| Preface |
|
xi | |
|
|
|
1 | (38) |
|
|
|
1 | (1) |
|
|
|
1 | (1) |
|
|
|
2 | (2) |
|
|
|
4 | (3) |
|
|
|
7 | (2) |
|
Security Program Evolution |
|
|
9 | (1) |
|
Information Security Infrastructure Management |
|
|
10 | (1) |
|
Information Security Service Management |
|
|
11 | (2) |
|
Information Security Governance |
|
|
13 | (2) |
|
|
|
15 | (1) |
|
|
|
15 | (2) |
|
|
|
17 | (2) |
|
|
|
19 | (3) |
|
Security Governance Fusion |
|
|
22 | (1) |
|
Cyber Security Service Delivery for IT |
|
|
23 | (2) |
|
Cyber Security Service Support for IT |
|
|
25 | (4) |
|
Security Governance Insights |
|
|
29 | (2) |
|
|
|
31 | (1) |
|
|
|
31 | (1) |
|
|
|
32 | (1) |
|
|
|
32 | (1) |
|
|
|
33 | (5) |
|
|
|
38 | (1) |
|
2 Security Governance Environment |
|
|
39 | (35) |
|
|
|
39 | (1) |
|
|
|
39 | (1) |
|
Entity-Centric Considerations |
|
|
40 | (1) |
|
Entity Control Environment |
|
|
41 | (5) |
|
Domain Convergence Effects |
|
|
46 | (7) |
|
|
|
53 | (2) |
|
|
|
55 | (3) |
|
|
|
58 | (1) |
|
|
|
59 | (6) |
|
|
|
65 | (2) |
|
|
|
67 | (6) |
|
|
|
73 | (1) |
|
3 Security Governance Management |
|
|
74 | (34) |
|
|
|
74 | (1) |
|
|
|
74 | (1) |
|
|
|
75 | (4) |
|
|
|
79 | (16) |
|
Control Objective Selection |
|
|
95 | (2) |
|
|
|
97 | (1) |
|
|
|
97 | (1) |
|
|
|
98 | (2) |
|
|
|
100 | (1) |
|
|
|
101 | (1) |
|
|
|
102 | (4) |
|
|
|
106 | (1) |
|
Appendix: Information Protection Classifications with Criteria and Definitions |
|
|
107 | (1) |
|
4 Security Governance Processes |
|
|
108 | (33) |
|
|
|
108 | (1) |
|
|
|
108 | (1) |
|
Framing Information Security Governance |
|
|
109 | (2) |
|
Tier Four Strategic Alignment |
|
|
111 | (4) |
|
|
|
115 | (4) |
|
Tier Four Risk Management |
|
|
119 | (5) |
|
Tier Four Resource Management |
|
|
124 | (4) |
|
Tier Four Performance Measurement |
|
|
128 | (3) |
|
|
|
131 | (6) |
|
|
|
137 | (2) |
|
Appendix: Control Evaluation Worksheets |
|
|
139 | (2) |
|
5 Organizational Employees |
|
|
141 | (31) |
|
|
|
141 | (1) |
|
|
|
141 | (1) |
|
Responsibility Delegation |
|
|
142 | (2) |
|
|
|
144 | (4) |
|
|
|
148 | (2) |
|
Workplace Irregularities and Illegal Acts |
|
|
150 | (4) |
|
IT Incident Response Team |
|
|
154 | (5) |
|
Education, Training, and Awareness |
|
|
159 | (5) |
|
|
|
164 | (1) |
|
|
|
165 | (1) |
|
Study and Evaluation Activities |
|
|
166 | (1) |
|
|
|
166 | (1) |
|
|
|
167 | (1) |
|
|
|
167 | (1) |
|
|
|
167 | (3) |
|
|
|
170 | (2) |
|
6 External Organizational Actors |
|
|
172 | (31) |
|
|
|
172 | (1) |
|
|
|
172 | (1) |
|
|
|
173 | (1) |
|
|
|
174 | (2) |
|
|
|
176 | (2) |
|
|
|
178 | (1) |
|
Managed Service Providers |
|
|
179 | (8) |
|
|
|
187 | (3) |
|
|
|
190 | (2) |
|
IT Audit Study and Evaluation of Controls |
|
|
192 | (4) |
|
IT Audit Testing of Controls |
|
|
196 | (1) |
|
IT Audit Report on Controls |
|
|
196 | (1) |
|
|
|
197 | (1) |
|
|
|
197 | (5) |
|
|
|
202 | (1) |
|
