Audits and Assessments Flashcards

1
Q

Audit Types

A

1: Internal Audits and Assessments
 Review processes, controls, and compliance
Importance
 Ensure operational effectiveness and adherence to internal policies

2: External Audits and Assessments
 Independent evaluations by external parties
Verification Areas
 Financial statements
 Compliance
 Operational practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Purpose of audits

A

 Validate security measures
 Identify vulnerabilities
 Maintain compliance with regulatory standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 risk assessment categories

A

 Risk Assessments
 Vulnerability Assessments
 Threat Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of pen testing

A

Passive
Active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internal audits focus on

A

 Data protection
 Network security
 Access controls
 Incident response procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Audit committee responsibilities

A

 Reviewing financial reporting
 Internal controls
 Internal and external audits
 Legal and regulatory compliance
 Addresses issues raised by auditors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MCIT Cybersecurity Self-Assessment

A

 MCIT’s Cybersecurity Self-Assessment checklist is
designed to help organizations minimize data and
cybersecurity-related exposures

 It assists in identifying areas where data security may
need strengthening

 The checklist comprises yes-or-no questions with
sections for comments and action items

 Action items are assigned to specific individuals or
groups responsible for implementing corrective actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

External audits focus areas

A

 Data protection
 Network security
 Access controls
 Incident response procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

External assessments can take various forms

A

 Risk assessments
 Vulnerability assessments
 Threat assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Regulatory Compliance

A

 The goal is to ensure organizations comply with
relevant laws, policies, and regulations
 Organizations adopt consolidated and harmonized sets
of compliance controls to achieve regulatory
compliance, e.g., NIST Cybersecurity Framework
 Compliance includes adherence to industry-specific
rules (e.g., HIPAA, PCI DSS) and more generalized
regulations like GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access controls

A

May include testing of the following
 Key personnel
 Certifications
 Standardized assessments
 Crucial for maintaining a strong security posture and regulatory compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

External assessments may vary depending on:

A

 Organization’s governance
 Risk
 Compliance practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Preparing for a HIPAA External Assessment

A

o Examiners provide a checklist of questions that organizations must answer
 Questions are answered as either “yes” or “no”
 Evidence files, such as documents or links, must be provided to demonstrate compliance
o Sample Checklist
 Questions cover various aspects like general information, policies, procedures, and employee training
 Organizations must provide evidence files as proof of compliance
 External assessments aim to provide a quick overview of the organization’s current risk posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

4 Types of pen testing

A

 Physical
 Offensive
 Defensive
 Integrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical pen testing and benefits

A

Evaluates an organization’s physical security measures
Examples
 Testing locks
 Access card
 Security cameras

Identifies vulnerabilities and recommends improvements for enhanced physical security

Benefits
 Improved security awareness
 Preventing unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Offensive pen testing and benefits

A

Known as “red teaming”

Actively seeks vulnerabilities and attempts to exploit them, like a real cyber attack

Helps uncover and report vulnerabilities to improve security

Benefits
Can simulate real-world attacks and gain support for cybersecurity investments

17
Q

Defensive pen testing and benefits

A

Known as “blue teaming”
 A reactive approach focused on strengthening systems,
detecting and responding to attacks
 Monitors for unusual activity and improves incident
response times

Benefits
 Enhances detection capabilities and helps improve
incident response

18
Q

Intergrated pen testing

A

 Known as “purple teaming”
 Combines elements of offensive and defensive testing

19
Q

Red vs Blue teams

A

Red team conducts offensive attacks, while the blue team detects and responds
o Encourages collaboration and learning between the red and blue teams

Benefits
 Comprehensive security assessment
 Promotes collaboration within cybersecurity teams
 Conducts simulated attacks and responses to improve
skills

20
Q

Importance of reconnaissance

A

 Crucial step in penetration testing
 Identifies potential vulnerabilities in the target system
 Helps plan the attack to reduce the risk of detection
and failure

21
Q

Types of reconnaissance

A

Active Reconnaissance
 Engaging with the target system directly, such as
scanning for open ports using tools like Nmap

Passive Reconnaissance
 Gathering information without direct engagement, like
using open-source intelligence or WHOIS to collect data

Reconnaissance and Environment Types
 Known Environment
 Penetration testers have detailed information about
the target infrastructure

22
Q

Attestation of findings

A

Involves formal validation or confirmation provided by an entity to assert the accuracy and authenticity of specific information

 Crucial in internal and external audits to ensure the
reliability and integrity of the following

23
Q

Attestation of Findings in Penetration Testing

A

 Used to prove that a penetration test occurred and
validate the findings
 May be required for compliance or regulatory purposes
(e.g., GLBA, HIPAA, Sarbanes-Oxley, PCI DSS)
 Includes a summary of findings and evidence of the
security assessment
 Evidence helps to prove that identified vulnerabilities
and exploits are valid

24
Q

The difference between attestation and the report

A

 Attestation includes evidence
 Report focuses on findings and recommended
remediation

25
Q

3 Types of attestation

A

1: Software Attestation
 Involves validating the integrity of software to ensure it
hasn’t been tampered with

2: Hardware Attestation
 Validates the integrity of hardware components to
confirm they haven’t been tampered with

3: System Attestation
 Validates the security posture of a system, often related
to compliance with security standards

26
Q

Attestation in Audits

A

In internal audits, attestation evaluates organizational compliance, effectiveness of internal controls, and adherence to policies and procedures

 In external audits, third-party entities provide
attestation on financial statements, regulatory
compliance, and operational efficiency
 Attestation builds trust, enhances transparency,
ensures accountability, and is essential for stakeholders
in making informed decisions

27
Q
A