Posted on Leave a comment

ISO 17025 Internal Audit Checklist for Labs (Clause 8.8)

ISO 17025 internal audit checklist for labs Clause 8.8 with audit steps

An ISO 17025 internal audit is your lab’s planned, recorded check that your system and technical work produce valid results. This playbook demonstrates how to develop a risk-based audit program, conduct a comprehensive audit of a real report from end to end, write defensible findings, and close corrective actions with supporting evidence. Use it to prevent repeat nonconformities and protect traceability.

Most labs fail internal audits for one reason. They audit paperwork, not the measurement system. A strong internal audit proves the result pipeline is controlled, from contract review to report release. That focus reduces customer complaints, reduces rework, and stops “we passed the audit” from masking weak technical control.

What ISO 17025 Internal Audit Must Prove

An internal audit is not a rehearsal for an external assessment. It is your lab verifying, on its own terms, that requirements are met and risks to validity are controlled. Clause intent becomes practical when you translate it into evidence, sampling, and follow-up discipline.

A good internal audit proves four things. First, your system is implemented, not just documented. Second, your technical work is performed according to the current method and within defined controls. Third, your results are traceable and supported by valid uncertainty logic where applicable. Fourth, corrective actions remove causes and do not repeat.

Many labs split audits into “management” and “technical,” but they forget the bridge between them. That bridge is the report. Reports connect contract review, method control, equipment status, competence, calculations, and authorisation. When you audit through the report, you automatically cover what matters.

How To Build A Risk-Based Audit Program

A defensible audit program follows risk, not calendar habit. Risk in a lab is driven by change, complexity, consequence, and history. New methods, new analysts, software changes, equipment failures, complaints, subcontracted steps, and tight customer tolerances all increase risk because they increase the chance of an invalid result.

Keep the risk rating simple so it gets used. A three-tier model is enough. High-risk areas get more frequent audits and deeper techniques like witnessing and recalculation. Medium risk gets a balanced mix of record review and selected witnessing. Low risk still gets coverage, but with lighter sampling and more focus on trend signals.

Independence and competence must be designed together. An auditor who does not understand the technical work will miss the real failure modes. An auditor who audits their own work will rationalise weak controls. Cross-auditing by method families is a practical solution because it maintains objectivity while keeping technical intelligence.

Use the following schedule logic as an internal rule set. This is the fastest way to make your audit program look intentional and defensible.

Set your baseline cycle first, then apply triggers that pull audits forward.

  1. Cover every method family on a planned cycle, even if the risk is low.
  2. Trigger a targeted audit within 4 to 8 weeks after any method revision, software update, or equipment replacement.
  3. Trigger a witness audit for the next 3 jobs after any new analyst authorisation.
  4. Trigger an audit trail review of the specific report within 10 working days after any complaint.
  5. Trigger supplier evidence verification each cycle for any subcontracted calibration or test step.
  6. Trigger an impartiality check when commercial pressure, rush requests, or conflicts appear.

Once these rules exist, keep a one-page record that links each rule to risk and validity. That single page becomes your “why” when someone questions frequency.

ISO 17025 Internal Audit Planning That Tests Results

ISO 17025 Internal Audit wins or loses on one choice. You must select the audit anchor. The best anchor is a completed report because it is the product the customer trusts. Start from the report, trace backward into records and controls, then trace forward into review and release evidence.

Sampling must also be defensible. Avoid “audit everything” because it creates shallow checking. Avoid “audit one record” because it can miss systematic issues. A practical approach is to sample by risk tier, then ensure every critical method family gets at least one full audit trail per cycle.

Clause 8.8 Checklist Table 

RequirementAudit QuestionEvidence Required (IDs)Y / N / N/ARisk If Broken (Validity Impact)
8.8.1aDo we have an internal audit program covering the management system and technical work?Audit Program ID, Audit Plan #, Scope Map / Method ListCoverage gaps hide invalid results
8.8.1bIs audit frequency based on importance, changes, and past results?Risk Register ID, Change Log IDs, Last Audit Report #, Schedule RevHigh-risk changes go unaudited
8.8.2aAre audit criteria and scope defined for this audit?Audit Plan #, Criteria / Clause Map, Scope StatementAudit becomes subjective and shallow
8.8.2bAre auditors objective and impartial for this scope?Auditor Assignment Log, Independence Check / Conflict RecordBias lets failures repeat
8.8.2cAre results reported to relevant management?Audit Report #, Distribution Record, Management Review / Minutes IDActions stall, issues persist
8.8.2dAre corrections and corrective actions implemented without undue delay?CAPA IDs, Due Dates, Containment Record IDs, Closure Evidence IDsInvalid output may reach customers
8.8.2eIs corrective action effectiveness verified?Effectiveness Check ID, Follow-up Audit Plan #, Post-fix Sample Check IDsSame nonconformity returns

Choose audit techniques that match the risk. A record review is good for document control and contract review. Observation is essential for environmental controls and method adherence. Recalculation is essential for spreadsheets, rounding, and uncertainty logic. Witnessing is essential when competence and technique matter.

