Page 337 - ITGC_Audit Guides
P. 337

Table of Contents


            Executive Summary ................................................................................................................... 3
            Introduction and Business Significance ..................................................................................... 4

            Key Risks and Threats Related to Cybersecurity ...................................................................... 5
            The Three Lines Model: Roles and Responsibilities .................................................................. 5
              Owners and Key Activities of First Line Roles ........................................................................ 6

                 Common Cyber Threat Controls ......................................................................................... 8
              Owners and Key Activities of Second Line Roles .................................................................. 9

                 Pitfalls of the First and Second Line Roles ....................................................................... 10
              The Internal Audit Activity as the Third Line Role ................................................................ 11
                 Internal Audit Scope and Collaboration ............................................................................ 15
            An Approach for Assessing Cybersecurity Risks and Controls ................................................ 16

              Cybersecurity Risk Assessment Framework ........................................................................ 16
                 Component 1: Cybersecurity Governance ........................................................................ 17

                 Component 2: Inventory of Information Assets ................................................................. 17
                 Component 3: Standard Security Configurations ............................................................. 18
                 Component 4: Information Access Management .............................................................. 18

                 Component 5: Prompt Response and Remediation ......................................................... 19
                 Component 6: Ongoing Monitoring ................................................................................... 19
            Role of CAE in Reporting Assurance to the Board and Other Governing Bodies .................... 21

            Appendix A. Key IIA Standards ............................................................................................... 23
            Appendix B. Related IIA Guidance .......................................................................................... 24
            Appendix C. Definition of Key Concepts .................................................................................. 25

            Appendix D. Internal Audit Considerations for Cybersecurity Risk .......................................... 26
            Authors/Contributors ................................................................................................................ 29














                      www.theiia.org                                             Assessing Cybersecurity Risk    2
   332   333   334   335   336   337   338   339   340   341   342