ISO27k Guideline On ISMS Audit v1
ISO27k Guideline On ISMS Audit v1
ISO27k Guideline On ISMS Audit v1
Introduction
This guideline has been written by members of the ISO27k Forum at ISO27001security.com, an
international community of practitioners who are actively using the ISO/IEC 27000-family of
Information Security Management Systems (ISMS) standards known colloquially as "ISO27k". We
wrote this guideline primarily to contribute to the development of ISO/IEC 27007 by providing what
we, as experienced ISMS implementers and IT/ISMS auditors, believe is worthwhile content. A
secondary aim was to provide a pragmatic and useful guideline for those involved in auditing ISMSs.
At the time of writing (February-March 2008), ISO/IEC 27007 is currently at the first Working Draft
stage ("ISO/IEC WD 27007") and has been circulated to ISO member bodies for study and comment
by March 14th 2008. Its working title is "Information technology - Security techniques - Guidelines
for information security management systems auditing".
The proposed outline structure of ISO/IEC WD 27007 is presently as follows:
Foreword and introduction
1. Scope
2. Normative references
3. Terms and definitions
4. Principles of auditing
5. Managing an audit programme
6. Audit activities
7. Competence and evaluation of auditors
Bibliography
In the proposed structure, section 6 should presumably explain how to go about auditing an
ISMS. The current working draft has headings for a guide to the audit process but little content on
the actual audit tests to be performed, although in section 6.3.1 it identifies a list of items that are
required by ISO/IEC 27001 and says that "Auditors should check that all these documents exist and
conform to the requirements in ISO/IEC 27001:2005". This is probably the most basic type of ISMS
audit test: are the specified ISMS documents present? We feel that a generic ISMS audit checklist
(often called an "Internal Controls Questionnaire" by IT auditors) would be a very useful addition to
the standard and producing one was a key aim of this guideline in fact we have produced two (see
the appendices). We also aim to contribute content to various other parts of the draft 27007 and
hope to track its development through future revisions.
This guideline follows the present structure and section numbering of ISO/IEC WD 27007 for
convenient cross-referencing.
1. Scope
This guideline provides advice to IT auditors reviewing compliance with the ISO/IEC 27000 family of
standards, principally ISO/IEC 27001 (the ISMS certification standard) and to a lesser extent
ISO/IEC 27002 (the code of practice for information security management). It is also meant to help
those who are implementing or have implemented the ISO/IEC 27000 family of standards, to conduct
internal audits and management reviews of their ISMS. Like the other related standards, it is generic
and needs to be tailored to the specific requirements of each situation. In particular, we wish to point
out that audits are best planned and conducted in relation to the risks facing the organization being
audited, in other words the starting point for audit planning is an initial assessment of the main risks
(commonly known as a pre-audit survey or gap analysis). As with ISO/IEC 27001 and ISO/IEC
27002, being risk-based provides a natural priority to the audit tests and relates directly to the
organization's business requirements for information security.
2. Normative references
Please refer to:
ISO/IEC 27000: this standard is currently at Committee Draft stage and is due to be published,
hopefully, later in 2008. It contains an overview of the ISO27k standards and a vocabulary or
definition of terms common to many of the ISO27k standards
ISO/IEC 27001:2005 Information technology -- Security techniques -- Information security
management system requirements. This is the formal specification for an ISMS against which
organizations may be certified compliant. Section 6 introduces the need for "Internal ISMS
audits" and briefly sets the main requirements for audit procedures. Section 7 also identifies the
need for periodic (at least annual) management reviews of the ISMS.
ISO/IEC 27002:2005 Information technology -- Security techniques -- Code of practice for
information security management. Provides more pragmatic guidance than 27001 on how to
design, implement, manage and improve an ISMS.
ISO/IEC 27006:2007 Information technology -- Security techniques -- Requirements for bodies
providing audit and certification of information security management systems. Accreditation
criteria for ISMS certification bodies.
ISO/IEC 17021:2006 Conformity assessment Requirements for bodies providing audit and
certification of management systems
ISO 19011:2002 Guidelines for quality and/or environmental management systems auditing. [A
new version of this standard is in preparation, so changes may be necessary once it is
published].
