Audit Credibility Backed by Technical Experience

Most auditors come from a compliance or governance background. They know the standards but may struggle to assess whether your technical controls are genuinely effective — or just configured to look the part.

I spent 26 years in IT infrastructure, cloud platforms, networking, and security before becoming a certified Lead Auditor. That means when I review your patch management, your access controls, or your network segmentation — I understand exactly what I'm looking at.

"Ticking boxes isn't compliance. Working controls are."

Who This Is For

  • Organisations ready for ISO 27001 certification
  • Companies pursuing ISO 42001 AI governance certification
  • Businesses adding ISO 27701 privacy management certification
  • Organisations requiring Essential Eight maturity assessment
  • Those needing a credible, technically competent auditor
  • Businesses where previous audits lacked technical depth

What Every Audit Includes

A rigorous, evidence-based audit process. Not a box-ticking exercise.

Documentation Review

Thorough review of your ISMS documentation — policies, procedures, risk register, treatment plan, and evidence records against standard requirements.

Technical Control Testing

Verification that your technical controls work as claimed — access management, patch management, logging, network controls, encryption, and more. Assessed with genuine IT understanding.

Management & Staff Interviews

Structured interviews with key personnel to verify that controls are understood, operated as documented, and genuinely embedded in day-to-day operations.

Risk & Treatment Review

Assessment of your information security risk register and treatment plan — verifying that identified risks have appropriate, proportionate, and implemented controls.

Findings Report

Clear, actionable audit findings — conformities, nonconformities, and observations. Written to be understandable to both technical teams and executive leadership.

Corrective Action Guidance

Post-audit guidance on addressing findings — practical recommendations for closing nonconformities, prioritised by risk and achievability for your organisation.

How a Certification Audit Works

A structured, ISO 19011:2018 compliant audit process conducted with professionalism and transparency.

1

Audit Planning & Scope

Define scope, agree objectives and criteria, review prior findings or documentation, and establish the audit programme. You'll know exactly what to expect before we begin.

2

Control Testing

On-site or remote evidence gathering — documentation review, technical control verification, and management interviews. Conducted professionally and with minimal disruption to your operations.

3

Findings & Report

Closing meeting to walk through findings, followed by a written audit report. Nonconformities clearly categorised (major/minor), with actionable guidance on remediation.

ISO Standards I Audit Against

ISO 27001:2022 — Information Security

Lead Audits for the world's leading information security management standard. Exemplar Global certified. Covering both Clauses 4–10 and Annex A controls.

ISO 42001 — AI Management Systems

Certification audits for AI governance and responsible AI management. Specialist certification in this emerging and increasingly critical standard.

ISO 27701 — Privacy Management

Privacy Information Management System audits — the privacy extension to ISO 27001. Specialist certification in the 2025 edition.

Essential Eight Maturity Assessment

ASD's Essential Eight Maturity Model assessments. TAFEcyber certified assessor — practical, evidence-based maturity rating across all eight mitigation strategies.

Why Craig's Audits Are Different

  • 26 years building systems like yours — understands technical feasibility
  • Assesses whether controls actually work, not just whether they're documented
  • Deep technical credibility across infrastructure, cloud, and security
  • Audit findings you can understand and act on
  • Honest assessment — you'll know exactly where you stand
  • Conducted to ISO 19011:2018 auditing guidelines

Technical Credibility That Changes How Audits Work

An auditor who has never configured a firewall, deployed an endpoint management system, or managed cloud infrastructure is at a disadvantage when assessing your controls. They see the documentation; they may miss the gaps.

I spent 26 years in the engine room. When I test your patch management control, I know what a well-configured system looks like — and what a poorly-configured system looks like when someone's tried to make it look compliant.

Your audit findings will be technically accurate, practically worded, and actually achievable to remediate.

Discuss Your Audit Needs →

Auditor Independence: I can only conduct your certification audit if I have not previously provided consulting services to your organisation. This independence requirement exists to protect the integrity of your certification. If you've been working with an external consultant, that's fine — I just can't be both your consultant and your auditor for the same engagement. See FAQ for more.

Ready for Certification?

If your ISMS is implemented and you're ready for a Lead Audit with genuine technical credibility — let's talk scope, timeline, and what to expect.