Hardening by Auditing: A Handbook for Measurably and Immediately Iimrpving the Security Management of Any Organization
()
About this ebook
An “audit” is a systematic, independent, and documented process for obtaining evidence and evaluating it objectively to determine the extent to which audit criteria are fulfilled. “Internal audits” are audits conducted by on behalf of the organization itself for internal purposes, and can form the basis of the organizations self-declaration of conformity or compliance.
A well-planned, effective, internal auditing program should consider the relative importance of the processes and areas to be audited. Don’t waste time on the unimportant.
The success of an organization is the sum of the effectiveness of Management authority, responsibility, and accountability. They are, in turn, the sum of the manner in which Management deals with the findings of the internal audits.
The premise of this book and my reason for creating it is simple:
1. Our organizations (large and small – public and private) and, in fact, our lives are in danger from both physical and cyber-attacks, because we remain incredibly uneducated, unstructured, and vulnerable, when it comes to threats to our security.
2. Organizational Security can be upgraded profoundly through a well-developed program of internal and outside audits. This book stresses internal audits – those that you do by yourselves and within your walls.
3. Organizations can combine resources synergistically. That is, the whole of the effort will be greater than the sum of its parts.
I have kept this work as compact as possible, so as to minimize reading time and maximize productivity. I write for no-nonsense CEOs, acquisition, security, and program managers in both the public and private sectors, with big responsibilities and limited resources. I refer often to four excellent ISO International Standards. They offer guidance for structuring effective management programs rapidly, regardless of whether or not organizations desire certification by accreditation bodies.
I invite you to use my approach to Risk Management. You will find it an effective and uncomplicated method for developing and monitoring your strategic plans.
Checklists and “quick-looks” can bring you up to speed fast. Using the checklists provided and taking prompt, positive, action on your findings will improve your security posture almost immediately, as well as boost your confidence to take on greater challenges.
Eugene A. Razzetti
Eugene A. (Gene) Razzetti retired from the U.S. Navy as a Captain in 1992, a Vietnam Veteran and having had two at-sea and two major shore commands. Since then, he has been an independent management consultant, project manager, and ISO auditor. He became an adjunct military analyst with the Center for Naval Analyses after September 11, 2001. He has authored six management books, co-authored MVO 8000, a Corporate Responsibility Management Standard, and numerous journal articles related to management systems and the Department of Defense. He has served on boards and committees dealing with ethics and professionalism in the practice of management consulting. He is a senior member of the American Society for Quality (ASQ) and assisted the Government of Guatemala with markedly heightening the security posture of its two principal commercial port facilities.
Read more from Eugene A. Razzetti
The Executive’S Guide to Internal Auditing Rating: 0 out of 5 stars0 ratingsHardening by Auditing: A Handbook for Measurably and Immediately Improving the Security Management of Any Organization Rating: 0 out of 5 stars0 ratingsFixes That Last - the Executive's Guide to Fix It or Lose It Management Rating: 0 out of 5 stars0 ratingsMake It Work or Make It Go Away: A Handbook for Dod Program Managers Rating: 0 out of 5 stars0 ratings
Related to Hardening by Auditing
Related ebooks
