Skip to main content

preeco | information security

Audits and Audit Catalogs

Conduct professional audits based on BSI IT-Grundschutz, ISO 27001, and CISIS12. Use predefined catalogs, document degrees of fulfillment, and maintain an overview of your ISMS status.

SUPPORTED STANDARDS

Audits based on BSI, ISO 27001, CISIS12, and VdA ISA

preeco includes preconfigured catalogs for all common standards. Document degrees of fulfillment for each requirement, assign measures, and prepare for external certification audits.

  • BSI IT-Grundschutz: basic and standard protection
  • ISO 27001: systematically capture and link Annex A
  • CISIS12 for operators of critical infrastructure
  • VdA ISA for financial service providers and industry-specific requirements
Audits based on BSI, ISO 27001, CISIS12, and VdA ISA

AUDIT FEATURES

Structured execution and measure assignment

Systematically work through all requirements, document degrees of fulfillment, and capture evidence. In case of deviations, assign measures directly with responsible persons and deadlines.

  • Checklists with degree of fulfillment, evidence, and measures
  • Measure assignment directly from within the audit
  • Export as report for management and certification bodies
  • Linking with assets, risk analyses, and ISMS documentation
Structured execution and measure assignment

PROGRESS & VERSIONING

Progress tracking and audit-proof versioning

The dashboard shows the status of all audits at any time – open items and upcoming repeat audits at a glance. All audit results are stored with version control, so changes are always traceable.

  • Dashboard with current status of all ongoing audits
  • Follow-ups for scheduled repeat audits
  • Complete versioning of all audit results
  • Audit-proof documentation for accountability requirements
Progress tracking and audit-proof versioning

Professionalize your ISMS now

In a personal consultation, we'll show you how preeco | information security simplifies your security management.

Schedule a consultation now

Risk Analyses

Assess risks systematically and document protection requirement analyses, resource assessments, and threat analyses.

More about risk analyses