1: Auditing Security Management Flashcards
Auditing security management activities require attention to keys such as
- Policies, processes, procedures, and standards
- Records
- Security awareness training
- Data ownership and management
- Data custodians
- Security administrators
- New and existing employees
Policies, processes, procedures, and standards
The auditor should request and examine information security policies to see what processes are required. This should be followed by requests to examine process and procedure documentation for key processes that are cited in security policies.
Records
the auditor should examine business records to see whether processes are active.
Security awareness training
The auditor should examine training materials, training procedures, and training records to determine the effectiveness of the organization’s security awareness training program.
Data ownership and management
The IS auditor should inquire about the methodology used to determine ownership and management of business data. The key point with data ownership and management is accountability:
Data custodians
the IS auditor should identify whether data custodians effectively carry out the wishes of the data owner, or act on their own as if they are the owner.
Security administrators
The IS auditor should determine if IT staff are knowledgeable about these duties and qualified to carry them out.
New and existing employees
The IS auditor should determine if any policies exist on this topic and whether security awareness training covers this theme.