<section title="4.3. Conducting Audits"><subsection title="Objective"><paragraph
    title="4.3.1."


><![CDATA[<p>The effectiveness of information security measures for systems is periodically reviewed and validated.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="4.3.2."


><![CDATA[<p>This section covers information on the process of undertaking a certification and accreditation audit.</p>]]></paragraph>
</block>
<block title="Audit objectives, scope and criteria"><paragraph
    title="4.3.3."


><![CDATA[<p>The aim of an audit is to review and assess:</p><ul>
<li>the risk identification and assessment;</li>
<li>design and complexity (including the system and security architectures);</li>
<li>any available assurance reports on support or outsourced services;</li>
<li>controls selection;</li>
<li>actual implementation and effectiveness of controls for a system; and</li>
<li>supporting information security documentation.</li>
</ul>]]></paragraph>
<paragraph
    title="4.3.4."


><![CDATA[<p class="NormS4C3">Only information that is verifiable should be accepted as audit evidence.  Audit evidence should be recorded.</p>]]></paragraph>
</block>
<block title="Audit outcome"><paragraph
    title="4.3.5."


><![CDATA[<p>The outcome of an audit is a report of compliance and control effectiveness for the certification authority outlining areas of non-compliance for a system and any suggested remediation actions.</p>]]></paragraph>
<paragraph
    title="4.3.6."


><![CDATA[<p class="NormS4C3">Part of this audit is an assessment of whether the control systems adequately identify and address risk and information security requirements.</p>]]></paragraph>
</block>
<block title="Who can assist with an audit"><paragraph
    title="4.3.7."


><![CDATA[<p>A number of other agencies and personnel within agencies are often consulted during an audit. Agencies or personnel that can be consulted on physical security aspects of information security may include:</p>
<ul>
<li>The <a title="Protective Security Requirements - Physical Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/physical-security" target="_blank">NZSIS for Physical Security</a>;</li>
<li>GCSB for TOP SECRET sites and Sensitive Compartmented Information Facilities (SCIFs);</li>
<li><a title="MFAT" rel="noopener noreferrer" href="https://www.mfat.govt.nz/" target="_blank">MFAT</a> for systems located at overseas posts and missions;</li>
<li>The Chief Security Officer (CSO) may be consulted on personnel and physical security aspects of information security;</li>
<li>The CISO, ITSM or communications security officer may be consulted on COMSEC aspects of information security; and</li>
<li>The ITSM and System Owner on aspects of secure system design configuration and operation.</li>
</ul>]]></paragraph>
</block>
<block title="Independent audits"><paragraph
    title="4.3.8."


><![CDATA[<p>An audit may be conducted by agency auditors or an independent security organisation.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Audit Evidence"><paragraph
    title="4.3.9"


><![CDATA[<p>Audit evidence can be obtained from documentation described in <a title="Information security documentation" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12682">Chapter 5 – Information Security Documentation</a>.&nbsp;</p><p>Other sources may include:</p><table class="table-main" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td class="table-cell-blue" colspan="2" valign="top">
<p class="NormS4C3">Source</p>
</td>
</tr>
<tr>
<td width="227" valign="top">
<p>Agency Strategies and Statements of Intent.</p>
</td>
<td width="410" valign="top">
<p>Any&nbsp;additional process documentation referenced in the documentation described in&nbsp;the NZISM Chapter 5.</p>
</td>
</tr>
<tr>
<td width="227" valign="top">
<p>Third party service provider agreements.</p>
</td>
<td width="410" valign="top">
<p>Independent&nbsp;risk assessments or security evaluations, such as penetration tests by an&nbsp;internal team or an external organization.</p>
</td>
</tr>
<tr>
<td width="227" valign="top">
<p>The agency risk identification and assessment &nbsp; process.</p>
</td>
<td width="410" valign="top">
<p>Any&nbsp;internal audit reports, assessments and reviews.</p>
</td>
</tr>
<tr>
<td width="227" valign="top">
<p>Any statements of applicability.</p>
</td>
<td width="410" valign="top">
<p>Any&nbsp;relevant incident reports.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 <block title="Audit evidence reliability"><paragraph
    title="4.3.10."


><![CDATA[<p class="NormS4C3">The reliability of audit evidence is influenced by its source, nature and the circumstances under which the evidence is gathered.  In general terms documentary evidence is more reliable than oral evidence, self-generated evidence less reliable than evidence gathered elsewhere and externally generated evidence is more reliable than internally generated evidence as internally generated evidence may be more susceptible to selective presentation. </p>]]></paragraph>
<paragraph
    title="4.3.11."


