Home | About Us | Services | Partners | Contact Us 
  Services  
  _________________________________________________________________

 

Information Security Audit
(Cyber Plus, Incorporated's IS Audit Process)

Cyber Plus' objective in performing an IS audit is to provide your company with a statement of assurance (the audit report) that your business processes supported by information technology are controlled, monitored, and adequately assessed.

Cyber Plus auditors collect and evaluate evidence to determine whether your systems and related resources adequately safeguard your information assets, maintain integrity, and have in effect internal controls that provide reasonable assurance that your objectives will be met and that undesired events will be prevented, or detected and corrected, in a timely manner.

Our auditors complete the following series of steps and processes to assure that your mission-critical information is reliable, confidential, secure and available when needed.

  1. We start by developing and implementing a risk-based audit strategy, based on company goals and objectives.

    To develop an adequate strategy the Cyber Plus auditor will:


    1. gain an understanding of the company's business mission, business objectives, business purpose, and business processes

    2. identify policies, standards, guidelines, procedures, and organization structure

    3. evaluate any privacy impact analysis carried out by management

      Regulated industries are highly concerned about privacy. Cyber Plus auditors are prepared to:


      • identify the nature of personally identifiable information associated with business processes

      • document the collection, use, disclosure and destruction of personally identifiable information

      • provide management with a tool to make informed policy regarding privacy risk and options for mitigating that risk

      • ensure that accountability for privacy issues exists

    4. perform a risk analysis to identify risks and vulnerabilities so that the auditor can determine the controls needed to mitigate those risks

      As part of the risk analysis the Cyber Plus auditor will:


      • identify business objectives, information assets, and the underlying systems/information resources

      • perform a risk assessment to identify risks and determine the probability of occurence, the resulting impact and additional safeguards that would mitigate this impact to a level acceptable to management

      • identify controls for mitigating identified risks

        The auditor will perform this assessment based on a cost-benefit analysis:


        • cost of the control compared to the benefit of minimizing the risk

        • management's appetite for risk (e.g., level of acceptable residual risk)

        • preferred risk-reduction methods (e.g., terminate the risk; minimize the probability; minimize the impact; or transfer the risk [e.g., buy insurance])

    5. conduct an internal control review.

      Controls might include:


      • preventative controls

        • using access control software for authorization to sensitive files

        • employing only qualified personnel

        • segregating duties

        • etc.

      • detective controls

        • hash totals

        • duplicate checking of calculations

        • periodic performance reporting with variances

        • etc.

      • corrective controls

        • contingency planning

        • backup procedures

        • rerun procedures

        • etc.

    6. set the audit scope and audit objectives

    7. develop the audit strategy (approach)

    8. assign personnel resources to the audit



  2. We plan specific audits that will ensure that the IS audit strategy and objectives are achieved.

    • Router audit

    • Firewall audit

    • VPN audit

    • Security policy audit

    • Remote-access policy

    • Assets Management audit

    • Human Resources Security Management audit

    • Wireless audit



  3. We identify reportable conditions and reach conclusions by analyzing all of the information gathered.

    Determining the materiality of audit findings is the assessment of what would be significant to different levels of management.

  4. To provide reasonable assurance that objectives have been achieved we review all the work performed.

    Because our conclusions are based on a holistic view of the audited environment in light of industry-defined best practices, we review all work performed and consider all reportable findings prior to submitting an audit report. This allows our auditors to reach reasonable conclusions regarding the overall wellness of mission-critical information in addition to highlighting areas for isolated improvement.

  5. We communicate the audit results to key managers and stakeholders.

    Cyber Plus uses a flexible approach in presenting audit results to key managers and stakeholders, based on the needs, size and goals of the audited entity. Typically, audit results are communicated in an exit interview as follows:

    1. Cyber Plus' IS auditors discuss the audit findings among themselves and with the entire audit team to ensure completeness, accuracy, and relevance of the audit report

    2. our auditors discuss the relevant findings with the audited entity's management staff prior to communicating results to senior management

      • to gain agreement on the findings

      • to develop a course of corrective action

    3. the audit report typically includes:

      • an executive summary

      • a review of the audit objectives, scope, and nature and extent of audit procedures

      • our overall conclusion and opinion on the adequacy of controls and procedures

      • our reservations or qualifications

      • a detailed list of audit findings and recommendations

  6. We facilitate and monitor the implementation of risk management and control practices within the organization.

Back to Services


 

© Copyright 2023 Cyber Plus, Inc. | http://www.cyberplusinc.com