Internal Audit
The NSA IT Security Audit process verifies the implementation of
IT controls identified by your organization's risk assessment, or
relevant regulations, as part of your IT security program for
mitigating risk.
Our information technology audits are designed based on
regulations and guidance from:
- Federal Financial Institutions Examination Council (FFIEC)
- Federal Deposit Insurance Corporation (FDIC)
- National Credit Union Administration (NCUA)
- Industry Best Practices
- Office of the Comptroller of the Currency (OCC)
- Federal Reserve (FRB)
- Office of Thrift Supervision (OTS)
The IT Audit process involves collecting and examining
documentation related to the organization's practices and
procedures, data related to technological controls, interviews of
key personnel, walkthroughs of physical locations, and any other
resources that impact the effectiveness of the security program.
These resources are leveraged to verify that the existing controls
adhere to the organization's risk assessment, best practice
standards, and applicable regulatory compliance.
NSA's expert analysts thoroughly document each step of the
process in order to provide a clear audit trail for compliance
reporting. Additionally, our methodology supports the ability to
archive critical data to support the audit conclusions while
maintaining accurate audit trails.
Some of the services in the NSA IT Security Audit include:
- Authentication and Access Controls
- Network Security
- Host Security
- User Equipment Security (e.g.: workstation, laptop,
handheld)
- Personnel Security
- Physical Security
- Application Security
- Software Development and Acquisition
- Business Continuity - Security
- Service Provider Oversight - Security
- Encryption/li>
- Data Security
- Security Monitoring
NSA Information Security Analysts (ISA) conduct the independent
verification by reviewing the relevant documentation and performing
interviews/walkthroughs.
Documentation includes the policies, procedures and checklists
that define and/or support the IT controls. The interviews and
walkthroughs, which are conducted with key personnel from the
organization, are performed to validate adherence to the documented
policies & procedures, as well as to corroborate the practices
described during the interview process.
The IT Audit results are provided in an extensive report
containing:
- Introduction
- Executive Summary
- Remediation Action Plan
- Detailed Audit Results
- Control Descriptions & Verification Procedures
- Supporting Documentation
|