, you lower the chance that a supply chain breach disrupts your service.

  • Accelerate sales cycles – Enterprise buyers move faster when they can verify your controls rather than waiting for ad‑hoc answers.

  • Support continuous compliance – A questionnaire structured according to ISO 27001:2022 ensures your ISMS remains effective and ready for surveillance audits.

Conclusion

Security that looks good on paper but fails in practice is a liability. A well‑designed ISO 27001 Questionnaire Guide gives you visibility into your organisation’s controls, reduces the cost of breaches and builds trust with buyers and regulators. By mapping the latest ISO 27001 requirements to your processes, drafting clear questions, collecting evidence and iterating through assessment and remediation, you create a living programme that scales with your business. Whether you’re preparing for a first certification or maintaining compliance across multiple frameworks, start small, engage your team and use the sample template provided here. With a human‑led, managed approach, you can focus on building your product while we handle security and compliance.

Frequently asked questions

1) What is a gap analysis questionnaire and why is it important? 

A gap analysis questionnaire compares your current controls to the requirements of ISO 27001:2022. It helps you identify areas where your ISMS does not meet the standard and guides remediation. Without a structured gap analysis, teams may overlook critical weaknesses and face delays during certification or procurement.

2) Do we need a questionnaire if we’re already certified? 

Yes. Certification is not a one‑time event. Surveillance audits and buyer due diligence require up‑to‑date evidence. A questionnaire helps you monitor changes, document improvements and prepare for periodic audits.

3) How often should we update and run the questionnaire? 

At a minimum, run it annually or when major changes occur: new products, acquisitions, significant system upgrades or new regulatory requirements. Many organisations run a lighter quarterly version focusing on high‑risk areas.

4) How detailed should answers be? 

Avoid simple Yes/No responses. Provide supporting evidence (policies, logs, screenshots) and contextual comments. Where controls are partially implemented, describe remaining tasks and target completion dates.

5) How do we handle third‑party vendors? 

Include vendor management questions in your questionnaire and require vendors to complete similar assessments. Review their SOC 2 reports, ISO 27001 certifications or HIPAA attestations. For high‑risk vendors, conduct onsite visits or independent audits.

6) Can small teams do this without hiring external consultants? 

Yes. Small teams can start with a concise questionnaire and gradually add depth. However, many find that partnering with a managed service like Konfirmity reduces internal workload and provides expertise in control implementation, evidence collection and audit support.

7) What evidence should we collect and maintain? 

Collect policies, procedures, risk registers, access logs, configuration files, incident reports, training records and vendor assessments. Store them in a secure repository with version control. Evidence should demonstrate that controls exist, are operating and are reviewed.

8) How does the questionnaire tie into internal audit and external certification? 

Internal audit uses the questionnaire responses and evidence to verify control design and operation. External auditors review the same evidence during certification. Maintaining a complete questionnaire reduces prep work for audits and increases the likelihood of a clean report.

Amit Gupta
Founder & CEO

Opt for Security with compliance as a bonus

Too often, security looks good on paper but fails where it matters. We help you implement controls that actually protect your organization, not just impress auditors

Request a demo

Cta Image