Nine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 3 out of 5 stars3/5Risk Management and Information Systems Control Rating: 5 out of 5 stars5/5CISA Certified Information Systems Auditor Study Guide Rating: 5 out of 5 stars5/5Business Practical Security Rating: 0 out of 5 stars0 ratingsIS Auditor - Process of Auditing: Information Systems Auditor, #1 Rating: 0 out of 5 stars0 ratingsIT Security Audit A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsISO27001:2013 Assessments Without Tears Rating: 3 out of 5 stars3/5Auditing Information Systems: Enhancing Performance of the Enterprise Rating: 0 out of 5 stars0 ratingsIT Security Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsGovernance Risk And Compliance A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsWe Need To Talk: 52 Weeks To Better Cyber-Security Rating: 0 out of 5 stars0 ratingsApplication security in the ISO27001:2013 Environment Rating: 4 out of 5 stars4/5Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders Rating: 0 out of 5 stars0 ratingsInformation Security Breaches: Avoidance and Treatment based on ISO27001 Rating: 0 out of 5 stars0 ratingsAuditing Information Systems and Controls: The Only Thing Worse Than No Control Is the Illusion of Control Rating: 0 out of 5 stars0 ratingsInformation Security Risk Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCybersecurity ISMS Policies And Procedures A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIT Audit, Control, and Security Rating: 0 out of 5 stars0 ratingsCybersecurity ISMS Policies And Procedures A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsInformation Systems Auditing: The IS Audit Testing Process: Information Systems Auditing, #3 Rating: 1 out of 5 stars1/5Information Systems Auditing: The IS Audit Planning Process: Information Systems Auditing, #1 Rating: 4 out of 5 stars4/5ThirdParty Cybersecurity Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsGRC Chronicles Rating: 0 out of 5 stars0 ratingsGRC, The Backbone of Enterprise Management Rating: 0 out of 5 stars0 ratingsISO IEC 27001 Lead Implementer A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsVendor Risk Management Practices A Complete Guide - 2020 Edition Rating: 5 out of 5 stars5/5Once Upon Internal Control: A Tale of Good and Bad Ways to Implement Internal Controls in a Local Church Rating: 0 out of 5 stars0 ratingsIT Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsSecure Your Business: Insights to Governance, Risk, Compliance & Information Security Rating: 0 out of 5 stars0 ratingsManaging Information Security Breaches: Studies from real life Rating: 0 out of 5 stars0 ratings
Economics For You
Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5On Writing Well, 30th Anniversary Edition: An Informal Guide to Writing Nonfiction Rating: 4 out of 5 stars4/5The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5A People's History of the United States Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Predictably Irrational, Revised and Expanded Edition: The Hidden Forces That Shape Our Decisions Rating: 4 out of 5 stars4/5Divergent Mind: Thriving in a World That Wasn't Designed for You Rating: 4 out of 5 stars4/5The Affluent Society Rating: 4 out of 5 stars4/5The Alter Ego Effect: The Power of Secret Identities to Transform Your Life Rating: 4 out of 5 stars4/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5Die With Zero: Getting All You Can from Your Money and Your Life Rating: 4 out of 5 stars4/5Wise as Fu*k: Simple Truths to Guide You Through the Sh*tstorms of Life Rating: 5 out of 5 stars5/5Sex Trafficking: Inside the Business of Modern Slavery Rating: 4 out of 5 stars4/5A History of Central Banking and the Enslavement of Mankind Rating: 5 out of 5 stars5/5The Opposite of Spoiled: Raising Kids Who Are Grounded, Generous, and Smart About Money Rating: 5 out of 5 stars5/5Multipliers, Revised and Updated: How the Best Leaders Make Everyone Smarter Rating: 4 out of 5 stars4/5Chip War: The Fight for the World's Most Critical Technology Rating: 4 out of 5 stars4/5The Confidence Code: The Science and Art of Self-Assurance---What Women Should Know Rating: 4 out of 5 stars4/5Economics 101: From Consumer Behavior to Competitive Markets--Everything You Need to Know About Economics Rating: 4 out of 5 stars4/5Capital in the Twenty-First Century Rating: 4 out of 5 stars4/5Second Class: How the Elites Betrayed America's Working Men and Women Rating: 5 out of 5 stars5/5Doughnut Economics: Seven Ways to Think Like a 21st-Century Economist Rating: 4 out of 5 stars4/5Men without Work: Post-Pandemic Edition (2022) Rating: 4 out of 5 stars4/5Peak: Secrets from the New Science of Expertise Rating: 4 out of 5 stars4/5The Lords of Easy Money: How the Federal Reserve Broke the American Economy Rating: 4 out of 5 stars4/5Apocalypse Never: Why Environmental Alarmism Hurts Us All Rating: 4 out of 5 stars4/5
Reviews for Hardening by Auditing
0 ratings0 reviews
Book preview
Hardening by Auditing - Eugene A. Razzetti
© 2022 Eugene A. Razzetti. All rights reserved.
