Documente Academic
Documente Profesional
Documente Cultură
CYBERSECURITY IN
INTERNAL AUDIT
A joint research report by By John Jamison,
the Internal Audit Foundation Lucas Morris, and
and Crowe Horwath Christopher Wilkinson
Conclusion.......................................................................................................... 27
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
3
Introduction and Executive Summary
Over the course of just a few years, cybersecurity has grown into one of
the most significant risk management challenges facing virtually every type
of organization. Is the internal audit function keeping pace with this rapidly
changing area of risk? This report examines this question and, based on
a survey of internal audit and cybersecurity professionals, offers some
observations on how internal audit departments are adapting in order to address
cybersecurity risks.
A decade ago, the internal audit function evolved and adapted to the increasingly
important role that information technology (IT) was playing in all aspects of
business operations. Today, internal audit faces the need to adapt once again to
address the critical risks associated with cybersecurity.
Recognizing this need, the Internal Audit Foundation and Crowe Horwath, in
collaboration with The Institute of Internal Auditors’ (IIA’s) Audit Executive Center,
conducted a limited survey of IIA members in order to understand how internal
audit has begun to adapt to this new risk landscape.
This report offers a summary of key findings from that research and provides
insights into some current internal audit and cybersecurity policies and
practices. In addition, the report’s authors draw on industry experience and
observation based on their working relationships with internal audit functions
across a broad range of industries.
4 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
The stakes are high, with significant risks and potential rewards for all involved.
Internal audit teams are encouraged to consider the findings in this report in
order to be prepared to respond proactively to this rapidly evolving area of risk.
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
5
Relationship Management in Cybersecurity
Maintaining effective relationships with other groups and departments within
the organization is always a critical concern for the internal audit function. It is
important for internal audit to understand the universe of relationships within an
organization in order to better protect it.
Although internal audit also must develop and maintain sound relationships with
various external groups — such as regulatory agencies, industry standard-
setting and professional organizations, and relevant law enforcement
authorities — the focus of this report is on internal audit’s relationships with
other groups within the organization. Cooperative, positive relationships with
those being audited can greatly expedite the audit process and improve the
quality of the audit results.
At the same time, however, internal audit must be careful not to allow such
relationships to compromise its necessary independence. While independence
is essential, a confrontational or adversarial approach can hinder internal audit’s
effectiveness. It is a matter of striking the right balance, and the methods for
determining and achieving that balance will vary widely from one organization
to another.
In the case of cybersecurity, the ability to strike the right balance can be further
complicated by the need for specialized expertise and technical knowledge,
which often are available only within the IT or InfoSec departments themselves.
The internal audit function can benefit when audit professionals make a special
effort to understand the backgrounds, mentalities, and motivations of the
technical personnel who are being audited and who also must provide some of
the technical expertise that internal audit needs to perform its function.
0: W
e do not perform audits of this area or have no relationship at this time.
3: C
ommunication is frequent and goes beyond audit requests and
assessments.
6 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
The results revealed that internal audit is more likely to at least have formalized
audits and communication with the IT and InfoSec departments, which is good.
The results also suggested such audits and communication are less likely to be
in place with the compliance and risk management functions, although these
results could be skewed by smaller organizations that may lack formalized
departments in these areas.
Exhibit 1: Very Weak and Very Strong Relationships With Internal Audit
Compliance
Risk Management
Information Security
Information Technology
On the other hand, the percentage of companies stating that they maintain a
relationship characterized by the sharing of resources and high trust levels was
lowest with the IT and InfoSec teams, despite the fact that they reported a higher
level of communication with these departments. This situation reinforces the
perception that barriers exist between the internal audit function and the IT and
InfoSec departments.
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
7
Information Technology
Because technology is a key component in any organization’s ability to achieve
its goals and objectives, the relationship between audit and IT is one of the
most critical to the success of technology assessments. Unfortunately, in many
organizations, the traditional relationship between the audit and IT teams has not
been fully collaborative.
In some cases, this situation might stem from IT team members’ understandable
pride in the tools, systems, and processes they have built. Preventing this natural
pride from growing into defensiveness can require some relationship-building
skills on the part of the auditors. In other instances, IT auditors who lack
sufficient cybersecurity-specific skills can damage the relationship with the IT
department due to a lack of credibility.
