Skip to content
CSY303 Week 08 Advanced

Master audit processes with hands-on control testing and assurance exercises.

Governance, Risk & Compliance

Track your progress through this week's content

Opening Framing

Trust but verify. Organizations claim their security controls work, but how do stakeholders—customers, regulators, boards, investors—know those claims are accurate? Audits provide independent assurance that controls are designed appropriately and operating effectively. Whether internal audits for continuous improvement or external audits for certification, the audit process is essential to GRC programs.

For security professionals, audits serve multiple purposes: they validate that controls work, identify gaps before incidents occur, satisfy compliance requirements, and provide evidence to stakeholders. Understanding how audits work—from both sides—enables you to design auditable controls, prepare effectively, and leverage findings for program improvement.

This week covers audit types and purposes, the audit process, evidence collection and documentation, working with auditors, managing findings, and continuous assurance approaches. You'll learn to both prepare for audits and use audit results to strengthen security programs.

Key insight: The goal isn't to pass audits—it's to have a security program that naturally passes audits because it works.

1) Types of Audits

Different audit types serve different purposes and stakeholders:

Audit Categories:

BY AUDITOR:
┌─────────────────────────────────────────────────────────────┐
│ INTERNAL AUDIT:                                             │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Performed by: Internal audit department                 │ │
│ │ Purpose: Continuous improvement, risk management        │ │
│ │ Independence: Reports to audit committee/board          │ │
│ │ Frequency: Ongoing, risk-based schedule                 │ │
│ │ Output: Internal reports, recommendations               │ │
│ │                                                         │ │
│ │ Advantages:                                             │ │
│ │ - Deep organizational knowledge                         │ │
│ │ - Ongoing relationship, continuous improvement          │ │
│ │ - Can address issues before external audit              │ │
│ │                                                         │ │
│ │ Limitations:                                            │ │
│ │ - May lack independence perception                      │ │
│ │ - Not accepted for certification/attestation            │ │
│ └─────────────────────────────────────────────────────────┘ │
│                                                             │
│ EXTERNAL AUDIT:                                             │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Performed by: Independent third-party auditors          │ │
│ │ Purpose: Certification, attestation, assurance          │ │
│ │ Independence: No relationship with organization         │ │
│ │ Frequency: Annual or per certification cycle            │ │
│ │ Output: Formal reports, certificates, attestations      │ │
│ │                                                         │ │
│ │ Types:                                                  │ │
│ │ - Certification audits (ISO 27001)                      │ │
│ │ - Attestation audits (SOC 2)                            │ │
│ │ - Regulatory audits (PCI QSA)                           │ │
│ │ - Financial audits (IT controls for SOX)                │ │
│ │                                                         │ │
│ │ Advantages:                                             │ │
│ │ - Independent, credible to stakeholders                 │ │
│ │ - Required for certifications                           │ │
│ │ - Fresh perspective                                     │ │
│ │                                                         │ │
│ │ Limitations:                                            │ │
│ │ - Point-in-time snapshot                                │ │
│ │ - Expensive                                             │ │
│ │ - Limited organizational context                        │ │
│ └─────────────────────────────────────────────────────────┘ │
│                                                             │
│ SECOND-PARTY AUDIT:                                         │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Performed by: Customers or their representatives        │ │
│ │ Purpose: Vendor due diligence, ongoing assurance        │ │
│ │ Frequency: During vendor selection, periodically        │ │
│ │ Output: Assessment reports, questionnaire responses     │ │
│ │                                                         │ │
│ │ Examples:                                               │ │
│ │ - Customer security assessments                         │ │
│ │ - Vendor security questionnaires                        │ │
│ │ - On-site customer audits                               │ │
│ └─────────────────────────────────────────────────────────┘ │
└─────────────────────────────────────────────────────────────┘

BY PURPOSE:
┌─────────────────────────────────────────────────────────────┐
│ Compliance Audit:                                           │
│ - Verify adherence to regulations/standards                 │
│ - PCI DSS assessment, HIPAA audit                           │
│ - Pass/fail or findings-based                               │
│                                                             │
│ Certification Audit:                                        │
│ - Assess against standard for certification                 │
│ - ISO 27001, SOC 2                                          │
│ - Results in certificate or attestation                     │
│                                                             │
│ Operational Audit:                                          │
│ - Assess effectiveness and efficiency                       │
│ - Process improvement focus                                 │
│ - Recommendations for improvement                           │
│                                                             │
│ Forensic Audit:                                             │
│ - Investigate specific incident or concern                  │
│ - Fraud investigation, incident response                    │
│ - Evidence for legal proceedings                            │
│                                                             │
│ Technical Audit:                                            │
│ - Assess technical controls                                 │
│ - Penetration testing, vulnerability assessment             │
│ - Technical findings and remediation                        │
└─────────────────────────────────────────────────────────────┘

Key insight: Different audits answer different questions. Understand what assurance each provides and to whom.

