Cybersecurity NIST Audit Program - revST-3
Cybersecurity NIST Audit Program - revST-3
Cybersecurity NIST Audit Program - revST-3
IS Audit/Assurance Program
Cybersecurity: Based on the NIST Cybersecurity Framework
Column Name Description Instructions
Process Sub-area An activity within an overall process influenced by the To make the audit program manageable, it is recommended to
enterprise's policies and procedures that takes inputs from break out the scope of the audit into sub-areas. The auditor
a number of sources, manipulates the inputs and produces can modify this field to entity-specific names and terms. ISACA
outputs has used the most commonly used terms as the basis to
develop this audit program.
Ref. Risk Specifies the risk this control is intended to address This field can be used to input a reference/link to risk
described in the entity's risk register or enterprise risk
management (ERM) system or to input a description of the risk
a particular control is intended to address.
Control Objectives A statement of the desired result or purpose that must be in This field should describe the behaviors, technologies,
place to address the inherent risk in the review areas within documents or processes expected to be in place to address the
scope inherent risk that is part of the audit scope.
Controls The means of managing risk, including policies, procedures, This field should describe in detail the control activities
guidelines, practices or organizational structures, which can expected to be in place to meet the control objective. Control
be of an administrative, technical, management or legal activities can be in roles and responsibilities, documentation,
nature forms, reports, system configuration, segregation of duties,
approval matrices, etc.
IS Audit/Assurance Program
Cybersecurity: Based on the NIST Cybersecurity Framework
Control Type Controls can be automated (technical), manual Specify whether the control under review is automated,
(administrative) or physical. manual, physical or a combination. This information is useful
in determining the testing steps necessary to obtain
Automated/technical controls are things managed or assessment evidence.
performed by computer systems.
Manual/administrative controls are usually things that
employees can or cannot do.
Physical controls include locks, fences, mantraps and even
geographic specific controls.
Control Classification Another way to classify controls is by the way they address Specify whether the control under review is preventive,
a risk exposure. detective, corrective or compensating. This information will be
helpful when defining testing steps and requesting evidence.
Preventive controls should stop an event from happening.
Detective controls should identify an event when it is
happening and generate an alert that prompts a corrective
control to act.
Corrective controls should limit the impact of an event and
help resume normal operations within a reasonable time
frame.
Compensating controls are alternate controls designed to
accomplish the intent of the original controls as closely as
possible when the originally designed controls cannot be
used due to limitations of the environment.
Control Frequency Control activities can occur in real-time, daily, weekly, Specify whether the control under review occurs in real-time,
monthly, annually, etc. daily, weekly, monthly, annually, etc. This information will be
helpful when defining testing steps and requesting evidence.
IS Audit/Assurance Program
Cybersecurity: Based on the NIST Cybersecurity Framework
Testing Step Identifies the steps being tested to evaluate the This field should describe in detail the steps necessary to test
effectiveness of the control under review control activities and collect supporting documentation. The
auditor can modify this field to meet entity-specific needs.
ISACA has used a set of generic steps to develop this audit
program.
NIST Ref. to COBIT 5 Identifies the COBIT 5 processes related to the control
objective or control activities as defined by the NIST
Cybersecurity Framework
Additional Ref. COBIT 5 Identifies additional COBIT 5 processes related to the Input the COBIT 5 process or practice that relates to this
control objective or control activities control.
Ref. Framework/Standards Specifies frameworks and/or standards that relate to the Input references to other frameworks used by the entity as
control under review (e.g., NIST, HIPAA, SOX, ISO) part of their compliance program.
Ref. Workpaper The evidence column usually contains a reference to other Specify the location of supporting documentation detailing the
documents that contain the evidence supporting the audit steps and evidence obtained.
pass/fail mark for the audit step.
An IS audit manager performing a quality control review must
decide whether an auditor has tested enough controls on
which to base an assessment and whether the obtained
evidence is sufficiently objective to support a pass or fail
conclusion.
