ISO27k ISMS mandatory documentation checklists

For example, you may feel there is no need for controls against malware if your organization only uses cloud-based IT services through dumb terminals running simple web browsers; however, the certification auditor will raise the red flag if the information assets within the scope of the ISMS are, in fact, vulnerable to malware yet the malware ... ................
................