The responses to the Foundation’s survey indicated that the majority of internal
audit departments (93 percent) had working relationships with IT, which is a
positive sign. However, just over 28 percent of internal audit departments had
what would be considered collaborative relationships with the IT departments.
Information Security
In addition to the IT function, the information security team will often have
significant responsibilities that will need to be assessed throughout the
organization. Although sometimes the InfoSec and IT organizations are
combined, they also can operate separately. In fact, a growing number of
regulatory agencies are starting to require the separation of these two functions,
which, in turn, requires a different approach for each audit.
8 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
The responses to the Foundation’s survey indicated that the majority of internal
audit departments (87 percent) had a working relationship with InfoSec, which
is a positive sign. However, just over 26 percent of internal audit departments
had what would be considered a collaborative relationship with the InfoSec
department. These results are very similar to those with the IT department,
which is expected, as duties are often shared between the two functions.
In many instances, the InfoSec team might have a stronger, more positive
relationship with the audit team than other groups do because, in part, it focuses
less on running infrastructure or maintaining access and capacity and more on
monitoring and detecting risk. As a result, the InfoSec team might have a more
intuitive understanding of internal audit’s function and value. As the audit team
seeks to build its capabilities, it is possible the InfoSec team could help audit
gain an even greater perspective of the risks faced by the IT infrastructure.
Internal audit, InfoSec, and cybersecurity also can take active steps to help
strengthen their relationships. Examples include co-sponsoring joint research
projects or co-hosting security-related training sessions or luncheon topics. In
addition to bolstering much-needed technical expertise and improving overall
awareness of cybersecurity concerns, such activities also help develop a
closer professional relationship among the individuals most directly involved in
cybersecurity risk management.
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
9
Information Risk Management
At its heart, information security is the process of understanding, managing,
and mitigating risks. Ultimately, this focus on risk can help the risk management
team within an organization develop critical relationships with both information
security and internal audit. Furthermore, it will be critical that the risk
management team tracks personnel, procedural, and technical controls to
help mitigate and control cybersecurity risk. As with all other areas of the
organization, audit must be prepared both to review the risk management and
identification procedures and to make sure that cybersecurity feeds into the
organization’s enterprise risk management framework.
It is worth noting that, broadly speaking, industry observation indicates that the
most effective organizations take a risk-based, rather than a controls-based,
approach to cybersecurity. The internal audit team is heavily involved and works
closely with various participants in the risk management process, including
operational risk, business risk, and the chief risk officer.
Recognizing the number of significant players involved, the internal audit team
must be prepared to work with these teams to assess their organization’s
understanding of risk and the roles they play in cybersecurity. The Foundation’s
survey showed that the relationship with compliance had the highest percentage
of respondents (42 percent) reporting the relationship was considered
collaborative. This result seems to indicate that organizations view cybersecurity
compliance as a goal or a destination, which can be a shortsighted approach in
managing overall exposure.
In the end, all teams are still working toward a common goal: the ultimate
success of the organization.
10 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
The first line of defense in this model is composed of business process owners
and management. In the case of cybersecurity, this includes the lines of
business and employees around the organization, but also focuses on IT, which
is responsible for the data infrastructure, systems, and processes where the
risk resides.
The second line of defense — the actual implementation and execution of risk
management processes — is the responsibility of the InfoSec function. The
InfoSec team either installs and monitors controls to detect malicious activity
or employs third-party vendors to perform this function. When an attack is
detected, the InfoSec team is also responsible for responding effectively.
As the third line of defense, internal audit is responsible for verifying that the
cybersecurity effort is, in fact, a risk-based approach that properly identifies
and prioritizes the risks, gathers the right information, and prescribes
appropriate responses. In reality, internal audit frequently lacks the resources
and background to evaluate the existing program. Instead, many internal audit
organizations look to cybersecurity professionals and outside vendors to
assess their cybersecurity program. This assessment includes ethical hacking,
specialized evaluations, risk assessments, and assessing InfoSec governance.
Many of these assessments can be performed by the second line as well.
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
11
While such blurring of the three lines is not necessarily desirable, it is in many
cases unavoidable. That said, it is incumbent on internal audit to develop cyber
audit plans more judiciously in order to minimize redundancy and duplication of
effort and to minimize the possibility of gaps or oversights.
The relationships among all the groups involved are critical. Better
collaboration — particularly between the second and third lines of defense —
can reduce duplication while still clearly delineating who takes responsibility
for each of the critical functions. In other words, the various players are
independent but integrated.