Audit observation - an optional or advisory audit recommendation which carries less weight
than an audit recommendation
Audit plan or programme - a project plan for an audit laying out the main audit activities and
heir timing
Audit recommendation - a corrective action that is proposed to address one or more identified
audit findings, that must be addressed prior to certification or recertification of the ISMS
Audit report - a formal report to management documenting the key findings and conclusions of
the audit
Audit risk - the potential for an audit to fail to meet its objectives, for example by using unreliable,
incomplete or inaccurate information
Audit schedule - a diary of planned audits
Audit subject - the in-scope organization/s, or parts of an organization, which are being audited
Audit test - a check conducted by the auditors to verify whether a control is effective, efficient
and adequate to mitigate one or more risks to the organization
Audit work papers - documents written by the auditors recording their examination, findings and
analysis of the ISMS, including completed audit checklists
Compliance audit - a type of audit specifically designed to assess the extent to which the audit
subject conforms to stated requirements
ISMS audit - an audit centred on the organization's Information Security Management System
(ISMS)
Risk-based audit - an audit planned on the basis of an assessment of risks
4. Principles of auditing
ISO 19011 section 4 covers the principles of auditing. Rather than duplicate ISO 19011, this section
need only cover any aspects that are different or particularly relevant to ISMS audits such as
Important but generic audit principles e.g. independent evaluation against agreed criteria, plus
more specific principles aimed at ISMS audits
In all matters related to the audit, the ISMS auditor should be independent of the auditee in both
attitude and appearance. The ISMS audit function should be independent of the area or activity
being reviewed to permit objective completion of the audit assignment.
Information security is a dynamic field with frequent changes to the risks (i.e. the threats,
vulnerabilities and/or impacts), controls and environment. It is therefore important that auditors
auditing information security controls should maintain knowledge of the state of the art
(e.g. emerging information security threats and currently-exploited vulnerabilities) and the
organizational situation (e.g. changing business processes and relationships, technology
changes).
Auditing business partners' ISMSs, emphasizing the value of ISO/IEC 27001 certification as a
means of gaining a level of confidence in the status of their ISMSs without necessarily having to
do the audit work
Developing an internal program for auditing the ISMS. From an IRCA point of view you develop
an Audit Plan when preparing to audit an organization. This plan is derived from the "Scope of
Registration" document that an individual fills out when requesting a certification audit from a
registrar. Besides the scope of registration the domain definition will also feed the audit plan.
6. Audit activities
The generic audit process of ISO 19011 may need to be customized to reflect the process steps
specifically involved in IT audits and, further, for ISMS audits
The main stages of a typical IT audit assignment are as follows:
Note: the generic example workplan/checklists supplied with this guideline are not intended to be
used without due consideration and modification. This paper is merely a general guideline. It is
anticipated that ISMS auditors will normally generate a custom workplan/checklist reflecting the
specific scope and scale of the particular ISMS being audited, taking into account any information
security requirements that are already evident at this stage (such as information-security relevant
laws, regulations and standards that are known to apply to similar organizations in the industry).
Also, the audit workplan/checklist may be modified during the course of the audit if previously
underappreciated areas of concern come to light.
The overall timing and resourcing of the audit is negotiated and agreed by management of both the
organization being audited and the ISMS auditors, in the form of an audit plan. Conventional project
planning techniques (such as GANTT charts) are normally used.
Audit plans identify and put broad boundaries around the remaining phases of the audit. It is
common to make preliminary bookings for the formal audit report/discussion meeting to allow
participants to schedule their attendance.
Audit plans often also include checkpoints, that is specific opportunities for the auditors to provide
informal interim updates to their management contacts including preliminary notification of any
observed inconsistencies or potential nonconformities etc. Interim updates also provide
opportunities for the auditors to raise any concerns over limited access to information or people, and
for management to raise any concerns over the nature of the audit work. While the auditors are
necessarily independent of the organization, they must establish a level of trust and a cooperative
working environment in order to engage sufficiently and obtain the information necessary to audit
the ISMS.
Finally, the timing of important audit work elements may be determined, particularly in order to
prioritize aspects that are believed to represent the greatest risks to the organization if the ISMS are
found to be inadequate.
The output of this phase is the (customized) audit workplan/checklist and an audit plan agreed with
management.
