Addressing Non-Conformities

A nonconformity found by a certification auditor is not a failure. It is a signal — from an independent, experienced professional who has just spent two to five days examining your ISMS — that something specific is not working as intended. That signal has real value. The organizations that treat nonconformities as learning inputs rather than embarrassments consistently build stronger management systems than those that treat them as obstacles to be documented away.

The critical distinction in corrective action work is between fixing the observation and fixing the cause. An auditor who found that the Q2 access review was not completed documented a symptom — the missed review. The cause was something else: no deputy owner, no escalation mechanism, no visibility on the ISMS calendar. A corrective action that only completes the overdue review will produce the same finding at the next audit. A corrective action that fixes the ownership, the calendar, and the escalation mechanism will not.

This article covers the complete nonconformity response discipline: the classification system that determines urgency and certification impact, the 7-step corrective action process that every response should follow, worked examples showing the difference between weak and strong corrective actions for three common audit findings, the response letter structure that CB reviewers expect, and the structural prevention framework that stops recurring findings.

Understanding Nonconformity Classification

ISO 27001 audits produce three types of findings, each with different certification implications and response requirements. Understanding these classifications precisely prevents both over-reaction (treating a minor NC as existential) and under-reaction (treating a major NC as a documentation task):

ClassificationDefinitionTypical examplesCertification impactResponse required
Major NonconformityA failure to satisfy a requirement of ISO 27001 that either (a) raises significant doubt about the ISMS's ability to achieve its intended outcomes, (b) indicates a systemic breakdown of a management system requirement, or (c) is the complete absence of a required element.No risk assessment has been conducted. Statement of Applicability does not exist. No management reviews have taken place. Top management has no engagement with the ISMS. ISMS scope is undefined.Certification cannot be recommended until the major NC is resolved and verified. CB must verify resolution before the certificate can be issued — typically through evidence submission or a follow-up audit visit. Response window: typically 30–90 days.Root cause analysis required. Corrective action must address the systemic failure, not just the specific instance. CB verifies resolution before certificate issuance.
Minor NonconformityAn isolated lapse in fulfilling a requirement that does not indicate systemic breakdown and does not prevent the ISMS from achieving its intended outcomes.One of four quarterly access reviews was not completed. Two staff members have not completed annual awareness training. A single risk register entry has no risk owner assigned. One supplier contract lacks a security addendum.Certificate can typically be issued (or recommended) subject to corrective action commitment and evidence of resolution within the agreed timeframe. Response window: typically 30–90 days from audit report issuance.Root cause analysis expected. Corrective action plan with target dates required. Evidence of resolution submitted to CB for confirmation.
Observation / OFIAn area where the auditor identifies a potential improvement to ISMS effectiveness that does not currently constitute a nonconformity. Not a failure — an invitation to improve.IS Policy review clause does not identify the process for initiating review. Risk register format could be more structured to improve trend visibility. Supplier review cycle could be shortened for critical providers.No mandatory corrective action. Certificate issuance not affected. Organization chooses whether to address observations. Unaddressed observations may become nonconformities at future surveillance audits if conditions change.Discretionary — acknowledge receipt, state whether the organization will address the observation and the intended timeline. Good practice to address before the next surveillance audit.
THE RECURRENCE TESTThe most reliable test for whether a corrective action is adequate: if the CB auditor returned tomorrow, unannounced, and audited exactly the same area, would they find the same nonconformity? If yes, the corrective action has not addressed the root cause. If no, the corrective action is adequate. Apply this test to every corrective action before submitting the response to the CB. It is a better quality check than any formal review process.