2) The Audit Process

Understanding the audit process helps you prepare effectively and manage audits smoothly:

Audit Lifecycle:

AUDIT PHASES:
┌─────────────────────────────────────────────────────────────┐
│                                                             │
│  ┌──────────┐   ┌──────────┐   ┌──────────┐                 │
│  │ PLANNING │──►│FIELDWORK │──►│REPORTING │                 │
│  │          │   │          │   │          │                 │
│  └──────────┘   └──────────┘   └────┬─────┘                 │
│                                     │                       │
│                                     ▼                       │
│                               ┌──────────┐                  │
│                               │ FOLLOWUP │                  │
│                               │          │                  │
│                               └──────────┘                  │
│                                                             │
└─────────────────────────────────────────────────────────────┘

PHASE 1: PLANNING
┌─────────────────────────────────────────────────────────────┐
│ Auditor Activities:                                         │
│ - Define audit objectives and scope                         │
│ - Understand the business and environment                   │
│ - Identify key risks and controls                           │
│ - Develop audit program/plan                                │
│ - Request initial documentation                             │
│ - Schedule fieldwork                                        │
│                                                             │
│ Your Activities:                                            │
│ - Provide requested documentation                           │
│ - Assign audit liaison/coordinator                          │
│ - Brief stakeholders                                        │
│ - Reserve meeting rooms, system access                      │
│ - Prepare evidence repository                               │
│                                                             │
│ Key Documents Typically Requested:                          │
│ - Policies and procedures                                   │
│ - Organization charts                                       │
│ - System inventory/diagrams                                 │
│ - Previous audit reports                                    │
│ - Risk assessments                                          │
│ - Control matrices                                          │
└─────────────────────────────────────────────────────────────┘

PHASE 2: FIELDWORK
┌─────────────────────────────────────────────────────────────┐
│ Auditor Activities:                                         │
│ - Test control design (are controls properly designed?)     │
│ - Test control effectiveness (do controls work?)            │
│ - Gather evidence (documents, observations, interviews)     │
│ - Identify findings                                         │
│ - Validate findings with management                         │
│                                                             │
│ Testing Methods:                                            │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Inquiry: Ask questions, interviews                      │ │
│ │ - "Walk me through how access is provisioned"           │ │
│ │ - "Who approves changes to production?"                 │ │
│ │                                                         │ │
│ │ Observation: Watch processes in action                  │ │
│ │ - Observe change approval meeting                       │ │
│ │ - Watch access provisioning process                     │ │
│ │                                                         │ │
│ │ Inspection: Review documents and evidence               │ │
│ │ - Review access approval tickets                        │ │
│ │ - Examine system configurations                         │ │
│ │                                                         │ │
│ │ Re-performance: Repeat the control procedure            │ │
│ │ - Recalculate a reconciliation                          │ │
│ │ - Attempt unauthorized access                           │ │
│ └─────────────────────────────────────────────────────────┘ │
│                                                             │
│ Your Activities:                                            │
│ - Provide evidence promptly                                 │
│ - Make personnel available for interviews                   │
│ - Facilitate system access for testing                      │
│ - Track requests and responses                              │
│ - Clarify findings before they're finalized                 │
└─────────────────────────────────────────────────────────────┘

PHASE 3: REPORTING
┌─────────────────────────────────────────────────────────────┐
│ Auditor Activities:                                         │
│ - Draft findings and recommendations                        │
│ - Classify findings by severity                             │
│ - Share draft report for factual accuracy                   │
│ - Finalize report                                           │
│ - Present to management/audit committee                     │
│                                                             │
│ Report Contents:                                            │
│ - Executive summary                                         │
│ - Scope and methodology                                     │
│ - Findings and observations                                 │
│ - Recommendations                                           │
│ - Management response                                       │
│ - Opinion/conclusion (for attestation audits)               │
│                                                             │
│ Your Activities:                                            │
│ - Review draft for factual accuracy                         │
│ - Provide management responses                              │
│ - Develop remediation plans                                 │
│ - Accept or dispute findings appropriately                  │
└─────────────────────────────────────────────────────────────┘

