Time
7 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
12

Video Transcription

00:01
everyone walking to another app sewed of the s S C P exam print. I'm your host, Peter Simple in For those who've been following since the beginning, this is going to be third lesson in the third domain.
00:13
So far in the third domain, we've looked at the risk management process, how to prepare for the assessment of risk management, how to take it
00:24
and how to communicate the findings of the assessment. We've looked at risk treatment, specifically four ways of handling gris, which are mitigation, avoidance, acceptance and transference.
00:37
And finally, in this lesson will be taking a look at ordinating, which is simply an evaluation off, a security framework for an organization and the determination of how appropriate that framework is for that organization.
00:53
Let's get started.
00:55
An audit is really simply just an evaluation off. How, AH security framework is so It takes a look at the objectives of security framework and verifies as I like an outside party to ensure that the security framework is fitting
01:10
for any particular organization.
01:14
Audits really serve two purposes. One, they point out where security is lax, offers any problems
01:21
or any type of weakness or anything like that and what it will definitely bring that the light.
01:26
The second point of an audit is to emphasize security things that are being done right. So if there's something that is really, really good and the organizations that we really great job with it, an audit will definitely bring that to light as well.
01:41
This is like a general note. If you're up the deed on all of your security or controls all of your policies and your procedures,
01:49
nothing will surprise you in it on it.
01:52
If you are up to date and for doing everything you're supposed to be doing,
01:55
nothing will be. Nothing will surprise you. There will be no hidden things or emergencies that we no problems that you're missing nothing like that.
02:05
There's really two types of auditors. There are internal auditors, which are people who belong to the organization who do an audit of our particular department.
02:15
And there's also external auditors, which is really just a company of people that comes in. They look at all your documentation and then they make a decision from there.
02:24
Why do what it's happened while all that's happened for a variety of reasons, But the most
02:30
the most consistent ones are, um, it's dictated by policy. So usually an audit is performed once a year by policy, just to make sure that everything is consistent on an ongoing basis.
02:46
There's also event trigger on it. So if an incident happens, or if there's a data breach, usually an audit will happen just so you can analyze the event or the data breach and figure out what went wrong, Aunt to figure out how to fix it.
03:06
There's also a merger and acquisition on its, which is usually done when the company that's buying the other company requests an audit on the company being purchased simply so they can get an idea of the security framework of that company that being born
03:23
every once in a while, there are regulation compliance on it. You know, these are orders that are dictated by different law, such as Sarbanes Oxley for financial reporting and hip for the medical fields.
03:39
Every once in a while, it's also an order on it usually buy in court. But this is this is very rare and doesn't happen off.
03:47
So how do audience had a had a woman's work, right? Well, the audits want to test to make sure your security framework is up to date
03:59
and does what it's supposed to do. But the test against, well, they have to test against some sore on bench more.
04:04
Now there's a couple different benchmarks that auditors contest what they can even test against their own bench more. But one of the main ones is called Kobe, which is control objectives for information and related technologies. It's really just kind of like a best practices
04:23
bench, more four ordering. So
04:26
it kind of lists out all of the objectives that on I t framework should have. And then you can match that against the framework of that particular organization.
04:39
So what? The Warners collecting? What do they do? Well,
04:44
they collect all kinds of information about your security processes and orders. Auditors Responsibilities are two things. Do things like provide independent assurance about security systems so you can say your security system is good all you want, But until 1/3 party comes in
05:01
and backs up your claim, then your claim is kind of meaningless. It's good to have that
05:06
third party assurance that you're doing the right thing.
05:10
He doesn't want to organize on analyzed security objectives. You wanna make sure your objectives are not skewed or lacking in any type of way. When you look at it and try to follow objectives consistently all the time, it's very easy
05:27
to overlook certain certain things or to gloss over them.
05:31
It's also good to check out your policies, standards, baselines, procedures, all that good stuff simply because if you look at it and at and modify it on a daily basis, you see it all the time. Things can fall through the cracks. There might be some things that you overlook or they're really just might be another point of view.
