Free Compliance Templates
Download production-ready templates built from real audit experience. Fill them in, then import into AuditFront for dashboards, AI analysis, and professional reports.
ISO 27001
ISO 27001 Gap Analysis Spreadsheet
Preparing for ISO 27001 certification starts with understanding where you stand today. This comprehensive gap analysis spreadsheet maps every control from ISO 27001:2022 Annex A and helps you systematically evaluate your organization's current security posture against each requirement. Rather than hiring expensive consultants for an initial assessment, this template empowers your team to conduct a thorough internal review and identify exactly which controls are fully implemented, partially implemented, or missing entirely. The spreadsheet covers all 93 controls across the four ISO 27001:2022 categories: Organizational Controls (37 controls), People Controls (8 controls), Physical Controls (14 controls), and Technological Controls (34 controls). For each control, you will find the control reference number, control title, a plain-language description of what the control requires, fields to document your current implementation status, evidence of compliance, identified gaps, and recommended remediation actions with priority levels and estimated effort. The built-in scoring system automatically calculates your overall readiness percentage and breaks it down by category, giving you a clear visual dashboard of where your strengths and weaknesses lie. This is invaluable for communicating compliance progress to leadership, prioritizing remediation work, and estimating the effort required to reach certification readiness. Whether you are a startup pursuing your first ISO 27001 certification or an established company preparing for a recertification audit, this gap analysis template provides the structured framework you need to turn compliance from an overwhelming project into a manageable, step-by-step process.
Incident Response Plan Template
When a security incident strikes — a data breach, ransomware attack, or unauthorized access to sensitive systems — the difference between a manageable event and a catastrophic one often comes down to whether your team has a clear, practiced plan to follow. This incident response plan template provides a comprehensive, ready-to-customize framework for detecting, responding to, containing, and recovering from information security incidents, aligned with ISO 27001:2022 requirements and industry best practices from NIST and SANS. The template covers the complete incident response lifecycle: preparation (roles, responsibilities, communication channels, escalation criteria), identification (detection mechanisms, initial triage, severity classification), containment (short-term and long-term containment strategies), eradication (root cause analysis, threat removal procedures), recovery (system restoration, verification, monitoring), and lessons learned (post-incident review, process improvement). Each phase includes detailed procedures, decision trees for common scenarios, and pre-formatted communication templates for internal and external stakeholders. Beyond the core response procedures, the template addresses the regulatory reporting requirements that many organizations overlook until an incident occurs. It includes notification timeline checklists aligned with GDPR (72-hour supervisory authority notification), NIS2 (24-hour early warning, 72-hour notification), and other frameworks. It also provides templates for data breach notifications to affected individuals, board reporting formats, and media communication guidelines. For ISO 27001 certification specifically, auditors will verify that your incident response plan exists, is communicated to relevant personnel, and has been tested — this template helps you satisfy all three requirements. The included tabletop exercise scenarios allow you to practice your response procedures with your team, generating the evidence of testing that auditors expect to see.
ISO 27001 Information Security Policy Template
Every ISO 27001 implementation starts with policies — and for most organizations, writing information security policies from scratch is one of the most daunting parts of the certification journey. This comprehensive policy template provides professionally written, ready-to-customize policy documents covering the core information security policy and supporting policies required by ISO 27001:2022. Instead of staring at a blank page or paying a consultant thousands of euros to draft boilerplate policies, you can start with battle-tested templates and adapt them to your organization's specific context. The template pack includes the overarching Information Security Policy (required by ISO 27001 Clause 5.2) along with supporting policies that address the most commonly audited Annex A control areas. Each policy document follows a consistent professional structure: purpose and scope, applicable roles and responsibilities, policy statements with clear requirements, exceptions process, compliance and enforcement provisions, and review and update procedures. The language is deliberately practical rather than legalistic — auditors want to see policies that your employees can actually understand and follow, not dense legal documents that sit unread in a shared drive. Critically, each policy includes implementation notes explaining what the auditor expects to see, common pitfalls to avoid, and guidance on what evidence you should maintain to demonstrate that the policy is not just documented but actively implemented. This bridge between documentation and implementation is where many organizations fail during certification audits — they have impressive policies but cannot demonstrate that those policies are followed in practice. These templates help you avoid that trap by building implementation awareness into the documentation process itself.
Vendor Risk Assessment Questionnaire
Your organization's security is only as strong as your weakest vendor. Supply chain attacks, third-party data breaches, and vendor security failures have become some of the most common and devastating attack vectors in recent years — from SolarWinds to MOVEit, the pattern is clear. ISO 27001 and NIS2 both require organizations to assess and manage the security risks posed by their suppliers and service providers. This vendor risk assessment questionnaire provides a structured, professional framework for evaluating the security posture of your vendors before onboarding them and periodically throughout the relationship. The questionnaire covers the critical security domains that matter when entrusting a vendor with your data or integrating their services into your operations: organizational security governance, access control and identity management, data protection and encryption, network and infrastructure security, application security, business continuity and disaster recovery, incident management, compliance and regulatory adherence, and personnel security. Each domain includes targeted questions with multiple-choice response options, follow-up prompts for deeper investigation, and a risk scoring methodology that produces an objective vendor risk rating. What makes this template particularly practical is its tiered assessment approach. Not every vendor needs the same level of scrutiny — your cloud hosting provider handling customer data warrants a more thorough assessment than your office supply vendor. The template includes a vendor classification matrix that helps you categorize vendors by the criticality of data or systems they access, then tailors the assessment depth accordingly. Critical vendors receive the full questionnaire; low-risk vendors receive an abbreviated version. This risk-based approach ensures thoroughness where it matters while avoiding unnecessary overhead. The template also includes a vendor risk register for tracking assessment results across your entire vendor portfolio, identifying trends, and prioritizing follow-up actions for vendors that fall below your acceptable risk threshold.
