<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Risk and Response Audit Services, Resources</title>
    <link>https://internalauditservice.com/resources</link>
    <atom:link href="https://internalauditservice.com/rss.xml" rel="self" type="application/rss+xml" />
    <description>Practical guides and audit insights on ISO 27001, ISO 42001, and ISO 9001 internal audits, drawn from real engagement work.</description>
    <language>en-us</language>
    <copyright>Risk and Response LLC</copyright>
    <managingEditor>audit@riskandresponse.com (Jonathan Major)</managingEditor>
    <webMaster>audit@riskandresponse.com (Jonathan Major)</webMaster>
    <generator>internalauditservice.com</generator>

    <item>
      <title>AI Search and Your ISMS: ISO 27001 A.5.34 &amp; A.8.21 Reframed</title>
      <link>https://internalauditservice.com/resources/ai-search-iso-27001-a5-34-a8-21</link>
      <guid isPermaLink="true">https://internalauditservice.com/resources/ai-search-iso-27001-a5-34-a8-21</guid>
      <pubDate>Thu, 30 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Jonathan Major</dc:creator>
      <category>ISO 27001</category>
      <category>AI</category>
      <category>GEO</category>
      <description>AI search reshapes ISO 27001 A.5.34 (PII) and A.8.21 (network services). What auditors now look for, gaps we flag, and a working baseline.</description>
    </item>

    <item>
      <title>Building a Defensible Data Deletion Request Process: An ISO 27001 Auditor's Guide</title>
      <link>https://internalauditservice.com/resources/data-deletion-request-process</link>
      <guid isPermaLink="true">https://internalauditservice.com/resources/data-deletion-request-process</guid>
      <pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Jonathan Major</dc:creator>
      <category>ISO 27001</category>
      <category>Privacy</category>
      <category>GDPR</category>
      <description>ISO 27001 A.5.34 plus GDPR Article 17, what auditors look for, the gaps we flag in internal audits, and a working template for a defensible data deletion request process.</description>
    </item>

    <item>
      <title>Threat Modeling in the SDLC: What ISO 27001 A.8.25 and A.8.26 Actually Demand</title>
      <link>https://internalauditservice.com/resources/threat-modeling-sdlc-iso-27001</link>
      <guid isPermaLink="true">https://internalauditservice.com/resources/threat-modeling-sdlc-iso-27001</guid>
      <pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Jonathan Major</dc:creator>
      <category>ISO 27001</category>
      <category>SDLC</category>
      <category>Threat Modeling</category>
      <description>Most SDLCs claim threat modeling. Most can't produce a single completed threat model on demand. What A.8.25 and A.8.26 require, the gaps we flag in audits, and a working template you can adopt in one sprint.</description>
    </item>
  </channel>
</rss>