The 7-Step Corrective Action Process

Clause 10.2 defines the corrective action requirements explicitly. Every step below is required by the standard — skipping steps, particularly root cause analysis and effectiveness verification, is itself a potential finding in the next audit cycle:

#StepWhat it requiresRequired output
01Read the finding preciselyBefore any corrective action is planned, read the finding statement exactly as written in the audit report. Identify: which clause or Annex A control was violated, what specific evidence the auditor cited, and whether the finding is classified as major or minor. Misreading a finding leads to corrective actions that address the wrong issue.Clear understanding of: (a) what requirement was not met, (b) the evidence basis, (c) the severity classification.
02Acknowledge and confirm understandingSend a brief acknowledgment to the CB confirming receipt of the audit report and your understanding of each finding. If any finding is unclear or you believe it may be based on a misunderstanding of the evidence, this is the appropriate moment to raise it professionally — not defensively, but with a request for clarification.Written acknowledgment letter to CB. Any clarification requests submitted within 5 business days of receiving the report.
03Immediate containmentWhere the finding represents an ongoing security risk — not just a documentation gap — take immediate containment action before root cause analysis is complete. A missing access review that reveals stale accounts requires immediate account deactivation, not a plan to conduct the review in 30 days. Document the containment action taken.Evidence of immediate containment action (if security risk was identified). Log entry noting date and nature of containment.
04Root cause analysisConduct a structured root cause analysis for every NC that warrants a corrective action. Use the appropriate method for the complexity: 5-Whys for simple process failures, fishbone diagram for multi-factor gaps. The root cause is the point at which the corrective action can prevent recurrence — not the symptom that the auditor observed.Documented root cause analysis. Root cause statement that specifically identifies why the NC occurred and why the ISMS did not prevent or detect it earlier.
05Design the corrective actionDesign a corrective action that addresses the root cause — not just the specific instance the auditor observed. The corrective action should answer: what process, policy, control, or governance change will prevent this specific failure from recurring? Assign a specific owner and a specific target completion date.Corrective action plan with: specific action, responsible owner, target date, and expected outcome. For major NCs: submitted to CB for approval before execution where required.
06Implement and collect evidenceExecute the corrective action per the plan. Collect evidence of implementation at the time of execution — not retrospectively. For documentation changes: the revised document with version number and approval date. For process changes: the first execution record under the new process. For control deployments: system configuration evidence or tool output.Implementation evidence. Updated CAR register entry showing completion. Evidence formatted for CB submission.
07Verify effectiveness and submitBefore submitting the corrective action response to the CB, verify that the action actually addressed the root cause — not just the symptom. The verification question: if we were audited tomorrow on the same finding, would we pass? If yes, submit the response. If no, the corrective action is incomplete.Formal corrective action response letter to CB: finding reference, root cause analysis, corrective action taken, evidence package attached, effectiveness verification statement. Submitted within CB's response window.

 

Response timeline management: CBs specify maximum response windows in their certification contracts — typically 30 days for major NCs and 60–90 days for minor NCs. These are ceilings, not targets. Submitting evidence as soon as corrective actions are completed — rather than waiting until the deadline — demonstrates organizational responsiveness and typically accelerates certificate issuance. Submitting on the deadline day repeatedly suggests that corrective actions are being rushed rather than genuinely addressed.

 

Worked Examples: Weak vs. Strong Corrective Actions

 

The difference between a corrective action that satisfies a CB reviewer and one that does not is almost always root cause depth. The three examples below demonstrate this contrast for a major NC and two minor NCs — each showing the finding, the root cause, a weak corrective action that would likely not be accepted, and a strong corrective action that addresses the genuine cause:

 

NC-01  ·   Major NC
FindingNo management review has been conducted since the ISMS was established 8 months ago. Clause 9.3 requires management reviews at planned intervals. The ISMS Manager confirmed a review was planned but postponed due to executive schedule conflicts.

 

Root cause analysisRoot cause (5-Whys): Review not conducted → CEO diary not blocked → management review not in ISMS calendar → ISMS calendar not integrated with executive scheduling → no process owner for management review scheduling assigned.

 

Weak corrective action (what not to do)Corrective action (weak): 'We will conduct a management review within 30 days.' This addresses the immediate gap but not the root cause — the review will be conducted for the audit response, but the scheduling failure will recur.

 

Strong corrective action (what to do)Corrective action (strong): (1) Conduct management review within 14 days — CEO confirmed, agenda sent, all 8 Clause 9.3.2 inputs prepared. (2) Assign ISMS Manager as management review scheduling owner with explicit responsibility in RACI. (3) Add management review to executive calendar for next 12 months with 30-day reminder. (4) Add management review schedule confirmation as a standing item in the monthly ISMS steering committee.