ISO 27001 Risk Assessment Template
Risk assessment is the backbone of ISO 27001 — it is the process that determines which controls you implement, how you prioritize your security investments, and how you justify your Statement of Applicability to auditors. Yet many organizations struggle with risk assessment methodology, producing either overly simplistic assessments that auditors reject or impossibly complex matrices that no one maintains. This template strikes the right balance: rigorous enough to satisfy certification auditors, practical enough for a small team to complete and maintain. The spreadsheet implements a structured risk assessment methodology aligned with ISO 27001:2022 Clause 6.1.2 and ISO 27005 guidance. It walks you through the complete risk assessment lifecycle: asset identification, threat identification, vulnerability assessment, likelihood and impact scoring, risk level calculation, risk treatment decisions (mitigate, accept, transfer, avoid), and control selection with mapping to ISO 27001:2022 Annex A controls. The scoring system uses a clear 5x5 matrix with defined criteria for each likelihood and impact level, eliminating the subjectivity that often undermines risk assessment quality. What makes this template particularly valuable is the pre-populated threat catalog. Rather than starting from scratch, you begin with a comprehensive list of common information security threats relevant to technology companies — from ransomware and phishing to cloud misconfiguration and insider threats — and assess which are relevant to your organization. This approach ensures thoroughness while saving significant time. The template also includes a risk treatment plan worksheet that links directly to your risk register, creating a clear audit trail from identified risks through treatment decisions to implemented controls. This traceability is exactly what auditors look for during certification assessments.
Tech DD
Pre-Acquisition Technology Assessment Report
When acquiring a technology company or investing in one, the quality and sustainability of the technology is often the most critical — and most misunderstood — factor in the deal. Financial due diligence has well-established methodologies, but technology due diligence remains ad hoc at many firms, leading to costly surprises post-acquisition: hidden technical debt, scalability limitations, security vulnerabilities, key-person dependencies, and licensing issues that can cost millions to remediate. This pre-acquisition technology assessment report template provides a structured, professional format for documenting a comprehensive technology evaluation. The report template covers the full spectrum of technology due diligence dimensions: technology strategy alignment, architecture and infrastructure assessment, codebase quality and technical debt, security posture and vulnerability assessment, team capability and organizational structure, development processes and DevOps maturity, intellectual property and licensing review, scalability and performance analysis, data management and privacy compliance, and vendor and third-party dependency evaluation. Each section includes specific evaluation criteria, a standardized scoring rubric, space for detailed findings, and a risk classification system (Critical, High, Medium, Low, Informational) that helps decision-makers quickly understand the severity of identified issues. What distinguishes this template from a simple checklist is its focus on producing a professional deliverable. The report format includes an executive summary designed for non-technical stakeholders (board members, investors, M&A attorneys), a detailed findings section for technical review, a risk register summarizing all identified issues with estimated remediation costs, and a recommendation section that ties technical findings to deal-relevant business decisions. Whether you are a PE firm evaluating a potential portfolio company, a corporate acquirer assessing a target, or a startup preparing to present your technology in the best possible light during due diligence, this template ensures that the assessment is thorough, consistent, and professionally presented.
Tech DD Code Review Checklist
Technology Due Diligence is increasingly critical in M&A transactions, investment rounds, and strategic partnerships — yet most companies approach code reviews ad hoc, missing critical issues that surface months or years later. This structured code review checklist provides a systematic framework for evaluating a technology organization's codebase, development practices, and technical architecture, whether you are assessing your own company's readiness or evaluating an acquisition target. The checklist covers the dimensions that experienced technical acquirers and investors evaluate: code quality and maintainability, architecture and scalability, security practices, testing and quality assurance, deployment and DevOps maturity, technical debt assessment, dependency management, documentation quality, and regulatory compliance considerations. Each dimension includes specific evaluation criteria, scoring guidance, and red-flag indicators that signal potential risks requiring deeper investigation. What sets this template apart from generic code review checklists is its focus on business-relevant technical assessment. Every evaluation criterion is tied to its business impact — how code quality affects development velocity, how architecture choices impact scaling costs, how security practices affect regulatory risk, and how technical debt influences future investment requirements. This business-context framing makes the template equally valuable for technical evaluators conducting the review and for non-technical stakeholders (investors, board members, M&A teams) who need to understand the findings. The scoring system produces a summary report that translates technical findings into business language, making it an effective communication tool between technical and business teams.
Already filled in a template?
Import your completed spreadsheet into AuditFront and upgrade from rows to dashboards, AI analysis, and board-ready reports.
Import your template