CYB:407-WK5-TEAM-AUDIT-PLAN-AND-POLICY
.docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
407
Subject
Accounting
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by lejb1288
CYB/407-WK5-TEAM-AUDIT-PLAN-AND-POLICY Audit Plan: Audit Strategy: The strategy will involve implementing the relevant controls as defined by the NIST Risk Management Framework. The level of risk each vulnerability possess will be given a threat rating and the mitigation strategy will focus on the highest threat ratings and review the relevant NIST RIsk mitigation guidelines. In the end, the different vulnerabilities will be addressed via antimalware software, employee training, and better password policies. Scope of Audit: Assess both employee practices and the effectiveness of security measures that are already put in place, such as protection against unauthorized access and the resiliency of software applications to hacking. Depth of Audit: Employees that have access to databases or utilizes devices to access databases and software applications that are used by the company. Objective: Through this process we will prove that the controls are adequate to protect databases & software applications utilized by the company and to ensure employees are knowledgeable about the risks of unintentionally revealing sensitive information to unauthorized users. The asset being protected is primarily the PHI and other company data. Human Resources Needed: Employee Training and development, Performance Review and Analysis, Health and safety, and Labour Laws. Audit Policy: Version: 1.1, revision date: 12/16/2022, approver: Bill Purpose: The audit policy is intended to provide a process that will help to secure organization information systems against the many vulnerabilities that may arise in the future. Scope: This policy applies to every member in the organization who interacts with information systems in any way.
Policy: Audit scope- will provide the guidelines, determine the ranges of the activities on the system, and what boundaries that should be in place for the specified audit Risk evaluation- will determine what risk level is involved by qualitative or quantitative relationships by both benefits and risk involved. Also, helping to identify the risk level and vulnerabilities with each risk. Security vulnerabilities- providing risk ratings ranging from low, medium, and high by identifying the weakness, flaws, or errors within the system of the organization. Administrative safeguards- these policies and procedures will be put in place to ensure the security of PHI, and to help manage the selection, implementation of all security measures, and all security controls. The three types of safeguards are administrative, physical and technical. Penetration testing- An internal test performed by a security team member to conduct a cyber attack on the organization's network. The test will help find network vulnerabilities to help avoid real attacks from happening. 2. This policy will address the following controls: - Addressing the roles, responsibilities, and purpose of all organizational entities and its management. - Provide documentation and development of audit and accountability procedures. - Provide penetration testing results and the usage of all software tools. - Documenting all audit results, its findings, and mitigation plan needed for proper response. - Provide required annually scheduled audits. 3. This policy will follow the standards from NIST SP 800-53 Rev 5.1 and SP 800-53B AU-1-Audit and Accountability- Policy and Procedures. This will help assist with your organization's security and privacy assurances. 4. All staff members related to the policy will be distributed a copy of expectations and any found in violation will be subject to disciplinary action, including possible termination due to extent of violation, or repeat offense.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Following is a list of internal controls. Select the COSO component that best matches each internal control.
Internal control
a. Implementation of policies to reduce risk of internal control failure.
b. Reporting of internal control effectiveness to investors.
c. Evaluation of internal control effectiveness by external auditors.
d. Identification and management of risks.
COSO
Control activities
Information & communication
Monitoring
Risk assessment
Control environment
Assessm
arrow_forward
Information Risk Analyst (IT Controls Audit) will help the organization assess risk controls and their effectiveness for current and future design improvements. To be successful in this career path YOU must be familiar with the concept Information Risk.
a. Explain the term ‘information risk’ in your own words.
b. Discuss three (3) causes of information risk.
c. Discuss the three (3) main ways to reduce information risk.
d. Differentiate between ‘assurance services’ and ‘non-assurance services,’ giving examples of each.
arrow_forward
Internal auditors would most appropriately perform which of the following activities during a review of systems development activity?a. Serve on the MIS steering committee that determines what new systems are to be developed.b. Review the methodology used to monitor and control the system development function. c. Recommend specific automated procedures to be incorporated into new systems that will provide reasonable assurance that all data submitted to an application are converted to machine-readable form.d. Recommend specific operational procedures that will ensure that all data submitted for processing are converted to machine-readable form.
