📜 ⬆️ ⬇️

IS audit methodology

How to determine the degree of system security (information object)?
Today, there are two most common types of IS audit: the first is the assessment of compliance with the requirements of standards (compliance) and the second is threat modeling and risk assessment.
Both types have drawbacks, which may result in incorrect assessment. In the first case, we check the compliance of our system with the requirements for a wide range of systems. These requirements cannot take into account the specifics of a particular system, and therefore there is a possibility that there are unnecessary requirements or a lack of necessary ones. In the second case, the result depends only on the qualifications and awareness of the auditor.

Under the katom described methodology for the audit of information security, minimizing these disadvantages.

The proposed method is based on the construction of failure trees and causes (from graph theory). Below are the actions of the auditor in stages.

1. Preparatory events

2. Building Failure Trees

3. Building a tree of causes

4. Assessment of compliance

An illustration of stages 2 and 3 is presented in the figures below.
')
Example of building fault trees:
image

An example of building a tree of reasons:
image

Source: https://habr.com/ru/post/151669/


All Articles