Similar experiences occur in organizations that apply any of the other national or
global cybersecurity frameworks, such as the National Institute of Standards and
Technology Cybersecurity Framework (NIST CSF), the International Organization
for Standardization (ISO) and International Electrotechnical Commission
(IEC) Cybersecurity Standards (specifically 27000 to 27008), the European
Telecommunications Standards Institute (ETSI) Cybersecurity Standards for the
European Union, or Japan’s Cybersecurity Basic Act.
12 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
While checklist compliance with the relevant framework is the point of some
cybersecurity tools, those organizations that are ahead of the curve do not
regard compliance as the goal. Rather, they seek to develop appropriate levels of
cybersecurity across the various risk components, recognizing that a completely
risk-free environment will never be achievable.
Further, knowing that not every attack will be prevented or immediately detected,
the organization should also have in place incident response plans to limit the
damages caused by the loss or compromise of critical data and to hasten a
return to normal operations.
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
13
The Foundation’s survey explored this issue and asked participants how
extensively their organizations were auditing cybersecurity capabilities in these
three areas. For each area, the survey asked them to characterize the level
of audit testing they performed on a four-level scale — from “no auditing” to
“extensive testing.” Their responses are shown in Exhibit 2.
60%
50%
40%
30%
20%
10%
0%
Inquiry or No Auditing High or Extensive Testing
The survey responses indicated that preventive controls are not only the
most frequently covered, but they also are tested at the highest rates. As
cybersecurity evolves, the ability to detect and respond will be just as crucial as
the controls associated with preventing attacks. Furthermore, the results showed
that most organizations do at least a basic auditing of their cybersecurity, but
there is room to grow.
14 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
As noted earlier, the responsibility for conducting and evaluating the results of
such assessments varies from one organization to another, so both the InfoSec
function and internal audit must collaborate on who conducts such assessments
and how often they should take place, taking into account the organization’s
agreed-upon risk tolerance levels.
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
15
Ultimately, each organization, based on its risk assessment as well as its IT
infrastructure, must determine what particular assessment or combination of
assessments best fits its information security strategy. Typically, a combination
of both types of assessments is necessary for a robust vulnerability
management program. Although InfoSec or IT teams will typically drive this
program, it is critical that the internal audit team reviews it to validate the scope,
assessment, and results.
In the same way, every organization must determine for itself whether it is cost-
effective — or even possible — to develop the technical capacity to conduct
these assessments in-house. The resources and necessary capabilities can
be expensive, but in large organizations, where the scope of the cybersecurity
operation merits ongoing testing, having the capacity in-house can be desirable.
In many other cases, however, outside vendors can perform these assessments
more cost-effectively. The CAE needs to make an informed, considered decision
in this area to determine when it makes sense to develop in-house capabilities.
If this function is contracted out, it is still important that internal audit assess
the efficacy of the arrangement, including review of the vendor selection and
qualification processes.
16 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
The Foundation’s survey results reflect this continuing adaptation, but they also
suggest that considerable room still exists for internal audit to play a larger and
more proactive role in IT and InfoSec strategies generally and in cybersecurity
concerns specifically. For example, only 20 percent of the survey participants
reported that their organizations consulted with the audit team in the design
and planning of major IT projects and continued to involve internal audit actively
throughout the projects’ duration.
Audit Consulting
Audit Advisory
Limited Input
Minimal Input
No Involvement
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
17
Similarly, approximately half (52 percent) of the survey participants reported
that the internal audit function was a member of their organizations’ project or
IT governance committees. This result suggests that internal audit leaders must
continue to assert and demonstrate the value their departments can provide in
terms of helping to manage risk associated with IT initiatives more effectively.
Cybersecurity Frameworks
One of the fundamental first steps internal audit must take in developing
a cybersecurity audit plan is to thoroughly understand the cybersecurity
framework the organization uses. The selection of a framework is a management
decision, often determined by IT and InfoSec executives. The framework sets
out the standards that internal audit will audit against. As such, the framework is
a pivotal factor that drives the development of the audit plan.
All such frameworks are designed to provide a way for organizations to begin
the management of their cybersecurity systems and help establish a common
language and terminology for all parties involved. For those reasons, the chosen
standard also provides a practical methodology for the audit team to use as it
plans its assessment of the same program compliance.
