{"id":109,"date":"2017-11-26T16:20:00","date_gmt":"2017-11-26T16:20:00","guid":{"rendered":"https:\/\/www.7sec.com\/blog\/?p=109"},"modified":"2021-06-10T13:09:34","modified_gmt":"2021-06-10T13:09:34","slug":"team-development-internal-audit-and-control-101","status":"publish","type":"post","link":"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/","title":{"rendered":"Team Development, Internal Audit &#038; Control 101"},"content":{"rendered":"\r\n<p>The development of a company\u2019s employees is of major importance. Ultimately, progress and growth are what everyone\u2019s after, but in order for that to happen, processes, workflow, and ethnicity must be all under control.<\/p>\r\n<p>In order to create a secure operations environment, an organization needs to build its structure and staff it in line with the proper approach to the\u00a0human factor in Information Security. Failing to do so usually results in a lack of direction, misplaced responsibility, and ultimately, operational disruptions.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<h4>THE TOP-DOWN APPROACH<\/h4>\r\n<p>Information Security is never built from the bottom up. Do not assume that everyone in the organization is tuned in to what (and how) needs to be done regarding Information Security. The major roles are usually defined as:<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>Senior Management \u2013 creates information security program and ensures proper and adequate staffing and funding and has organizational priority. Responsible for ensuring organizational assets are protected.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>Data Owner (aka information owner or business owner) \u2013 a management employee responsible for ensuring the protection of specific data. Data classification, sensitivity labels, and the frequency of data backup are determined by this role.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>Custodian \u2013 a role responsible for the actual protection of assets, performing tasks such as data backups and restoration, patch systems, etc., under detailed orders \u2013 Custodians do not make critical decisions on how data is protected.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>User \u2013 the largest in number, yet major information security role. Users follow rules. For Users, it is mandatory to comply with policies, procedures, standards, etc. Working to raise awareness you can tell people how to do the right things at times when their behavior can make a difference in the security of the company.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<h4 class=\"wp-block-heading\">ADMINISTRATIVE PERSONNEL CONTROLS<\/h4>\r\n<p>\r\n\r\n<\/p>\r\n<p>These are fundamental operational security concepts that should be observed when organizing and structuring the staff of a company. These concepts are important because they do not only deal with personnel but permeate through multiple Information Security domains:<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<ul class=\"wp-block-list\">\r\n<li>Least Privilege (aka Minimum Necessary Access) \u2013 dictates that all persons\u2019 access is strictly bound to the minimum access required so they can perform their duties. This is the one, single, most important principle that administrative security controls revolve around.<\/li>\r\n<li>Split-knowledge \u2013 a process in which certain portions of data have split access over multiple people, individually sharing no knowledge of the data in its entirety. Thus data can be subsequently inputted into, or output from, by the separate people to the extent they access to and can be combined to recreate the data in its entirety only by a person with access that would allow such actions.<\/li>\r\n<li>Separation of duties \u2013 prescribes that multiple people are required to complete critical or sensitive transactions. The goal of separation of duties is to ensure that in order for someone to be able to abuse access to sensitive data or transactions, that person must convince another party to act in concert.<\/li>\r\n<li>Rotation of duties\/job rotation \u2013 a process in which staff members are required to perform the same duties interchangeably on a rotation schedule. By doing so, the company is more protected due to having varying people perform and review the work of their peers, who did the same job in the previous rotation. Rotation of duties helps mitigate a collision, where two or more people are in alliance to subvert the security of a system.<\/li>\r\n<li>Mandatory leave\/forced vacation \u2013 an additional operational control, closely related to a rotation of duties, with the primary security considerations being similar: reducing or detecting personnel single points of failure and the detection and deterrence of fraud. Forcing all employees to take leave can identify areas where the depth of coverage is lacking or can help reveal fraudulent or suspicious behavior.<\/li>\r\n<\/ul>\r\n<p>\r\n\r\n<\/p>\r\n<h4 class=\"wp-block-heading\">TYPICAL STRUCTURE AND INTERACTIONS<\/h4>\r\n<p>\r\n\r\n<\/p>\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-111 size-full\" src=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png\" alt=\"\" width=\"1400\" height=\"893\" srcset=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png 1400w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team-300x191.png 300w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team-1024x653.png 1024w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team-768x490.png 768w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team-1200x765.png 1200w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\r\n<\/div>\r\n<p>\r\n\r\n<\/p>\r\n<p>&nbsp;<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>While the diagram above provides a generic structure to illustrate how Information Security and Internal Audit are related both functionally and in terms of subordination and dependency, it is not to be applied blindly. When building one\u2019s own structure, one should take into account the nature of the organization\u2019s business, its existing structure as well as resource considerations. The\u00a0Information Security Manager\u00a0usually referred to as the\u00a0Chief Information Security Officer (CISO)\u00a0and their unit play a distinct role, which should not be confused with that of the\u00a0Audit Committee (AKA The Internal Audit and Control Unit)\u00a0as is further detailed below.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p><strong>The CISO<\/strong><\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>The Chief Information Security Officer (CISO) is the highest-ranking executive responsible for the establishment and maintaining the fundamental business concept, the company\u2019s strategy, and programs to ensure assets and information technology appropriately protected.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>The CISO directs staff in the identification, development, implementation, and maintenance of processes across the organization to reduce the information and information technology (IT) risks.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>The CISO, and its staff, respond to incidents, establish appropriate standards and controls, manage security technologies, and guide the development and implementation of policies and procedures.