CIO Influence
CIO Influence News Security

Auditors Can Assess and Advance Their Zero Trust Model with New ISACA Audit Program

Auditors Can Assess and Advance Their Zero Trust Model with New ISACA Audit Program

For organizations that adopt a Zero Trust approach for their cybersecurity program—adhering to the principles of “never trust, always verify”—it is important to periodically review, test and adjust their model to ensure that all users have the least amount of access to perform their jobs in order to better protect assets and systems. A new audit program from ISACA supports IT auditors in assessing these controls and processes to ensure their Zero Trust models are effective.

PREDICTIONS SERIES 2024 - CIO Influence

Auditors can assess and advance their #ZeroTrust model with new #ISACA #audit program.

A subpar Zero Trust program can lead to major impacts, such as unplanned costs associated with incident response, significant impact resulting from regulatory censure, missed performance targets, system downtime, loss of business-critical data and/or systems, and reputational damage.

CIO INFLUENCE News: Engage3 Successfully Renews SOC 2 Type 2 Compliance for Price Image Management Suite

ISACA’s Zero Trust Audit Program guides auditors in examining the core focus areas that can reduce the impact of a cyberincident. The program can be used to assess an organization’s ability to secure itself based on Zero Trust policies and procedures, as well as to evaluate related controls and their effectiveness in reducing the likelihood of a cybersecurity incident. The program also hones in on shortcomings pertaining to personnel, processes, technologies and governance, as well as various types of operational risk that could have a reputational impact.

“Organizations are not static, and so their Zero Trust model for their cybersecurity programs should not be either,” says Sampa David Sampa, regional senior IT auditor at World Vision, member of the ISACA Emerging Trends Working Group and a developer of the paper. “When an enterprise’s roles, responsibilities, vendors or infrastructure change, or updates are made to policies, data classification or incident response processes, they also need to adjust their Zero Trust model accordingly to address these and reduce risk.”

CIO INFLUENCE News: PlainID Announces Dynamic Security Capabilities with SQL Databases

The audit program—which includes an Excel file with testing steps—also outlines the specific processes that auditors should consider when assessing the maturity level of a Zero Trust program, including:

  • Continuous authentication validation and risk analysis processes
  • Microperimeter implementations built around and between all critical applications, systems and data stores
  • Just-in-time (JIT) and proportionate access controls
  • Advanced attack protections integrated into application workflows

“Only through a concerted effort involving rigorous testing of controls and monitoring of a range of processes can organizations really have a clear picture of where they stand with their Zero Trust program and how they can continue to strengthen it,” says Paul Phillips, ISACA director, event content development. “ISACA is committed to providing auditors with the support and resources they need to continue refining and advancing their Zero Trust approach to ultimately reduce their risk of and impact from cyberincidents.”

CIO INFLUENCE News: Enphyr Secures $1 Million in Seed Funding At $10 Million Valuation

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Application Whitelisting by PC Matic Available in Australia to Prevent Ransomware’s Global Spread

Eureka Security Announces New File Sharing Product Capabilities

GlobeNewswire

Versa Networks and Nabiq Partner to Deliver Advanced Private 5G Services in Japan

CIO Influence News Desk