No part of this book may be reproduced, stored in a retrieval system, or
transmitted by any means without the written permission of the author.
Published by AuthorHouse 06/29/2022
ISBN: 978-1-6655-6260-7 (sc)
ISBN: 978-1-6655-6261-4 (e)
Any people depicted in stock imagery provided by Getty Images are models,
and such images are being used for illustrative purposes only.
Certain stock imagery © Getty Images.
Because of the dynamic nature of the Internet, any web addresses or links contained in
this book may have changed since publication and may no longer be valid. The views
expressed in this work are solely those of the author and do not necessarily reflect the
views of the publisher, and the publisher hereby disclaims any responsibility for them.
CONTENTS
Dedication
Foreword
SECTION I
INTERNAL AUDITING IN GENERAL
Chapter 1 What We Mean by Hardening by Auditing
Chapter 2 Benchmarking, Dashboards, Metrics, and Measures of Effectiveness
Chapter 3 Defense Contracting
Chapter 4 Risk Management
Chapter 5 Synergy vs. Innovation
Chapter 6 System Integration - Enabling Capability Through Connectivity
Chapter 7 Some Additional Thoughts about Internal Auditing Before We Discuss Security
Section Two
Organizational Security Management
Chapter 8 Auditing Organizational Security at Your Command
Chapter 9 Compliance, Continuity, and COVID
Chapter 10 Contingency Planning
Chapter 11 Business Impact Analysis
Chapter 12 Business Continuity Management
Chapter 13 Recovery and Restoration
Chapter 14 Auditing Computer-Based Information Security – Gain Control and Keep it
APPENDIX
Appendix I Business Continuity Management
Appendix II Information Security Management
Appendix III Supply Chain Security Management
Appendix IV Glossary
About The Author
DEDICATION
FOREWORD
SECTION I
INTERNAL AUDITING
IN GENERAL
CHAPTER ONE
What We Mean by
Hardening by Auditing
Ten areas in which executives and auditors can quantifiably
improve the security posture of any organization.
Overview
Industrial espionage, hacker/cyber-attacks, natural disasters, disgruntled former employees, HAZMAT spills, and (let’s face it) terrorist attacks can close an organization indefinitely, not to mention exacting a concurrent, incidental toll in personnel or equipment. Organizations, especially those contribute to the defense of the United States, have an ethical as well as an economic imperative to assess and harden their security structures. These days, Management can and should assess the security posture of their organizations as part of the organization’s overall auditing strategy – no less vital than Quality, Finance, Marketing, or Human Resource Management.
The International Standard ISO 28000: Supply Chain Security Management can help to ensure the security of any organization. It was developed in response to the transportation and logistics industries’ need for a commonly applicable security management system specific to the supply chain.
The main elements of the ISO 28000 Standard are:
✓ Security Management Policy
✓ Security Planning (risk assessment, regulatory requirements, objectives, and targets)
✓ Implementation and Operation (responsibilities and competence, communication, documentation, operational control, and emergency preparedness)
✓ Internal auditing, corrective and preventive Action
✓ Management review and continual improvement.
Organizations already certified to ISO 9000 Quality Management) or ISO 14000 (Environment Management) are already well on their way to ISO 28000 certification and to a hardened security posture. These three International Standards mutually support each other, as shown in the following table, and security-minded auditors and consultants will work with an organization’s existing strategic planning, process management, and documentation, to synergistically increase security, as well as the more traditional challenges, like efficiency, safety, profitability, and regulatory compliance. See Table 1-1.