PHASE 4: FOLLOWUP
┌─────────────────────────────────────────────────────────────┐
│ Activities:                                                 │
│ - Track remediation of findings                             │
│ - Verify remediation completion                             │
│ - Report status to management/board                         │
│ - Update risk assessments                                   │
│ - Incorporate lessons into security program                 │
│                                                             │
│ Remediation Tracking:                                       │
│ - Each finding assigned owner and due date                  │
│ - Regular status reporting                                  │
│ - Verification of closure (evidence required)               │
│ - Escalation for overdue items                              │
└─────────────────────────────────────────────────────────────┘

Key insight: A well-prepared audit with responsive support goes faster, costs less, and produces better outcomes.

3) Evidence and Documentation

Audits run on evidence. Good evidence makes good audits:

Audit Evidence:

EVIDENCE CHARACTERISTICS:
┌─────────────────────────────────────────────────────────────┐
│ Good evidence is:                                           │
│                                                             │
│ SUFFICIENT:                                                 │
│ - Enough to support conclusions                             │
│ - Appropriate sample size                                   │
│ - Covers the audit period                                   │
│                                                             │
│ APPROPRIATE:                                                │
│ - Relevant to the control being tested                      │
│ - Reliable (from trustworthy source)                        │
│ - Objective (not just assertions)                           │
│                                                             │
│ RELIABLE (in order of preference):                          │
│ 1. System-generated (logs, configs) - most reliable         │
│ 2. Third-party confirmation                                 │
│ 3. Documents created in normal course of business           │
│ 4. Documents prepared for the audit                         │
│ 5. Oral representations - least reliable                    │
└─────────────────────────────────────────────────────────────┘

COMMON EVIDENCE TYPES:
┌─────────────────────────────────────────────────────────────┐
│ Access Control Evidence:                                    │
│ - User access lists (exports from systems)                  │
│ - Access request/approval tickets                           │
│ - Termination checklists with access removal                │
│ - Periodic access review documentation                      │
│ - Privileged access lists                                   │
│ - MFA configuration screenshots                             │
│                                                             │
│ Change Management Evidence:                                 │
│ - Change tickets with approvals                             │
│ - Code review documentation                                 │
│ - Test results before deployment                            │
│ - Deployment logs                                           │
│ - Emergency change documentation                            │
│                                                             │
│ Security Monitoring Evidence:                               │
│ - SIEM alert examples                                       │
│ - Log retention configuration                               │
│ - Incident tickets                                          │
│ - Security review meeting minutes                           │
│                                                             │
│ Risk Management Evidence:                                   │
│ - Risk assessment reports                                   │
│ - Risk register                                             │
│ - Risk treatment plans                                      │
│ - Risk acceptance documentation                             │
│                                                             │
│ Governance Evidence:                                        │
│ - Policies with approval signatures                         │
│ - Training completion records                               │
│ - Security committee meeting minutes                        │
│ - Board security reports                                    │
│                                                             │
│ Vulnerability Management Evidence:                          │
│ - Vulnerability scan reports                                │
│ - Patch deployment records                                  │
│ - Remediation tickets                                       │
│ - Penetration test reports                                  │
└─────────────────────────────────────────────────────────────┘

SAMPLING:
┌─────────────────────────────────────────────────────────────┐
│ Auditors test samples, not every transaction                │
│                                                             │
│ Population: All instances of a control operating            │
│ Sample: Subset selected for testing                         │
│                                                             │
│ Sample Size Factors:                                        │
│ - Control frequency (daily, weekly, annual)                 │
│ - Population size                                           │
│ - Risk level of the control                                 │
│ - Auditor's required confidence level                       │
│                                                             │
│ Typical Sample Sizes:                                       │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Control Frequency    │ Typical Sample Size              │ │
│ │ ─────────────────────┼────────────────────────────────  │ │
│ │ Annual               │ 1 (the occurrence)               │ │
│ │ Quarterly            │ 2-4                              │ │
│ │ Monthly              │ 2-5                              │ │
│ │ Weekly               │ 5-15                             │ │
│ │ Daily                │ 20-40                            │ │
│ │ Per transaction      │ 25-60 (based on population)      │ │
│ └─────────────────────────────────────────────────────────┘ │
│                                                             │
│ If exceptions found, auditor may expand sample              │
└─────────────────────────────────────────────────────────────┘