 

Evidence to provide to CBManagement review minutes dated within 14 days of NC response. Updated RACI showing scheduling ownership. Executive calendar entries (screenshot or calendar export). Steering committee minutes showing review schedule confirmed.

 

NC-02  ·   Minor NC
FindingReview of access review records shows the Q2 2026 access review was not completed. The Access Control Policy requires quarterly access reviews. Evidence provided covers Q1 and Q3 but Q2 is absent.

 

Root cause analysisRoot cause: Q2 review was not initiated because the IT Manager who owned the process was on extended leave during the review window, and no deputy owner was designated. The absence was not flagged to the ISMS Manager.

 

Weak corrective action (what not to do)Corrective action (weak): 'The Q2 access review has now been completed.' This closes the gap on the specific instance but leaves the root cause — no deputy ownership — unaddressed.

 

Strong corrective action (what to do)Corrective action (strong): (1) Complete the overdue Q2 access review immediately (retroactively documenting the period). (2) Update the Access Review Procedure to require a named deputy owner for all critical ISMS processes, designating a backup when the primary owner is absent for >5 business days. (3) Add access review status to the monthly ISMS working group agenda as a standing tracking item.

 

Evidence to provide to CBCompleted Q2 access review report with reviewer sign-off and date. Updated Access Review Procedure v1.1 showing deputy ownership requirement. ISMS working group minutes showing access review tracker added to agenda.

 

NC-03  ·   Minor NC
FindingAnnex A 8.28 (Secure coding) is included as applicable in the SoA with implementation status 'Yes'. However, evidence provided shows only that developers attended a general OWASP training session. No secure coding standard document exists, and no SAST tool is integrated in the CI/CD pipeline.

 

Root cause analysisRoot cause: The SoA was updated to reflect 'Yes' implementation status based on the training alone, without recognizing that A.8.28 requires a complete secure coding program including a documented standard and technical controls (SAST).

 

Weak corrective action (what not to do)Corrective action (weak): 'We will create a secure coding standard.' This addresses only one of the two gaps and does not acknowledge that the SoA implementation status was inaccurate.

 

Strong corrective action (what to do)Corrective action (strong): (1) Update SoA to reflect implementation status as 'Partial' until all elements are in place. (2) Publish Secure Coding Standard v1.0 based on OWASP aligned to the organization's technology stack. (3) Integrate SAST tool (Semgrep or equivalent) into CI/CD pipeline with quality gate that blocks deployments on critical findings. (4) Deliver targeted secure coding training referencing the new standard. (5) Update SoA to 'Yes' once all three elements are evidenced.

 

Evidence to provide to CBUpdated SoA with corrected implementation status. Secure Coding Standard v1.0 (approved). SAST integration evidence (CI/CD pipeline configuration, sample scan report). Training records for developer team.

 

Pattern analysis: The three worked examples share a consistent structural pattern in the strong corrective actions: (1) an immediate remediation of the specific instance, (2) a systemic fix that prevents the specific failure mechanism, and (3) an ongoing detection mechanism that would catch recurrence before the next audit. This three-layer structure — immediate / systemic / detection — is a reliable template for any corrective action regardless of the finding type.

Writing the Corrective Action Response Letter

The formal corrective action response letter is the primary communication through which the CB reviewer assesses whether the nonconformities have been genuinely addressed. CB reviewers read many corrective action responses — they recognize quality, depth, and specificity quickly. The template below provides the structure and draft language for each section:

