# More about security audits

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Previously, you were introduced to how to plan and complete an internal security audit. In this reading, you will learn more about security audits, including the goals and objectives of audits. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Security audits</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**security audit**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a review of an organization's security controls, policies, and procedures against a set of expectations. Audits are independent reviews that evaluate whether an organization is meeting internal and external criteria. Internal criteria include outlined policies, procedures, and best practices. External criteria include regulatory compliance, laws, and federal regulations. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Additionally, a security audit can be used to assess an organization's established security controls. As a reminder, </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**security controls**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> are safeguards designed to reduce specific security risks. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Audits help ensure that security checks are made (i.e., daily monitoring of security information and event management dashboards), to identify threats, risks, and vulnerabilities. This helps maintain an organization’s security posture. And, if there are security issues, a remediation process must be in place.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Goals and objectives of an audit</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The goal of an audit is to ensure an organization's information technology (IT) practices are meeting industry and organizational standards. The objective is to identify and address areas of remediation and growth. Audits provide direction and clarity by identifying what the current failures are and developing a plan to correct them. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Security audits must be performed to safeguard data and avoid penalties and fines from governmental agencies. The frequency of audits is dependent on local laws and federal compliance regulations.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Factors that affect audits</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Factors that determine the types of audits an organization implements include: </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Industry type</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Organization size</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Ties to the applicable government regulations</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A business’s geographical location</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A business decision to adhere to a specific regulatory compliance</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">To review common compliance regulations that different organizations need to adhere to, refer to </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[the reading about controls, frameworks, and compliance<svg aria-labelledby="cds-react-aria-755-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk-" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.coursera.org/learn/foundations-of-cybersecurity/supplement/xu4pr/controls-frameworks-and-compliance)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The role of frameworks and controls in audits</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Along with compliance, it’s important to mention the role of frameworks and controls in security audits. Frameworks such as the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) and the international standard for information security (ISO 27000) series are designed to help organizations prepare for regulatory compliance security audits. By adhering to these and other relevant frameworks, organizations can save time when conducting external and internal audits. Additionally, frameworks, when used alongside controls, can support organizations’ ability to align with regulatory compliance requirements and standards. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">There are three main categories of controls to review during an audit, which are administrative and/or managerial, technical, and physical controls. To learn more about specific controls related to each category, click the following link and select “Use Template.” </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Link to template: </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Control categories<svg aria-labelledby="cds-react-aria-756-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://docs.google.com/document/d/1HsIw5HNDbRXzW7pmhPLsK06B7HF-KMifENO_TlccbSU/template/preview)</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">OR</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">If you don’t have a Google account, you can download the template directly from the following attachment</span>