6.3 Fieldwork
During the fieldwork phase, audit evidence is gathered by the auditor/s working methodically through
the workplan or checklist, for example interviewing staff, managers and other stakeholders
associated with the ISMS, reviewing ISMS documents, printouts and data (including records of ISMS
activities such as security log reviews), observing ISMS processes in action and checking system
security configurations etc. Audit tests are performed to validate the evidence as it is
gathered. Audit work papers are prepared, documenting the tests performed.
The first part of the fieldwork typically involves a documentation review. The auditor reads and
makes notes about documentation relating to and arising from the ISMS (such as the Statement of
Applicability, Risk Treatment Plan, ISMS policy etc.). The documentation comprises audit evidence,
with the audit notes being audit working papers.
Findings from the documentation review often indicate the need for specific audit tests to determine
how closely the ISMS as currently implemented follows the documentation, as well as testing the
general level of compliance and testing appropriateness of the documentation in relation to ISO/IEC
27001. The results of the audit tests are normally recorded in checklists such as those provided in
Appendix A and Appendix B.
Technical compliance tests may be necessary to verify that IT systems are configured in accordance
with the organizations information security policies, standards and guidelines. Automated
configuration checking and vulnerability assessment tools may speed up the rate at which technical
compliance checks are performed but potentially introduce their own security issues that need to be
taken into account*.
*Note: automated system security audit tools are powerful utilities but are not appropriate in all environments.
They can potentially undermine system security, perhaps introducing additional technical vulnerabilities,
The output of this phase is an accumulation of audit working papers and evidence in the audit files.
6.4 Analysis
The accumulated audit evidence is sorted out and filed, reviewed and examined in relation to the
risks and control objectives. Sometimes analysis identifies gaps in the evidence or indicates the
need for additional audit tests, in which case further fieldwork may be performed unless scheduled
time and resources have been exhausted. However, prioritizing audit activities by risk implies that
the most important areas should have been covered already.
6.5 Reporting
Reporting is an important part of the audit process, and an involved sub-process all by itself:
A typical ISMS audit report contains the following elements, some of which may be split into
appendices or separate documents:
Title and introduction naming the organization and clarifying the scope, objectives, period of
coverage and the nature, timing and extent of the audit work performed.
An executive summary indicating the key audit findings, a brief analysis and commentary, and
an overall conclusion, typically along the lines of We find the ISMS compliant with ISO/IEC
27001 and worthy of certification.
The intended report recipients plus (since the contents may be confidential) appropriate
document classification or restrictions on circulation.
An outline of the auditors credentials, audit methods etc.
Detailed audit findings and analysis, sometimes with extracts from the supporting evidence in
the audit files where this aides comprehension.
The audit conclusions and recommendations, perhaps initially presented as tentative proposals
to be discussed with management and eventually incorporated as agreed action plans depending
on local practices;
A formal statement by the auditors of any reservations, qualifications, scope limitations or other
caveats with respect to the audit.
Depending on normal audit practices, management may be invited to provide a short
commentary or formal response, accepting the results of the audit and committing to any agreed
actions.
It is important that there is sufficient, appropriate audit evidence to support the results
reported. Audit's quality assurance processes therefore ensure that everything reportable is
reported and everything reported is reportable, normally based on a review of the audit file by a
senior auditor. The wording of the draft audit report is checked to ensure readability, avoiding
ambiguity and unsupported statements. When approved by audit management for circulation, the
draft audit report is usually presented to and discussed with management. Further cycles of review
and revision of the report may take place until it is finalized. Finalization typically involves
management committing to the action plan.
In addition to the formal audit recommendations relating to any major non-conformance, auditors
sometimes provide audit observations on minor non-conformance and other advice, for instance
potential process improvements or good practice suggestions from their experience with other
organizations. These may or may not be part of the formal audit report, depending on local practices.
While such observations and advice will not preclude certification of the ISMS, they will be recorded
on the audit file and may trigger follow-up audit work in a future surveillance or recertification audit.
extracting highly sensitive information and affecting system performance or availability. Furthermore, auditors
using such tools must be competent to use and obtain meaningful data from them: a pass from an automated
vulnerability assessment tool does not necessarily mean that a system is free of vulnerabilities and is hence
secure. A wrongly-configured or ineptly used database security review tool may bring down a production
system. Such tools should only be introduced using the organizations conventional change management
processes, including pre-implementation security testing, where appropriate.
The auditors believe that it is in the organizations best interests to address all recommendations
and observations, although the organizations management must decide about what to do and when
to do it, if at all.