Pass/Fail Document preliminary conclusions regarding the Specify whether the overall control is effective (Pass) or not
effectiveness of controls. effective (Fail) based on the results of the testing.
Comments Free format field Document any notes related to the review of this Process Sub-
area or specific control activities.
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Identify
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
devices, systems, and communication and data flows 1. Ensure the organization maintains accurate and current copies of data flow ISO/IEC
and data flows are mapped. données sont-ils diagram(s) (DFD), logical network diagram(s) (LND), and/or other diagrams to 27001:2013
facilities that enable the are mapped ?
cartographiés ? show organizational communication and data flow. DSS05.02 APO01.04 A.13.2.1
organization to achieve
business purposes are
identified and managed
consistent with their relative
importance to business 1. If the organization relies on information systems hosted by third parties,
objectives and the obtain a copy of the external systems inventory. Review the third-party
organization’s risk strategy. inventory considering the following:
External information systems Does the external informations Les systèmes d'information a. Scope of external systems is based on the organization's risk appetite (e.g.,
are cataloged. systems are cataloged ? externes sont-ils catalogués ? systems that store, process or access sensitive information or are critical to
business objectives).
b. Completeness of inventory (e.g., location, third party, owner, etc.)
c. Inventory collection process ensures new systems are collected accurately
and in a timely manner (e.g,. automated software to detect and/or store the
inventory) ISO/IEC
d. Frequency of inventory reviews 27001:2013
APO02.02 A.11.2.6
The organization’s place in 1. Obtain documentation or evidence (e.g., mission statement, business
critical infrastructure and its La place de l'organisation dans continuity policy, strategic plan) that the organization has clearly defined and
industry sector is identified and les infrastructures essentielles understands its role in its industry sector and its role within national critical
communicated. et son secteur industriel est-elle infrastructure, as defined by the Department of Homeland Security APO02.06;
Does the organization’s place in cidentifiée et communiquée? (https://www.dhs.gov/what-critical-infrastructure). APO03.01
Priorities for organizational Les priorités de la mission, des 1. Determine if the organization has a strategic plan defining enterprise goals.
The organization’s mission, mission, objectives and organizational mission,
objectifs et des activités de Ensure enterprise goals are aligned with stakeholder interests.
objectives, stakeholders, objectives and activities are
activities are established and l'organisation ont-ils été établis 2. Determine if the organization's mission statement and objectives are
and activities are established and
communicated. et communiqués ? clearly published in a way employees can easily see or access them.
understood and prioritized; communicated ?
this information is used to 3. Determine if an IT strategic plan is documented, defines goals and is
inform cybersecurity roles, mapped to enterprise goals. APO02.01;
responsibilities, and risk 4. Determine if employees are educated on the organization's mission and APO02.06;
management decisions. objectives. APO03.01
Have the dependencies and Les dépendances et les 1. Obtain the organization's business continuity plan, disaster recovery plan,
Dependencies and critical
critical functions for delivery of fonctions critiques pour la business impact analysis and risk assessments and review for the following:
functions for delivery of critical
critical services are prestation des services critiques a. Information systems and software supporting critical business functions ISO/IEC
services are established.
established ? ont-elles été établis ? are identified and prioritized based on maximum allowable downtime. BAI04.02; 27001:2013
b. Third parties who support critical business functions and information BAI09.01; A.11.2.2; A.11.2.3;
systems/software are identified and prioritized. BAI09.02 A.12.1.3
Business Env
this information is used to
inform cybersecurity roles,
responsibilities, and risk
management
NIST Cybersecurity Framework - Identifydecisions. ISACA IS Audit/Assurance Program
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Identify
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Des exigences de résilience 1. Determine if the organization's business continuity and disaster recovery
Resilience requirements to Does resilience requirements to
pour soutenir la prestation de plans (including business impact analysis) support resilience of critical
support delivery of critical support delivery of critical
services essentiels sont-elles services.
services are established. services are established ?
