๐Ÿ“ CISSP Study Note: Audit

๐Ÿ“ CISSP Study Note: Audit

The tools, processes, and activities used to perform compliance reviews. [Source]

๐Ÿ” Definition

Audit refers to the tools, processes, and activities used to perform compliance reviews, ensuring that security controls, policies, and procedures are operating as intended and meet internal and external standards.


๐Ÿง  Why It Matters in Cybersecurity

Auditing isn’t just a checkbox—it’s a core part of governance, risk, and compliance (GRC). Audits provide accountability, uncover gaps in security posture, and verify that security practices match documented policies.


๐Ÿ”ง Core Components of Auditing

Component Description
Audit Tools Software or utilities used to collect, analyze, and report on system and security data (e.g., SIEM, log analyzers).
Audit Processes Steps taken to perform the audit—planning, data collection, evaluation, reporting, and follow-up.
Audit Activities The tasks involved—interviewing personnel, reviewing configs, observing processes, checking access controls, etc.

๐Ÿ› ️ Types of Audits in CISSP Context

Type Purpose
Internal Audit Conducted by the organization to assess its own compliance and readiness.
External Audit Performed by third parties (e.g., for SOC 2, ISO 27001, PCI-DSS) for regulatory or certification purposes.
IT/Security Audit Focuses on systems, access, and security controls.
Operational Audit Reviews day-to-day procedures and their alignment with policy.

๐Ÿ“Œ Key Principles

Principle Description
Independence Auditors must be impartial and not responsible for the system being audited.
Repeatability Audits should follow a standard, documented methodology.
Evidence-Based Findings are based on logs, records, interviews, and other verifiable evidence.
Documented Results All findings, gaps, and remediation plans must be logged in a formal report.

๐Ÿ” Security Control Categories Audited

  • Access Controls (Who can access what, and how)

  • System Logs and Monitoring

  • Incident Response Processes

  • Configuration Management

  • Change Control

  • Encryption Use

  • Data Retention and Disposal


✅ Example (CISSP-Style)

A company undergoes a quarterly access control audit. The audit reveals that former contractors still have active VPN credentials.
The audit team documents the finding and recommends immediate revocation and an update to offboarding procedures.
This is a successful use of audit processes to enforce security compliance.


๐Ÿ“– Found In CISSP Domain

  • ๐Ÿ“˜ Domain 6: Security Assessment and Testing

    • Auditing strategies

    • Internal and external assessments

    • Evidence gathering and reporting


Comments

Popular posts from this blog

๐Ÿงญ CISSP Study Note: Guidelines

๐Ÿ’ธ CISSP Study Note: Risk Transference

๐Ÿ“ CISSP Study Note: Standards