Page 406 - ITGC_Audit Guides
P. 406

Function: Protect (continued)

                    Control Activities                                                          Assessment
                    Protection processes are continuously improved.
                    Effectiveness of protection technologies is shared with appropriate parties.

                    Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery
                    and Disaster Recovery) are in place and managed.
                    Response and recovery plans are tested.

                    Cybersecurity is included in human resources practices (e.g., deprovisioning, and personnel screening).
                    A vulnerability management plan is developed and implemented.

                    Risk Area: Maintenance
                    Control Objective: Maintenance and repairs of industrial control and information system components is performed
                    consistently with policies and procedures.
                    Control Activities                                                          Assessment
                    Maintenance and repair of organizational assets is performed and logged in a timely manner, with
                    approved and controlled tools.
                    Remote maintenance of organizational assets is approved, logged, and performed in a manner that
                    prevents unauthorized access.
                    Risk Area: Protective Technology

                    Control Objective: Technical security solutions are managed to ensure the security and resilience of systems and
                    assets, consistent with related policies, procedures, and agreements.
                    Control Activities                                                          Assessment
                    Audit/log records are determined, documented, implemented, and reviewed in accordance with policy.

                    Removable media is protected and its use restricted according to policy.

                    The principle of least functionality is incorporated by configuring systems to provide only
                    essential capabilities.
                    Communication and control networks are protected.

                    Systems operate in pre-defined functional states to achieve availability (e.g., under duress, under
                    attack, during recovery, and normal operations).




















                         www.theiia.org                                      Auditing Insider Threat Programs   38
   401   402   403   404   405   406   407   408   409   410   411