établies ? 2. Determine if appropriate due diligence (e.g., business continuity plans ISO/IEC
(BCP), service level agreements (SLA), Service Organization Control (SOC) 27001:2013
reports) information is in place and reviewed to ensure resilience A.11.1.4; A.17.1.1;
requirements of the organization can be met by critical third-party services. DSS04.02 A.17.1.2; A.17.2.1
Has the organizational La politique organisationnelle 1. Obtain a copy of the information security policy.
Organizational information 2. Determine if the policy is complete and has been approved by a APO01.03;
information security policy is de sécurité de l'information est-
security policy is established. governance structure within the organization. EDM01.01; ISO/IEC
established ? elle établie ?
3. Determine if the policy is communicated to employees. EDM01.02 27001:2013 A.5.1.1
organization’s regulatory,
legal, risk, environmental, 1. Obtain a list of all relevant legal and regulatory requirements for the
and operational Les exigences légales et
organization.
requirements are Legal and regulatory Have legal and regulatory réglementaires en matière de
2. Determine if the cybersecurity program is mapped to legal and regulatory
understood and inform the requirements regarding requirements regarding cybersécurité, y compris les
requirements.
management of cybersecurity, including privacy cybersecurity, including privacy obligations en matière de
3. Review any recent regulatory cybersecurity exams or audits. If any
cybersecurity risk. and civil liberties obligations, and civil liberties obligations, protection de la vie privée et de
exceptions were noted in audits, determine how the organization responded
are understood and managed. are understood and managed ? libertés civiles, sont-elles
to exceptions.
comprises et gérées ?
4. Determine if critical third-party contracts are reviewed by legal counsel
prior to execution.
5. Determine if there is a formalized process in place to monitor and review MEA03.01; ISO/IEC
changes in cybersecurity laws and regulations. MEA03.04 27001:2013 A.18.1
Des informations sur les 1. Determine if the organization is a member of or subscribes to a threat and
Threat and vulnerability Have threat and vulnerability vulnerability information sharing organization (e.g,. United States Computer
menaces et les vulnérabilités
information is received from information is received from Emergency Readiness Team [US-CERT]).
sont-elles reçues de forums et
information sharing forums and information sharing forums and 2. Determine if the organization has a formal process in place for
de sources de partage
sources. sources ? disseminating threat and vulnerability information to individuals with the
d'informations ?
expertise to review the information and the authority to mitigate risk posed APO12.01; ISO/IEC
to the organization. BAI08.04 27001:2013 A.6.1.4
The organization Threats, both internal and Have threats, both internal and Les menaces, internes et 1. Review risk assessments to determine if internal and external threats are APO12.01;
Risk Assessment
understands the external, are identified and external, are identified and externes, sont-elles identifiées identified and documented. APO12.02;
cybersecurity risk to documented. documented ? et documentées ? 2. Determine if the organization has developed processes to actively monitor APO12.03;
organizational operations and report potential threats. APO12.04
(including mission, Les impacts commerciaux
functions, image, or Potential business impacts and Does potential business impacts
potentiels et les probabilités 1. Review risk assessments and business impact analysis to determine if APO12.02;
reputation), organizational likelihoods are identified. and likelihoods are identified ?
sont-ils identifiés ? likelihood and potential impacts are identified and analyzed for threats. DSS04.02 BAI04.02
assets, and individuals.
Les menaces, les vulnérabilités, 1. Determine if the risk assessment process identifies reasonably foreseeable
Threats, vulnerabilities, Have threats, vulnerabilities,
les probabilités et les impacts internal and external threats and vulnerabilities, the likelihood and potential ISO/IEC
likelihoods and impacts are likelihoods and impacts are
son-tils utilisés pour déterminer damage of those threats, and the sufficiency of controls to mitigate the risk 27001:2013
used to determine risk. used to determine risk ?
les risques ? associated with those threats. APO12.02 A.12.6.1
Les réponses aux risques sont- 1. Obtain the organization's risk management plan and/or other
Risk responses are identified Have Risk responses are documentation showing the organization's response to risk levels identified
elles identifiées et hiérarchisées
and prioritized. identified and prioritized ? in the risk assessment. Determine if the risk management plan is designed to
?
accept or reduce risk level in accordance with the organization's risk appetite.