Evidence Management:

Managing Audit Evidence:

EVIDENCE REPOSITORY:
┌─────────────────────────────────────────────────────────────┐
│ Maintain organized evidence repository:                     │
│                                                             │
│ Structure:                                                  │
│ └── Audit Evidence                                          │
│     ├── [Audit Name/Year]                                   │
│     │   ├── 01-Planning                                     │
│     │   │   ├── Audit request letter                        │
│     │   │   ├── Initial documentation requests              │
│     │   │   └── Audit schedule                              │
│     │   ├── 02-Access Control                               │
│     │   │   ├── User access list_2024-01-15.xlsx            │
│     │   │   ├── Access review_Q4_2023.pdf                   │
│     │   │   └── Termination samples                         │
│     │   ├── 03-Change Management                            │
│     │   │   ├── Change tickets                              │
│     │   │   └── Deployment logs                             │
│     │   └── ...                                             │
│                                                             │
│ Best Practices:                                             │
│ - Name files clearly with dates                             │
│ - Track what's been provided                                │
│ - Keep copies of everything provided                        │
│ - Document source of evidence                               │
│ - Maintain chain of custody for sensitive evidence          │
└─────────────────────────────────────────────────────────────┘

EVIDENCE REQUEST TRACKING:
┌─────────────────────────────────────────────────────────────┐
│ Request │ Control     │ Evidence       │ Owner │ Status    │
│ ID      │ Area        │ Requested      │       │           │
│ ────────┼─────────────┼────────────────┼───────┼───────────│
│ REQ-001 │ Access      │ User list      │ IT    │ Provided  │
│ REQ-002 │ Access      │ Term samples   │ HR    │ In Progress│
│ REQ-003 │ Change      │ Change tickets │ Dev   │ Provided  │
│ REQ-004 │ Monitoring  │ SIEM alerts    │ SecOps│ Pending   │
│ ...     │ ...         │ ...            │ ...   │ ...       │
└─────────────────────────────────────────────────────────────┘

CONTINUOUS EVIDENCE COLLECTION:
┌─────────────────────────────────────────────────────────────┐
│ Don't wait for audit to collect evidence:                   │
│                                                             │
│ - Automate evidence collection where possible               │
│ - Save evidence as controls operate                         │
│ - Regular screenshots of configurations                     │
│ - Export reports monthly/quarterly                          │
│ - Document exceptions when they occur                       │
│ - Keep meeting minutes and approvals                        │
│                                                             │
│ Benefits:                                                   │
│ - Evidence available when audit starts                      │
│ - Less scrambling during fieldwork                          │
│ - Catches gaps before auditors do                           │
│ - Demonstrates mature control environment                   │
└─────────────────────────────────────────────────────────────┘

Key insight: If you can't prove a control operates, it didn't operate—at least for audit purposes.

4) Working with Auditors

How you work with auditors significantly affects audit outcomes:

Auditor Relationship:

PREPARATION:
┌─────────────────────────────────────────────────────────────┐
│ Before the Audit:                                           │
│                                                             │
│ Internal Readiness:                                         │
│ - Conduct internal pre-audit assessment                     │
│ - Identify and address obvious gaps                         │
│ - Ensure policies are current and approved                  │
│ - Verify evidence is available                              │
│ - Brief stakeholders on audit process                       │
│                                                             │
│ Logistics:                                                  │
│ - Designate audit coordinator                               │
│ - Reserve conference room/workspace                         │
│ - Arrange system access for auditors                        │
│ - Schedule key personnel availability                       │
│ - Prepare evidence repository                               │
│                                                             │
│ Communication:                                              │
│ - Understand audit scope and timeline                       │
│ - Clarify deliverables and format                           │
│ - Establish communication protocols                         │
│ - Identify escalation paths                                 │
└─────────────────────────────────────────────────────────────┘

