Page 253 - COSO Guidance Book
P. 253

11. Wiping. In case a laptop or mobile device is lost or stolen, sensitive data can be remotely wiped (but not
               recovered) using security features of a particular vendor (for example, Microsoft Intune) or other third-
               party software.
            12. Training. It is important to increase user awareness of the types of cyberthreats that could occur at their
               entity and measures users should take in case of an adverse event. For example, if a user receives an
               email with grammatical and spelling errors that has other signs of being suspicious, the user should be
               required to notify appropriate personnel that a suspicious email was able to bypass IT security software.

            COSO in the Cyber Age
            In 2015, COSO issued the guidance COSO in the Cyber Age, a portion of which provides a methodology for
            identifying risks (including cyber risks) in information systems.   After cyber risks are identified, controls
                                                                        22
            can be designed to mitigate them. The methodology follows:

            Identify critical information systems.

              Identify information categories based on business and organization objectives using the following as
               a guide:
               –  Corporate policies
               –  Industry standards (e.g., ISO)
               –  Regulatory requirements
               –  Business objectives
               –  Intellectual property
               –  Financials
               –  Customer or employee data
              Identify where information exists.
               –  Identify how information is collected, used, transferred, stored, and archived.
               –  Identify business, system, and application owners for information assets.
               –  Create data flows to understand how information moves within business processes, systems,
                   and applications.
              Understand risks associated with the information system.
               –  Analyze asset inventories and data flows to control risks.
               –  Assess the likely perpetrators of cyberattacks and their likely attack methods.
               –  Identify controls to address identified risks based on risk profile of the process, system, or
                   application.



            Control activities principle 12: Deploys through

            policies and procedures

            The organization deploys control activities through policies that establish what is expected and
            procedures that put policies into action.

            The following six points of focus emphasize important characteristics relating to this principle:

              Point of focus — Establishes policies and procedures to support deployment of management’s
               directives

            22
              https://www.coso.org/documents/COSO%20in%20the%20Cyber%20Age_FULL_r11.pdf

            © 2020 Association of International Certified Professional Accountants. All rights reserved.    5-19
   248   249   250   251   252   253   254   255   256   257   258