arrow_forward
Audit concerns and implications on risk assessment are two important factorsthat must be addressed in a computer information system enviroment.Discuss the above statement.
arrow_forward
Section 404 requires management to make a statement identifying the control framework used to conduct their assessment of internal controls. Discuss the options in selecting a control framework.
arrow_forward
(ANSWER IN PARAGRAPH FORM)
What are the most significant challenges that auditors face when assessing the effectiveness of Internal Control Information Technology General Controls (ITGC), and how can these challenges be overcome in order to ensure the reliability and integrity of IT systems and processes in a CIS environment?
arrow_forward
Answer the question below: Please include atleast one reference
1: Explain Audit data analytics in risk assurance
arrow_forward
Describe how the audit team assesses control risk in an IT environment.
arrow_forward
Discuss and give examples of the various tools to document control risk assessment – such as narratives, flowcharts and checklists.
Discuss the term audit programs – what are they and why are audit programs important to the audit process?
Please provide references if there is any.
arrow_forward
Describe the Adversary Model (resources, capabilities, intent, motivation, risk aversion, access) for the following common kinds of threats:
* Script Kiddies
* Cybercriminals
* Nation-States
* Insiders
arrow_forward
Internal controls are perhaps the most important tools for managing operational risk. What are internal controls? Give three examples of internal controls and explain how each control is used to minimize operational risk.
arrow_forward
(ANSWER IN PARAGRAPH FORM)
What are the most effective tools and techniques used in auditing IT systems and processes, and how do they help auditors identify and mitigate IT-related risks in a CIS environment?
arrow_forward
1. What are objectives? What three categories of objectives are set forth in the COSO framework?
2. What does the control environment comprise?
3. What are control activities? What types of control activities are present in a well-designed system of internal controls?
4. When are monitoring activities most effective? Who performs monitoring activities? What distinguishes separate evaluations from ongoing monitoring activities?
5. How does internal auditors' perspective of internal control differ from management's perspective?
6. How does COSO define risk? How does ISO define risk?
7. What are the five COSO ERM components? 8. How does COSO define risk appetite?
9. What are some ERM assurance activities the internal audit function may perform? What are some ERM consulting activities the internal audit function may perform if appropriate safeguards are implemented? What ERM activities should the internal audit function not perform?
10. What are COSO's five categories of risk…
arrow_forward
4. Many organizations implement assurance layering strategies to mitigate the risks they face to acceptable levels. One such strategy is the Three Lines of Defense model.
a. Describe the first and second lines of defense included in this model.
b. Explain what distinguishes the third line of defense from the first two.
c. Discuss how the three lines of defense are coordinated.
d. Identify the external sources of assurance that organizations use to augment their internal lines of defense.
arrow_forward
Enterprise risk management
A.
Guarantees achievement of organizational objectives.
B.
Requires establishment of risk and control activities by internal auditors.
C.
Involves the identification of events with negative impacts on organizational objectives.
D.
Includes selection of the best risk response for the organization.
arrow_forward
Discuss the importance of monitoring and reporting on the institution's compliance with its ALM policies and limits. Explain how this helps to identify and manage risks as they arise
arrow_forward
Which option below accurately describes the process of continually assessing internal controls and transactions?
Multiple Choice
Continuous reporting.
О
Continuous monitoring.
The homogenous systems approach.
The heterogeneous systems approach.
arrow_forward
A firm is assessing a risk using the risk management process and has just identified the risks to which it is exposed. What is likely to be the next stage in the process?