<div id="bkmrk-control-categories-d" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: pre-wrap; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div contenteditable="false" data-e2e="slate-asset-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[<div class="asset-wrapper css-cp6qd0" data-testid="asset-v2-wrapper" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; position: relative; outline: none; user-select: none;"><div class="cml-asset cml-asset-generic cml-nonmedia-asset css-3u3yqw" data-e2e="cml-asset cml-asset-generic cml-nonmedia-asset" data-extension="docx" data-id="DPKTUx5pQUq6QUZB7jnQKQ" data-name="Control categories" data-url="https://d3c33hcgiwev3.cloudfront.net/DPKTUx5pQUq6QUZB7jnQKQ_6f691709d57d473ca944942acb11cef1_Control-categories.docx?Expires=1686182400&Signature=ZaYvjtt~67jwWVexsC8hbQ3sSF1Hb65L2J5caK7lHQLvr178k~XelvYhKoh6eD7BEx0Tf0ZRZXhPlw-~F3j~mVB95zuBrvR23sjAalfJ4R4HUBXyK8gclJ0czUifqxqHjXnaN6noC6n7TJL~B8GcDeotgnbPlc4wognWdNcJWX0_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; background-color: rgb(245, 247, 248); border-radius: 8px; height: 84px; padding: 0px 24px; display: flex; -webkit-box-align: center; align-items: center; width: 790px; margin-bottom: 12px;"><div data-e2e="asset-icon" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><svg aria-labelledby="cds-react-aria-757-title" class="css-0" fill="none" focusable="false" height="24" id="bkmrk--2" role="img" viewbox="0 0 24 24" width="24"></svg></div><div class="css-1yz0hhk" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; flex: 1 1 0%; min-width: 0px; flex-direction: column; white-space: nowrap; overflow-x: hidden; margin-left: 16px;"><div class="css-2ivpt" data-e2e="asset-name" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: bold; letter-spacing: -0.1px; text-overflow: ellipsis; overflow: hidden;">Control categories</div><div class="css-13413s3" data-e2e="asset-label" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; letter-spacing: 0px; font-size: 1rem; line-height: 1.5rem; font-family: 'Source Sans Pro', Arial, sans-serif; font-weight: 400; color: rgb(99, 99, 99); margin-top: 4px;">DOCX File</div></div></div></div>](https://d3c33hcgiwev3.cloudfront.net/DPKTUx5pQUq6QUZB7jnQKQ_6f691709d57d473ca944942acb11cef1_Control-categories.docx?Expires=1686182400&Signature=ZaYvjtt~67jwWVexsC8hbQ3sSF1Hb65L2J5caK7lHQLvr178k~XelvYhKoh6eD7BEx0Tf0ZRZXhPlw-~F3j~mVB95zuBrvR23sjAalfJ4R4HUBXyK8gclJ0czUifqxqHjXnaN6noC6n7TJL~B8GcDeotgnbPlc4wognWdNcJWX0_&Key-Pair-Id=APKAJLTNE6QMUY6HBC5A)</div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Audit checklist</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">It’s necessary to create an audit checklist before conducting an audit. A checklist is generally made up of the following areas of focus:</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Identify the scope of the audit**</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The audit should:</span>
    
    
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">List assets that will be assessed (e.g., firewalls are configured correctly, PII is secure, physical assets are locked, etc.) </span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Note how the audit will help the organization achieve its desired goals</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Indicate how often an audit should be performed</span>
    - <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Include an evaluation of organizational policies, protocols, and procedures to make sure they are working as intended and being implemented by employees</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Complete a risk assessment**</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A risk assessment is used to evaluate identified organizational risks related to budget, controls, internal processes, and external standards (i.e., regulations).</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Conduct the audit**</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">When conducting an internal audit, you will assess the security of the identified assets listed in the audit scope.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Create a mitigation plan**</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A mitigation plan is a strategy established to lower the level of risk and potential costs, penalties, or other issues that can negatively affect the organization’s security posture. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Communicate results to stakeholders**</span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">The end result of this process is providing a detailed report of findings, suggested improvements needed to lower the organization's level of risk, and compliance regulations and standards the organization needs to adhere to. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this reading you learned more about security audits, including what they are; why they’re conducted; and the role of frameworks, controls, and compliance in audits. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Although there is much more to learn about security audits, this introduction is meant to support your ability to complete an audit of your own for a self-reflection portfolio activity later in this course.</span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Resources for more information</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Resources that you can explore to further develop your understanding of audits in the cybersecurity space are: </span>

- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[IT Security Procedural Guide: Audit and Accountability (AU) CIO-IT Security-01-08<svg aria-labelledby="cds-react-aria-758-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--3" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.gsa.gov/cdnstatic/Audit_and_Accountability_(AU)_%5BCIO-IT_Security_01-08_Rev_6%5D_12-03-2020docx.pdf)</span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[Assessment and Auditing Resources<svg aria-labelledby="cds-react-aria-759-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--4" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.nist.gov/cyberframework/assessment-auditing-resources)</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span>
- <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">[IT Disaster Recovery Plan](https://www.ready.gov/it-disaster-recovery-plan)</span>