Cybersecurity NIST Audit Program - FINAL
Cybersecurity NIST Audit Program - FINAL
IS Audit/Assurance Program
Cybersecurity: Based on the NIST Cybersecurity Framework
Column Name Description Instructions
Process Sub-area An activity within an overall process influenced by the To make the audit program manageable, it is recommended to
enterprise's policies and procedures that takes inputs from break out the scope of the audit into sub-areas. The auditor
a number of sources, manipulates the inputs and produces can modify this field to entity-specific names and terms. ISACA
outputs has used the most commonly used terms as the basis to
develop this audit program.
Ref. Risk Specifies the risk this control is intended to address This field can be used to input a reference/link to risk
described in the entity's risk register or enterprise risk
management (ERM) system or to input a description of the risk
a particular control is intended to address.
Control Objectives A statement of the desired result or purpose that must be in This field should describe the behaviors, technologies,
place to address the inherent risk in the review areas within documents or processes expected to be in place to address the
scope inherent risk that is part of the audit scope.
Controls The means of managing risk, including policies, procedures, This field should describe in detail the control activities
guidelines, practices or organizational structures, which can expected to be in place to meet the control objective. Control
be of an administrative, technical, management or legal activities can be in roles and responsibilities, documentation,
nature forms, reports, system configuration, segregation of duties,
approval matrices, etc.
IS Audit/Assurance Program
Cybersecurity: Based on the NIST Cybersecurity Framework
Control Type Controls can be automated (technical), manual Specify whether the control under review is automated,
(administrative) or physical. manual, physical or a combination. This information is useful in
determining the testing steps necessary to obtain assessment
Automated/technical controls are things managed or evidence.
performed by computer systems.
Manual/administrative controls are usually things that
employees can or cannot do.
Physical controls include locks, fences, mantraps and even
geographic specific controls.
Control Classification Another way to classify controls is by the way they address Specify whether the control under review is preventive,
a risk exposure. detective, corrective or compensating. This information will be
helpful when defining testing steps and requesting evidence.
Preventive controls should stop an event from happening.
Detective controls should identify an event when it is
happening and generate an alert that prompts a corrective
control to act.
Corrective controls should limit the impact of an event and
help resume normal operations within a reasonable time
frame.
Compensating controls are alternate controls designed to
accomplish the intent of the original controls as closely as
possible when the originally designed controls cannot be
used due to limitations of the environment.
IS Audit/Assurance Program
Cybersecurity: Based on the NIST Cybersecurity Framework
Control Frequency Control activities can occur in real-time, daily, weekly, Specify whether the control under review occurs in real-time,
monthly, annually, etc. daily, weekly, monthly, annually, etc. This information will be
helpful when defining testing steps and requesting evidence.
Testing Step Identifies the steps being tested to evaluate the This field should describe in detail the steps necessary to test
effectiveness of the control under review control activities and collect supporting documentation. The
auditor can modify this field to meet entity-specific needs.
ISACA has used a set of generic steps to develop this audit
program.
NIST Ref. to COBIT 5 Identifies the COBIT 5 processes related to the control
objective or control activities as defined by the NIST
Cybersecurity Framework
Additional Ref. COBIT 5 Identifies additional COBIT 5 processes related to the Input the COBIT 5 process or practice that relates to this
control objective or control activities control.
Ref. Framework/Standards Specifies frameworks and/or standards that relate to the Input references to other frameworks used by the entity as
control under review (e.g., NIST, HIPAA, SOX, ISO) part of their compliance program.
Ref. Workpaper The evidence column usually contains a reference to other Specify the location of supporting documentation detailing the
documents that contain the evidence supporting the audit steps and evidence obtained.
pass/fail mark for the audit step.
An IS audit manager performing a quality control review must
decide whether an auditor has tested enough controls on
which to base an assessment and whether the obtained
evidence is sufficiently objective to support a pass or fail
conclusion.
Pass/Fail Document preliminary conclusions regarding the Specify whether the overall control is effective (Pass) or not
effectiveness of controls. effective (Fail) based on the results of the testing.
Comments Free format field Document any notes related to the review of this Process Sub-
area or specific control activities.
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Identify
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Resources (e.g., hardware, 1. Obtain a copy of the organization's data classification program
devices, data and software) are (classification may also be identified in the risk assessment or business impact
prioritized based on their analysis).
classification, criticality and 2. Review the program to determine if key resources (e.g., hardware, devices, APO03.03;
business value. data, software) are classified and prioritized based on criticality and business APO03.04; ISO/IEC
value. BAI09.02 27001:2013 A.8.2.1
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Identify
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Business Environment
Priorities for organizational 1. Determine if the organization has a strategic plan defining enterprise goals.
