Page 385 - ITGC_Audit Guides
P. 385

  Review access control lists and firewall restrictions that limit access to sensitive systems
                          and data located on the internal network.
                         Identify and review applicable laws and
                          regulations that influence the context of
                                                                      Audit Considerations
                          the audit engagement.
                                                                      CERT’s list of 20 practices included in
                   Interviewing Relevant Stakeholders                 Appendix D may be used to develop

                   To  gather  information,  internal  auditors  may   internal control questionnaires (ICQs)
                   interview employees who perform tasks associated   to gather information about control
                   with the insider threat program, the management    activities during the engagement
                   responsible for oversight, and the individuals with   planning phase, or to develop
                   authority  to  make  decisions.  Some  of  the     stakeholder interview questions.
                   stakeholders to include are listed in Figure 7.

                   Figure 7: Stakeholders in the Insider Threat Program


                    Business Stakeholders                      IT Stakeholders

                    C-level managers.                          Information technology (CIO, CTO).
                    Security (physical, personnel, and information).   Data architect (or functionality).

                    Human resources (HR).                      System network architect.

                    Legal/privacy.                             Information assurance specialists.

                    Ethics and compliance.                     IT security investigation specialists.
                    Acquisition/contracting/purchasing.        IT operations.
                    Critical lines of business (products, services, data
                                                               Software development.
                    owners, trusted business partners as appropriate).
                    Public relations.                          Computer incident response team (CIRT).



                   As part of the interviews or separately, internal
                   auditors  may  lead  brainstorming  sessions  with   Staying Ahead of Threats
                   stakeholders to identify inherent risks. Later, the
                                                                     Because the threat landscape
                   resulting list can be input into a more detailed risk
                                                                     changes rapidly, internal auditors
                   assessment  to  determine  the  residual  risk  and
                                                                     should check the resources in
                   prioritize risks according to significance.
                                                                     Appendices C through E frequently
                                                                     for updates.










                         www.theiia.org                                      Auditing Insider Threat Programs   17
   380   381   382   383   384   385   386   387   388   389   390