Page 407 - ITGC_Audit Guides
P. 407

Function: Detect

                    Risk Area: Anomalies and Events
                    Control Objective: Anomalous activity is detected in a timely manner and the potential impact of events is understood.

                    Control Activities                                                          Assessment
                    Detected events are analyzed to understand attack targets and methods.
                    Event data are aggregated and correlated from multiple sources and sensors.

                    Impact of event is determined.

                    Incident alert thresholds are established.
                    Risk Area: Security Continuous Monitoring
                    Control Objective: The information systems and assets are monitored at discrete intervals to identify cybersecurity
                    events and verify the effectiveness of protective measures.

                    Control Activities                                                          Assessment
                    The network is monitored to detect potential cybersecurity events.
                    The physical environment is monitored to detect potential cybersecurity events.

                    Personnel activity is monitored to detect potential cybersecurity events.
                    Malicious code is detected.

                    Unauthorized mobile code is detected.

                    External service provider activity is monitored to detect potential cybersecurity events.
                    Monitoring for unauthorized personnel connections, devices, and software is performed.

                    Vulnerability scans are performed.
                    Risk Area: Detection Processes

                    Control Objective: Detection processes and procedures are maintained and tested to ensure timely and adequate
                    awareness of anomalous events.

                    Control Activities                                                          Assessment
                    Roles and responsibilities for detection are well defined to ensure accountability.
                    Detection activities comply with all applicable requirements.

                    Detection processes are tested.
                    Event detection information is communicated to appropriate parties.

                    Detection processes are continuously improved.









                         www.theiia.org                                      Auditing Insider Threat Programs   39
   402   403   404   405   406   407   408   409   410   411   412