SectionDraft content (adapt to your findings)Guidance note
Reference and dateRE: Corrective Action Response — Stage 2 Audit — Audit Reference [CB-2026-XXXX] Date: [DD Month YYYY]  Dear [Auditor Name / CB Review Team],Always include the CB's audit reference number. Address to the named auditor or the CB's certification review team as directed.
Finding acknowledgmentWe acknowledge receipt of the Stage 2 audit report issued [date] and confirm our understanding of the following findings: [list each finding by reference number and brief description]. We have reviewed each finding and the evidence basis cited in the audit report.Acknowledge each finding explicitly. Do not try to contest findings in this section — save any factual corrections for a separate clarification request.
Root cause analysis per findingFinding [reference]: [Finding description as stated in audit report]  Root cause: [Your root cause analysis — be specific. State why this failure occurred at the system level, not just the instance level.]  Example: 'The root cause is that the Access Review Procedure did not designate a deputy owner for the process, meaning that when the process owner was unavailable during the Q2 review window, no action was taken and no escalation occurred. The absence was not visible to the ISMS Manager because access review status was not on the monthly ISMS working group agenda.'One root cause analysis per finding. Must be specific to the actual failure, not generic. Auditors read root cause analyses carefully — superficial analysis signals superficial corrective action.
Corrective action takenCorrective action: The following actions have been completed / are in progress: 1. [Specific action 1 — completed DD Month YYYY] — see Evidence Item 1 2. [Specific action 2 — target completion DD Month YYYY] — in progress, see Evidence Item 2 3. [Systemic action — e.g. procedure updated, owner assigned] — completed DD Month YYYY — see Evidence Item 3List each action separately with its completion status. For actions already completed, state the date. For actions in progress, state the target date. Reference the evidence items attached.
Effectiveness verificationEffectiveness review: We have reviewed the corrective actions taken and confirm that they address the identified root cause. Specifically: [state how each action prevents the specific root cause identified — not how it prevents the symptom]. We will verify effectiveness at the next [internal audit / management review] scheduled for [date].Required by Clause 10.2(f). Must state specifically why the action addresses the root cause, not just the observation. Forward-looking verification commitment is good practice.
Evidence indexEvidence attached: • Evidence Item 1: Access Review Report Q2 2026 (completed) — [document name] • Evidence Item 2: Updated Access Control Procedure v1.1 showing deputy ownership requirement — [document name] • Evidence Item 3: ISMS Working Group Minutes showing access review tracker on agenda — [document name]  All evidence items are attached to this letter as a single combined PDF.Index all evidence clearly. Submit as a single combined PDF if possible — not a folder of separate files. Name each file systematically: [CB-ref]-[NC-ref]-Evidence-[number]-[brief-description].
Closing and sign-offWe trust that the above corrective actions and evidence are satisfactory. Please advise if any clarification or additional evidence is required. We look forward to receiving confirmation of finding closure.   Yours sincerely,  [Name] [Title — ISMS Manager / CISO] [Organization] [Date]Professional, direct close. Do not restate all the evidence — just invite follow-up if needed. Include a direct contact number and email for the CB reviewer to reach you quickly.

Two common response letter mistakes undermine otherwise adequate corrective actions. The first is vagueness — describing what was done without specificity. 'We have updated our procedures' is not a corrective action response. 'We have updated the Access Control Procedure to v1.2 to require a named deputy owner, as attached — see Evidence Item 2' is. The second is evidence misalignment — attaching evidence that does not directly demonstrate the corrective action claimed. Every evidence item should be named in the letter with a specific reference to what it demonstrates.

After the Response: What the CB Does Next

Once you submit the corrective action response, the CB's certification reviewer (not the auditor) assesses whether the responses are adequate. The reviewer's assessment follows one of three paths:

  • Accepted — all findings closed: The reviewer confirms that all NCs have been adequately addressed. The certificate is issued (for Stage 2 responses) or the audit cycle continues to the next stage. This is the expected outcome for well-structured responses with clear evidence.
  • Clarification requested: The reviewer requires additional information or evidence for one or more findings. Respond promptly and specifically to each clarification request. Reviewers who request clarification are typically looking for a specific piece of evidence that was not attached — provide it directly, without rephrasing the entire corrective action.
  • Not accepted — re-response required: The reviewer determines that one or more corrective actions do not adequately address the finding. This typically occurs when the root cause analysis is superficial, when the corrective action addresses only the symptom, or when evidence is missing or misaligned. Redesign the corrective action for the rejected findings and resubmit.

The most common reason corrective action responses are rejected is that they describe intended actions rather than completed ones. 'We will update the procedure' is a plan, not a corrective action. 'We have updated the procedure — see attached version 1.2 dated 15 March 2026' is a corrective action with evidence. Never submit a response that includes future actions as evidence of closure for a finding.

