Conducting an internal security audit is a great way to get your company on the right track towards protecting against a data breach and other costly security threats. Many IT and security professionals think of a security audit as a stressful, expensive solution to assessing the security compliance of their organization (it is, with external security audit costs hovering in the $50k range). But they are overlooking the fact that with the right training, resources, and data, an internal security audit can prove to be effective in scoring the security of their organization, and can create critical, actionable insights to improve company defenses.
There are five steps you need to take to ensure your internal security audit will provide return on your investment:
J S Teksys consulting services provide clients with highly skilled experts and engineers who maintain a deep knowledge of leading technologies. Our consultants combine their specialized skills with the firm’s proven problem-solving approach, ensuring that we understand a client’s mission and objectives. Our consulting approach, combined with client insight and technology acumen, provides us with the unique ability to design, develop and implement the optimal technology solution for the client.
Before we dive into the specifics of each step, it’s important to understand the difference between an external and internal security audit. An external security audit has incredible value for companies, but it’s prohibitively expensive for smaller businesses and still relies heavily on the cooperation and coordination of internal IT and security teams. Those teams must first and foremost find a respected and affordable external audit partner, but they’re also required to set goals/expectations for auditors, provide all the relevant and accurate data, and implement recommended changes.
Still, there’s a reason why larger organizations rely on external audits (and why financial institutions are required to have external audits as per the the Gramm-Leach-Bliley Act) on top of the audits and assessments done by internal teams.
External audits are performed by seasoned professionals who have all the appropriate tools and software to conduct a thorough audit — assuming they receive the requisite data and direction. Because they are conducted by people outside the business, it also ensures that no business unit is overlooked due to internal biases. Auditors have the advantage of understanding all security protocols and are trained to spot flaws in both physical and digital systems. Despite the benefits, many IT and security professionals opt for internal security audits due to their speed, cost, efficiency, and consistency.
With an internal security audit, you can establish a baseline from which you can measure improvement for future audits. As these internal audits are essentially free (minus the time commitment), they can be done more frequently. Additionally, gathering and sorting relevant data is simplified because it isn’t being distributed to a third party. Another nice perk is that internal security audits cause less disruption to the workflow of employees.
If you choose to undertake an internal security audit, it’s imperative that you educate yourself in the compliance requirements necessary to uphold security protocols. Once familiar, you’ll have an understanding of where you should be looking – and that means you’re ready to begin your internal security audit.
Your first job as an auditor is to define the scope of your audit – that means you need to write down a list of all of your assets. Assets include obvious things like computer equipment and sensitive company and customer data, but it also includes things without which the business would require time or money to fix like important internal documentation.
Once you have a lengthy list of assets, you need to define your security perimeter.
A security perimeter segments your assets into two buckets: things you will audit and things you won’t audit. It is unreasonable to expect that you can audit everything. Choose your most valuable assets, build a security perimeter around them, and put 100% of your focus on those assets.
Next, take your list of valuable assets and write down a corresponding list of potential threats to those assets.
This can range from poor employee passwords protecting sensitive company or customer data, to DDoS (Denial of Service) attacks, and can even include physical breaches or damage caused by a natural disaster. Essentially, any potential threat should be considered, as long as the threat can legitimately cost your businesses a significant amount of money.
Here are a list of common threats you should think about during this step:
Now that you have your list of threats, you need to be candid about your company’s ability to defend against them. At this point, you are evaluating the performance of existing security structures, which means you’re essentially evaluating the performance of yourself, your team, or your department.
This is one area where an external audit can provide additional value, because it ensures that no internal biases are affecting the outcome of the audit.
It is critical to the legitimacy and efficacy of your internal security audit to try and block out any emotion or bias you have towards evaluating and assessing your performance to date, and the performance of your department at large.
Maybe your team is particularly good at monitoring your network and detecting threats, but are your employees up-to-date on the latest methods used by hackers to gain access to your systems? As the first line of defense, perhaps you should weigh threats against employees more heavily than threats related to network detection. Of course, this works both ways depending on the strengths and weaknesses of your team as it relates to threats you face. Factoring in your organization’s ability to either defend well against certain threats or keep valuable assets well protected is invaluable during the next step: Risk Scoring.
This may be the most important job you have as an auditor. How do you prioritize?
Take your list of threats and weigh the potential damage of a threat occurrence versus the chances that it actually can occur (thus assigning a risk score to each). For example, a natural disaster can obliterate a business (high risk score), but if your assets exist in a place that has never been hit with a natural catastrophe, the risk score should be lowered accordingly.
Don’t forget to include the results of the current security performance assessment (step #3) when scoring relevant threats.
During your threat assessment, it’s important to take a step back and look at additional factors:
The final step of your internal security audit is straightforward — take your prioritized list of threats and write down a corresponding list of security improvements or best practices to negate or eliminate them. This list is now your personal to-do list for the coming weeks and months.
Here are a list of common security solutions for you to think about during this step:
© J S Teksys Inc. 2019. All rights reserved.