Group of answer choices
A. Evaluating risks
B. Controlling risks.
C. Analysing risks.
D. Mitigating risks.
arrow_forward
Which of the following are true regarding internal auditors and the adequacy of an
organization's risk management process
1. Internal auditors must understand the risk assessment process and the tools used to
make the assessment
II. Internal auditors should determine the level of risks acceptable to the organization
III. Internal auditors need to be satisfied that the key objectives of risk management
processes are being met
IV. Internal auditors should evaluate management's risk processes the same way they
analyze risk when planning an engagement
O I II, III and IV
O None of the choices
O , Il and III only
O l and Il only
arrow_forward
Which SDLC stage is being performed?
Writing operating procedures manuals
Developing program and process controls
Identifying alternative systems designs
Developing a logical model of the systems
Identifying external and administrative controls
Testing the system
Training personnel
Evaluating the existing system
Analysing the achievement of the systems benefits
Modifying and alternating programs
Analysing total quality management (TQM) performance measures
Conducting a feasibility analysis
Aligning AIS development plans with business objectives
arrow_forward
1. How does internal control impart on the achievement of organization’s goals?
2. Why risk management process is essential in addressing risks that the organization is facing?
3. Differentiate qualitative and quantitative assessment of risks.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Related Questions
- Following is a list of internal controls. Select the COSO component that best matches each internal control. Internal control a. Implementation of policies to reduce risk of internal control failure. b. Reporting of internal control effectiveness to investors. c. Evaluation of internal control effectiveness by external auditors. d. Identification and management of risks. COSO Control activities Information & communication Monitoring Risk assessment Control environment Assessmarrow_forwardInformation Risk Analyst (IT Controls Audit) will help the organization assess risk controls and their effectiveness for current and future design improvements. To be successful in this career path YOU must be familiar with the concept Information Risk. a. Explain the term ‘information risk’ in your own words. b. Discuss three (3) causes of information risk. c. Discuss the three (3) main ways to reduce information risk. d. Differentiate between ‘assurance services’ and ‘non-assurance services,’ giving examples of each.arrow_forwardInternal auditors would most appropriately perform which of the following activities during a review of systems development activity?a. Serve on the MIS steering committee that determines what new systems are to be developed.b. Review the methodology used to monitor and control the system development function. c. Recommend specific automated procedures to be incorporated into new systems that will provide reasonable assurance that all data submitted to an application are converted to machine-readable form.d. Recommend specific operational procedures that will ensure that all data submitted for processing are converted to machine-readable form.arrow_forward
- Audit concerns and implications on risk assessment are two important factorsthat must be addressed in a computer information system enviroment.Discuss the above statement.arrow_forwardSection 404 requires management to make a statement identifying the control framework used to conduct their assessment of internal controls. Discuss the options in selecting a control framework.arrow_forward(ANSWER IN PARAGRAPH FORM) What are the most significant challenges that auditors face when assessing the effectiveness of Internal Control Information Technology General Controls (ITGC), and how can these challenges be overcome in order to ensure the reliability and integrity of IT systems and processes in a CIS environment?arrow_forward
- Answer the question below: Please include atleast one reference 1: Explain Audit data analytics in risk assurancearrow_forwardDescribe how the audit team assesses control risk in an IT environment.arrow_forwardDiscuss and give examples of the various tools to document control risk assessment – such as narratives, flowcharts and checklists. Discuss the term audit programs – what are they and why are audit programs important to the audit process? Please provide references if there is any.arrow_forward
- Describe the Adversary Model (resources, capabilities, intent, motivation, risk aversion, access) for the following common kinds of threats: * Script Kiddies * Cybercriminals * Nation-States * Insidersarrow_forwardInternal controls are perhaps the most important tools for managing operational risk. What are internal controls? Give three examples of internal controls and explain how each control is used to minimize operational risk.arrow_forward(ANSWER IN PARAGRAPH FORM) What are the most effective tools and techniques used in auditing IT systems and processes, and how do they help auditors identify and mitigate IT-related risks in a CIS environment?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningBusiness/Professional Ethics Directors/Executives...AccountingISBN:9781337485913Author:BROOKSPublisher:CengageAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Business/Professional Ethics Directors/Executives...
Accounting
ISBN:9781337485913
Author:BROOKS
Publisher:Cengage
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,