DURING THE AUDIT:
┌─────────────────────────────────────────────────────────────┐
│ DO:                                                         │
│ ✓ Be responsive - provide evidence promptly                 │
│ ✓ Be honest - don't hide problems                           │
│ ✓ Be prepared - have documentation ready                    │
│ ✓ Be professional - auditors are doing their job            │
│ ✓ Ask for clarification if request is unclear               │
│ ✓ Provide context that helps auditor understand             │
│ ✓ Correct misunderstandings promptly                        │
│ ✓ Keep track of all requests and responses                  │
│ ✓ Escalate issues through proper channels                   │
│                                                             │
│ DON'T:                                                      │
│ ✗ Volunteer information not requested                       │
│ ✗ Speculate or guess - say "I'll find out"                  │
│ ✗ Be defensive or argumentative                             │
│ ✗ Hide problems (they usually find them anyway)             │
│ ✗ Promise things you can't deliver                          │
│ ✗ Let scope creep without discussion                        │
│ ✗ Delay responses without communication                     │
│ ✗ Go around the audit coordinator                           │
└─────────────────────────────────────────────────────────────┘

INTERVIEW TIPS:
┌─────────────────────────────────────────────────────────────┐
│ When being interviewed by auditors:                         │
│                                                             │
│ - Listen carefully to the question                          │
│ - Answer the question asked (not what you think they mean)  │
│ - Be concise - don't over-explain                           │
│ - If you don't know, say so and offer to find out           │
│ - Don't speculate about other areas                         │
│ - Stay in your lane (speak to what you know)                │
│ - Have supporting documentation available                   │
│ - It's okay to pause and think                              │
│                                                             │
│ Example:                                                    │
│ Q: "How are access requests approved?"                      │
│ Good: "Managers approve in ServiceNow before IT provisions" │
│ Bad: "Well, it depends, sometimes we do it this way, but    │
│       occasionally if it's urgent we might skip..."         │
└─────────────────────────────────────────────────────────────┘

Managing Findings:

Audit Findings Management:

FINDING SEVERITY LEVELS:
┌─────────────────────────────────────────────────────────────┐
│ Critical/High:                                              │
│ - Significant control deficiency                            │
│ - Material weakness                                         │
│ - Immediate remediation required                            │
│ - May prevent certification/clean opinion                   │
│                                                             │
│ Moderate/Medium:                                            │
│ - Control weakness but not material                         │
│ - Significant deficiency                                    │
│ - Remediation expected within defined timeframe             │
│                                                             │
│ Low/Minor:                                                  │
│ - Opportunity for improvement                               │
│ - Documentation gaps                                        │
│ - Address in normal course of business                      │
│                                                             │
│ Observation:                                                │
│ - Not a finding but worth noting                            │
│ - Best practice recommendation                              │
│ - Optional to address                                       │
└─────────────────────────────────────────────────────────────┘

RESPONDING TO FINDINGS:
┌─────────────────────────────────────────────────────────────┐
│ Options:                                                    │
│                                                             │
│ 1. Accept the Finding                                       │
│    - Agree with auditor's conclusion                        │
│    - Commit to remediation plan                             │
│    - Provide timeline and owner                             │
│                                                             │
│ 2. Provide Additional Context                               │
│    - Finding may be technically accurate but missing context│
│    - Provide compensating controls                          │
│    - Explain business justification                         │
│    - May result in finding modification                     │
│                                                             │
│ 3. Dispute the Finding                                      │
│    - Use sparingly and professionally                       │
│    - Provide evidence contradicting finding                 │
│    - Escalate through proper channels                       │
│    - Document disagreement if not resolved                  │
│                                                             │
│ Management Response Components:                             │
│ - Agreement/disagreement with finding                       │
│ - Remediation actions planned                               │
│ - Responsible party                                         │
│ - Target completion date                                    │
│ - Root cause (if applicable)                                │
└─────────────────────────────────────────────────────────────┘

REMEDIATION MANAGEMENT:
┌─────────────────────────────────────────────────────────────┐
│ Track all findings to closure:                              │
│                                                             │
│ Finding │ Severity │ Owner    │ Due Date  │ Status         │
│ ────────┼──────────┼──────────┼───────────┼────────────────│
│ F-001   │ High     │ J.Smith  │ 2024-02-15│ In Progress    │
│ F-002   │ Medium   │ T.Jones  │ 2024-03-30│ Not Started    │
│ F-003   │ Low      │ A.Wilson │ 2024-06-30│ Complete       │
│                                                             │
│ Verification:                                               │
│ - Evidence of remediation required                          │
│ - May be verified by internal audit                         │
│ - External auditor confirms at next audit                   │
│                                                             │
│ Reporting:                                                  │
│ - Regular status updates to management                      │
│ - Escalate overdue items                                    │
│ - Report to audit committee/board                           │
└─────────────────────────────────────────────────────────────┘

Key insight: Findings are opportunities to improve, not failures to hide. How you respond matters as much as the finding itself.