2. Obtain copies of management responses to recent cybersecurity-related
audits and assessments to determine if exceptions noted in audits or APO12.05;
assessments are identified and prioritized. APO13.02
stakeholders. organizational stakeholders ? intervenants organisationnels ? b. Is the process repeatable and measurable? APO13.02;
c. Does the process have an owner? BAI02.03;
d. Are stakeholders involved or informed of the process? BAI04.02
The organization’s priorities,
constraints, risk tolerances, La tolérance au risque de
Organizational risk tolerance is Does the organizational risk
and assumptions are l'organisation est-elle
determined and clearly tolerance is determined and
established and used to déterminée et clairement 1. Determine if the organization has defined and approved a cyberrisk APO12.03;
expressed. clearly expressed ?
support operational risk exprimée ? appetite statement. APO12.06 EDM03.01
decisions.
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
1. Review access rights and permissions for the network and any critical
applications.
2. Determine if user access profiles are consistent with their job functions
(based on least privilege). Compare a sample of users' access authority with
their assigned duties and responsibilities.
3. Determine if access is granted for mission critical functions and
Access permissions are Do access permissions are Les autorisations d'accès sont- information system support functions in order to reduce the risk of
managed, incorporating the managed, incorporating the elles gérées en intégrant les malevolent activity without collusion (e.g., critical processes require two
principles of least privilege and principles of least privilege and principes de moindre privilège people to perform the function).
separation of duties. separation of duties ? et de séparation des tâches ? 4. Determine if users with local administrative privilege on workstations
require this level of access.
5. Review how the organization restricts and/or monitors access to sensitive
data by users with elevated network privilege.
6. Determine if role-based access controls are implemented (e.g., roles vs. ISO/IEC
users are assigned access rights). 27001:2013
7. Determine if there are regular reviews of access. A.6.1.2; A.9.1.2;
DSS05.04; A.9.2.3; A.9.4.1;
DSS06.03 A.9.4.4
1. Review network diagrams and data flow diagrams.
Does the network integrity is L'integrite du réseau est-elle
Network integrity is protected, 2. Determine if high-value/critical systems are separated from high-risk
protected, incorporating protegée, en incorporant la ISO/IEC
incorporating network systems (e.g., VLAN, DMZ, hard backups, air-gapping) where possible.
network segregation where ségrégation du réseau le cas 27001:2013
segregation where appropriate. 3. Determine if the organization has a formal process to approve data flows
appropriate ? échéant ? A.13.1.1; A.13.1.3;
and/or connections between networks and/or systems.
DSS05.02 A.13.2.1
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
The organization’s
Ref. personnel and partners are
Awareness Training
Process Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk provided cybersecurity
Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
awareness education and
are adequately trained to
perform their information 1. Review training and continuing education programs for senior executives.
security-related duties and Consider the following:
responsibilities consistent a. Cybersecurity knowledge and skill levels needed to perform their duties
with related policies, are defined.
Do the senior executives Les cadres supérieurs
procedures, and Senior executives understand b. Specific role-based training is assigned based on cybersecurity roles and
understand roles and comprennent-ils les rôles et
agreements. roles and responsibilities. responsibilities.
responsibilities? responsabilités ?
c. A method is in place to measure senior executives' cybersecurity
knowledge and understanding against organization requirements.
d. Training and education materials are updated to reflect changes in the ISO/IEC
threat environment. 27001:2013
APO07.03 EDM01.03 A.6.1.1; A.7.2.2
Les actifs sont-ils gérés de 1. Review asset inventory policies and procedures. Consider the following: ISO/IEC
Assets are formally managed Have the assets are formally
manière formelle tout au long a. Formalized processes in place 27001:2013
throughout removal, transfers managed throughout removal,
du déménagement, des b. Accuracy of asset tracking A.8.2.3; A.8.3.1;
and disposition. transfers and disposition ?