><![CDATA[<p class="NormS4C3">Confirmation should be obtained that:</p><ul>
<li>Risk owners have been identified; and</li>
<li>Each risk owner has sufficient accountability and authority to manage their identified risks.</li>
</ul>]]></paragraph>
<paragraph
    title="4.3.12."


><![CDATA[<p class="NormS4C3">Audit evidence can be gathered through the following methods in order of preference:</p><table class="table-main" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td width="102" valign="top">
<p align="center">Method</p>
</td>
<td width="514" valign="top">
<p align="center">Description</p>
</td>
</tr>
<tr>
<td width="102" valign="top">
<p>Inspection</p>
</td>
<td width="514" valign="top">
<p>Physical&nbsp;inspections can provide an independent confirmation of the physical condition&nbsp;of the site or systems, its implementation and its management.</p>
</td>
</tr>
<tr>
<td width="102" valign="top">
<p>Analytical review</p>
</td>
<td width="514" valign="top">
<p>Reviews&nbsp;of records and documents will provide evidence of varying degrees of&nbsp;reliability depending on their nature and source.&nbsp; A review of the risk identification and&nbsp;selection of risk treatments is invaluable.</p>
</td>
</tr>
<tr>
<td width="102" valign="top">
<p>Enquiry</p>
</td>
<td width="514" valign="top">
<p>Here&nbsp;audit evidence is gathered by interview.&nbsp;&nbsp;Enquiries can be formal or informal and oral or written.&nbsp; It is essential that the auditor creates a&nbsp;written record of any enquiries conducted.</p>
</td>
</tr>
<tr>
<td width="102" valign="top">
<p>Observation</p>
</td>
<td width="514" valign="top">
<p>Observation&nbsp;of operations or procedures being performed by others with the aim of&nbsp;determining the manner of its performance only at that particular time.&nbsp; This may include checks on system&nbsp;configurations, change management processes or other key elements.</p>
</td>
</tr>
<tr>
<td width="102" valign="top">
<p>Computations</p>
</td>
<td width="514" valign="top">
<p>Rarely&nbsp;used for non-financial records but may include, for example, asset registers&nbsp;and validation of holdings of accountable equipment and software.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Audit evidence sufficiency"><paragraph
    title="4.3.13."


><![CDATA[<p class="NormS4C3">The Sufficiency is the measure of the quality (not the quantity) of audit evidence.  It is important, however, that a balance is struck between the extent of the audit, the nature of the system under review, agency risk and the cost, effort and benefit of the audit.  Sufficient evidence should be obtained to allow the auditor to be able to draw reasonable conclusions on which to base the audit opinion.  For evidence to be deemed sufficient, the following aspects should be considered:</p><ul>
<li>Materiality.  Materiality is the threshold where any distorted, missing and incorrect information is likely to have an impact on the risk and security of a system.  Where it becomes clear that there are material deficiencies in the evidence presented more substantive tests may be required or the audit suspended until corrective action has been taken by the agency.</li>
<li>Risk assessment: It is almost impossible to validate every risk identification and selection of risk treatments.  For larger systems a more practical approach may be to validate the identification and treatment of major risks and use sampling techniques for the balance.</li>
<li>Economy: Before gathering or requesting additional audit evidence, it is important to consider whether or not it is feasible or cost-effective to generate this evidence against the benefits, assessed value and time required.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="4.3.14."