Internal Audit Coverage Map for ISO 17025 Labs

Use this matrix to keep coverage balanced and to stop audits from becoming opinion-based. It tells the auditor what to verify and what “good evidence” should look like.

Lab ProcessHow To AuditMinimum Sample RuleWhat Good Evidence Looks Like
Contract ReviewRecord Review + Interview3 jobs per monthRequirements captured, scope accepted, deviations approved
Method ControlRecord Review2 methods per cycleCurrent revision in use, controlled change history
Personnel AuthorisationRecord Review + Interview2 staff per cycleTraining, supervised practice, and authorisation sign off
Equipment StatusRecord Review5 instruments per cycleCalibration valid at use date, intermediate checks logged
TraceabilityRecord Review3 jobs per cycleReference standards valid, ranges appropriate, fit for purpose
Environmental ControlObservation + Record Review2 days sampledLogs within limits, alarms addressed, actions recorded
CalculationsRecalc + File Review1 critical point per jobFormula correct, units correct, version controlled
Uncertainty EvaluationRecord Review + Recalc1 method per cycleComponents justified, budgets current, changes reviewed
Data IntegritySystem Review + Record Sample5 records per cycleAccess control, audit trails, backups, and change logs
Reporting And ReviewRecord Review3 reports per monthIndependent review evidence, authorised release, controlled template

How To Run The Audit On The Floor

Execution is where audits become either useful or political. You reduce friction by being precise. State scope, timeboxes, and evidence rules in the opening meeting. Confirm what will be witnessed and what records will be sampled. Make it clear you are auditing process control, not judging individuals.

Evidence notes must be written so that another auditor can replay them later. That means you record job IDs, record IDs, dates, instrument IDs, method revision, and what was observed. Avoid vague phrases like “seems ok.” Replace them with specific evidence anchors.

Witnessing should be selective and purposeful. Watch steps where technique affects outcome, such as setup, stabilisation, intermediate checks, environmental control, and decision rules. When you witness, you are looking for hidden variability, not just whether someone can follow a script.

The One-Report Backtrace Method

This is the fastest way to audit technical competence without auditing the entire lab. Pick one released report and validate its full evidence trail.

1. Start With The Report

Confirm identification, scope, method reference, and authorisation.

2. Pick One High-Risk Point

Select one high-risk point and redo the math from raw readings.

3. Validate Calculation Discipline

Confirm units, rounding, and that the calculation file is controlled.

4. Verify Instrument Status

Verify the instrument used was within calibration on the measurement date, and that intermediate checks exist where required.

5. Check Reference Standards Fit

Confirm reference standards were appropriate for the range and capability.

6. Confirm Environmental Compliance

Verify environmental logs support the method requirements during the run.

7. Verify Analyst Authorisation

Confirm the analyst had authorisation for that method revision at that time.

8. Close With Release Controls

Finish by checking review evidence and template control at release.

This single trail catches the most common failure mode in labs. Numbers can be correct while traceability or control is broken. A technical audit must test both.

How To Write Findings And Close CAPA

Findings must be written like engineering statements. A strong finding ties a requirement to a condition and supports it with objective evidence. It then states the risk to the validity or compliance and defines the scope. That structure prevents debate because it is built on facts.

Severity should follow risk to valid results. Anything that can affect traceability, uncertainty validity, data integrity, or impartiality should be treated as a higher priority because it can change customer decisions. Administrative misses still matter, but they rarely carry the same technical risk.

Corrective action should remove the cause, not just patch the symptoms. Training alone is rarely a complete action unless you also fix the control that allowed the error. Spreadsheet version control, template locking, review gates, authorisation rules, and intermediate checks are examples of controls that prevent recurrence.

Use the closure gates below to keep CAPA disciplined and measurable. Apply these closure gates before you mark any action complete.

  1. Evidence exists. Record IDs, logs, or controlled files prove the fix is real.
  2. Scope is checked. Similar jobs are sampled to confirm it was not systemic.
  3. Recurrence control is added. A procedure, template, or gate is updated to prevent repetition.
  4. Competence is verified. The analyst demonstrates the corrected step under observation.
  5. Result protection is confirmed. If validity is at risk, affected results are assessed and handled.
  6. Effectiveness is proven. A follow-up check after 4 to 8 weeks shows the issue cannot recur.

When you use these gates, repeat findings drop, closure time improves, and internal audits stop feeling like paperwork.

FAQ

What Is An ISO 17025 Internal Audit?

