Practical - Cybersec Audit - PAF - Tauffik - Segara - Purba
Practical - Cybersec Audit - PAF - Tauffik - Segara - Purba
Practical - Cybersec Audit - PAF - Tauffik - Segara - Purba
CIA
• The first known use of cybersecurity was in 1989 – Merriam Webster dictionary
Source : GTAG Assessing Cybersecurity risk, IIA
2016
PRACTICAL
APPROACH
Plannin Performing
Communicati
&
2200 series g 2300 2400 ng
[Cybersecurity] Objectives series Supervisin series
Testing
Risk Assessment
Scope
g Evaluatin
Criteri g
a
Documen
Audit ting
Progra
Functio
n
Categor
y
Categor
y
• Malware defences
• Limitation and control of network ports,
protocols, and services
• Application software security
• Wireless access control
• Boundary defence
• Penetration tests, phishing tests, and red team
exercises • Secure configurations for hardware and software on
• Maintenance, monitoring, and analysis of mobile devices, laptops, workstations, and servers
change events • Secure configurations for network devices such as
• Data protection/data loss prevention firewalls, routers, and switches
Engineering reputation
• Malware • Lack of
- Knowledge-skill • People •
•
Phishing
Denial of Services awareness
• Data/ • Lack of policy
- Awareness Information
•
•
Spam
Data breach • Failure to monitor
• Application
- 3rd • Storage
•
•
Web based attacks
Botnets
logs
• Inadequate
parties/vendor • Computing
• Network
• Identity thefts-social
engineering passwords
• APT • Open network
ports
• Coding errors
• Interoperability
errors
Integri
ty
Confidential Availabili
ity ty
Source : Transforming Cybersecurity, ISACA
Category Subcategory Informative Reference
Sub- Control Controls Control Control Control Testing NIST Addition Ref.Fram Ref.Wor Pass/ Comments
Proces Objectives Type Classifcation Frequency Step ref to al Ref. e k Fail
s COBIT to work/Sta paper
5 COBIT5
nd ard
Controls The means of managing risk, including policies, procedures, guidelines, practices or organizational structures, which can be
of an administrative, technical, management or legal nature
Control Type Controls can be automated (technical), manual (administrative) or physical.
Control Frequency Control activities can occur in real-time, daily, weekly, monthly, annually, etc.
Testing Step Identifies the steps being tested to evaluate the effectiveness of the control under review
NIST Ref. to COBIT 5 Identifies the COBIT 5 processes related to the control objective or control activities as defined by the NIST Cybersecurity
Framework
Additional Ref. COBIT 5 Identifies additional COBIT 5 processes related to the control objective or control activities
Ref. Framework/Standards Specifies frameworks and/or standards that relate to the control under review (e.g., NIST, HIPAA, SOX, ISO)
Ref. Workpaper The evidence column usually contains a reference to other documents that contain the evidence supporting the pass/fail mark for
the audit step.
Pass/Fail Document preliminary conclusions regarding the effectiveness of controls.
Comments Free format field
Source : IS Audit/Assurance Program Cybersecurity: Based on the NIST Cybersecurity Framework, ISACA
Source : IS Audit/Assurance Program Cybersecurity: Based on the NIST Cybersecurity Framework, ISACA
Auditor(s) need to equipped with relevant knowledge, skill & tool, recent
trends/research (1200 - proficiency & due professional care)
Identify and categorize audit areas where reliance on the work of others
makes sense (SSAE 16/SOC Report)
“one cannot plan against everything and prevent it” and addresses exactly
those (probable or improbable) attacks and breaches that require targeted
response and investigative activities.
ABOUT CYBERSECURITY
•
•
•
•
[email protected]
0811224093
www.linkedin.com/in/taufiksnp
urba