Governance, Compliance, and Risk
BlogInterviewing GuideGovernance Guide
  • Home
  • Governance
    • Policies, Procedures, and Guidelines
      • Policies
        • Policy Life Cycle Steps
        • Creating a Good Policy
        • Types of Policies
      • Procedure
      • Guideline
    • Business
      • Review of Security Requirements for Contracts
        • Request for Proposal (RFP)
        • Request for Quote (RFQ)
        • Request for Information (RFI)
      • Common Business Documents to Support Security
  • Compliance
    • Frameworks
      • ISO 27001
        • Changes from 2013 to 2022
      • SOC 2
        • The Planning Phase
        • Famework Subject Matter
        • Security Management Procedures
        • Prepare for Implementation
        • Initiating a SOC2 Audit
        • Conducting a SOC 2 Audit
      • FedRAMP
      • HITRUST
    • Security Controls
      • Asset Management (AST)
      • Business Continuity and Disaster Recovery (BCD)
      • Change Management (CHG)
      • Compliance (CPL)
    • Auditing
      • Gap Assessment/Analysis
      • Techniques
        • Auditing Cybersecurity Programs
        • Auditing Web Servers and Web Applications
        • Auditing Databases
        • Auditing Storage
        • Auditing End-User Computing Devices
        • Auditing Applications
        • Auditing Cloud Computing
  • Risk
    • Frameworks
  • Customer Security
    • What is Customer Security
    • Security Questionnaires: Questions
      • Security Governance
        • Does your organization conduct an annual independent information security review and act upon the fi
        • Does your organization have a documented Cybersecurity Policy or Information Security Policy?
        • Does your organization have a formal policy on the use of mobile devices?
        • Does your organization have a formal policy for remote working that includes security?
        • Does your organization have a documented Acceptable Use Policy
        • Does your organization have a documented Data Classification Policy?
        • Does your organization have a documented Access Control Policy?
        • Does your organization have a Password Policy?
        • Does your organization have a documented Backup Policy?
        • Does your organization enforce a Clear Desk and Screen Policy?
        • Are your organization's information security policies available to all employees?
      • Risk Assessment and Treatment
        • IT & Infrastructure Risk Governance
        • IT & Infrastructure Risk Assessment Life Cycle
        • Third-Party Risk Management
      • Asset and Information Management
        • Asset Management
        • Information Management
        • Media Security
        • Physical Media Transmission
        • Data Transmission
        • Encryption
        • Page 1
      • HR and Personnel Security
      • Operation Management
        • IT Operational Procedures
        • Change Control
        • System Acceptance Criteria
        • Time Synchronization
      • Access Control
        • Access Provisioning
        • Access Revocation
        • Authentication
        • Access Reviews
        • Password Controls
        • Remote Access
      • Application Security
        • Application Security Roles and Responsibilities
        • Secure Architectural Design Standards
        • SDLC
        • Web Server Security
        • API
        • Mobile Application Security
      • Incident Event and Communications Management
        • Cybersecurity Incident Management
        • Security Event Monitoring
      • Business Resiliency
        • Business Resilience Governance
        • Business Continuity Planning
        • Disaster Recovery Testing
        • Capacity Management and Redundancy
        • Backup and Recovery
      • Compliance
      • End User Device Security
      • Network Security
      • Privacy
      • Threat Management
      • Server Security
      • Cloud Hosting
Powered by GitBook
On this page
  • Verify Adequate Policy Coverage
  • Verify Stakeholder Buy-In
  • Verify Processes Around the Policies
  • Review the awareness and communications functions of the security team, reviewing methods to train employees on security risks and concerns.
  • Review the vulnerability management function of the organization, ensuring that the team is aware of emerging threats and vulnerabilities and has processes to identify at-risk systems in the environment.
  • Assess the security monitoring function of the security team, reviewing log collection and alert processing and detection capabilities.
  • Assess the incident response function of the security team, ensuring that the organization is able to respond effectively to various kinds of security events.
  • Assess other functions of the security team as appropriate.
  • Review and evaluate policies and processes for assigning ownership of company data, classifying the data, protecting the data in accordance with their classification, and defining the data’s life cycle.
  • Determine how security policies and security risk are handled in organizational IT processes.
  • Review and evaluate processes for ensuring that security personnel have the skills and knowledge necessary for performing their jobs.
  • Assess that metrics are collected commensurate with the goals of the security program and that metrics are reported to appropriate management personnel.
  • Review processes around the use of managed security service providers (MSSPs) within the security team.
  • Determine how the organization ensures that its security controls are effective.
  1. Compliance
  2. Auditing
  3. Techniques