5) Internal Audit Program

A strong internal audit program enables continuous improvement and audit readiness:

Internal Audit Program:

INTERNAL AUDIT FUNCTION:
┌─────────────────────────────────────────────────────────────┐
│ Purpose:                                                    │
│ - Provide independent assurance to management and board     │
│ - Evaluate effectiveness of controls                        │
│ - Identify improvement opportunities                        │
│ - Prepare for external audits                               │
│ - Support risk management                                   │
│                                                             │
│ Independence Requirements:                                  │
│ - Report to audit committee or board                        │
│ - Administrative reporting separate from operational        │
│ - No operational responsibilities for areas audited         │
│ - Objectivity in assessments                                │
│                                                             │
│ Standards:                                                  │
│ - IIA (Institute of Internal Auditors) Standards            │
│ - ISACA IT Audit Framework                                  │
└─────────────────────────────────────────────────────────────┘

AUDIT PLANNING:
┌─────────────────────────────────────────────────────────────┐
│ Risk-Based Audit Plan:                                      │
│                                                             │
│ 1. Identify Audit Universe                                  │
│    - All auditable areas/processes                          │
│    - Systems and applications                               │
│    - Business processes                                     │
│    - Third parties                                          │
│                                                             │
│ 2. Risk Assessment                                          │
│    - Inherent risk of each area                             │
│    - Control effectiveness                                  │
│    - Time since last audit                                  │
│    - Regulatory requirements                                │
│    - Management concerns                                    │
│                                                             │
│ 3. Prioritization                                           │
│    - High risk = more frequent audits                       │
│    - Regulatory requirements = mandatory                    │
│    - Resource constraints considered                        │
│                                                             │
│ 4. Annual Audit Plan                                        │
│    - Audits to be performed                                 │
│    - Timing and resources                                   │
│    - Coverage of key risks                                  │
│    - Approved by audit committee                            │
└─────────────────────────────────────────────────────────────┘

SAMPLE SECURITY AUDIT PLAN:
┌─────────────────────────────────────────────────────────────┐
│ Audit Area          │ Risk │ Frequency │ Last    │ Next    │
│ ────────────────────┼──────┼───────────┼─────────┼─────────│
│ Access Management   │ High │ Annual    │ Q1 2023 │ Q1 2024 │
│ Change Management   │ High │ Annual    │ Q2 2023 │ Q2 2024 │
│ Incident Response   │ Med  │ 18 months │ Q3 2022 │ Q1 2024 │
│ Vendor Management   │ High │ Annual    │ Q4 2023 │ Q4 2024 │
│ Data Protection     │ High │ Annual    │ Q1 2023 │ Q1 2024 │
│ Physical Security   │ Med  │ 2 years   │ Q2 2022 │ Q2 2024 │
│ BCP/DR              │ High │ Annual    │ Q3 2023 │ Q3 2024 │
│ Cloud Security      │ High │ Annual    │ Q4 2023 │ Q4 2024 │
│ Security Awareness  │ Med  │ Annual    │ Q1 2023 │ Q1 2024 │
└─────────────────────────────────────────────────────────────┘

Continuous Assurance:

Continuous Monitoring and Assurance:

CONTINUOUS CONTROLS MONITORING:
┌─────────────────────────────────────────────────────────────┐
│ Moving from periodic audits to continuous assurance:        │
│                                                             │
│ Traditional Audit:                                          │
│ - Point-in-time assessment                                  │
│ - Sample-based testing                                      │
│ - Annual or periodic                                        │
│ - Reactive (finds past issues)                              │
│                                                             │
│ Continuous Monitoring:                                      │
│ - Ongoing, automated assessment                             │
│ - 100% population (not samples)                             │
│ - Real-time or near-real-time                               │
│ - Proactive (finds current issues)                          │
│                                                             │
│ Examples:                                                   │
│ - Automated access reviews                                  │
│ - Configuration compliance scanning                         │
│ - Continuous vulnerability assessment                       │
│ - Log analysis for policy violations                        │
│ - Automated segregation of duties checking                  │
└─────────────────────────────────────────────────────────────┘

