In this module

AD7.7 Audit Readiness and Security Assessments

5-6 hours · Module 7 · Free
Operational Objective
Whether it's a client security questionnaire, an insurance renewal assessment, a regulatory audit, or a certification assessment (Cyber Essentials in the UK, Essential Eight in Australia, NIST CSF in the US, or ISO 27001 globally), you'll eventually need to demonstrate that your security program exists and works. The controls you've deployed in Modules AD1-AD6 address the core requirements of every major security framework — but the assessor doesn't know what you've configured. They need evidence: screenshots, exports, policy documents, and configuration summaries mapped to whatever framework they're assessing against. This subsection builds the evidence collection process and the framework-agnostic assessment approach that works regardless of which framework your assessor uses.
Deliverable: An evidence collection process and assessment readiness package that maps your deployed controls to any security framework — enabling rapid response to client questionnaires, insurance assessments, and certification audits regardless of the framework used.
Estimated completion: 30 minutes
YOUR CONTROLS → ANY FRAMEWORK YOUR DEPLOYED CONTROLS Access control: MFA + CA (AD1) Email security: Safe Links/Att + DMARC (AD2) Endpoint protection: compliance + AV (AD3) Data protection: labels + DLP (AD4) Monitoring + IR: weekly review + procedures (AD5-6) Governance: policies + reporting (AD7) One set of controls ISO 27001 (global) NIST CSF (US-origin, global use) Regional frameworks Client questionnaires REGIONAL EXAMPLES UK: Cyber Essentials AU: Essential Eight (ACSC) US: NIST CSF / CMMC EU: NIS2 / DORA CA: PIPEDA requirements IN: CERT-In guidelines Same controls, different labels

Figure AD7.7 — Your deployed controls address the core requirements of every major security framework. The controls are universal; the framework labels are regional. One evidence base serves all assessments — you translate the evidence into each framework's language as needed.

The five universal security domains

Every security framework — regardless of region or industry — evaluates the same five domains. Your program covers all five:

1. Access Control (Who can access what) Your controls: MFA for all users (CA001), admin MFA (CA002), device compliance enforcement (CA003), break-glass accounts, least-privilege admin roles. Framework equivalents: ISO 27001 A.9, NIST CSF PR.AC, Cyber Essentials "Access Control," Essential Eight "Restrict Admin Privileges" + "MFA."

2. Threat Protection (How you block attacks) Your controls: Safe Links, Safe Attachments, anti-phishing policies, SPF/DKIM/DMARC, Defender Antivirus, network protection. Framework equivalents: ISO 27001 A.12.2, NIST CSF PR.DS + DE.CM, Cyber Essentials "Malware Protection," Essential Eight "Application Control" + "Email Filtering."

3. Endpoint Security (How you protect devices) Your controls: Intune compliance policies, BitLocker encryption, Windows Firewall verification, OS patching via Windows Update, BYOD app protection. Framework equivalents: ISO 27001 A.6.2 + A.10.1, NIST CSF PR.DS + PR.IP, Cyber Essentials "Firewalls" + "Secure Configuration" + "Patching," Essential Eight "Patch Applications" + "Patch OS."

4. Data Protection (How you classify and protect data) Your controls: 4-tier sensitivity labels with encryption, DLP policies, SharePoint sharing restrictions, external access controls. Framework equivalents: ISO 27001 A.8.2 + A.13.2, NIST CSF PR.DS, GDPR Articles 5/32, PIPEDA Principle 7.

5. Detection and Response (How you find and fix incidents) Your controls: Monday security review, alert notifications, sign-in log monitoring, incident response procedures, evidence preservation, post-incident review. Framework equivalents: ISO 27001 A.12.4 + A.16, NIST CSF DE + RS. All frameworks require monitoring and incident response capability.

When an assessor asks about any security domain, you map their question to one of these five domains and reference your deployed controls. The framework label changes; the underlying control doesn't.

Building the evidence collection package

Create an evidence folder that supports any assessment:

SecurityEvidence/
├── 01-AccessControl/
│   ├── CA001-AllUsers-MFA-Policy.png
│   ├── CA002-AdminMFA-Policy.png
│   ├── CA003-CompliantDevice-Policy.png
│   ├── MFA-Registration-Report.csv
│   ├── Admin-Role-Assignments.csv
│   └── BreakGlass-Documentation.docx
├── 02-ThreatProtection/
│   ├── SafeLinks-Policy.png
│   ├── SafeAttachments-Policy.png
│   ├── AntiPhishing-Policy.png
│   ├── DMARC-DNS-Record.png
│   └── ThreatProtection-Stats.csv
├── 03-EndpointSecurity/
│   ├── Compliance-Policy-Windows.png
│   ├── Compliance-Rate-Report.csv
│   ├── BitLocker-Encryption-Report.csv
│   ├── WindowsUpdate-Ring-Config.png
│   └── BYOD-AppProtection-Policy.png
├── 04-DataProtection/
│   ├── SensitivityLabels-Config.png
│   ├── DLP-Policies.png
│   ├── SharePoint-SharingConfig.csv
│   └── LabelAdoption-Report.csv
├── 05-DetectionAndResponse/
│   ├── MondayReview-Checklist.pdf
│   ├── AlertNotification-Config.png
│   ├── WeeklySecurityLog.csv
│   ├── IncidentResponsePlan.pdf
│   └── ProcedureTesting-Log.txt
├── 06-Governance/
│   ├── AcceptableUsePolicy.pdf
│   ├── PasswordAuthPolicy.pdf
│   ├── DataClassificationPolicy.pdf
│   ├── QuarterlyReports/
│   └── ProgramSummary.pdf
└── EvidenceIndex.md