The organization’s mission, mission, objectives and
objectives, stakeholders, Ensure enterprise goals are aligned with stakeholder interests.
activities are established and 2. Determine if the organization's mission statement and objectives are
and activities are communicated.
understood and prioritized; clearly published in a way employees can easily see or access them.
this information is used to 3. Determine if an IT strategic plan is documented, defines goals and is
inform cybersecurity roles, mapped to enterprise goals. APO02.01;
responsibilities, and risk 4. Determine if employees are educated on the organization's mission and APO02.06;
management decisions. objectives. APO03.01
Resilience requirements to 1. Determine if the organization's business continuity and disaster recovery
support delivery of critical plans (including business impact analysis) support resilience of critical
services are established. services.
2. Determine if appropriate due diligence (e.g., business continuity plans ISO/IEC
(BCP), service level agreements (SLA), Service Organization Control (SOC) 27001:2013
reports) information is in place and reviewed to ensure resilience A.11.1.4; A.17.1.1;
requirements of the organization can be met by critical third-party services. DSS04.02 A.17.1.2; A.17.2.1
Information security roles and 1. Determine if information security roles and responsibilities are defined.
responsibilities are coordinated Roles and responsibilities may be defined in policies, job descriptions,
and aligned with internal roles agreements, RACI charts, hierarchy charts and/or contracts.
and external partners. 2. Determine if there is sufficient independence within the information
security roles in order to provide adequate separation of duties for critical
functions.
3. Review contracts, nondisclosure agreements (NDAs) and service level ISO/IEC
The policies, procedures, agreements (SLAs) with critical vendors to determine if cybersecurity controls APO01.02; 27001:2013
and processes to manage and incident notification are addressed appropriately. APO13.12 DSS06.03 A.6.1.1; A.7.2.1
and monitor the
Governance
organization’s regulatory,
legal, risk, environmental,
and operational
requirements are 1. Obtain a list of all relevant legal and regulatory requirements for the
understood and inform the Legal and regulatory organization.
management of requirements regarding 2. Determine if the cybersecurity program is mapped to legal and regulatory
cybersecurity risk. cybersecurity, including privacy requirements.
and civil liberties obligations, 3. Review any recent regulatory cybersecurity exams or audits. If any
are understood and managed. exceptions were noted in audits, determine how the organization responded
to exceptions.
4. Determine if critical third-party contracts are reviewed by legal counsel
prior to execution.
5. Determine if there is a formalized process in place to monitor and review MEA03.01; ISO/IEC
changes in cybersecurity laws and regulations. MEA03.04 27001:2013 A.18.1
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Identify
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
The organization Threats, both internal and 1. Review risk assessments to determine if internal and external threats are APO12.01;
Risk Assessment
understands the external, are identified and identified and documented. APO12.02;
cybersecurity risk to documented. 2. Determine if the organization has developed processes to actively monitor APO12.03;
organizational operations and report potential threats. APO12.04
(including mission,
functions, image, or Potential business impacts and
reputation), organizational likelihoods are identified. 1. Review risk assessments and business impact analysis to determine if APO12.02;
assets, and individuals. likelihood and potential impacts are identified and analyzed for threats. DSS04.02 BAI04.02
Threats, vulnerabilities, 1. Determine if the risk assessment process identifies reasonably foreseeable
likelihoods and impacts are internal and external threats and vulnerabilities, the likelihood and potential ISO/IEC
used to determine risk. damage of those threats, and the sufficiency of controls to mitigate the risk 27001:2013
associated with those threats. APO12.02 A.12.6.1
Risk management processes are 1. Evaluate the framework or process used for risk management. Consider
established, managed and the following:
a. Is the process formally documented? APO12.04;
Risk Management Strategy
agreed to by organizational
stakeholders. b. Is the process regularly updated? APO12.05;
b. Is the process repeatable and measurable? APO13.02;
The organization’s priorities, c. Does the process have an owner? BAI02.03;
constraints, risk tolerances, d. Are stakeholders involved or informed of the process? BAI04.02
and assumptions are Organizational risk tolerance is
established and used to determined and clearly
support operational risk 1. Determine if the organization has defined and approved a cyberrisk APO12.03;
expressed. appetite statement. APO12.06 EDM03.01
decisions.
The organization’s
determination of risk tolerance 1. Obtain a copy of the organization's risk management strategy and risk
is informed by its role in critical appetite statement to determine if these align with its role in critical
infrastructure and sector- infrastructure (as defined by national infrastructure protection plan [NIPP]
specific risk analysis. and sector-specific plans).
APO04.03
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Access to assets and 1. Determine whether policies and procedures related to remote users'
associated facilities is access capabilities are formalized. Consider the following:
limited to authorized users, a. Remote users (e.g., employees, contractors, third parties) with access to
processes, or devices, and to critical systems are approved and documented.
authorized activities and b. Remote connections are only opened as required.
transactions. c. Remote connections are logged and monitored.