18 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
• NIST CSF and NIST SP 800-53. The NIST CSF was published in 2014,
following a presidential executive order. The CSF consists of the framework
core, which is a set of about 100 cybersecurity activities (controls) across
five functions; the framework tiers, which help define an organization’s
cybersecurity risk management “maturity”; and the framework profiles, which
show the current and target states of the organization. The NIST Special
Publication 800-53 provides a catalog of security controls designed for
federal information systems. These more than 170 controls are spread
across three security control baselines, which are starting points for
selection of implementation of controls. Both NIST frameworks take a risk-
based approach to recommending controls to implement in order to provide
flexibility to organizations of different sizes, complexity, and objectives.
• ISO/IEC 27001. The ISO and the IEC published the 27001 security standard
in 2013 as an update to the 27001:2005 standard. This framework is unique
in that organizations can become 27001-certified, and the framework is used
internationally. Similar to the NIST frameworks, this framework does not
require all 114 controls be in place, but it serves as a basis for certification
and provides a set of risk-based recommended controls for an organization
to implement as well as a process for managing risk.
• CIS Top 20. The Center for Internet Security (CIS) published the Critical
Security Controls for Effective Cyber Defense, which is a set of 20 best-
practice guidelines. These guidelines are further broken down into about
150 controls. The CIS Top 20 guidelines are largely tactical and actionable
technical defense controls that don’t emphasize overall cyber risk
management and governance.
• HIPAA and HITECH. The Health Insurance Portability and Accountability
Act (HIPAA) and the Health Information Technology for Economic and Clinical
Health Act (HITECH) are two standards that focus on protecting electronic
personal health information (ePHI) in the healthcare industry and in other
industries that handle employee or customer health records. These standards
are legal requirements, industries must be in compliance with them, and
violations can lead to fines.
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
19
• COBIT 5. ISACA developed the original version of Control Objectives for
Information and Related Technologies (COBIT) in 1996. COBIT 5 is the latest
iteration of this framework, which places emphasis on managing cybersecurity
risk through compliance with effective IT governance and management and on
linking IT and cybersecurity objectives to business strategic goals.
• FFIEC CAT and FDIC InTREx. The FFIEC released its assessment tool, the
CAT, in 2014 as a framework against which financial institutions can measure
themselves. Institutions can use this tool to assess their cybersecurity
preparedness, which is determined by an institution’s calculated inherent
risk profile and cybersecurity across five domains, while taking into account
risk tolerance and business objectives. Unlike other frameworks, the CAT
is more rigid in requiring a number of the almost 500 maturity controls
to be met before achieving specific maturity levels. The Federal Deposit
Insurance Corporation (FDIC) has incorporated a portion of the CAT controls
into regulatory examination guidance for banks, with the introduction of the
Information Technology Risk Examination (InTREx) program in 2016.
• PCI DSS. The PCI DSS is a continually updated set of information security
standards mandated by the Payment Card Industry Security Standards
Council. Unlike other standards and frameworks, the scope of the PCI DSS
only includes cardholder data, such as information contained on credit cards.
The controls in these standards are often very detailed and specific, and
organizations that are found to be in violation of these standards can be fined
or might receive increased fees from payment card brands, such as Visa
and Discover.
20 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
4%
13%
24% NONE
ISO/IEC 27001
11% 7%
HIPAA/HITECH
COBIT 5
OTHER
37%
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
21
As with any IT audit functions, the initial moves into cybersecurity audit
capabilities are likely to occur in areas that do not require extensive technical
training — areas such as policies and procedures, system backups, and
compliance with the designated frameworks mentioned earlier. Change and
patch management and audits of workstations are similarly cybersecurity
related, and in the short term might require a minimal amount of training in order
for organizations to begin to incorporate them into their internal audit rotations.
Beyond these broad trends, several other immediate opportunities are already
presenting themselves in many organizations. One such opportunity involves
internal audit departments taking a much deeper dive into application controls.
22 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
23
The audit executives were asked to rate their teams on the following scale:
The results (Exhibit 5) showed that respondents were more likely to have
confidence in their audit team’s abilities for solutions such as Microsoft Windows
and Active Directory software, SIEM products, and IT governance and risk, but
in other areas tended to lack that level of confidence. This perception was most
apparent within the network design and UNIX/Linux skill sets, as almost
75 percent of respondents felt their audit team had only novice-level skills.