Auditing Cybersecurity Programs

Obtain organization charts or other artifacts describing the makeup and function of the security team. Interview functional leaders to gather more information.

A security program should be expected to cover a minimal set of practices in some form or fashion, including:

  • Policy and compliance management - Defining security guidelines for the company

  • Awareness - Getting relevant security information into the hands of people who may need it

  • Vulnerability management - Helping the organization understand the risks and criticality of potential exploits and assisting with remediation

  • Security monitoring - Collecting log and alert data and detecting potential security events in the environment

  • Incident response - Dealing with viruses, breaches, or other malicious activities and helping to return the business to a normal state

Verify Adequate Policy Coverage

Obtain a copy of your company’s IT security policies. Ensure that they adequately cover your company’s IT environment. At a minimum, the policies should include coverage of the following areas:

  • Acceptable usage

  • Data Classification

  • Remote Access

  • Password Policy

  • Client Security

  • Server Security

  • Logical access

Verify Stakeholder Buy-In

Ensure that key stakeholders were included during policy creation. Obtain a list of employees involved in the creation and approval of the IT security policies, such as IT organizations that are expected to comply with the policy.

Verify Processes Around the Policies

Review processes for periodically reviewing and updating the policies to ensure that they keep up with the ever- changing IT environment. Look for evidence that these processes have been executed.

Review processes for periodically evaluating changes in the environment that might necessitate the development of new policies. Look for evidence that these processes have been executed.

Ensure that provisions have been made for obtaining approved exemptions from the policy. There inevitably will be occasions when people do not think that they can comply with the policy. A defined process should be in place whereby those people can formally request an exemption from the policy. They should be required to state why they need an exemption and define the compensating controls that will be put in place.

Review the awareness and communications functions of the security team, reviewing methods to train employees on security risks and concerns.

Discuss the scope of the security awareness program with the individual in charge of that function. You should expect the following primary elements in a complete program:

  • General security training for new employees

  • Periodic security training for current employees

  • Ongoing general security awareness

  • Role-specific security training for designated functions (for example, software developers)

Review the processes for providing general security training for new hires.

Review the content to ensure that basics are covered, such as employee expectations around security, information on company security policies, key areas of concern or risk for the company, how to report security issues, and so on.

Sample records from training systems or orientations to ensure that employees attended or reviewed security material.

Ensure that training is provided on a periodic basis. Depending on risk level and industry requirements, organizations may be required to provide security training very frequently, but many companies mandate annual or biennial security training for current employees.

Review the vulnerability management function of the organization, ensuring that the team is aware of emerging threats and vulnerabilities and has processes to identify at-risk systems in the environment.

HOW

Assess the security monitoring function of the security team, reviewing log collection and alert processing and detection capabilities.

HOW

Assess the incident response function of the security team, ensuring that the organization is able to respond effectively to various kinds of security events.

HOW

Assess other functions of the security team as appropriate.

HOW

Review and evaluate policies and processes for assigning ownership of company data, classifying the data, protecting the data in accordance with their classification, and defining the data’s life cycle.

HOW

Determine how security policies and security risk are handled in organizational IT processes.

HOW

Review and evaluate processes for ensuring that security personnel have the skills and knowledge necessary for performing their jobs.

HOW

Assess that metrics are collected commensurate with the goals of the security program and that metrics are reported to appropriate management personnel.

HOW

Review processes around the use of managed security service providers (MSSPs) within the security team.

HOW

Determine how the organization ensures that its security controls are effective.

HOW

PreviousTechniquesNextAuditing Web Servers and Web Applications

Last updated 2 years ago