The output of this phase is a completed ISMS audit report, signed, dated and distributed according
to the terms of the audit charter or engagement letter.
6.6 Closure
In addition to indexing and cross-referencing and literally shutting the audit files, closure involves
preparing notes for future audits and following up to check that the agreed actions are in fact
completed on time.
If the ISMS qualifies for certification (in other words, if all mandatory audit recommendations have
been resolved to the satisfaction of the auditors), the organizations ISMS certificate is prepared and
issued.
Contributors/authors
The following members of the ISO27k implementers forum volunteered to contribute to this
guideline:
Gary Hinson - IT auditor and information security manager for over 20 years; MBA, CISSP,
CISM and CISA qualified; ISO27k user since the dawn of time; project leader.
Bala Ramanan - ISMS Lead Auditor, CISM, ITIL(F), Six Sigma Green Belt trained. Consulting
for the last 12 years on different management models like ISO 27001, COBIT, ISO 9000, ISO
14000, BS 15000, ISO 20000, TS 16949, QS 9000 and OHSAS 18001.
Jesus Benitez - Big Four ISMS auditor
Anton Aylward - CISSP, CISM, InfoSec consultant and IT Auditor for Canadian banks. COBIT
user since its inception.
Richard Regalado - Information Security Consultant (13 completed and certified ISMS projects);
ISO 9000 Lead QMS Auditor (150 organizations audited to date)
Khawaja Faisal Javed - CISA, MCP, MBA, IRCA reg. ISO27001 LA, itSMF reg. ISO 20000 LA,
ISO 9001 LA, ISO 14001 LA, OHSAS18001 LA, IRCA approved ISMS Lead Tutor for Lead
Auditor courses. More than 15 years in IT, InfoSec, System Analysis and Design, BPR QA/QC,
including a management system auditing experience of more than 9 years.
Kim Sassaman - ISO/IEC 27001 Lead Auditor, CISSP, IRCA Instructor for 27k LA course and
Implementors course, member ISO/IEC JTC1 SC27 CS1.
Prasad Pendse - ISO /IEC 27001 Lead Auditor,CISA
Mninikhaya Qwabaza (Khaya) - IT Governance Officer - Information Assurance, governance,
compliance, secure infrastructure design, DRP, IT Audit and evaluation, security assessment.
Eight years hands-on experience in information security.
Javier Cao Avellaneda -Information Security Consultant (1 completed and certified ISMS
project), IRCA 27001 Auditor, CISA
Plus Renato Aquilino Pujol, Marappan Ramiah, Mooney Sherman, Jasmina Trajkovski,
John South, Rob Whitcher, Alchap, Lakshminarayanan, Lee Evans, Rocky Lam, Pritam
Bankar and others who provided comments through the forum.
Feedback
Comments, queries and improvement suggestions (especially improvement suggestions!) are
welcome either via the ISO27k Implementers' Forum or to the project leader and forum administrator
Gary Hinson. We plan to continue developing this guideline in parallel with ISO/IEC 27007 and the
other ISO27k standards still in development.
Copyright
This guideline is copyright 2008, ISO27k Implementers' Forum, some rights
reserved. It is licensed under the Creative Commons Attribution-Noncommercial-
Share Alike 3.0 License. You are welcome to reproduce, circulate, use and create
derivative works from this provided that (a) it is not sold or incorporated into a commercial product,
(b) it is properly attributed to the ISO27k Implementers' Forum at www.ISO27001security.com,
(c) derivative works are shared under the same terms as this.
Introduction
The following checklist is generic. It reflects and refers to ISO/IEC 27001's requirements for Information Security Management Systems without regard
to any specific ISMS requirements that an individual organization might have (for example if they are subject to legal, regulatory or contractual
obligations to implement particular information security controls).
The checklist is primarily intended to guide, or to be adapted and used by, competent auditors including those working for internal audit functions,
external audit bodies and ISMS certification bodies. It can also be used for internal management reviews of the ISMS including pre-certification checks
to determine whether the ISMS is in a fit state to be formally audited. Finally, it serves as a general guide to the likely depth and breadth of coverage
in ISMS certification audits, helping the organization to prepare the necessary records and information (identified in bold below) that the auditors will
probably want to review.
