Auditing Cybersecurity Programs
Obtain organization charts or other artifacts describing the makeup and function of the security team. Interview functional leaders to gather more information.
Verify Adequate Policy Coverage
Verify Stakeholder Buy-In
Verify Processes Around the Policies
Review the awareness and communications functions of the security team, reviewing methods to train employees on security risks and concerns.
Review the vulnerability management function of the organization, ensuring that the team is aware of emerging threats and vulnerabilities and has processes to identify at-risk systems in the environment.
HOW
Assess the security monitoring function of the security team, reviewing log collection and alert processing and detection capabilities.
HOW
Assess the incident response function of the security team, ensuring that the organization is able to respond effectively to various kinds of security events.
HOW
Assess other functions of the security team as appropriate.
HOW
Review and evaluate policies and processes for assigning ownership of company data, classifying the data, protecting the data in accordance with their classification, and defining the data’s life cycle.
HOW
Determine how security policies and security risk are handled in organizational IT processes.
HOW
Review and evaluate processes for ensuring that security personnel have the skills and knowledge necessary for performing their jobs.
HOW
Assess that metrics are collected commensurate with the goals of the security program and that metrics are reported to appropriate management personnel.
HOW
Review processes around the use of managed security service providers (MSSPs) within the security team.
HOW
Determine how the organization ensures that its security controls are effective.
HOW
Last updated