It is a planned and recorded check performed by your lab to confirm requirements are met, and results remain valid. Strong audits trace one released report back to raw data, method control, equipment status, and authorisation, then confirm review and release controls.

How Often Should Internal Audits Be Done In ISO 17025?

Frequency should follow risk. Stable methods can run on a planned cycle, while complaints, changes, new staff, new equipment, or method revisions should trigger targeted audits sooner. A defendable schedule is based on change and impact on validity.

Who Can Conduct An Internal Audit In An ISO 17025 Lab?

Auditors must be competent in what they audit and objective in judgment. They should not audit their own work or decisions. Cross-auditing across sections is a practical pattern because it keeps independence while preserving technical understanding.

What Is The difference between a Technical Audit and a Management System Audit?

A management system audit checks system controls like document control, contract review, complaints, and corrective action flow. A technical audit checks method control, traceability, calculations, uncertainty, witnessing of work, and data integrity to confirm that the result pipeline is valid.

How Do You Write A Nonconformity In An ISO 17025 Audit?

Write the requirement, observed condition, objective evidence, risk to validity, and scope. Use record IDs, dates, instrument IDs, and the exact control that failed. Avoid vague wording and avoid personal tone so corrective action becomes precise and testable.

Conclusion

ISO 17025 internal audits are valuable only when they protect the validity of the results. Build a risk-based program that pulls audits forward when changes and complaints appear.

Anchor technical audits to one released report and trace it through calculations, raw data, method control, traceability, environmental evidence, competence, and authorised release. Write findings with evidence and risk, then close CAPA with measurable gates that prove effectiveness. Run audits this way, and you do not just stay compliant. You build a lab that produces defensible results under pressure.

Posted on Leave a comment

ISO 17025 Audit Playbook: Fast Lab Audits That Close

ISO 17025 audit playbook illustration for fast lab audits and closure

An ISO 17025 audit should test competence, not paperwork. This playbook shows how to plan the audit program, sample technical evidence, run a fast vertical witness audit, and close findings so they do not return. Every step stays lab-first, evidence-led, and practical.

Many labs pass document checks and still fail reality. That gap shows up in method drift, weak traceability, or fragile calculations. It also shows up when a review becomes a stamp. Repeat findings then become normal. Closure slows down. Corrective actions change words, not controls.

A high-quality audit breaks that loop. It forces one discipline every time. Requirement ties to evidence. Evidence ties to behavior. Behavior ties to result validity. Once that chain holds, audits stop feeling seasonal. They start acting like technical control.

What Does An ISO 17025 Audit Check?

An audit is not a search for missing signatures. It is a structured test of technical control. Strong audits behave like engineering checks. They sample real work and try to break it.

Think of your lab as a decision factory. Inputs arrive as samples, instruments, and requirements. The process applies methods, equipment controls, and calculations. Output leaves as a report and often a decision. One weak link can corrupt the result.

Ask one hard question each time. If a customer challenges this report tomorrow, can you defend it fast? Evidence should answer, not memory. When that is true across samples, the control is real.

How To Plan An ISO 17025 Audit Program

A one-off annual checklist is an event. A program is coveredby design. Start by turning your scope into audit units. Use methods, ranges, sites, and critical equipment. Include reporting paths and authorization groups, too. Coverage must match what can break validity.

Risk should drive frequency. New methods deserve early audits. Staff turnover raises risk fast. Supplier changes can break traceability. Template edits can corrupt calculations. Complaints and QC drift also matter. Stable areas can run slower, but never disappear.

Auditor capability matters as much as independence. A weak auditor misses technical drift. A smart approach is a paired team. Use one audit lead and one method specialist. That combination finds defects sooner.

Audit Coverage Map

What To Audit FirstEvidence To PullTypical Failure ModeFive-Minute Check
Reports With DecisionsReport, raw data, decision inputsRight number, wrong decisionRe-run one decision from recorded inputs
High-Risk MethodsMethod version, changes, verificationDrift without re-verificationMatch method in use to verification scope
Critical EquipmentStatus, due dates, intermediate checksAn expired or unsuitable tool was usedCompare the last use to the status and due date
Traceability ChainCertificates and reference recordsBroken chain or weak cert controlTrace one tool back to a reference record
Data HandlingTemplates, exports, calculation traceFormula drift or manual editsRecompute one result from raw inputs
Personnel AuthorizationAuthorization and competence recordsUnauthorised work releasedTrace signer authority for three reports
Review EffectivenessReview evidence and correctionsReview becomes a stampFind one defect caught by the review

This table is a failure-mode map. It tells you what to audit first. It also keeps the audit small and sharp.

What Evidence To Sample In An ISO 17025 Audit

Sampling is where audits win or fail. Shallow sampling checks that documents exist. Deep sampling checks controls work in practice. Deep sampling can stay small. You just need good choices.

