Page 76 - ITGC_Audit Guides
P. 76

Executive Summary









                   The COVID-19 pandemic accelerated the adoption of remote work and may have permanently
                   altered attitudes about whether or how often workers should be in the office. The rapid rise in
                   remote connections to enterprise networks and the continued adoption of cloud-based services
                   have increased the risks of accessing company data and applications over potentially less-
                   secure networks and devices.
                   Internal auditors need to understand common technologies that enable remote work, the
                   significant risks arising from remote access, and standard controls that prevent, detect, or
                   remediate unauthorized access or sharing of information.

                   The primary control objectives for mobile computing include:

                   1.   Remote access – Which users are authorized to access portions of the enterprise network
                       remotely, and which security measures are in place to protect the transmission?

                   2.  Centralized device administration – Which devices are authorized to access the enterprise
                       network remotely, and how are secure configurations managed?

                   3.  Endpoint security – How are on-device security measures, such as antivirus software and
                       partitions of user-managed devices, ensured?

                   4.  Data protection – How is sensitive data protected from transmission to a less secure
                       environment, including being shared in collaboration tools?

                   5.  Cybersecurity monitoring – Are there anomalies or red flags in the use of remote access that
                       could indicate a breach or misuse?
                   6.  Training – Do personnel have the training on collaboration tools and security awareness to
                       perform their jobs remotely and securely?

                   With the rise in remote work, many organizations may be motivated to assess the risks and
                   opportunities posed by mobile computing. Internal audit activities may have opportunities to
                   deliver valuable assurance and consulting services related to the design and implementation of
                   mobile computing controls — which, in turn, can help the organization achieve innovation and
                   security objectives.















                   1 — theiia.org
   71   72   73   74   75   76   77   78   79   80   81