back to top

How to check Compliance and Control in Security Audit

Getting your Trinity Audio player ready...

First you need to know all control categories then you can try to check compliance and control one by one. It’s not complicated to understand control for example, if you are home and your mom told you make your kitchen stuff list and find what is useful or what is not useful. This is easy to understand, besides you need a mind set to check all lists carefully. this is a example of how to check compliance and control in security audit. This list also help to understand some audit terms.

Before create this check list you need to understand How to write Scope, Goals and risk assessment report for a company.

This is a example report for a company this report provide controls assessment report with one by one point.

ControlYes/NoExplanation
Least PrivilegeNoCurrently, all employees have access to customer data: privileges need to be limited to reduce the risk of a breach.
Disaster Recovery PlansNoThere are no disaster recovery plans in place. These need to be implemented to ensure business continuity.
Password PoliciesNoEmployee password requirement are minimal, which could allow a threat actor to more easily access secure data/other assets via employee work equipment/ the internal network.
Separation of dutiesNoneeds to be implemented to reduce the possibility of fraud/access to critical data, since the company CEO currently runs day-to-day operations and managers the payroll.
FirewallYesThe existing firewall blocks traffic based on an appropriately defined set of security rules.
Intrusion detection system (IDS)NoThe IT department needs an IDS in place to help identify possible intrusions by threat actors.
BackupsNoThe IT department needs to have backups of critical data, in the case of a breach to ensure business continuity.
Antivirus softwareYesAntivirus software is installed and monitored regularly by the IT department.
Manual monitoring maintenance and intervention for legacy systemsNoThe list of assets notes the use of legacy systems. The risk assessment indicates that these systems are monitored and maintained, but there is not a regular schedule in place for this task and procedures/policies related to intervention are unclear, which could place these systems at risk of a breach.
EncryptionNoEncryption is not currently used, implementing if would provide greater confidentiality of sensitive information.
Password Management SystemNoThere is no password management system currently in place, implementing this control would improve IT department/other employee productivity in the case of password issues.
Locks (offices, storefront, warehouse)YesThe store’s physical location which includes the company’s main offices, store front, and warehouse of products, has sufficient locks.
Closed-circuit television (CCTV) surveillanceYesCCTV is installed/functioning at the store’s physical location.
Fire detection/prevention (fire alarm, sprinkler system, etc.)YesBotium Toy’s physical location has a functioning fire detection and prevention system.

Compliance Checklist

Payment Card Industry Data Security Standard (PCI DSS)

Best PracticeYes/NoExplanation
Only authorized users have access to customers credit card informationNoCurrently all employees have access to the company’s internal data.
Credit card information is accepted processed transmitted and stored internally in a secure environment.NoCredit Card information is not encrypted and all employees currently have access to internal data, including customers credit card information
Implement data encryption procedures to better secure credit card transaction touchpoints and data.NoThe company does not currently use encryption to better ensure the confidentiality of customers financial information.
Adopt secure password management policies.NoPassword policies are nominal and no password management system is currently in place.

General Data Protection Regulation (GDRP)

Best PracticeYes/NoExplanation
E.U customers data is kept private/secured.NoThe company does not currently use encryption to better ensure the confidentiality of customers financial information.
There is a plan in place to notify E.U. Customers within 72 hours if their data is compromised/there is a breach.Yesthere is a plan to notify E.U. customers within 72 hours of a data breach.
Ensure data is properly classified and inventoriedNoCurrent assets have been inventoried/listed, but not classified.
Enforce privacy policies, procedures and processes to properly document and maintain data.YesPrivacy policies procedures and processes have been developed and enforced among IT team members and other employees as needed.

System and Organizations Controls (SOC type 1, SOC type 2)

Best PracticeYes/NoExplanation
User access policies are establishedNoControls of least privilege and separation of duties are not currently in place: all employees have access to internally stored data.
Sensitive data (PII/SPII) is confidential/privateNoEncryption is not currently used to better ensure the confidentiality of PII/SPII.
Data integrity ensures the data is consistent, complete, accurate, and has been validated.YesData integrity is in place
Data is available to individuals authorized to access it.NoWhile data is available to all employees, authorization needs to be limited to only the individuals who need access to it do their jobs.

After check all compliance list you need to be write recommendation for a company, this is a positive points which are always give you strength.

Let’s analysis this report……..

In this report you can see lots of options does not follow by a company so that you need to make a final closure of a compliance and control security with the help you above checklist.

According to checklist multiple controls need to be implemented to improve company posture and better ensure the confidentiality of sensitive information, including: Least Privilege, disaster recovery plans, password policies, separation of duties, an IDS, ongoing legacy system management, encryption and a password management system.

Be positive and try to address gaps in compliance company needs to implement controls such as Least Privilege, separation of duties, and encryption. The company also needs to properly classify assets, to identify additional controls that may need to be implemented to improve their security posture and better protect sensitive information.

Form any question suggestion and recommendation please contact on contact@widelamp.com
Pradeep Sharma
Pradeep Sharma
Pradeep Sharmahttps://pradeepsharma.widelamp.com
A cybersecurity and physics expert, skilled in quantum computing, Cybersecurity and network security, dedicated to advancing digital and scientific innovation.

Popular Articles