Use two styles on purpose. Horizontal sampling checks one control across many jobs. Vertical sampling checks one job across many controls. Horizontal finds systemic gaps. Vertical proves technical competence.

Keep a simple sampling rule. Choose three to five recent jobs. Force each job through the full chain. Trace request, method, equipment, and authorization. Check raw data and calculations. Confirm review evidence and release logic.

Use this set to expose control quickly:

  • Pick one report that used critical equipment. Validate status and suitability. Check intermediate checks and any out-of-tolerance actions.
  • Select one method that changed recently. Confirm the method version matches the records. Verify the evidence matches the version in use.
  • Choose one report with a conformity decision. Trace decision inputs and uncertainty use. Confirm the decision path is consistent.
  • Pull one QC or trend record. Confirm the drift-triggered action. Check that the action was evaluated later.
  • Trace one authorized signer. Confirm that current competence evidence exists. Verify authorization matches the scope of work.

Finish with one hard proof test. Recalculate one key result from raw data. Use recorded inputs and the approved path. That step kills most paper illusions.

How To Run A Vertical Audit In ISO 17025

Most guides mention witnessing as a concept. This section gives you a drill. It fits inside a normal lab day. It also tests competence without bloating effort.

Select one job that matters. Use a high-impact report or a high-risk method. You can also use a repeat-finding area. Follow the job from intake to release. Do not accept “we usually do” answers. Evidence must lead every step.

Observe one critical activity in real time. Choose a step where an error changes the result. Sample prep, setup, or measurement steps work well. Watching reality exposes drift. Drift rarely shows in documents.

Close the drill with a verification. Pick one computed value on the report. Rebuild it from raw data. Use the recorded inputs. If the lab cannot reproduce its number fast, control is weak.

Run this drill monthly for high-risk methods. Use a quarterly cadence for stable areas. The drill becomes an early warning system. That is what a program should provide.

How To Close ISO 17025 Audit Findings

Findings repeat for two reasons. The finding is vague. Or the fix is cosmetic. Both problems are preventable with discipline.

Write findings like engineering defect reports. Use requirement, evidence, gap, and risk. That structure makes closure objective. It also makes prioritization clear. Risk should be explicit, not implied.

Corrective action must change the control. Training can support a fix. Training alone rarely prevents recurrence. Real controls include template locks and hard stops. Review gates should include measurable checks. Verification triggers should fire after method changes. Authorization logic should block unapproved release.

Use these rules to stop repeat findings:

  • Write each finding so it is reproducible. A third party should recreate the gap from the records.
  • Tie the action to a control change. Document edits do not block failure paths.
  • Verify effectiveness on fresh work. Do not re-check the same record set.
  • Treat repeated minors as one upstream cause. Fix the upstream control first.
  • Track repeat-finding rate each quarter. That KPI exposes weak controls fast.

Closure quality is not about prettier reports. It is about removing the error path.

ISO 17025 Internal Audit Checklist

This checklist is a runnable sequence. Use it to keep audits tight. It is built for technical depth and clean closure.

Scope: Define methods, ranges, and sites. Pick one high-risk method for a vertical trace.


Criteria: State what you audit against. Include internal procedures and customer commitments.


Sampling Plan: Choose three to five jobs. Reserve one for a full end-to-end trace.


Evidence Pull: Collect raw data, calculation trace, and method version proof. Pull the equipment status and review the proof, too.


On-Floor Check: Observe one technical activity in real execution. Compare behavior to method steps and records.


Traceability: Trace one working tool and one reference. Verify certificates, intervals, and intermediate checks.


Uncertainty And Decisions: For one decision, verify inputs and uncertainty use. Confirm the decision logic is consistent.


Validity Monitoring: Pick one QC or PT record. Verify drift triggered action and later evaluation.

Nonconforming Work: Follow one nonconformance end-to-end. Check containment, root cause, and effectiveness proof.

Audit Records: Keep plan, scope, criteria, findings, and follow-up evidence together.

FAQ

1. What is an ISO 17025 audit?

It is an evidence-based check that your lab controls methods, competence, traceability, data integrity, review, and corrective action so results remain valid under normal variation.

2. What is the difference between an internal audit and an external audit?

Internal audits are your lab’s self-check for control and readiness. External audits or assessments are done by customers or accreditation bodies to verify competence against defined criteria.

3. How often should internal audits be performed?

Frequency should follow risk. High-risk methods and recent changes need a tighter cadence. Stable areas can be audited less often, while still ensuring full scope coverage over time.

4. What should an auditor sample first?

Start with one released report. Trace it end-to-end through method version, equipment status, authorization, raw data, calculations, review evidence, and decision inputs.

5. How do you prove corrective action effectiveness?

Use fresh sampling after closure. Show that the failure path cannot recur under normal variation. If the same path still exists, effectiveness is not proven.