# 01 - basic audit

## [CISO Assistant: starting an audit](https://app.guidde.com/playbooks/68qUXmai1HgEMzMooV7g6b)

{% embed url="<https://app.guidde.com/share/playbooks/68qUXmai1HgEMzMooV7g6b>" %}

Start your audit confidently with CISO Assistant by setting up your organization's domains and security perimeters. This guide helps you create an audit baseline aligned with ISO/IEC 27001:2022 and understand your organization's security context.

#### Go to [localhost:5173](http://localhost:5173)

#### 1. Click "Organization"

Access the Organization settings to begin configuring your domain management.

![Click 'Organization'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2Fw3RmWn1Ep1UfNKC2jEd5vB_doc.png?alt=media\&token=2f44a4cf-6b6b-4ff2-a5c7-e93f2b76d964)

#### 2. Click "Domains"

Navigate to the Domains section to manage your organization's domain details.

![Click 'Domains'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FwaSEBAgQeUwwrDzU1pJCQN_doc.png?alt=media\&token=876b0fd9-b96e-4c10-9330-ed8f3b39b331)

#### 3. Click here

Initiate the process to add a new domain by selecting the appropriate option.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FajLTs31DjDLhV9TXLysjtW_doc.png?alt=media\&token=23979dc4-7169-4b4a-9801-f552097af319)

#### 4. Click here

Enter a descriptive name for your new domain to clearly identify it.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FcdcT9a7nDBR1xWw8oqkAtd_doc.png?alt=media\&token=d5667607-a8b8-48c3-813f-ba15755534b5)

#### 5. Fill "explainer"

Save the newly created domain to register it within your organization.

![Fill 'explainer'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F5h2R9uQH8i5r6FTF4hfxFg_doc.png?alt=media\&token=9a1c7326-0c2e-4713-b7c7-fce273eb5a55)

#### 6. Click "Save"

Select the domain you just created to begin setting up its security perimeter.

![Click 'Save'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2Fm9wYgBQ4X76Z6egBNgbyk3_doc.png?alt=media\&token=5e585ecd-b8e7-452b-89c2-fc05a49d927f)

#### 8. Pick "explainer" domain

Start adding a new security perimeter to define the domain's protective scope.

![Click 'explainer'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F7REFTEX9qNdc8wDAYFJXaG_doc.png?alt=media\&token=7b9f8d22-7d25-4db7-9a00-7f2aa36166b3)

#### 9. Click "Add perimeter"

Choose the option to specify the perimeter's characteristics and settings.

![Click 'Add perimeter'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F8WdLnGaq2PDhaKaNLvzgAn_doc.png?alt=media\&token=f8b93555-bf74-4736-99ee-dc46ecd4cdbc)

#### 10. Click here

Provide a clear and concise name for the new security perimeter.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F4UzUZHfGzq6Fy2L4PQMMdS_doc.png?alt=media\&token=8987f518-aa29-4e44-9120-dd19829e01b7)

#### 11. Fill "general"

Save the perimeter settings to apply them to the domain.

![Fill 'general'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F2jYe3PLHj6yvfTehHjZEhV_doc.png?alt=media\&token=fc51666b-0e10-4ed5-8c5a-fdc331878063)

#### 12. Click "Save"

Return to the General settings to prepare for audit creation.

![Click 'Save'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FpMJnNEC1CNyAohgcF2EhPq_doc.png?alt=media\&token=82e2862c-9b56-425c-b1c0-3a817575b1e4)

#### 13. Click "General"

Begin creating a new audit to assess your organization's security posture.

![Click 'General'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F9nUEyDx1R153NmDNWRjxm1_doc.png?alt=media\&token=8cb6a279-4353-48fb-bed8-febd6ecb3213)

#### 14. Click "New Audit"

Select the option to add a new audit baseline for evaluation.

![Click 'New Audit'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FwJsHPd27EwUVPFx3iQ3Sqh_doc.png?alt=media\&token=c9f3e75b-492c-4779-92d8-e092807ac103)

#### 15. Click here

Name your audit baseline to reflect its purpose or scope.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F94NT7eypeXe71GFFbJkpVG_doc.png?alt=media\&token=0752878a-717a-4160-a8d4-1437fb4106ca)

#### 16. Fill "my baseline"

Specify the audit type or category to align with your compliance goals.

![Fill 'my baseline'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FjVUJd99QwC8GNDeba3L4yZ_doc.png?alt=media\&token=a44af7bc-f47e-4237-a8dc-dcbc126a478c)

#### 17. Click here

Choose the relevant standard or framework for your audit.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FtvduYKuWj1D2z5QrT9o8N8_doc.png?alt=media\&token=7cce6478-cb78-4058-a8a7-9a7823442caa)

#### 18. Search "iso"

Select the International standard ISO/IEC 27001:2022 to align with recognized security practices.

![Fill 'iso'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F9epKUsa358ZfbwEgLxCjGj_doc.png?alt=media\&token=dd5f9161-e5b4-47ba-8e2f-c100961f9aeb)

#### 19. Click "International standard ISO/IEC 27001:2022"

Confirm and save your audit configuration to proceed.

![Click 'International standard ISO/IEC 27001:2022'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F5w9F5twQ3Lg8fctShbv5WS_doc.png?alt=media\&token=618acbb6-41d8-4802-bda9-cf9aa9aed2f7)

#### 20. Click "Save"

Access the detailed audit sections to review specific requirements.

![Click 'Save'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2Fi9vCEB2Zn3pHGFDEptbcNd_doc.png?alt=media\&token=d34a3638-b55d-407c-8b1c-c1f1621d4ed8)

#### 21. Open the tree structure

Select the section focused on the organization's context for information security.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FkgZQBDoeNZFqAVozRUK17W_doc.png?alt=media\&token=71d66fd2-a12a-44f4-a459-6bb77d9932ee)

#### 23. Enter an item to review/update it

Ensure your Information Security Management System (ISMS) aligns with your organization's context by addressing these factors.

![Click 'Identify internal and external factors that influence the organization’s ability to achieve information security objectives, ensuring the ISMS is aligned with its context.'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2Fa27bCyziSdsee7qcnL46nM_doc.png?alt=media\&token=0112364f-3d0e-425f-be0c-1c8a24db5e30)

This guide walked you through setting up domains and security perimeters, creating an audit baseline, and aligning your ISMS with ISO/IEC 27001:2022 standards. You learned to identify organizational factors critical to achieving information security objectives.

[Powered by **guidde**](https://www.guidde.com)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://intuitem.gitbook.io/ciso-assistant/ca-journeys/overview.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
