Page 377 - ITGC_Audit Guides
P. 377

components of the program (e.g., governance, information security, physical security, or hiring
                   practices) or may include those components in internal audit engagements that include critical
                   digital  assets  in  the  scope.  For  example,  internal  auditors  may  assess  whether  the  security
                   monitoring functions have the necessary mechanisms to detect anomalies from within that could
                   indicate compromised credentials or authorized users abusing their privileges. If the organization
                   has already implemented mechanisms to monitor the external and internal environment, internal
                   auditors  may  assess  the  effectiveness  and  efficiency  of  such  control  processes  and  may  help
                   promote continuous improvement (Standards 2120 – Risk Management and 2130 – Control).

                   The CAE must consider whether the internal audit activity collectively possesses the appropriate
                   knowledge,  skills,  and  other  competencies  to  perform  such  engagements  (Standard  1210  –
                   Proficiency).  For  assurance  engagements,  internal  auditors  are  expected  to  have  sufficient
                   knowledge of key IT risks and controls; however, they are not expected to have the expertise of
                   internal auditors whose primary responsibility is IT auditing (Standard 1210.A3). If the internal audit
                   activity lacks the necessary competencies to perform an assurance engagement involving insider
                   threats, the CAE must obtain competent assistance and advice, according to Standard 1210.A1.
                   Internal auditors should collaborate with personnel in IT operations and information security to
                   leverage the required technical expertise to ensure a comprehensive assessment of insider threats.
                   Additionally, the CAE should coordinate activities and share information with these functions to
                   leverage capabilities, ensure proper assurance coverage, and minimize duplication of efforts, as
                   described in Standard 2050 – Coordination and Reliance.










































                         www.theiia.org                                      Auditing Insider Threat Programs   10
   372   373   374   375   376   377   378   379   380   381   382