><![CDATA[<p class="NormS4C3">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>&nbsp;Title</strong></td>
<td><strong>&nbsp;Publisher</strong></td>
<td><strong>&nbsp;Source</strong></td>
</tr>
<tr>
<td>
<p><strong><strong>AS/NZ ISO 19011:2019&nbsp;</strong></strong></p>
</td>
<td>
<p><strong><strong>Guidelines for auditing management systems</strong></strong></p>
</td>
<td style="text-align: center;">
<p>Standards NZ</p>
</td>
<td>&nbsp;<a title="Standards NZ" rel="noopener noreferrer" href="https://standards.govt.nz/" target="_blank">https://standards.govt.nz/</a></td>
</tr>
<tr>
<td>
<p><strong><strong>ISO 19011:2018</strong></strong></p>
</td>
<td>
<p><strong>Guidelines for auditing management systems</strong></p>
</td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>&nbsp;<a title="ISO 19011:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/70017.html" target="_blank">https://www.iso.org/standard/70017.html</a></td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 27000:2018&nbsp;</strong></strong></p>
</td>
<td>
<p><strong>Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary</strong></p>
</td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>
<p>&nbsp;<a title="ISO/IEC 27000:2018" rel="noopener noreferrer" href="https://www.iso.org/standard/73906.html" target="_blank">https://www.iso.org/standard/73906.html</a></p>
</td>
</tr>
<tr>
<td>
<p><strong><strong>ISO/IEC 27001:2013&nbsp;</strong></strong></p>
</td>
<td>
<p><strong>Information technology -- Security techniques -- Information security management systems -- Requirements</strong></p>
</td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>&nbsp;<a title="ISO/IEC 27001:2013" rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">https://www.iso.org/standard/54534.html</a></td>
</tr>
<tr>
<td><strong><strong>ISO/IEC 27002:2022</strong></strong></td>
<td>
<p class="no-uppercase"><strong>Information security, cybersecurity and privacy protection — Information security controls</strong></p>
</td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>
<p>&nbsp;<a title="ISO/IEC 27002:2022" rel="noopener noreferrer" href="https://www.iso.org/standard/75652.html" target="_blank">https://www.iso.org/standard/75652.html</a></p>
</td>
</tr>
<tr>
<td><strong><strong>ISO/IEC 27006:2015</strong></strong></td>
<td><strong>Information Technology – Security Techniques- Requirements for bodies providing audit and certification of information security management systems</strong></td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>&nbsp;<a title="ISO/IEC 27006:2015" rel="noopener noreferrer" href="https://www.iso.org/standard/62313.html" target="_blank">https://www.iso.org/standard/62313.html</a></td>
</tr>
<tr>
<td><strong><strong>ISO/IEC 27007:2020&nbsp;</strong></strong></td>
<td><strong>Information Technology – Security Techniques - Guidelines for information security management systems auditing</strong></td>
<td style="text-align: center;">&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">ISO</span></td>
<td>&nbsp;<a title="ISO/IEC 27007:2020" rel="noopener noreferrer" href="https://www.iso.org/standard/77802.html" target="_blank">https://www.iso.org/standard/77802.html</a></td>
</tr>
<tr>
<td><strong><strong>International Standard On Auditing (New Zealand) 500&nbsp;</strong></strong></td>
<td><strong>Audit Evidence</strong></td>
<td style="text-align: center;">
<p>&nbsp;<span style="font-family: &#039;Open Sans&#039;,&#039;sans-serif&#039;; font-size: 10pt; mso-fareast-font-family: &#039;Times New Roman&#039;; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-ansi-language: EN-NZ; mso-fareast-language: EN-AU; mso-bidi-language: AR-SA;">External Reporting Board, NZ Audit and Assurance&nbsp;Standards Board</span></p>
</td>
<td><a title="International Standard On Auditing (New Zealand) 500&nbsp;" rel="noopener noreferrer" href="https://www.xrb.govt.nz/standards/assurance-standards/auditing-standards/isa-nz-500/" target="_blank">https://xrb.govt.nz/standards-for-assurance-practitioners/auditing-standards/isa-nz-500/</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="4.3.15."


