Skip to content
TECHNOMATON | Docs SAI Certified Trainers

Audit & Monitoring

Version: 1.0 | Effective from: 1 January 2026


1. Purpose

This directive defines the requirements for audit, monitoring, and continuous improvement of the compliance programme.


2. Audit Programme

2.1 Types of audits

TypeFrequencyScopeConducted by
Internal auditQuarterlyRotating areasCompliance Officer
External auditAnnuallyFull ISMSExternal auditor
Compliance checkSemi-annuallyRegulatory requirementsDPO + CISO
Penetration testAnnuallyFull scopeExternal vendor
Vulnerability scanMonthlyAll systemsIT Security

2.2 Internal Audit Programme

2.3 Audit Process


3. Continuous Monitoring

3.1 Security Monitoring

AreaMonitoringToolAlert threshold
AuthenticationFailed loginsSIEM>5 failures / 10min
AccessPrivileged accessPAMAny admin access
NetworkTraffic anomaliesIDS/IPSSignature match
EndpointMalware detectionEDRAny detection
ApplicationError ratesAPM>1% error rate
DataSensitive data accessDLPAny PII export

3.2 Compliance Monitoring

RegulationMetricTargetMeasurement
AI ActAI inventory completeness100%Quarterly
AI ActHigh-risk AI documentation100%Monthly
NIS2Patch compliance>95%Monthly
NIS2Incident response time<4h (critical)On incident
GDPRDSAR response time<30 daysPer DSAR
GDPRBreach notification<72hOn breach

3.3 Monitoring Dashboard


4. Key Performance Indicators

4.1 Security KPIs

KPITargetCurrentTrend
Patch compliance (critical)>99%
Patch compliance (high)>95%
MFA adoption100%
Phishing click rate<5%
Mean time to detect (MTTD)<1h
Mean time to respond (MTTR)<4h

4.2 Privacy KPIs

KPITargetCurrentTrend
DSAR response time<30 days
DSAR compliance rate100%
Data mapping accuracy>95%
DPA coverage100%
Privacy training completion100%

4.3 AI Governance KPIs

KPITargetCurrentTrend
AI inventory completeness100%
Risk classification coverage100%
High-risk AI documentation100%
Bias testing frequencyMonthly
AI incident rate<1/quarter

5. Risk Register

5.1 Risk Register Template

Risk IDDescriptionCategoryLikelihoodImpactScoreStatusMitigation
RISK-001AI/NIS2/GDPR1-51-5LxIOpen/Mitigated

5.2 Risk Review Process

FrequencyActivity
WeeklyNew risks identification
MonthlyRisk register review (CISO + DPO)
QuarterlyRisk treatment plan update (C-level)
AnnuallyFull risk assessment refresh

5.3 Risk Acceptance

Risk acceptance criteria:

Risk ScoreAcceptanceApproval
1-5 (Low)AutomaticRisk owner
6-12 (Medium)With mitigationCISO/DPO
13-20 (High)ExceptionalCTO + CEO
21-25 (Critical)NeverN/A

6. Reporting

6.1 Report Schedule

ReportAudienceFrequency
Security metricsIT ManagementWeekly
Compliance statusC-levelMonthly
Risk registerBoardQuarterly
External auditBoard + RegulatorsAnnually

6.2 Monthly Compliance Report Template


7. Continuous Improvement

7.1 PDCA Cycle

7.2 Lessons Learned

After each incident or audit:

  1. Document — What happened
  2. Analyze — Root cause
  3. Identify — What to improve
  4. Implement — Changes
  5. Verify — Effectiveness

7.3 Improvement Register

IDSourceDescriptionStatusDeadline
IMP-001Incident
IMP-002Audit

8. Documentation Requirements

8.1 Retention Schedule

DocumentRetentionNote
Audit reports5 yearsAfter audit cycle ends
Compliance evidence5 yearsFor regulatory inspections
Risk assessments5 yearsAfter validity expires
Training records3 yearsAfter employee departure
Meeting minutes3 years
Metrics data2 yearsFor trend analysis

9. Tools & Systems

CategoryToolPurpose
GRCOneTrust, ServiceNowCompliance management
SIEMSplunk, Elastic, SentinelSecurity monitoring
VulnerabilityQualys, Nessus, TenableScanning
DLPMicrosoft Purview, SymantecData protection
PAMCyberArk, BeyondTrustPrivileged access
TrainingKnowBe4, ProofpointSecurity awareness

10. Policy Review

  • Monthly: Security metrics review
  • Quarterly: Audit findings review, risk register update
  • Semi-annually: Policy effectiveness assessment
  • Annually: Full policy review + external audit

Next review: Q2 2026