The audit tests noted below are intended as prompts or reminders of the main aspects to be checked by competent, qualified and experienced IT
auditors. They do not cover every single aspect of ISO/IEC 27001. They are not meant to be asked verbatim or checked-off piecemeal. They are
not suitable for use by inexperienced auditors working without supervision.
Reminder: the workplan/checklist is not intended to be used without due consideration and modification. It is anticipated that ISMS auditors will
normally generate a custom workplan/checklist reflecting the specific scope and scale of the particular ISMS being audited, taking into account any
information security requirements that are already evident at this stage (such as information-security relevant laws, regulations and standards that are
known to apply to similar organizations in the industry). Also, the audit workplan/checklist may be modified during the course of the audit if previously
underappreciated areas of concern come to light. Finally, the workplan/checklist should reflect the auditors normal working practices, for example it
may need additional columns to reference audit evidence, indicate SWOT/PEST analyses of the findings etc.
4.2.1g) For those information security risks that are to be mitigated, review
the defined control objectives and selected controls using suitable
sampling e.g. stratified sampling by types of control (technical, physical,
procedural or legal), by risk ranking (high, medium or low), by location
(business units, sites/buildings etc.) or by other audit sampling
criteria. Compare the objectives and controls against those suggested by
ISO/IEC 27002 and summarized in Annex A of ISO/IEC 27001, in particular
identifying and reviewing any significant discrepancies from the standards
(e.g. commonplace objectives or controls from the standards that are not
used by the organization, or any that may have been added). Also check that
any information security requirements explicitly mandated by corporate
policies, industry regulations, laws or contracts etc. are properly reflected in
the documented control objectives and controls. [Note: the ISM audit
checklist in Appendix B may prove useful in auditing the controls, but beware
of sinking too much audit time into this one aspect]
4.2.1h) Briefly evaluate the residual information security risks. Has
management formally considered and approved them? Are they within the
organization's defined risk appetite?
5. Management responsibility
5.1 Review the extent of management commitment to information security,
using evidence such as:
Formal management approval of the ISMS policy manual
Management acceptance of ISMS objectives and implementation plans,
along with the allocation of adequate resources and assignment of
suitable priorities to the associated activities (see also 5.2.1)
Clear roles and responsibilities for information security including a
process for allocating and accepting accountability for the proper
protection of valuable information assets
Management memoranda, emails, presentations, briefings etc.
expressing support for and commitment to the ISMS
Risk acceptance criteria, risk appetite etc. relating to information security
risks
The scoping, resourcing and initiation of internal audits and management
reviews of the ISMS
8 ISMS improvement
8.2 Obtain and review information relating to ISMS corrective actions such
as reports and action plans from ISMS management review/s or audits (see
7.3), ISMS change requests, budget/investment proposals and business
cases etc. Seek evidence that the ISMS is in fact being materially improved
as a result of the feedback - more than just fine words, check the
documentation relating to closure of action plan items etc. to confirm whether
nonconformities and their root causes are actually being resolved by
management within reasonable timescales. Review that the corrective
actions taken address the root cause of the nonconformities and are effective.
8.3 In addition to making ISMS improvements resulting from actual
nonconformities previously identified, determine whether the organization
takes a more proactive stance towards addressing potential improvements,
emerging or projected new requirements etc. Seek evidence of ISMS
changes (such as adding, changing or removing information security controls)
in response to the identification of significantly changed risks.
*** End of checklist ***
Introduction
The following checklist is generic. It reflects and refers to ISO/IEC 27002's requirements for Information Security Management Systems without regard
to any specific control requirements that an individual organization might have in relation to information security risks identified through the risk
assessment and risk management processes.
This is a generic checklist to guide a general review of the organization's security controls against the guidance provided in ISO/IEC
27002. It cannot provide specific guidance on the particular risks and controls applicable to every situation and must therefore be
customized by an experienced IT auditor to suit the situation. For example, the organization's risk analysis may have determined that certain
control objectives are not applicable and hence the corresponding controls may not be required, whereas in other areas the control objectives may be
more rigorous than suggested in the standard and additional controls may be required. The Risk Treatment Plan should provide further details on
this.
The audit tests noted below are intended as prompts or reminders of the main aspects to be checked by competent, qualified and experienced IT
auditors. They do not cover every single aspect of ISO/IEC 27002. They are not meant to be asked verbatim or checked-off piecemeal. They are
not suitable for use by inexperienced auditors working without supervision.