transferts et de la disposition ? c. Secure removal or destruction of confidential information from A.8.3.2; A.8.3.3;
Information and records decommissioned assets BAI09.03 DSS05.06 A.11.2.7
(data) are managed
Data Security
ISO/IEC
27001:2013
A.6.1.2; A.7.1.1;
Les protections contre les fuites
Protections against data leaks Has the protections against A.7.1.2; A.7.3.1;
de données ont-elles été mises
are implemented. data leaks are implemented ? A.8.2.2; A.8.2.3;
en place?
1. Review risk assessments, information security meeting minutes and A.9.1.1; A.9.1.2;
information security strategies to determine if the risk of data loss prevention A.9.2.3; A.9.4.1;
or exfiltration of confidential data is being considered. A.9.4.4; A.9.4.5;
2. Ensure controls or tools (e.g., data loss prevention) are in place to detect or A.13.1.3; A.13.2.1;
block potential unauthorized or unintentional transmission or removal of A.13.2.3; A.13.2.4;
confidential data (e.g., email, FTP, USB devices, Telnet) APO01.06 DSS05.06 A.14.1.2; A.14.1.3
Les mécanismes de vérification 1. Determine if the organization employs integrity verification tools (e.g.,
Integrity checking mechanisms Does the Integrity checking
de l'intégrité sont-ils utilisés parity checks, cyclical redundancy checks, cryptographic hashes) to detect
are used to verify software, mechanisms are used to verify
pour vérifier l'intégrité des unauthorized changes to software (e.g., middleware, applications and ISO/IEC
firmware and information software, firmware and
logiciels, des micrologiciels et operating systems with key internal components such as kernels, drivers), 27001:2013
integrity. information integrity ?
des informations ? firmware (e.g., Basic Input Output System [BIOS]), and information (e.g., A.12.2.1; A.12.5.1;
metadata such as security attributes associated with information). APO01.06 A.14.1.2; A.14.1.3
The development and testing Have the development and Les environnements de
environment(s) are separate testing environment(s) are développement et de test sont- 1. If the organization maintains a software development or testing
from the production separate from the production ils distincts de l'environnement environment, review network diagrams, database connections and applicable ISO/IEC
environment. environment ? de production ? firewall/router configurations to determine sufficiency of separation between 27001:2013
these environments and the production network. BAI07.04 A.12.1.4
A baseline configuration of Does a baseline configuration of Une configuration de base des 1. Determine if the organization has created or adopted baseline
information information systèmes de contrôle des configurations (e.g., Center for Internet Security [CIS] benchmarks, Security ISO/IEC
technology/industrial control technology/industrial control technologies de l’information et Technical Implementation Guides [STIG]) for systems (e.g., servers, desktops, BAI10.01; 27001:2013
systems is created and systems is created and de l’industrie est-elle créée et routers). BAI10.02; A.12.1.2; A.12.5.1;
maintained. maintained ? maintenue ? 2. Sample systems against the organization's baseline configurations to BAI10.03; A.12.6.2; A.14.2.2;
ensure standards are followed and enforced. BAI10.05 A.14.2.3; A.14.2.4
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Un cycle de vie de 1. Obtain and review a copy of the organization's system development life ISO/IEC
A system development life cycle Does a system development life
développement système (SDLC) cycle. 27001:2013
(SDLC) to manage systems is cycle (SDLC) to manage systems
pour gérer les systèmes est-il 2. Obtain samples of rollout documentation and rollout schedule to ensure BAI07.04; A.6.1.5; A.14.1.1;
implemented. is implemented ?
