Auditors are Asking Better Questions—Organizations Should Have Better Answers (2024)

As part of the audit process, auditors typically inquire about an organization’s operations by posing a series of targeted questions. When discussing their operations, most organizational leaders say that data is important to their organization and that the security of that data is a top priority. Security leaders agree that regulatory compliance is not an effective security strategy, yet the protection of data in most organizations is strictly limited to regulated data. Overcoming this paradox is necessary to build effective data security programs that both protect data and meet regulations.

Flunking the Softball Questions

Compliant organizations are often breached because, historically, internal and external auditors have largely shied away from asking questions about capabilities that are not explicitly required for compliance. Moreover, when these questions have been asked, auditors have often been too ready to accept non-answers. Responses from organizations such as “We do not know” have long been commonplace. This lack of rigor is part of the reason that so many organizations have employees who are responsible for ensuring regulatory compliance, but far fewer have owners of data security itself.

Lack of rigor is part of the reason that so many organizations have employees that are responsible for ensuring regulatory compliance, but far fewer have owners of data security itself.

This blasé response to data security is unacceptable. If organizations believe that data security is a priority, they need to be able to answer basic questions about the security of that data. While there are dozens of potential topics that auditors could ask about, almost all of them boil down to 9 key questions:

  1. Where is the data stored?
  2. What data was accessed?
  3. How much was accessed?
  4. Was any of it altered, either unintentionally or purposefully?
  5. Who has accessed the data?
  6. When did they do it?
  7. How did they do it?
  8. Was the data accessed in an appropriate manner?
  9. Taken together, what do the answers to these questions mean for the organization’s risk profile?

These questions are not complicated, and the means to answer them are readily available. Capabilities such as data discovery and classification—which are foundational to any data security strategy—can be brought in, whether through automated tools or external consultants. Likewise, there is no justification for lacking a well-defined strategy in the case of a significant data breach or loss. Everyone should know whose phone rings first when a breach has been discovered, and that person should already have access to all the answers and tools to formulate a proper incident response.

The Changing Nature of Auditing

In this context, it has been highly encouraging to see the dynamic between organizations and auditors starting to shift in recent years. Moreover, there is a growing trend of auditors probing into the capabilities of organizations, posing inquiries such as:

  • How is access to personally identifiable information (PII) monitored and secured?
  • What methods are used to detect unusual or anomalous behavior?
  • How can one determine whether a material change has been made to a given dataset?
  • What processes are in place to deal with orphan and unused data users?

This maturation of the auditing process is critical, as it not only prompts organizations to improve their data security processes, but can also help to identify gaps in their strategies. Faced with more concrete, tangible questions, organizations are more likely to engage in serious introspection about what investments they are making into data security, and whether it is the most effective use of resources.

Running With the Cyber-Bulls

Data protection and its common intersection with regulatory compliance can quickly become a complex long-term ineffectual project without an informed strategy. As previously noted, security leaders agree that a regulatory-compliant program does not equate to an effective data security program. However, they equally agree that a well-defined and implemented data security program does in fact both protect data and satisfy the requirements of regulation. There are several ways organizations can ensure their data is protected and secure:

  • Monitor access to all data, not only regulated or critical data.
  • Monitor actions of all users, including applications and APIs, that access data, not just privileged users.
  • Monitor all locations where data is stored from legacy systems to modern cloud systems.
  • Store data long enough to satisfy regulations, as well as, provide acceptable incident response (usually 1 to 3 years).
  • In-house data security expertise is uncommon so get help from service or technology partners.

Cybersecurity is constantly evolving, and data security is no exception. Attackers are always improving and refining their techniques, meaning that organizations must bring in better tools to maintain their security. Think of it as the digital equivalent of running with the bulls in Pamplona. Every year, thousands take to the streets, chased by fighting bulls with razor-sharp horns with the aim merely to get to the finish line before them.

When running with the bulls, you do not have to be the fastest, but you do not want to be the slowest. Your speed last year may not have changed, but if everyone around you is getting a bit faster all the time, you can very quickly find that, instead of being comfortable in the middle of the pack, you are suddenly in last place and very real danger. Auditors are upping their game to ensure that their clients are not falling behind—the onus is now on organizations to recognize and respond quickly.

Terry Ray

Is SVP of Data Security GTM, Field CTO, and an Imperva Fellow for Imperva, a Thales company. As a technology SVP & CTO, he supports all corporate business functions utilizing his more than 2 decades of cybersecurity experience. Previously he served as Imperva’s chief technology officer where he was responsible for developing and articulating the company’s technical vision and strategy, as well as, maintaining a deep knowledge of the Application and Data Security Solution and Threats Landscape. Ray is a frequent speaker for ISACA, FS-ISAC, IIA, ISSA, OWASP, RSA, and other professional security and audit organizations in the Americas and abroad. He also provides expert commentary to the media and has been quoted in Security Week, SC Magazine, Forbes, CBS News, the BBC, and many others.

Auditors are Asking Better Questions—Organizations Should Have Better Answers (2024)
Top Articles
5 TV Shows Or Movies You May Know The Carshield Commercial Actors From - Looper
Carshield Commercial Actors: 10 Best Movies & TV Shows Where You've Seen Vivica A. Fox & Ice-T Before
Blackstone Launchpad Ucf
Citi Trends Watches
Jeff Bezos Lpsg
glizzy - Wiktionary, the free dictionary
Eric Rohan Justin Obituary
James Darren, ‘Gidget’ teen idol, singer and director, dies at 88
411.Com Reverse Address Lookup
Anonib Altoona Pa
U-Bolts - Screws, Bolts variety of type & configurable | MISUMI Thailand
Deshaun Watson suspension ruling live updates: Latest on settlement with NFL, reactions
Target Nytimes
Wat is 7x7? De gouden regel voor uw PowerPoint-presentatie
Craigslist Hutchinson Ks
Demystifying the C-Suite: A Close Look at the Top Executive Roles - 33rd Square
Mobiloil Woodville Tx
2887 Royce Road Varysburg Ny 14167
Shae Cornette Bikini
Rancho Medanos Schedule
FREE Printable Pets Animal Playdough Mats
Craigs List Duluth Mn
Chi Trib Weather
Eros Indy
Aldi Sign In Careers
8005607994
Joshua Efird Net Worth
Craigslist St. Paul
Emuaid Lawsuit
Does Wanda Sykes Use A Cane
Verizon Fios Internet Review: Plans, Prices And Speed 2024
Www.questdiagnostics.com
De Chromecast met Google TV en stembediening instellen
4156303136
JetBlue, Spirit end $3.8 billion merger agreement after losing antitrust suit
Keyn Car Shows
Dvax Message Board
Terraria Cement Mixer
Ryker Webb 2022
Limestone Bank Hillview
Monte Carlo Poker Club Coin Pusher
Cvs Pharmacy Tb Test
Tu Pulga Online Utah
Unblocked Games Shooters
Lowlifesymptoms Twitter
How To Buy Taylor Swift Tickets By Navigating Ticketek's Stress-Inducing System
Christina Cox Measurements
Wis International Intranet
Bitlife Tyrone's
Omni Id Portal Waconia
my Control Vitality Female Support Complex (10 ml)
Imagetrend Elite Delaware
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6554

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.