Security Testing

Security Assessments: protecting the organization against cyberattacks is a critical part of achieving the goal of internal control

How to:

•follow the established risk management framework

•assess and respond to threats on a continuous basis

Risk Management Framework: outlines a comprehensive process to manage risk by applying the following four components.

How to: FARM

•establish a risk framework: defining the environment in which risk based decisions are made to form a strategy helping companies identify assumptions, constraints, and tolerance.

•assess risk: helps identify threats

•respond to risk: DEAR

Develop

Evaluate

Appropriate response

Risk response implemented

•Monitoring

managing risk in an organization requires intricate planning and participation at all levels from senior mgmgt to frontline employees. NIST provides a framework.

Engagements and reporting: involve addressing the second compost like performing a risk assessment and testing controls resulting in Security Assessment Report to managemnt

•outlined in NIST

how to:

•define assessment procedures

Assessment methods: examination, interviewing, testing,

•support assessment methods by identifying the tools, techniques and methodologies needed to assess risk, risk assessment assumptions, constraints, roles and responsibilities, assessment data collection and processing methods, communication methods, how assessment is conducted, frequency

Security Assessment Reports: issued as evidence of controls complying, or not complying with stated security goals and objectives. Findings, recommendations, identified vulnerabilities.

•outlined in NIST

Contains

•determination statements: made throughout the report that assigns a grade- "S, satisfied" or "O, other than satisfied"

•summary of findings: introductory portion with synopsis of key findings and recommended actions

•system overview: outlines the information management system being assessed

•assessment methodology: explains the techniques and procedures utilized to perform the assessment

•Security assessment findings: discusses the gaps and deficiencies discovered during the assessment

•recommendations

•action plan: final section of a roadmap that covers steps to be taken

Security Assessment evaluators: level of assurance in line with the AICPA service organizations control

done by system auditors, developers, assessors, owners, integrators, inspectors.

How to:

•consider quality and maturity of a company risk management process and tailor assessment according to NIST

•results will help identify deficiency and response and prioritize and monitor and budget better

Security Assessment evidence: from assessments current or previous, document system development articles and operational activities

product and system assessment are examination, often conducted by third party to evaluate the security functions and their configuration settings.

Communication of security knowledge and awareness

super important everyone is on the same page and the only way to do this is with training on a regular basis And at all stages of an employees job and tailored to the job role. Is mandated or encouraged usually.

Effect: minimizes cyber risk and damages

Types of training: on management, specialized IT personnel, and all other employees.

•fully outsourced

•in house

•combo

Methods of training:

•individual or group session

•live or on demand, in person or remote

May include:

•quizzes, examinations, simualtions

Must have: adequate documentation of course planning and delivery methods should also be performed for consistency and evaluation purposes.

Organizational job role specific to security awareness:

•management: designs and evaluates security awareness programs or coordinates with third party vendors hired to develop and or perform the security awareness training

•specialized IT personnel: carry out the policies set forth in security awareness programs

•all other employee: follows security procedures based on their specific job roles

Successful awareness programs:

•phishing simulations: summarized with metrics and analyzed over time to evaluate the employee awareness

click rate: percentage of employees that clicked on a phising email link

reclick rate: percentage of employees who failed the first campaign who click again

report rate: percentage who report

No response rate: percentage who ignore the email and did not respond in any way

reply rate: percentage of employees who replied

•program supporters and champions: leading to the effort of implementing a security platform is often needed.

employee consultations/ how often they are utilized

security behaviors with and without champions

champion density vs security behaviors: measures the degree of correlations and linear relationship of champion activity and density among different departments and security behavior

•regular employee engagement

percentage of employees who completed training

average time taken

referral

questions from training

follow up after training

social media feedback

•metrics to measure program success like amount of money, resource, and corrective action plan for any deficiency discovered.