mis en œuvre ? compliance with policy. APO13.01 BAI07.06 A.14.2.1; A.14.2.5
Response and recovery plans Have the response and recovery Les plans d'interventions et de ISO/IEC
are tested. plans are tested ? relance ont-ils été testés ? 1. Determine whether business continuity and incident response tests are 27001:2013
performed according to policy and any applicable guidance. DSS04.04 A.17.1.3
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Protect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Maintenance and repair of Have the maintenance and L'entretien et la réparation des 1. Review controlled maintenance processes. Consider the following:
organizational assets is repair of organizational assets is actifs organisationnels sont-ils a. Maintenance activities are approved, scheduled and documented (e.g.,
performed and logged in a performed and logged in a effectués et enregistrés en date and time, name of individual(s) performing maintenance, description of
timely manner, with approved timely manner, with approved temps opportun, avec des outils maintenance performed, systems removed/replaced)
and controlled tools. and controlled tools ? approuvés et contrôlés ? b. Maintenance staff or vendors are approved, authorized and supervised (if ISO/IEC
required). 27001:2013
Maintenance and repairs of c. Maintenance tools and media are approved and inspected for improper or A.11.1.2; A.11.2.4;
Maintenance
industrial control and unauthorized modifications prior to use. BAI09.03 DSS03.05 A.11.2.5
information system
components is performed
consistent with policies and
procedures. La maintenance à distance des
Remote maintenance of Does the remote maintenance
actifs organisationnels est-elle 1. Determine whether remote maintenance on servers, workstations and
organizational assets is of organizational assets is
approuvée, consignée et other systems is performed. Consider the following:
approved, logged and approved, logged and
effectuée de manière à a. Who is allowed to connect to systems (e.g. internal employees, third
performed in a manner that performed in a manner that
empêcher tout accès non parties)
prevents unauthorized access. prevents unauthorized access ?
autorisé ? b. What software/version or service is used to connect ISO/IEC
c. Whether end users have to take some action prior to allowing remote 27001:2013
control of their workstation and/or whether access is logged and monitored A.11.2.4; A.15.1.1;
d. Adequacy of authentication requirements (e.g., multifactor authentication) DSS05.04 A.15.2.1
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Detect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
APO12.06
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Detect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Detect
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Respond
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Response Planning
Have events are reported Les événenments sont-ils 1. Review the incident response plan to determine if reporting structure and
Events are reported consistent
consistent with established siganlés conformément aux communication channels are clearly defined.
with established criteria.
criteria ? critères établis ? 2. Determine if employees are trained to report suspected security incidents. ISO/IEC
3. Obtain copies of reports from recent incidents to validate reporting is 27001:2013
consistent and follows the plan. DSS02.05 A.6.1.3; A.16.1.2
Communications
La coordination avec les parties 1. Review the incident response plan to determine if a process is in place to
Coordination with stakeholders Does the coordination with
prenantes se déroul-t-elle communicate with internal and external stakeholders during and/or following
occurs consistent with response stakeholders occurs consistent
conformément aux plans an incident.
plans. with response plans ?
d'intervention ? 2. Obtain copies of reports from recent incidents to validate reporting is DSS02.05;
consistent and follows the plan. DSS02.07
Le partage volontaire
Voluntary information sharing Has the voluntary information
d'informations a-t-il lieu avec
occurs with external sharing occurs with external
des parties prenantes externes
stakeholders to achieve broader stakeholders to achieve broader
afin de mieux faire connaitre la
cybersecurity situational cybersecurity situational 1. Review the incident response plan to determine if a process is in place to
situation en matière de
awareness. awareness ? communicate with external stakeholders (e.g., end users, suppliers, third
cybersécurité ?
parties, customers) following an incident. BAI08.01
The impact of the incident is Has the impact of the incident is 1. Review the incident response plan to determine if there is a process to
understood. understood ? formally analyze and classify incidents based on their potential impact.
Analysis is conducted to 2. Review resume and education of incident response team members ISO/IEC
Analysis
ensure adequate response responsible for determining incident impact to determine if they have the 27001:2013
and support recovery L'impact de l'incident est-il compris ? knowledge and experience to adequately understand potential impact. DSS02.04 A.16.1.6
activities.