Remote access is managed. d. Remote connections are encrypted.
e. Strong authentication is in place (e.g., multifactor, strong password
parameters).
f. The ability to wipe data remotely on mobile devices when data are missing
or stolen is enabled.
g. Institution security controls (e.g., antivirus, patch management) are ISO/IEC
required on remote devices connecting to the network. APO13.01; 27001:2013
DSS01.04; A.6.2.2; A.13.1.1;
DSS05.03 A.13.2.1
1. Review access rights and permissions for the network and any critical
applications.
2. Determine if user access profiles are consistent with their job functions
(based on least privilege). Compare a sample of users' access authority with
their assigned duties and responsibilities.
3. Determine if access is granted for mission critical functions and
Access permissions are information system support functions in order to reduce the risk of
managed, incorporating the malevolent activity without collusion (e.g., critical processes require two
principles of least privilege and people to perform the function).
separation of duties. 4. Determine if users with local administrative privilege on workstations
require this level of access.
5. Review how the organization restricts and/or monitors access to sensitive
data by users with elevated network privilege.
6. Determine if role-based access controls are implemented (e.g., roles vs. ISO/IEC
users are assigned access rights). 27001:2013
7. Determine if there are regular reviews of access. A.6.1.2; A.9.1.2;
DSS05.04; A.9.2.3; A.9.4.1;
DSS06.03 A.9.4.4
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Third-party stakeholders (e.g., 1. Review applicable third-party contracts, customer agreements, and partner
suppliers, customers, partners) agreements to ensure security roles and responsibilities are clearly defined.
The organization’s personnel understand roles and 2. Review the organization's vendor management program to ensure third
parties are complying with cybersecurity responsibilities defined in contracts APO07.03;
Awareness Training
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Assets are formally managed 1. Review asset inventory policies and procedures. Consider the following: ISO/IEC
throughout removal, transfers a. Formalized processes in place 27001:2013
and disposition. b. Accuracy of asset tracking A.8.2.3; A.8.3.1;
c. Secure removal or destruction of confidential information from A.8.3.2; A.8.3.3;
Information and records decommissioned assets BAI09.03 DSS05.06 A.11.2.7
Data Security
ISO/IEC
27001:2013
Protections against data leaks A.6.1.2; A.7.1.1;
are implemented. A.7.1.2; A.7.3.1;
A.8.2.2; A.8.2.3;
1. Review risk assessments, information security meeting minutes and A.9.1.1; A.9.1.2;
information security strategies to determine if the risk of data loss prevention A.9.2.3; A.9.4.1;
or exfiltration of confidential data is being considered. A.9.4.4; A.9.4.5;
2. Ensure controls or tools (e.g., data loss prevention) are in place to detect or A.13.1.3; A.13.2.1;
block potential unauthorized or unintentional transmission or removal of A.13.2.3; A.13.2.4;
confidential data (e.g., email, FTP, USB devices, Telnet) APO01.06 DSS05.06 A.14.1.2; A.14.1.3
A baseline configuration of
information 1. Determine if the organization has created or adopted baseline
technology/industrial control configurations (e.g., Center for Internet Security [CIS] benchmarks, Security ISO/IEC
systems is created and Technical Implementation Guides [STIG]) for systems (e.g., servers, desktops, BAI10.01; 27001:2013
maintained. routers). BAI10.02; A.12.1.2; A.12.5.1;
2. Sample systems against the organization's baseline configurations to BAI10.03; A.12.6.2; A.14.2.2;
ensure standards are followed and enforced. BAI10.05 A.14.2.3; A.14.2.4
A system development life cycle 1. Obtain and review a copy of the organization's system development life ISO/IEC
(SDLC) to manage systems is cycle. 27001:2013
implemented. 2. Obtain samples of rollout documentation and rollout schedule to ensure BAI07.04; A.6.1.5; A.14.1.1;
compliance with policy. APO13.01 BAI07.06 A.14.2.1; A.14.2.5
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Effectiveness of protection
technologies is shared with 1. Determine if the organization participates in information sharing and
appropriate parties. analysis groups. ISO/IEC
2. Determine if the organization facilitates information sharing by enabling BAI08.01; 27001:2013
authorized users to share authorized information to sharing partners. MEA02.03 A.16.1.6
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Maintenance and repair of 1. Review controlled maintenance processes. Consider the following:
organizational assets is a. Maintenance activities are approved, scheduled and documented (e.g.,
performed and logged in a date and time, name of individual(s) performing maintenance, description of
timely manner, with approved maintenance performed, systems removed/replaced)
and controlled tools. b. Maintenance staff or vendors are approved, authorized and supervised (if ISO/IEC
required). 27001:2013
c. Maintenance tools and media are approved and inspected for improper or A.11.1.2; A.11.2.4;
Maintenance
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Detect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
APO12.06
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Detect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Detect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Roles and responsibilities for 1. Obtain a copy of processes and procedures for monitoring physical and
electronic anomalous events.
detection are well defined to 2. Determine if the organization's processes and procedures assign key
ensure accountability. ISO/IEC
responsibilities to specific individuals or positions.