Building Prevention: Stopping Recurring NCs

The highest-value outcome of a nonconformity is not closing the specific finding — it is preventing the pattern from recurring at the next audit. Recurring findings — the same finding appearing in two consecutive audit cycles — are a double signal: the original problem was not fixed, and the ISMS improvement mechanism is not working. The table below maps the most common recurring NC patterns, how to prevent them structurally, and how to detect recurrence before the next external audit:

Common NC patternFrequencyStructural preventionOngoing detection
Process has no designated ownerVery commonEvery ISMS process must have a named owner (role, not individual) in the ISMS RACI. Deputy owners for critical processes. Owner responsibility confirmed annually.Internal audit quarterly — check all critical processes have active, aware owners.
ISMS calendar not maintainedVery commonDedicated ISMS calendar with all recurring activities: access reviews, management review, internal audits, supplier reviews, vulnerability scans, training renewals. Owned by ISMS Manager. 30-day reminder triggers.ISMS Manager reviews calendar monthly. Any missed activity generates a corrective action entry.
SoA not updated when controls are deployedCommonSoA update is a mandatory step in the risk treatment plan implementation workflow. Control implementation is not 'complete' until SoA implementation status is updated and evidenced.Quarterly SoA review — compare implementation status entries against control evidence availability.
Evidence not collected at time of operationCommonEvidence collection is built into each operational procedure as a required step — not an optional documentation activity. LMS auto-records training. Access review templates auto-generate completion reports.Internal audit samples evidence for timeliness — when was the evidence created vs. when was the process supposed to run?
Management review treated as formalityCommonManagement review agenda is prepared 2 weeks in advance. All 8 Clause 9.3.2 inputs assembled. CEO prepared with current risk posture briefing. Minutes use decision-language, not status-report language.Internal audit tests management review quality — not just that it occurred, but that decisions were made and documented.
Corrective actions closed superficiallyCommonCAR register closure requires: effectiveness verification documented. Root cause confirmation. Evidence attached. For major NCs: CISO sign-off before closing.Internal audit samples closed CARs and verifies: was the root cause addressed, not just the symptom? Is the finding-type recurring?
Policy review date lapsesModerately commonDocument register tracks review dates with automated alerts at 30 and 7 days before expiry. Document owner receives automatic reminder. Overdue review dates generate a CAR automatically.Monthly document register review by ISMS Manager. Any overdue reviews generate immediate CAR.
Bitlion CAR management: Bitlion's corrective action register links every finding to its clause reference, Annex A control, root cause, and evidence items. The platform tracks response deadlines with automated reminders at 14 and 7 days before the CB submission window closes. Effectiveness verification is a required step in the CAR closure workflow — the CAR cannot be marked closed without documentation of the effectiveness check. Trend analysis identifies recurring finding patterns across audit cycles.

The ISMS Improvement Mindset

There is a mindset shift that separates organizations that continuously improve their ISMS from those that manage a static compliance program. The compliance mindset treats each nonconformity as an obstacle to certification — something to be addressed as efficiently as possible, documented adequately, and moved past. The improvement mindset treats each nonconformity as a diagnostic signal — evidence that a specific mechanism in the management system is not functioning as designed.

Organizations with the improvement mindset welcome rigorous audits. They look forward to internal audits producing findings — because findings are what improvement is built from. They address corrective actions at root cause depth not because the CB requires it, but because they want the ISMS to actually work better. And they analyse finding patterns across audit cycles to identify systemic themes that point to deeper organizational issues — capability gaps, resource constraints, cultural factors — that a single corrective action cannot fix.

This mindset does not happen automatically. It is built through how leadership talks about findings, how the ISMS team communicates audit outcomes, and how corrective actions are resourced and tracked. An executive sponsor who responds to audit findings with curiosity rather than defensiveness, and who approves the resources needed for genuine corrective action, produces the culture that makes the improvement mindset possible.

Nonconformities, responded to well, are how management systems become genuinely better. That is their purpose — and it is a valuable one.