Audits and Assessments Flashcards
Audit Types
1: Internal Audits and Assessments
Review processes, controls, and compliance
Importance
Ensure operational effectiveness and adherence to internal policies
2: External Audits and Assessments
Independent evaluations by external parties
Verification Areas
Financial statements
Compliance
Operational practices
Purpose of audits
Validate security measures
Identify vulnerabilities
Maintain compliance with regulatory standards
3 risk assessment categories
Risk Assessments
Vulnerability Assessments
Threat Assessments
Types of pen testing
Passive
Active
Internal audits focus on
Data protection
Network security
Access controls
Incident response procedures
Audit committee responsibilities
Reviewing financial reporting
Internal controls
Internal and external audits
Legal and regulatory compliance
Addresses issues raised by auditors
MCIT Cybersecurity Self-Assessment
MCIT’s Cybersecurity Self-Assessment checklist is
designed to help organizations minimize data and
cybersecurity-related exposures
It assists in identifying areas where data security may
need strengthening
The checklist comprises yes-or-no questions with
sections for comments and action items
Action items are assigned to specific individuals or
groups responsible for implementing corrective actions
External audits focus areas
Data protection
Network security
Access controls
Incident response procedures
External assessments can take various forms
Risk assessments
Vulnerability assessments
Threat assessments
Regulatory Compliance
The goal is to ensure organizations comply with
relevant laws, policies, and regulations
Organizations adopt consolidated and harmonized sets
of compliance controls to achieve regulatory
compliance, e.g., NIST Cybersecurity Framework
Compliance includes adherence to industry-specific
rules (e.g., HIPAA, PCI DSS) and more generalized
regulations like GDPR
Access controls
May include testing of the following
Key personnel
Certifications
Standardized assessments
Crucial for maintaining a strong security posture and regulatory compliance.
External assessments may vary depending on:
Organization’s governance
Risk
Compliance practices
Preparing for a HIPAA External Assessment
o Examiners provide a checklist of questions that organizations must answer
Questions are answered as either “yes” or “no”
Evidence files, such as documents or links, must be provided to demonstrate compliance
o Sample Checklist
Questions cover various aspects like general information, policies, procedures, and employee training
Organizations must provide evidence files as proof of compliance
External assessments aim to provide a quick overview of the organization’s current risk posture
4 Types of pen testing
Physical
Offensive
Defensive
Integrated
Physical pen testing and benefits
Evaluates an organization’s physical security measures
Examples
Testing locks
Access card
Security cameras
Identifies vulnerabilities and recommends improvements for enhanced physical security
Benefits
Improved security awareness
Preventing unauthorized access