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>The CISO is also usually responsible for compliance related to company information.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p><strong>The Internal Audit &amp; Control Unit<\/strong><\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>The Internal Audit &amp; Control Unit holds an inextricably independent function. Otherwise, it can become dysfunctional with sub-standard performance. There are many degrees in the level of independence and effectiveness, so a clear understanding of the business needs and circumstances is required.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>The unit\u2019s function is to provide a third level of control in the organization, which should be independent of the control of the first level \u2013 that of the top management of the company and of other units, such as legal, human resources, financial control, etc.<\/p>\r\n<p>\r\n\r\n<\/p>\r\n<p>The unit establishes appropriate policies and procedures to guide the internal audit function, and ensure the quality of the assurance services delivered \u2013 all aligned and are consistent with the company\u2019s objectives and governance policies.<\/p>\r\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>The development of a company\u2019s employees is of major importance. Ultimately, progress and growth are what everyone\u2019s after, but in order for that to happen, processes, workflow, and ethnicity must be all under control. In order to create a secure operations environment, an organization needs to build its structure and staff it in line with &hellip; <a href=\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Team Development, Internal Audit &#038; Control 101&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,4],"tags":[90,44,43,26,70,92,93,47,50,89,91],"class_list":["post-109","post","type-post","status-publish","format-standard","hentry","category-compliance","category-it-governance","tag-audit-committee","tag-chief-information-security-officer","tag-ciso","tag-information-security","tag-information-security-audit","tag-information-security-manager","tag-information-technology-risks","tag-internal-audit","tag-internal-audit-function","tag-team-development","tag-the-internal-audit-and-control-unit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Team Development, Internal Audit &amp; Control 101 - Information Security Blog - 7Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Team Development, Internal Audit &amp; Control 101 - Information Security Blog - 7Security\" \/>\n<meta property=\"og:description\" content=\"The development of a company\u2019s employees is of major importance. Ultimately, progress and growth are what everyone\u2019s after, but in order for that to happen, processes, workflow, and ethnicity must be all under control. In order to create a secure operations environment, an organization needs to build its structure and staff it in line with &hellip; Continue reading &quot;Team Development, Internal Audit &#038; Control 101&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Security Blog - 7Security\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-26T16:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-10T13:09:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png\" \/>\n<meta name=\"author\" content=\"madmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"madmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/\",\"url\":\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/\",\"name\":\"Team Development, Internal Audit & Control 101 - Information Security Blog - 7Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png\",\"datePublished\":\"2017-11-26T16:20:00+00:00\",\"dateModified\":\"2021-06-10T13:09:34+00:00\",\"author\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/#primaryimage\",\"url\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png\",\"contentUrl\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png\",\"width\":1400,\"height\":893},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.7sec.com\/blog\/#website\",\"url\":\"https:\/\/www.7sec.com\/blog\/\",\"name\":\"Information Security Blog - 7Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.7sec.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65\",\"name\":\"madmin\",\"sameAs\":[\"https:\/\/www.7sec.com\/blog\"],\"url\":\"https:\/\/www.7sec.com\/blog\/author\/madmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Team Development, Internal Audit & Control 101 - Information Security Blog - 7Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/","og_locale":"en_US","og_type":"article","og_title":"Team Development, Internal Audit & Control 101 - Information Security Blog - 7Security","og_description":"The development of a company\u2019s employees is of major importance. Ultimately, progress and growth are what everyone\u2019s after, but in order for that to happen, processes, workflow, and ethnicity must be all under control. In order to create a secure operations environment, an organization needs to build its structure and staff it in line with &hellip; Continue reading \"Team Development, Internal Audit &#038; Control 101\"","og_url":"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/","og_site_name":"Information Security Blog - 7Security","article_published_time":"2017-11-26T16:20:00+00:00","article_modified_time":"2021-06-10T13:09:34+00:00","og_image":[{"url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png","type":"","width":"","height":""}],"author":"madmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"madmin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/","url":"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/","name":"Team Development, Internal Audit & Control 101 - Information Security Blog - 7Security","isPartOf":{"@id":"https:\/\/www.7sec.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/#primaryimage"},"image":{"@id":"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/#primaryimage"},"thumbnailUrl":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png","datePublished":"2017-11-26T16:20:00+00:00","dateModified":"2021-06-10T13:09:34+00:00","author":{"@id":"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.7sec.com\/blog\/team-development-internal-audit-and-control-101\/#primaryimage","url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png","contentUrl":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2018\/04\/team.png","width":1400,"height":893},{"@type":"WebSite","@id":"https:\/\/www.7sec.com\/blog\/#website","url":"https:\/\/www.7sec.com\/blog\/","name":"Information Security Blog - 7Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.7sec.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65","name":"madmin","sameAs":["https:\/\/www.7sec.com\/blog"],"url":"https:\/\/www.7sec.com\/blog\/author\/madmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":8,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/109\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/109\/revisions\/323"}],"wp:attachment":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/media?parent=109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/categories?post=109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/tags?post=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}