Have the incidents are Les incidents sont-ils classés 1. Review the incident response plan to determine if it is designed to
Incidents are categorized prioritize incidents, enabling a rapid response for significant incidents or
categorized consistent with conformrément aux plans
consistent with response plans. vulnerabilities. ISO/IEC
response plans ? d'intervention ?
2. Obtain copies of reports from recent incidents to validate reporting is DSS02.01; 27001:2013
consistent and follows the plan. DSS02.02 A.16.1.4
Activities are performed to Incidents are mitigated. a. Steps to mitigate the incident to prevent further harm
prevent expansion of an mitigated ? atténués ? b. Procedures to notify potentially impacted third parties
event, mitigate its effects c. Strategies to mitigate impact different types of incidents (e.g., distributed
and eradicate the incident. denial-of-service [DDoS], malware, etc.) ISO/IEC
2. Review any documented incidents to determine whether mitigation efforts 27001:2013
were implemented and effective. DSS02.05 A.12.2.1; A.16.1.5
Mitigation
Activities are performed to
IS Audit/Assurance Progamof an
prevent expansion
Cybersecurity:event,
Basedmitigate
onitsthe
effects
NIST Cybersecurity Framework - Respond
and eradicate the incident.
Process Ref. Control Control Control NIST Ref. to Additional Ref. Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 COBIT 5 Standards Workpaper Fail Comments
Les plans d'intervention 1. Review the organization's incident handling reports and incident testing
Response plans incorporate Does the response plans documentation for action items and lessons learned.
intègrent-t-ils les
lessons learned. incorporate lessons learned ? 2. Evaluate the incident response plan to determine if results (e.g., action ISO/IEC
enseignements tirés ?
Improvements
Organizational response items, lessons learned) from real-world incidents and incident testing have 27001:2013
activities are improved by been used to update incident response procedures, training and testing. BAI01.13 DSS02.07 A.16.1.6
incorporating lessons
learned from current and
previous detection/response 1. Review the organization's incident response and business continuity
activities. Response strategies are Have the response strategies Les stratégies d'intervention strategies and plans. Consider the following:
updated. are updated ? ont-elles été mises à jour ? a. There is a mechanism in place to regularly review, improve, approve and
communicate the plans.
b. The organization's response capability is informed by actual incidents, tests
and current threats. DSS02.07
IS Audit/Assurance Progam
Cybersecurity: Based on the NIST Cybersecurity Framework - Recover
Process Ref. Control Control Control NIST Ref. to Additional Ref. Framework/ Ref. Pass/
Sub-Area Risk Control Objectives Controls Questions for clients FR Type Classification Frequency Testing Step COBIT 5 Ref. COBIT 5 Standards Workpaper Fail Comments
Recovery processes and cybersecurity incident plan) and the documented results of recent
procedures are executed cybersecurity events or event tests.
and maintained to ensure Recovery plan is executed Does recovery plan is executed Le plan de récupération est-il
exécuté pendant ou aprs un
2. Evaluate documentation for the following:
a. Frequency of testing
timely restoration of during or after an event. during or after an event ? événement ? b. Coverage of critical pieces of the organization's recovery plans and
systems or assets affected procedures
by cybersecurity events. c. Documentation of incidents (e.g. power outages, communication failures,
system outages, attempted and successful malicious or careless unauthorized ISO/IEC
access or disruption). DSS02.05; 27001:2013
DSS03.04 A.16.1.5
1. Obtain a copy of results of recent cybersecurity events or event tests.
Recovery plans incorporate Does recovery plans Les plan de rétablissement 2. Evaluate documentation for the following:
lessons learned. incorporate lessons learned. intègrent-ils les leçons ? a. Documented lessons learned and analysis of failed or missing controls
b. Action items designed to improve recovery plans and procedures based on
the lessons learned and analysis DSS04.05;
BAI05.07 DSS04.08
Improvements