Section 13.114 Internal Audits and Assessments Flashcards
Objective 5.5 Explain types and purposes of audits and assessments
Internal Audits
Systematic evaluations conducted by an organization’s own audit team to assess the effectiveness of internal controls, compliance with regulations, and
the integrity of information systems and processes
Internal Audits Focus areas:
● Data protection
● Network security
● Access controls
● Incident response procedures
Examples of internal audit focus areas
● Password policies - allign weith best practices
● User access controls
Process on Internal Audit
● Reviewing policies and procedures
● Examining access rights
● Testing effectiveness of controls
● Findings documented for recommendations and improvements
Concepts in Internal Audits
Compliance Requirements
Ensuring that information systems and security practices meet established standarts, regulations and laws
○ Compliance is essential for protecting sensitive data and avoiding legal penalties
○ Internal audits may be required for compliance with specific laws or regulations
Audit Committee
A group, often comprising members of a companys board of directors, overseeing audit and compliance activities
Responsibilities:
■ Reviewing financial reporting
■ Internal controls
■ Internal and external audits
■ Legal and regulatory compliance
Addresses issues raised by auditors
Internal Assessments
An in-depth analysis to identify and assess potential risks and vulnerabilitites in an organisations information systems
■ Commonly performed before implementing new systems or making significant changes to existing ones
Self Assessments
Internal evaluations assessing compliance with specific standards or
regulations
■ Vulnerability assessments, threat modeling exercises, and risk assessments are part of internal assessments
Internal Assessment Process
Threat Modeling Exercise
○ Identifies potential threats to applications (e.g., SQL injection, XSS,
DoS attacks)
Internal Assessment Process
Vulnerability Assessment
○ Uses automated scanning tools and manual testing techniques to identify known vulnerabilities and code weaknesses
Internal Assessment Process
Risk Assessment
○ Evaluates the potential impact of the following
■ Identified threats and vulnerabilities
■ Considering likelihood
■ Potential damage
■ Cost of security measures
Internal Assessment Process
Mitigation Strategies
○ Recommendations to address risks and vulnerabilities
○ Code fixes
○ Additional security controls
○ Architectural changes