DSS05.01 27001:2013 A.6.1.1
1. Obtain a copy of laws and regulations (e.g., federal, state, local), industry
standards, internal security requirements and risk appetite applicable to the
Detection activities comply with organization.
all applicable requirements. ISO/IEC
2. Determine if the organization is performing audits/testing to ensure their
detection activities comply with these requirements. 27001:2013
MEA03.03 A.18.1.4
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Respond
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Events are reported consistent 1. Review the incident response plan to determine if reporting structure and
with established criteria. communication channels are clearly defined.
2. Determine if employees are trained to report suspected security incidents. ISO/IEC
3. Obtain copies of reports from recent incidents to validate reporting is 27001:2013
consistent and follows the plan. DSS02.05 A.6.1.3; A.16.1.2
Communications
Coordination with stakeholders 1. Review the incident response plan to determine if a process is in place to
occurs consistent with response communicate with internal and external stakeholders during and/or following
plans. an incident.
2. Obtain copies of reports from recent incidents to validate reporting is DSS02.05;
consistent and follows the plan. DSS02.07
Voluntary information sharing
occurs with external
stakeholders to achieve broader
cybersecurity situational 1. Review the incident response plan to determine if a process is in place to
awareness. communicate with external stakeholders (e.g., end users, suppliers, third
parties, customers) following an incident. BAI08.01
ensure adequate response 2. Review resume and education of incident response team members ISO/IEC
and support recovery responsible for determining incident impact to determine if they have the 27001:2013
activities. knowledge and experience to adequately understand potential impact. DSS02.04 A.16.1.6
Analy
and support recovery
activities.
NIST Cybersecurity Framework - Respond ISACA IS Audit/Assurance Program
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Respond
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Response plans incorporate 1. Review the organization's incident handling reports and incident testing
lessons learned. documentation for action items and lessons learned.
Improvements
Organizational response 2. Evaluate the incident response plan to determine if results (e.g., action ISO/IEC
activities are improved by items, lessons learned) from real-world incidents and incident testing have 27001:2013
incorporating lessons been used to update incident response procedures, training and testing. BAI01.13 DSS02.07 A.16.1.6
learned from current and
previous detection/response
activities. 1. Review the organization's incident response and business continuity
Response strategies are strategies and plans. Consider the following:
updated. a. There is a mechanism in place to regularly review, improve, approve and
communicate the plans.
b. The organization's response capability is informed by actual incidents, tests
and current threats. DSS02.07
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Recover
Process Ref. Control Control Control NIST Ref. to Additional Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 Ref. COBIT 5 Standards Workpaper Fail Comments
Recovery processes and cybersecurity incident plan) and the documented results of recent
procedures are executed cybersecurity events or event tests.
and maintained to ensure Recovery plan is executed 2. Evaluate documentation for the following:
timely restoration of during or after an event. a. Frequency of testing
systems or assets affected b. Coverage of critical pieces of the organization's recovery plans and
by cybersecurity events. procedures
c. Documentation of incidents (e.g. power outages, communication failures,
system outages, attempted and successful malicious or careless unauthorized
access or disruption). ISO/IEC
DSS02.05; 27001:2013
DSS03.04 A.16.1.5
BAI05.07 DSS04.08
Recovery planning and
processes are improved by
incorporating lessons
learned into future 1. Obtain a copy of the organization's recovery plans and procedures (e.g.,
activities. business continuity plan, incident response plan, disaster recovery plan,
cybersecurity incident plan) and the documented results of recent
cybersecurity events or event tests.
Recovery strategies are 2. Determine if recovery plans and procedures are reviewed, updated and
updated. approved on a regular basis or as changes are made to systems and controls.
3. Review recovery plans and procedures to determine if action items
resulting from lessons learned during cybersecurity events and event tests
have been implemented.
DSS04.05;
BAI07.08 DSS04.08
Communications
NIST Cybersecurity Framework - Recover ISACA IS Audit/Assurance Program
coordinated with internal
and external parties, such as
coordinating centers,
IS Audit/Assurance
Internet Progam
Service Providers,
Cybersecurity:owners
Based on thesystems,
of attacking NIST Cybersecurity Framework - Recover
victims, other CSIRTs and
vendors.
Process Ref. Control Control Control NIST Ref. to Additional Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Type Classification Frequency Testing Step COBIT 5 Ref. COBIT 5 Standards Workpaper Fail Comments