Table 1-1 Relationship of ISO Standards
000.jpgTen areas in which executives and auditors can quantifiably harden the security of their organizations
The ten areas that follow contain segments of a checklist that I use when I audit or consult in ISO 28000. Appendix III contains my complete Supply Chain Security checklist.
1. Organizing the Security Management System
Organizing for security means that the organization must establish, document, maintain, and continually improve an effective security management system for identifying security threats, assessing risks, and controlling/mitigating their consequences. The organization must look at all of the functions it performs and assess them according to the amount of vulnerability and the amount of protection required, as shown in the notional matrix below. Figure 1-1 describes a quick and logical vulnerability assessment. As the arrows suggest, you want to minimize vulnerability and maximize protection. Try this with your own organization and/or area of responsibility.
Figure 1-1 Vulnerability Assessment (example)
39056.png2. Defining the Scope of the Security Management System
Having completed an initial vulnerability assessment, the organization must next define the scope of its Security Management System, including control of outsourced processes that affect the conformity of product or service. That accomplished, the organization must establish (and maintain) an organizational structure, including roles, responsibilities, and authorities, consistent with the achievement of the security management policy, objectives, targets, and programs; and these must be defined, documented, and communicated to all responsible individuals.
Management must provide quantifiable and documented evidence of its commitment to development of a security management system and to improving its effectiveness. Specifically, by:
• Appointing a member of senior management who, irrespective of other responsibilities is responsible for the design, maintenance, documentation and improvement of the security management system
• Appointing members of management with the necessary authority to ensure that the objectives and targets are implemented
• Identifying and monitoring the expectations of the organization’s stakeholders and taking appropriate action to manage these expectations¹
• Ensuring the availability of adequate resources
• Communicating to the organization the importance of meeting its security management requirements in order to comply with its established policies
• Ensuring any security programs generated from other parts of the organization complement the security management system
• Communicating to the organization the importance of meeting its security management requirements in order to comply with its policy
• Establishing meaningful security metrics and measures of effectiveness, security-related threats, criticalities, and vulnerabilities are evaluated and included in organizational risk assessments as appropriate (see below)
3. Security Policies – taking a security
approach to mission accomplishment
Top management also must develop, as applicable to the mission of the organization, written security policies that are:
• Consistent with the other policies of the organization
• Providing framework for specific security objectives, targets, and programs to be produced
• Consistent with the organization’s overall security threat and risk management strategy
• Appropriate to the threats to the organization and the nature and scale of its operations
• Clear in their statement of overall/broad security management objectives
• Compliant with current applicable legislation, regulatory and statutory requirements and with other requirements to which the organization subscribes
• Visibly endorsed by top management
• Documented, implemented, and maintained
• Communicated to all relevant employees and third parties including contractors and visitors with the intent that these persons are made aware of their individual security-related obligations
• Available to stakeholders where appropriate
• Provided for review in case of acquisition or merger, or other change to the business scope, which may affect the relevance of the security management system.
4. Security Training and Qualification
The security-minded organization appoints (and entrusts) personnel to operate the Security Management System. Like any other responsible positions in the organization, the people who design, operate, and manage the security equipment and processes must be suitably qualified in terms of education, training, certification, and/or experience. Further, these personnel must be fully aware and supportive of:
5. Operational Control
A. General
Effective operational control of the Security Management System means that the organization has identified all operations necessary for achieving its stated security management policies, control of all activities, and mitigation of threats identified as posing significant risks. Control also means compliance with legal, statutory, and other regulatory security requirements, the security management objectives, delivery of its security management programs, and the required level of supply chain security (as appropriate).
ISO 28000 Certification requires organizations to ensure that operational control is maintained by:
• Establishing, implementing, and maintaining documented procedures to control situations where their absence could lead to failure to maintain operations
• Establishing and maintaining the requirements for goods or services which impact on security and communicating these to suppliers and contractors.
Where existing designs, installations, operations, etc., are