><![CDATA[<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td>
<p>GOV3, GOV8, INFOSEC1, INFOSEC2, INFOSEC3 and INFOSEC4</p>
</td>
<td>
<p><a title="PSR requirements" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><a title="PSR" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank"></a></p>
<p><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>PSR content protocols</strong></p>
</td>
<td>
<p>Management protocol for information security</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/guidance/information-security/management-protocol" target="_blank">Management protocol for information security | Protective Security Requirements</a><a rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/management-protocol-2/" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>
<p><strong>PSR requirements sections</strong></p>
</td>
<td>
<p>Self assessment &amp; reporting</p>
</td>
<td>
<p><a href="https://www.protectivesecurity.govt.nz/about/self-assessment-and-reporting">Self-assessment and reporting | Protective Security Requirements</a><a title="Self assessment and reporting" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/self-assessment-and-reporting/" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>
<p><strong>Managing specific scenarios</strong></p>
</td>
<td><a href="https://www.protectivesecurity.govt.nz/guidance/information-security/managing-specific-scenarios">Managing specific scenarios | Protective Security Requirements</a></td>
<td><a rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/guidance/information-security/managing-specific-scenarios" target="_blank">Transacting online with the public</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Independence of auditors"><paragraph
    title="4.3.16.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>As there can be a perceived conflict of interest in the system owner assessing the security of their own system it is important that the auditor is demonstrably independent. This does not preclude an appropriately qualified system owner from assessing the security of a system that they are not responsible for.</p>]]></paragraph>
<paragraph
    title="4.3.16.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="562"
><![CDATA[<p>Agencies SHOULD ensure that auditors conducting audits are able to demonstrate independence and are not also the system owner or certification authority.</p>]]></paragraph>
</block>
<block title="Audit preparation"><paragraph
    title="4.3.17.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Ensuring that the system owner has approved the system architecture and associated information security documentation will assist auditors in determining the scope of work for the first stage of the audit.</p>]]></paragraph>
<paragraph
    title="4.3.17.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="565"
><![CDATA[<p>Prior to undertaking the audit the system owner MUST approve the system architecture and associated information security documentation.</p>]]></paragraph>
</block>
<block title="Audit (first stage)"><paragraph
    title="4.3.18.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p class="Normal-nonumbering"><span>Auditing against the risk assessment and subsequent controls selection is preferable to a ‘checklist’ approach where all controls in the NZISM are checked for selection and implementation irrespective of applicability.</span></p>]]></paragraph>
<paragraph
    title="4.3.18.R.02."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>The purpose of the first stage of the audit is to determine that the system and security architecture (including information security documentation) is based on sound information security principles and has addressed all <span style="text-decoration: underline;"><strong>applicable</strong></span> controls from this manual. During this stage the statement of applicability for the system will also be assessed along with any justification for non-compliance with applicable controls from this manual.</p>]]></paragraph>
<paragraph
    title="4.3.18.R.03."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>Without implementing the controls for a system their effectiveness cannot be assessed during the second stage of the audit.</p>]]></paragraph>
<paragraph
    title="4.3.18.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="569"
><![CDATA[<p>The SecPol, SRMP, SSP, SOPs and IRP documentation MUST be reviewed by the auditor to ensure that it is comprehensive and appropriate for the environment the system is to operate within.</p>]]></paragraph>
<paragraph
    title="4.3.18.C.02."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="570"
><![CDATA[<p>The Information Security Policy (SecPol) MUST be reviewed by the auditor to ensure that all applicable controls specified in this manual are addressed.</p>]]></paragraph>
<paragraph
    title="4.3.18.C.03."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="571"
><![CDATA[<p>The system and security architecture (including information security documentation) SHOULD be reviewed by the auditor to ensure that it is based on sound information security principles and meets information security requirements, including the NZISM.</p>]]></paragraph>
<paragraph
    title="4.3.18.C.04."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="572"
><![CDATA[<p>The Information Security Policy (SecPol) SHOULD be reviewed by the auditor to ensure that policies have been developed or identified by the agency to protect classified information that is processed, stored or communicated by its systems.</p>]]></paragraph>
<paragraph
    title="4.3.18.C.05."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="573"
><![CDATA[<p>The system owner SHOULD provide a statement of applicability for the system which includes the following topics:</p><ul>
<li>the baseline of this manual used for determining controls;</li>
<li>controls that are, and are not, applicable to the system;</li>
<li>controls that are applicable but are not being complied with; and</li>
<li>any additional controls implemented as a result of the SRMP.</li>
</ul>]]></paragraph>
</block>
<block title="Implementing controls"><paragraph
    title="4.3.19.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>System testing is most effective on working systems. Desk checks have limited effectiveness in these situations.</p>]]></paragraph>
<paragraph
    title="4.3.19.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="576"
><![CDATA[<p>Prior to undertaking any system testing in support of the certification process, the system owner MUST implement the controls for the system.</p>]]></paragraph>
</block>
<block title="Audit (second stage)"><paragraph
    title="4.3.20.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>The purpose of the second stage of the audit is to determine whether the controls, as approved by the system owner and reviewed during the first stage of the audit, have been implemented correctly and are operating effectively.</p>]]></paragraph>
<paragraph
    title="4.3.20.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="579"
><![CDATA[<p>The implementation of controls MUST be assessed to determine whether they have been implemented correctly and are operating effectively.</p>]]></paragraph>
<paragraph
    title="4.3.20.C.02."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="580"
><![CDATA[<p>The auditor MUST ensure that, where applicable, a physical security certification has been awarded by an appropriate physical security certification authority.</p>]]></paragraph>
<paragraph
    title="4.3.20.C.03."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Should"
    cid="581"
><![CDATA[<p>The physical security certification SHOULD be less than three (3) years old at the time of the audit.</p>]]></paragraph>
</block>
<block title="Report of compliance "><paragraph
    title="4.3.21.R.01."

    tags="Governance,Accreditation,Certification"


><![CDATA[<p>The report of compliance assists the certification authority in conducting a residual security risk assessment to assess the residual security risk relating to the operation of a system following the audit and any remediation activities the system owner may have undertaken.</p>]]></paragraph>
<paragraph
    title="4.3.21.C.01."

    tags="Governance,Accreditation,Certification"


    classification="All Classifications"
    compliance="Must"
    cid="584"
><![CDATA[<p>The auditor MUST produce a report of compliance for the certification authority outlining areas of non-compliance for a system and any suggested remediation actions.</p>]]></paragraph>
</block>
</subsection>
</section>