GRC TOOL CAPABILITIES:
┌─────────────────────────────────────────────────────────────┐
│ Modern GRC platforms enable:                                │
│                                                             │
│ - Control mapping to multiple frameworks                    │
│ - Automated evidence collection                             │
│ - Continuous control testing                                │
│ - Findings tracking and remediation                         │
│ - Compliance dashboards                                     │
│ - Audit workflow management                                 │
│ - Risk assessment integration                               │
│ - Reporting and analytics                                   │
│                                                             │
│ Benefits:                                                   │
│ - Reduced manual effort                                     │
│ - Consistent processes                                      │
│ - Better visibility                                         │
│ - Audit readiness                                           │
│ - Trend analysis                                            │
└─────────────────────────────────────────────────────────────┘

SELF-ASSESSMENT PROGRAMS:
┌─────────────────────────────────────────────────────────────┐
│ Control owners regularly assess their own controls:         │
│                                                             │
│ Process:                                                    │
│ - Quarterly or semi-annual self-assessment                  │
│ - Control owners complete questionnaire                     │
│ - Provide evidence of control operation                     │
│ - Identify issues and remediation plans                     │
│ - Security/internal audit validates sample                  │
│                                                             │
│ Benefits:                                                   │
│ - Ownership of controls                                     │
│ - Earlier identification of issues                          │
│ - Audit readiness                                           │
│ - Reduced external audit effort                             │
│                                                             │
│ Risks to Manage:                                            │
│ - Self-assessment bias (rate selves favorably)              │
│ - Inconsistent interpretation                               │
│ - Lack of evidence                                          │
│ - Requires validation                                       │
└─────────────────────────────────────────────────────────────┘

Key insight: The best audit programs make external audits almost anticlimactic—internal processes catch issues first.

Real-World Context

Case Study: Audit Failure Turned Success

A company's first SOC 2 audit resulted in a qualified opinion with 12 findings, including 3 high-severity issues: no evidence of access reviews, incomplete change management documentation, and missing risk assessment. Rather than viewing this as failure, leadership used it as a catalyst. They implemented a GRC tool, established continuous evidence collection, created control owner accountability, and conducted quarterly internal assessments. The next year's audit resulted in an unqualified opinion with only 2 minor observations. The initial "failed" audit became the foundation for a mature compliance program.

Case Study: Over-Prepared Audit

A security team, worried about an upcoming ISO 27001 certification audit, spent months preparing a massive evidence repository with thousands of documents. During the audit, auditors were overwhelmed and couldn't find what they needed. The team realized that more documentation isn't better— organized, relevant documentation is better. They restructured their approach: created a control matrix mapping each control to specific evidence, organized evidence by control area, and prepared index documents explaining what evidence existed and where. Subsequent audits were significantly smoother.

Audit Management Quick Reference:

Audit Management Checklist:

PREPARATION:
□ Audit scope and timeline confirmed
□ Audit coordinator designated
□ Stakeholders briefed
□ Evidence repository prepared
□ Pre-audit self-assessment completed
□ Obvious gaps addressed
□ Logistics arranged (rooms, access)

DURING AUDIT:
□ Request tracker maintained
□ Evidence provided promptly
□ Personnel available for interviews
□ Daily status meetings held
□ Issues escalated appropriately
□ Findings discussed before finalization

POST-AUDIT:
□ Draft report reviewed for accuracy
□ Management responses prepared
□ Remediation plans developed
□ Finding owners assigned
□ Tracking mechanism established
□ Status reporting to management

CONTINUOUS IMPROVEMENT:
□ Lessons learned documented
□ Process improvements identified
□ Internal audit plan updated
□ Evidence collection automated
□ Self-assessment program implemented

Audits should validate what you already know about your security program, not reveal surprises.

Guided Lab: Audit Preparation

In this lab, you'll prepare for a SOC 2 Type II audit and develop an internal audit program.

