Page 42 - CITP Review
P. 42

from independent third-party assessors on the effectiveness of the entity's cybersecurity risk
            management program.




            How to use in conjunction with cybersecurity risk mitigation

            The practitioner's evaluation of management's risk assessment process — that is, the assessment of
            potential events and circumstances that could threaten the achievement of the entity's cybersecurity
            objectives — includes consideration of items such as the following:

              The process management uses to
               –  identify its cybersecurity objectives,
               –  identify information and other assets,
               –  determine the threats to information and other assets,
               –  design and implement controls to address identified risks, and
               –  incorporate information from its monitoring activities that identify previously unconsidered
                   potential events and circumstances
              The frequency with which management updates the risk assessment and supporting risk
               management processes and controls.
              Whether management uses an appropriate management framework for managing its processes and
               controls — for example, the National Institute of Standards and Technology’s  Framework for
               Improving Critical Infrastructure Cybersecurity (NIST Cybersecurity Framework) or International
               Standardization Organization/International Electrotechnical Commission (ISO/IEC) Standards 27001
               and 27002 — as part of its assessment and management process.

            Factors such as the size and complexity of the entity, the goods or services provided, and commitments
            made to customers and others are important considerations when evaluating the suitability of the design
            of controls. A smaller, less complex entity may be able to address risks that threaten the achievement of
            the entity's cybersecurity objectives using a different set of controls than a larger, more complex entity.
            For example, a smaller, less complex entity may


              have policies and procedures that are less formal and detailed but sufficient for the practitioner to
               evaluate;
              have fewer levels of management, which may result in more direct oversight of the operation of key
               controls; and
              make greater use of manual controls versus automated controls.





















            © 2019 Association of International Certified Professional Accountants. All rights reserved.    1-34
   37   38   39   40   41   42   43   44   45   46   47