# 01 - basic audit

## [CISO Assistant: starting an audit](https://app.guidde.com/playbooks/68qUXmai1HgEMzMooV7g6b)

{% embed url="<https://app.guidde.com/share/playbooks/68qUXmai1HgEMzMooV7g6b>" %}

Start your audit confidently with CISO Assistant by setting up your organization's domains and security perimeters. This guide helps you create an audit baseline aligned with ISO/IEC 27001:2022 and understand your organization's security context.

#### Go to [localhost:5173](http://localhost:5173)

#### 1. Click "Organization"

Access the Organization settings to begin configuring your domain management.

![Click 'Organization'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2Fw3RmWn1Ep1UfNKC2jEd5vB_doc.png?alt=media\&token=2f44a4cf-6b6b-4ff2-a5c7-e93f2b76d964)

#### 2. Click "Domains"

Navigate to the Domains section to manage your organization's domain details.

![Click 'Domains'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FwaSEBAgQeUwwrDzU1pJCQN_doc.png?alt=media\&token=876b0fd9-b96e-4c10-9330-ed8f3b39b331)

#### 3. Click here

Initiate the process to add a new domain by selecting the appropriate option.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FajLTs31DjDLhV9TXLysjtW_doc.png?alt=media\&token=23979dc4-7169-4b4a-9801-f552097af319)

#### 4. Click here

Enter a descriptive name for your new domain to clearly identify it.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FcdcT9a7nDBR1xWw8oqkAtd_doc.png?alt=media\&token=d5667607-a8b8-48c3-813f-ba15755534b5)

#### 5. Fill "explainer"

Save the newly created domain to register it within your organization.

![Fill 'explainer'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F5h2R9uQH8i5r6FTF4hfxFg_doc.png?alt=media\&token=9a1c7326-0c2e-4713-b7c7-fce273eb5a55)

#### 6. Click "Save"

Select the domain you just created to begin setting up its security perimeter.

![Click 'Save'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2Fm9wYgBQ4X76Z6egBNgbyk3_doc.png?alt=media\&token=5e585ecd-b8e7-452b-89c2-fc05a49d927f)

#### 8. Pick "explainer" domain

Start adding a new security perimeter to define the domain's protective scope.

![Click 'explainer'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F7REFTEX9qNdc8wDAYFJXaG_doc.png?alt=media\&token=7b9f8d22-7d25-4db7-9a00-7f2aa36166b3)

#### 9. Click "Add perimeter"

Choose the option to specify the perimeter's characteristics and settings.

![Click 'Add perimeter'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F8WdLnGaq2PDhaKaNLvzgAn_doc.png?alt=media\&token=f8b93555-bf74-4736-99ee-dc46ecd4cdbc)

#### 10. Click here

Provide a clear and concise name for the new security perimeter.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F4UzUZHfGzq6Fy2L4PQMMdS_doc.png?alt=media\&token=8987f518-aa29-4e44-9120-dd19829e01b7)

#### 11. Fill "general"

Save the perimeter settings to apply them to the domain.

![Fill 'general'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F2jYe3PLHj6yvfTehHjZEhV_doc.png?alt=media\&token=fc51666b-0e10-4ed5-8c5a-fdc331878063)

#### 12. Click "Save"

Return to the General settings to prepare for audit creation.

![Click 'Save'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FpMJnNEC1CNyAohgcF2EhPq_doc.png?alt=media\&token=82e2862c-9b56-425c-b1c0-3a817575b1e4)

#### 13. Click "General"

Begin creating a new audit to assess your organization's security posture.

![Click 'General'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F9nUEyDx1R153NmDNWRjxm1_doc.png?alt=media\&token=8cb6a279-4353-48fb-bed8-febd6ecb3213)

#### 14. Click "New Audit"

Select the option to add a new audit baseline for evaluation.

![Click 'New Audit'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FwJsHPd27EwUVPFx3iQ3Sqh_doc.png?alt=media\&token=c9f3e75b-492c-4779-92d8-e092807ac103)

#### 15. Click here

Name your audit baseline to reflect its purpose or scope.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F94NT7eypeXe71GFFbJkpVG_doc.png?alt=media\&token=0752878a-717a-4160-a8d4-1437fb4106ca)

#### 16. Fill "my baseline"

Specify the audit type or category to align with your compliance goals.

![Fill 'my baseline'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FjVUJd99QwC8GNDeba3L4yZ_doc.png?alt=media\&token=a44af7bc-f47e-4237-a8dc-dcbc126a478c)

#### 17. Click here

Choose the relevant standard or framework for your audit.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FtvduYKuWj1D2z5QrT9o8N8_doc.png?alt=media\&token=7cce6478-cb78-4058-a8a7-9a7823442caa)

#### 18. Search "iso"

Select the International standard ISO/IEC 27001:2022 to align with recognized security practices.

![Fill 'iso'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F9epKUsa358ZfbwEgLxCjGj_doc.png?alt=media\&token=dd5f9161-e5b4-47ba-8e2f-c100961f9aeb)

#### 19. Click "International standard ISO/IEC 27001:2022"

Confirm and save your audit configuration to proceed.

![Click 'International standard ISO/IEC 27001:2022'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2F5w9F5twQ3Lg8fctShbv5WS_doc.png?alt=media\&token=618acbb6-41d8-4802-bda9-cf9aa9aed2f7)

#### 20. Click "Save"

Access the detailed audit sections to review specific requirements.

![Click 'Save'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2Fi9vCEB2Zn3pHGFDEptbcNd_doc.png?alt=media\&token=d34a3638-b55d-407c-8b1c-c1f1621d4ed8)

#### 21. Open the tree structure

Select the section focused on the organization's context for information security.

![Click here](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2FkgZQBDoeNZFqAVozRUK17W_doc.png?alt=media\&token=71d66fd2-a12a-44f4-a459-6bb77d9932ee)

#### 23. Enter an item to review/update it

Ensure your Information Security Management System (ISMS) aligns with your organization's context by addressing these factors.

![Click 'Identify internal and external factors that influence the organization’s ability to achieve information security objectives, ensuring the ISMS is aligned with its context.'](https://static.guidde.com/v0/qg%2FJ0RVKao966SmT5uQXRHVpcgc2yd2%2F68qUXmai1HgEMzMooV7g6b%2Fa27bCyziSdsee7qcnL46nM_doc.png?alt=media\&token=0112364f-3d0e-425f-be0c-1c8a24db5e30)

This guide walked you through setting up domains and security perimeters, creating an audit baseline, and aligning your ISMS with ISO/IEC 27001:2022 standards. You learned to identify organizational factors critical to achieving information security objectives.

[Powered by **guidde**](https://www.guidde.com)