7 Information Security Governance Audit |
|
|
203 | (38) |
|
|
|
203 | (1) |
|
|
|
203 | (1) |
|
ISG Audit Planning Process |
|
|
204 | (2) |
|
|
|
206 | (3) |
|
|
|
209 | (1) |
|
ISG Audit Study and Evaluation of Controls |
|
|
210 | (2) |
|
Information Security Strategic Alignment |
|
|
212 | (3) |
|
Information Security Value Delivery |
|
|
215 | (1) |
|
Information Security Risk Management |
|
|
216 | (1) |
|
Information Security Resource Management |
|
|
216 | (1) |
|
Information Security Performance Management and Measurement |
|
|
217 | (1) |
|
Other Auditable Information Security Units |
|
|
217 | (2) |
|
ISG Audit Testing and Evaluation of Controls |
|
|
219 | (2) |
|
Information Security Compliance Testing |
|
|
221 | (1) |
|
Information Security Substantive Testing |
|
|
222 | (1) |
|
Information Security Evidence Assessment |
|
|
223 | (1) |
|
ISG Audit Control Reporting |
|
|
223 | (1) |
|
|
|
224 | (1) |
|
|
|
225 | (1) |
|
|
|
225 | (1) |
|
|
|
225 | (1) |
|
|
|
226 | (1) |
|
Engagement Report Structuring |
|
|
227 | (1) |
|
|
|
227 | (1) |
|
ISG Audit Follow-Up Responsibilities |
|
|
228 | (1) |
|
General ISG Audit Follow-Up Activities |
|
|
229 | (4) |
|
|
|
233 | (2) |
|
|
|
235 | (1) |
|
Appendix A Control Environment Characteristics -- Internal Policies Matrix |
|
|
236 | (1) |
|
Appendix B Entity Culture -- Audit Area Personnel Matrix |
|
|
237 | (1) |
|
Appendix C ISG Audit Risk Assessment Template |
|
|
238 | (1) |
|
Appendix D Testing Methodology Options Table |
|
|
239 | (1) |
|
Appendix E Sampling Selection Options Table |
|
|
240 | (1) |
|
8 Cyber Security Governance Audit |
|
|
241 | (39) |
|
|
|
241 | (1) |
|
|
|
241 | (1) |
|
CSG Audit Planning Process |
|
|
242 | (1) |
|
|
|
243 | (3) |
|
|
|
246 | (2) |
|
CSG Audit Study and Evaluation of Controls |
|
|
248 | (4) |
|
Cybersecurity Access Management |
|
|
252 | (3) |
|
Cybersecurity Network Infrastructure |
|
|
255 | (3) |
|
Cybersecurity Risk Analysis |
|
|
258 | (2) |
|
Cybersecurity Environmental Controls |
|
|
260 | (1) |
|
Cybersecurity Confidential Information Assets |
|
|
261 | (2) |
|
CSG Audit Testing and Evaluation of Controls |
|
|
263 | (2) |
|
Cybersecurity Compliance Testing |
|
|
265 | (2) |
|
Cybersecurity Substantive Testing |
|
|
267 | (1) |
|
Cybersecurity Evidence Assessment |
|
|
268 | (1) |
|
CSG Audit Control Reporting |
|
|
268 | (2) |
|
|
|
270 | (1) |
|
|
|
270 | (1) |
|
|
|
270 | (1) |
|
|
|
270 | (1) |
|
|
|
271 | (1) |
|
Engagement Report Structuring |
|
|
272 | (1) |
|
|
|
273 | (1) |
|
CSG Audit Follow-Up Responsibilities |
|
|
273 | (1) |
|
General CSG Audit Follow-Up Activities |
|
|
274 | (4) |
|
|
|
278 | (1) |
|
|
|
279 | (1) |
| Appendix A CSG Audit Risk Assessment Template |
|
280 | (1) |
| Appendix B IAP Functions or Duties Templates |
|
281 | (1) |
| Appendix C IAP Control Classification Template |
|
282 | (1) |
| Index |
|
283 | |