The skills gap was also evident in two other critical areas, with 57 percent and
65 percent of respondents citing only novice skills for penetration testing and
telephony/VoIP, respectively. Finally, although the percentages varied across
competencies, very few organizations felt they had advanced skill sets in
any area. These responses highlighted a critical gap for those organizations
attempting to develop work programs and controls for critical technologies.
24 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
The audit executives also were asked about their future hiring plans as they
relate to these competencies. A majority of respondents (52 percent) said they
expect to hire individuals with specific expertise in IT governance and risk within
the next three years but that they will avoid some of the more technical areas
such as UNIX/Linux, VoIP, software development, and networking, most likely
opting to rely on third parties in these areas.
The apparent disparities between existing skill levels and future hiring
plans suggest many internal audit executives have not yet evaluated their
current capabilities in light of the expected expansion of cybersecurity audit
responsibilities. Moreover, the requisite technical skills are continually growing
and changing. Future requirements are likely to encompass artificial intelligence,
blockchain technologies, quantum computers, and other specialized disciplines
that have yet to be recognized, named, or defined. With some internal auditors
already operating from a reactive stance, these future areas of concern will
further complicate matters.
What’s more, the highly competitive nature of the cybersecurity job market
allows the most talented prospects to be quite selective in choosing their next
opportunity. The most desirable talent is driven not just by pay and benefits, but
also by the opportunity to stay on the leading edge of their profession and to be
exposed to a fast-changing array of technical and professional challenges. Such
employees might feel constrained by the duties that are required of them in an
internal audit department, and they would be more attracted by the environment
they find in a research, security, IT, or startup organization.
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
25
While the demand for cybersecurity professionals has tapered off slightly in
recent years, it remains at a very high level. This demand makes it difficult to
offer competitive salary and benefits packages within the constraints of the
internal audit department’s budget, especially for small organizations or teams.
Two other tactics can prove useful in developing the needed talent for effective
cybersecurity audit capabilities. First, the internal audit team can look within
its own talent base, particularly to those working in a more traditional IT audit
capacity. Numerous examples exist of high-performing IT audit personnel
who are eager to make the transition to cybersecurity specialization. These
candidates not only know the organization, but they have the added advantage
of having already developed an understanding of risk and audit competencies
that can be readily applied to cybersecurity. In many cases, the technical
training required to migrate from system technology to cybersecurity
technology is easily managed. Additionally, as smaller audit teams start to
employ internal IT audit capabilities, either via training or hiring, there are
cybersecurity fundamentals that can be incorporated into areas such as
change management, access controls, IT operations, and disaster recovery,
thus reducing the need for outsourced resources.
The second tactic for addressing the talent needs associated with cybersecurity
audit relates back to the topic of relationship management addressed earlier.
While internal audit’s independence and objectivity must be maintained,
establishing a more collaborative working relationship with the IT and InfoSec
functions can provide auditors with indirect access to technical competencies
that could otherwise be difficult or inefficient to develop and maintain.
26 theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
The Future of Cybersecurity
in Internal Audit
Conclusion
As internal audit departments continue to adapt to their growing responsibilities
in validating the effectiveness of cybersecurity risk management, the responses
recorded as part of the Foundation’s research project can provide a valuable
snapshot of the current state of the profession — as well as a potential road map
for the future.
Finally, recognizing the growing need for technical expertise and experience that
is specifically relevant to cybersecurity, audit executives will need to continue
developing creative ways of attracting and retaining talent with the requisite skills
while also strengthening relationships with other elements within the organization
that can provide valuable guidance and support.
theiia.org/foundation
Licensed to Customer No. 1967087@iiaext.org. Re-distribution is prohibited.
crowehorwath.com
27
Microsoft, Windows, Active Directory, and SQL Server are registered trademarks or trademarks of Microsoft Corp. in the United States and/or other countries.
Copyright © 2018 by the Internal Audit Foundation, formerly The Institute of Internal Auditors Research Foundation (IIARF). All rights reserved.
In accordance with applicable professional standards, some firm services may not be available to attest clients.
This material is for informational purposes only and should not be construed as financial or legal advice. Please seek guidance specific to your organization from qualified advisers in your jurisdiction.
© 2018 Crowe Horwath LLP, an independent member of Crowe Horwath International crowehorwath.com/disclosure RISK-18000-002A