Reminder: the workplan/checklist is not intended to be used without due consideration and modification. It is anticipated that ISMS auditors will
normally generate a custom workplan/checklist reflecting the specific scope and scale of the particular ISMS being audited, taking into account any
information security requirements that are already evident at this stage (such as information-security relevant laws, regulations and standards that are
known to apply to similar organizations in the industry). Also, the audit workplan/checklist may be modified during the course of the audit if previously
underappreciated areas of concern come to light. Finally, the workplan/checklist should reflect the auditors normal working practices, for example it
may need additional columns to reference audit evidence, indicate SWOT/PEST analyses of the findings etc.
5. Security policy
5.1 Information security policy. Are the organisations Information
Security Management (ISM) policies available locally? Are the policies
communicated, understood and accepted? Obtain and review copies of any
local Business Unit (BU) policies, standards, procedures, guidelines
etc. covering ISM, such as:
Standards for physical security of the computer and telecommunications
installation and associated facilities;
HR procedures governing access to and use of IT services (e.g. issue of
usernames and passwords, disciplinary procedures);
End user guidelines covering PC software licensing and virus prevention.
Check issue status, confirm when last reviewed and whether any recent
changes have been incorporated. Are references to relevant standards
(e.g. ISO/IEC 27002) and laws (e.g. Computer Misuse Act, Privacy/Data
Protection Act) incorporated? Do BU standards etc. comply with the
organisation policies? Are they reasonable and workable? Do they
incorporate suitable and sufficient controls? Do they cover all essential
computing and telecommunications services? Would any of the BU
standards, guidelines etc. be useful/applicable elsewhere in the
organisation (best practice)?
7. Asset management
7.1 Responsibility for assets. Review arrangements to establish and
maintain an inventory of information assets (computer and communications
hardware/systems, application software, data, printed information). How is
the inventory maintained fully up-to-date, accurate and complete despite
equipment/staff moves, new systems etc.? Is there a registration process
for new application systems? Are there asset tags on all PCs, network
equipment etc.? Are power and data cables clearly labelled and are wiring
diagrams kept complete and up-to-date?
10.5 Backups. Check the backup strategies and procedures. Are they
documented and tested? Do the strategies cover data, programs, system
files, parameter files etc. for all systems including servers, desktops,
phone/network systems, system/network management systems,
standalone/portable systems, control systems etc.? Are backup frequencies
and types appropriate? Are backup media protected against loss, theft,
damage, fire including both on-site and off-site/remote storage e.g. are fire
safes BS-certified or better and normally locked shut? Using a small sample,
check whether backup tapes listed in the procedures/records actually exist in
the right place and are properly labelled. Request proof of management
review of backups against backup policy
10.10 Monitoring. Ascertain how the main systems monitor, log and report
security incidents. Who is responsible for reviewing and following-up on
reports? Is the process running reasonably well in practice? Is there a
process in place for reviewing and responding appropriately to security alerts
from vendors, CERTs, government sources etc.? Check for evidence that
the process is working effectively.
15 COMPLIANCE
15.1 Compliance with legal requirements. Ascertain how statutory,
regulatory, contractual and business requirements for information security
that are relevant and applicable to the organization, are identified, including
changes and new requirements. Determine whether the organization is
subject to specific legal obligations for data protection and privacy (such as
HIPAA, Act of Protection of Personal Information, Data Protection Act,
Privacy Act etc.) and/or similar contractual obligations, then ascertain
whether the corresponding information security controls are in place. Check
for example that procedures are in place to comply with requirements on the
use of copyright materials, such as software licenses. Ascertain how
important organizational records are protected from loss, destruction and
falsification in accordance with statutory, regulatory and business
requirements. Do the storage/archival arrangements take account of the
possibility of media deterioration (e.g. controlled storage conditions, periodic
integrity checks and/or transfer to fresh media)? Are appropriate long-life
storage media used for long term storage? Review policies and practices to
determine whether the use of IT facilities for any non-business or
unauthorized purpose, without management approval, is treated as improper
use. Verify whether an appropriate warning message is presented to users
that they must acknowledge to continue with the log-on process. Verify
whether any monitoring procedures have been approved by legal counsel.
Verify whether the use of cryptography is in compliance with all relevant laws,
agreements/contracts and regulations.