Page 383 - ITGC_Audit Guides
P. 383
Initiation Phase
During this phase the organization identifies the need for an insider threat program, defines the
scope for the program, and identifies the main stakeholders. Some of the questions that may help
the organization to identify and prioritize the protection of its critical assets include:
What critical assets do we have?
Do we know the current state of each critical asset?
Do we understand the importance of each critical asset and can we explain why it is
critical to our organization?
Can we prioritize our list of critical assets?
Do we have the authority, money, and resources to effectively monitor our critical assets?
Planning Phase
The planning phase usually starts by obtaining senior management buy-in, and identifying the
assets that must be protected. Some of the steps the organization may take to complete this
phase include:
Identify systems and digital assets.
Identify regulatory requirements.
Conduct a risk assessment.
Develop a formal implementation project plan.
Create (if needed) governance structure and policies.
Develop communication, training, and reporting plans.
Operations Phase
During this phase the organization analyzes needs and gaps and prioritizes activities to address
them. Some of the typical activities that take place during this phase include:
Cost/benefit analysis.
Develop insider threat profiles.
Identify/implement the necessary controls to address insider threats (examples of
common IT security controls are shown in Figure 6).
Develop key performance indicators.
Formalize IT security incident management procedures.
www.theiia.org Auditing Insider Threat Programs 15