tg-me.com/IT_Audit/343
Last Update:
π‘οΈ The ABCs of Cybersecurity Audit: Focusing on Asset Management - The Definitive Edition π οΈ
Hello Cyber Warriors! π Today, we're taking a comprehensive look at Asset Management within cybersecurity audits, enriched with references to industry standards and frameworks. Buckle up, because we're about to get technical! π―
---
π ID.AM-1: Physical Device Inventory π₯οΈ
- Function: IDENTIFY
- Category: Asset Management
- Audit: Physical devices and systems within the organisation are inventoried.
- Guidance: The data, personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed consistently.
ID.AM-1 Checklist:
1. π§Ύ Create a device registry
- Example: Use a centralised asset management system to record all servers, laptops, and mobile devices.
2. π΅οΈββοΈ Use network scanning tools
- Example: Employ tools like Nmap to scan for devices connected to your network.
3. π Regularly update the inventory
- Example: Automate alerts to review the inventory every quarter.
4. π« Label all devices
- Example: Use QR codes to label devices for quick scanning and identification.
π ID.AM-2: Software Inventory π¦
- Function: IDENTIFY
- Category: Asset Management
- Audit: Software platforms and applications within the organisation are inventoried.
- Guidance: The data, personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed consistently.
ID.AM-2 Checklist:
1. π Create a software registry
2. π‘οΈ List all security certificates
3. β²οΈ Track expiration dates
4. π οΈ Update or remove outdated software
- Example: Use vulnerability scanners to identify software that needs updating or removal.
π ID.AM-3: Data Flow Mapping πΊοΈ
- Function: IDENTIFY
- Category: Asset Management
- Audit: Organisational communication and data flows are mapped.
- Guidance: The data, personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed consistently.
ID.AM-3 Checklist:
1. π Identify data entry and exit points
- Example: Pinpoint where customer data enters via the CRM and exits via email reports.
2. π¦ List all data transformation processes
- Example: Document how raw sales data is transformed into actionable insights.
3. π Regularly review and update the map
- Example: Audit the data flow map after any significant infrastructure changes.
π ID.AM-4: External Systems Catalogue π
- Function: IDENTIFY
- Category: Asset Management
- Audit: External information systems are catalogued.
- Guidance: The data, personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed consistently.
ID.AM-4 Checklist:
1. π List all third-party systems
- Example: Catalogue all SaaS tools like Salesforce, AWS, and Slack.
2. π‘οΈ Verify their security posture
- Example: Check if the vendors are GDPR-compliant or hold relevant security certifications.
3. π€ Establish security SLAs (Service Level Agreements)
- Example: Negotiate SLAs that require vendors to notify you within 24 hours of a security incident.
π― ID.AM-5: Resource Prioritisation βοΈ
- Function: IDENTIFY
- Category: Asset Management
- Audit: Resources are prioritised based on their classification, criticality, and business value.
- Guidance: The data, personnel, devices, systems, and facilities that enable the organisation to achieve business purposes are identified and managed consistently.
ID.AM-5 Checklist:
1. π·οΈ Classify all resources
2. π Perform a risk assessment
- Example: Use the FAIR framework to assess the financial impact of losing specific assets.
3. π Prioritise critical assets
π ID.AM-6: Cybersecurity Roles and Responsibilities π€
- Function: IDENTIFY
- Category: Asset Management
- Audit: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders are established.
BY IT Audit and Governance
Warning: Undefined variable $i in /var/www/tg-me/post.php on line 280
Share with your friend now:
tg-me.com/IT_Audit/343