05:50
Um, with the policy of standard that you might not even be aware of,
05:55
It's always good to have another set of eyes on your security processes.
06:00
It's also good for orders to analyze the effectiveness of controls for the exact same reason you might think you're controls are lacking when, really, from an unbiased opinion, there might be a little bit more to that. Auditors also really gonna stating and explaining the scope of the system.
06:18
So what is an audit coin to cover? Well, oughta cover all kinds of things, but they're usually broken down into eight different domains. So we have, you know, the user domain, which is, you know, authentication methods, right? How do users log into a system in the morning? Right, there's
06:39
or stations. So what's kind of security do people have on their computers? Then there's application security. So what kind of security do you have in place to prevent unauthorized access to email? Database is wet applications. Then you have land, which is really just
06:58
the equipment required to create internal local area networks. For your computers to attach,
07:04
you have your land to win with Lando in which is really a local area network to a wide area network, which so basically the border between your local network and a wide area networks such as the Internet. This is where you work Diem. Steve resides.
07:23
You want to make sure you're D M Z,
07:25
and any firewalls are doing their job. That's why when is also considered one of the eight domains that an audit does cover,
07:34
there's also removed remote access to your network. How remote users get in through one type of authentication protocols. Any type of you know VPN things like that. And there's also cloud an outsource right. How do you protect your data that's not actually
07:53
in your area or neck?
07:55
They were
07:56
so orders. Love. Looking at your system documentation. If you've ever been a part of an organization that's had an audit done, you will know exactly what I'm talking about. They always want to review every single piece of system documentation that you have.
08:13
Piece of system documentation, disaster and business recovery plans, Right? Um, whose configuration documentation they want to see. How are your host configured on the network? They want to see what kind of endpoint security might have.
08:28
They want to see what kind of baseline security configuration you might have and what steps are being done, specifically rated to security.
08:37
They also want to see what kind of acceptable use policies you might have. So that applies to things such as, you know, Internet browsing. When you're supposed to be working, that applies to any type of cell phone usage or even uses of certain protocols, you know, such as ftp for transferring files.
08:56
They want to see what your changed management process looks like. They want to make sure that all changes have been documented officially, so you can keep an eye on how your organization and I t needs move and grow. They want to see how you classify your data.
09:15
All right. It's not all Date is the same, obviously, some it is just general, while others
09:20
is, Maur very is more private. It's more confidential, and the more confidence in the data is obviously, that should be protected and, obviously business flow documentation, not white related to i t security per se. But it's very important to know how
09:37
information full flows throughout your organization.
09:41
All right, once and on it is done. There is always going to be an exit interview when an exit interview happens. They always talk about glaring issues, right? What is just over the top Wrong with your system Security,
09:58
Right? Once this is done, there's usually a presentation off findings. So
10:03
once all the glaring issues have been addressed immediately, the orders will go
10:09
Look at all of the information and everything they've gathered and put together a result sheet and that result she is presented to the management so
10:18
and this result she talked about things that are that are kind of lacking. You know what you're doing good at what needs to be improved and how you can improve things that need to be improved.
10:31
Once that is done up, the management has an opportunity to look over the results. She and then have a written response to the auditors.
10:43
Into these lectures we discussed on drink, which is really simply an evaluation of an organization's security framework.
10:52
Quiz time,
10:54
the type of audit that is used to confirm compliance with the I T security related portions of legislative regulations. Such a Sarbanes Oxley and HIPPA is a event triggered on it.
11:05
Be ordered on it.
11:07
See regulation compliance Audit, Andy Merger, acquisition on it.
11:16
If you said see, then you are correct. Remember, Sarbanes Oxley and Hip are pieces of legislation that comply organizations to do a certain Matt certain amount of work in protecting financial data and medical data.
11:37
Thank you guys for watching our Roy Hope you learned a lot in this lesson and I'll see you next time

Up Next

Systems Security Certified Professional (SSCP)

Obtaining your SSCP certification signifies that you possess the ability to tackle the operational demands and responsibilities of security practitioners, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor