Task 2 - Audit Simulation
Task 2 - Audit Simulation
Task 2
Audit simulation
SUMMARY .............................................................................................................. 4
CONCLUSIONS ................................................................................................. 13
RECOMMENDATIONS ......................................................................................... 14
REFERENCES..................................................................................................... 15
APPENDIX A. ....................................................................................................... 16
Questionnaire ...................................................................................................... 16
APPENDIX B. ....................................................................................................... 17
Check List.......................................................................................................... 17
3
INTRODUCTION
Indeed, the objectives of the audit will be defined, and the resources will be established.
necessary to carry it out, the work schedule will be developed and
they will identify possible findings, evidence and recommendations, in the areas of
evaluate. For this, the good practices established in the standards will be followed
ISO 27002.
4
summary
The activities carried out simulate the scenario of an organization that wishes to
evaluate the level of readiness to comply with the new requirements
regulatory. Derived from this general requirement, the evaluation is carried out of
different areas of IT Management.
As a starting point, the objectives are defined, and the resources are established.
required to carry out the audit, a schedule of activities is deployed
to carry out and establish possible findings in the areas to be evaluated.
Audit tools
• Questionnaires.
• Standards and protocols.
• Check List.
Involved personnel
Audit team:
• Senior Auditor
Supervisor:
Interlocutor:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Meeting of
Opening and
Documentation
Definition of the
Scope,
Objectives
Generals and
Specific to the
Audit
Review of
Procedure
General
Identification of
Personal Key
Identification of
Factors of
Risk
Verification of the
taking of
Requirements
Definition of
Processes
Significant to
Audit
Definition of
Requirements
Meetings of
Understanding
Layout of
Understanding
Evaluation of
Internal Control of
Physical Security and
Logic
Evaluation of
Internal Control of
Management of
Changes
8
Evaluation of
Internal Control of
Production and
Network Management
Evaluation of
Control of
IT Governance
Evaluation of
Control and Management
of Users
Finals
Review and
Discussion of the
Results of
Pre-Report
Corrections of
the Results of
the Findings,
Observations,
Recommendations
and Conclusions
Preparation of the
Report of
Audit
Presentation of the
Report
a panorama del
environment and consequently
will be able to control better
way.
computer incidents
from the ISO 27002 standard
(ISO, 2017)
Acceptance Tests: The evaluation must be carried out at the end of the change or
end users will be able to manage user implementation of the
tests to verify the finals. modules, the end user
proper functioning. must perform tests
1
to be able to verify the
process flow and give the
approval of your
Management of
functioning.
end users
Protection of Data must be evaluated; it will be guaranteed through
Used in Tests user management of a document, that the
finals. tests entered by
2 the end users will be
protected, since
this is already part of the flow
of system processes.
Table 2: Identification of possible findings, evidence, and recommendations. (Preparation
own)
13
CONCLUSIONS
The possible findings were identified, with evidence based on the statement
of the problem, with the analysis of this starting point it is possible to establish a
context of the scope, necessary tools, work times and possible
areas and aspects to be explored. Therefore, it is concluded that the activities carried out
they must be part of the initial auditing process, establishing a starting point
with the aspects that will determine the evaluations to be carried out, as well as the
resources that will be necessary.
RECOMMENDATIONS
It is considered interesting to complement the audit process with the standards.
ISO 27001 establishes an Information Security Management System,
this with a more general plan and possible guidelines for documentation of
information processing procedures. The following are also proposed
points:
REFERENCES
ISO. (2017). ISO 27002: Code of practice for information security controls
information.
16
APPENDIX A.
Questionnaire
Could you tell us the procedure for developing a new one?
requirement?
3. Do you have a formal document to request the necessary data for the
conducting tests?
APPENDIX B.
Check List
CHECKLIST
DOMAIN PROCESS
OBJECT
DE User requirements
CONTROL
ACCORDINGLY
ID EVALUATED ASPECT OBSERVATIONS
YES NO
RQUIS-01
RQUIS-02
RQUIS-03
RQUIS-04
RQUIS-05
RQUIS-06
CHECKLIST
DOMAIN PROCESS
OBJECT
DE Project planning.
CONTROL
IN ACCORDANCE
ID EVALUATED ASPECT OBSERVATIONS
YES NO
PLANP-01
PLANP-02
PLANP-03
PLANP-04
PLANP-05