The EvidenceIndex.md maps each evidence file to framework controls:

EVIDENCE INDEX
File: CA001-AllUsers-MFA-Policy.png
  ISO 27001: A.9.4.2 | NIST CSF: PR.AC-7
  Cyber Essentials: Access Control | Essential Eight: MFA

File: BitLocker-Encryption-Report.csv
  ISO 27001: A.10.1.1 | NIST CSF: PR.DS-1
  Cyber Essentials: Secure Config | GDPR: Article 32(1)(a)

Automated evidence collection

# Collect-SecurityEvidence.ps1
$evidenceDir = "C:\SecurityEvidence-$(Get-Date -Format 'yyyyMMdd')"
New-Item -Path $evidenceDir -ItemType Directory -Force | Out-Null

Connect-MgGraph -Scopes "Policy.Read.All","DeviceManagementManagedDevices.Read.All" -NoWelcome

# Access Control evidence
$acDir = "$evidenceDir\01-AccessControl"
New-Item -Path $acDir -ItemType Directory -Force | Out-Null
Get-MgIdentityConditionalAccessPolicy -All |
    Select-Object DisplayName, State, CreatedDateTime,
        @{N="GrantControls";E={$_.GrantControls.BuiltInControls -join ", "}} |
    Export-Csv "$acDir\ConditionalAccessPolicies.csv" -NoTypeInformation

# Endpoint Security evidence
$esDir = "$evidenceDir\03-EndpointSecurity"
New-Item -Path $esDir -ItemType Directory -Force | Out-Null
Get-MgDeviceManagementManagedDevice -All |
    Select-Object DeviceName, ComplianceState, OperatingSystem,
        OsVersion, IsEncrypted, UserPrincipalName |
    Export-Csv "$esDir\DeviceCompliance.csv" -NoTypeInformation

# Secure Score
$score = Get-MgSecuritySecureScore -Top 1
$pct = [math]::Round($score.CurrentScore / $score.MaxScore * 100, 1)
Write-Host "Secure Score: $pct%" -ForegroundColor Green
Write-Host "Evidence collected to: $evidenceDir" -ForegroundColor Green

Run quarterly alongside report data collection. CSV exports plus portal screenshots form the complete evidence package.

Regional framework quick reference

Your controls are universal. Here's how they map to frameworks your learners may encounter:

UK — Cyber Essentials: 5 controls (firewalls, secure config, access control, malware, patching). Your program covers all 5. Cost: £300-500 Basic, £1,500-3,500 Plus.

Australia — Essential Eight: 8 mitigation strategies. Your program fully addresses MFA, patch applications, patch OS, restrict admin privileges. Partially addresses application control, restrict Office macros, user application hardening. Does not address daily backups (outside M365 scope).

US — NIST CSF: 5 functions (Identify, Protect, Detect, Respond, Recover). Your program covers Identify (Intune asset management), Protect (access control, email, data), Detect (monitoring), Respond (IR procedures). Recover is partially covered.

EU — NIS2: Requires risk management, incident handling, business continuity, supply chain security, training. Your program addresses risk management, incident handling, and awareness. Business continuity and supply chain are outside course scope.

Global — ISO 27001: 93 controls across 4 themes. Your program covers approximately 60-70%. See AD7.8 for detailed gap analysis.

The key insight: every framework asks the same fundamental questions. "Do you use MFA?" "Do you protect against malware?" "Do you monitor for threats?" Your answers are the same. Only the reference numbers change.

Compliance Myth: "We need to implement different controls for different frameworks"
Every major security framework shares 80% of its requirements. MFA is required by ISO 27001, NIST CSF, Cyber Essentials, Essential Eight, and virtually every client questionnaire. You don't need different MFA implementations for different frameworks — you need one MFA implementation with different reference numbers. Build the controls once (AD1-AD6), document them once (AD7), and reference them differently for each framework.
Decision point

A client sends a security questionnaire based on ISO 27001 Annex A. Your organization isn't ISO 27001 certified. How do you respond?

Option A: "We're not ISO 27001 certified, so we can't answer this questionnaire."

Option B: "We're not ISO 27001 certified, but our security program addresses the relevant Annex A controls. Here's our response mapping each question to our deployed controls and evidence." Use the evidence collection and control mapping to answer each question with specific references to your policies, configurations, and reports. Many clients accept demonstrated controls as evidence of security maturity even without formal certification.

The correct answer is Option B. Certification is one form of assurance. Demonstrated controls with documented evidence are another. The program summary, quarterly reports, and evidence folder provide comprehensive demonstration of security maturity regardless of certification status.

Try it: Build your evidence collection package

1. Create the evidence folder structure from this subsection 2. Run Collect-SecurityEvidence.ps1 to populate CSV exports 3. Take screenshots of each major policy (CA policies, compliance, DLP, Safe Links/Attachments) 4. Create EvidenceIndex.md mapping each file to at least 2 framework references 5. Identify which regional framework is most relevant to your organization

Initial collection: 45-60 minutes. Subsequent quarterly collections: 15-20 minutes.

An insurance company asks for evidence of your "endpoint protection program" during policy renewal. They don't specify a framework. What do you provide?
A verbal description of your Intune compliance policies — Verbal descriptions aren't evidence.
The full program summary — Too much detail for a targeted request.
The Endpoint Security evidence folder: device compliance report (97%+), BitLocker encryption report (100%), Windows Update ring config, compliance policy screenshot — targeted evidence demonstrating endpoint protection — Correct. The evidence folder structure makes this a 5-minute retrieval: open folder 03, attach the files.
A framework certification — Only relevant if you have one AND the insurer accepts it.

You're reading the free modules of M365 Security: From Admin to Defender

The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts.

View Pricing See Full Syllabus