Lab Scenario:

  • SaaS company preparing for first SOC 2 Type II
  • Previously completed Type I
  • 12-month audit period
  • Security (CC) and Availability criteria in scope
  • Need to establish ongoing audit program

Exercise Steps:

  1. Create control matrix for in-scope criteria
  2. Map evidence requirements to each control
  3. Design evidence collection process
  4. Prepare sample evidence package
  5. Create audit coordinator playbook
  6. Design internal audit plan
  7. Create finding tracking template
  8. Develop audit readiness dashboard

Reflection Questions:

  • What evidence would be hardest to produce retroactively?
  • How would you maintain audit readiness year-round?
  • What would you do differently for the next audit?

Week Outcome Check

By the end of this week, you should be able to:

  • Distinguish between internal, external, and second-party audits
  • Explain the audit lifecycle phases
  • Identify and collect appropriate audit evidence
  • Prepare effectively for external audits
  • Work productively with auditors
  • Respond appropriately to audit findings
  • Develop risk-based internal audit plans
  • Implement continuous assurance approaches

🎯 Hands-On Labs (Free & Essential)

Master audit processes with hands-on control testing and assurance exercises.

🔍 Security Audit Simulation

What you'll do: Conduct comprehensive security audits—plan scope, perform control testing, document findings, prepare audit reports.
Why it matters: Audits verify that controls are actually working, not just documented.
Time estimate: 3-4 hours

ISACA Audit Resources →

✅ Control Testing Lab

What you'll do: Perform control testing—design test procedures, gather evidence, evaluate effectiveness, document exceptions.
Why it matters: Control testing provides assurance that security measures are functioning correctly.
Time estimate: 2-3 hours

COSO Internal Control Framework →

📊 Audit Remediation Planning

What you'll do: Manage audit findings—prioritize by risk, create remediation plans, track to closure, prepare management responses.
Why it matters: Audit value comes from remediation, not just finding issues.
Time estimate: 2-3 hours

AICPA Audit Standards →

💡 Lab Strategy: Approach audits collaboratively, not adversarially—the goal is improving security, not finding blame.

Resources

Lab

Complete the following lab exercises to practice audit management concepts.

Part 1: Control Matrix (LO6)

Create control matrix: (a) list SOC 2 Common Criteria controls, (b) map to organizational controls, (c) identify control owners, (d) document control frequency.

Deliverable: SOC 2 control matrix with 20+ controls mapped to organizational implementation.

Part 2: Evidence Mapping (LO6)

Map evidence requirements: (a) identify evidence needed for each control, (b) determine evidence source, (c) define collection frequency, (d) assign responsibility.

Deliverable: Evidence requirements matrix with sources and collection schedule.

Part 3: Audit Coordinator Playbook (LO6)

Create playbook: (a) document pre-audit preparation, (b) create request tracking template, (c) define escalation procedures, (d) create communication templates.

Deliverable: Audit coordinator playbook with templates and procedures.

Part 4: Internal Audit Plan (LO6)

Develop audit plan: (a) identify audit universe, (b) conduct risk-based prioritization, (c) create annual audit schedule, (d) define audit procedures for one area.

Deliverable: Annual internal audit plan with risk-based prioritization.

Part 5: Finding Management (LO6)

Create finding process: (a) design finding tracking template, (b) create management response template, (c) define remediation workflow, (d) create status reporting format.

Deliverable: Finding management process with templates and workflow.

Checkpoint Questions

  1. What is the difference between internal, external, and second-party audits? What assurance does each provide?
  2. Describe the four phases of an audit. What happens in fieldwork and what testing methods do auditors use?
  3. What makes audit evidence reliable? Rank the following from most to least reliable: system logs, interview responses, documents prepared for audit, third-party confirmations.
  4. How should you respond when an auditor identifies a finding you disagree with?
  5. What is continuous assurance and how does it differ from traditional periodic audits?
  6. You're preparing for a SOC 2 Type II audit. What evidence would you need for access control, and how would you collect it throughout the audit period?

Week 08 Quiz

Test your understanding of Audit types, the Audit Lifecycle, and Evidence Management.

Format: 10 multiple-choice questions. Passing score: 70%. Time: Untimed.

Take Quiz

Weekly Reflection

Audits provide essential assurance that security programs work as intended. This week covered how to prepare for, execute, and leverage audits for continuous improvement.

Reflect on the following in 200-300 words:

A strong reflection demonstrates understanding that audits should verify an effective program, not substitute for one.

Verified Resources & Videos

← Previous: Week 07 Next: Week 09 →