Skip to content

The goal of this project is to simulate an internal security audit of a fictitious company "Botium Toys". The project will be broken up into several documents, each including different parts of an internal security audit.

Notifications You must be signed in to change notification settings

JacobDKing/InternalAuditTest

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Conducting a Security Audit

The goal of this project is to simulate an internal security audit of a fictitious company "Botium Toys". The project will be broken up into several documents, each including different parts of an internal security audit. Below in this ReadMe is both a Scenario description as well as an overview of the Scope and Goals of this particular audit.



Scenario:

This scenario is based on a fictional company:

Botium Toys is a small U.S. business that develops and sells toys. The business has a single physical location. However, its online presence has grown, attracting customers in the U.S. and abroad. Their information technology (IT) department is under increasing pressure to support their online market worldwide.

The manager of the IT department has decided that an internal IT audit needs to be conducted. She expresses concerns about not having a solidified plan of action to ensure business continuity and compliance, as the business grows. She believes an internal audit can help better secure the company’s infrastructure and help them identify and mitigate potential risks, threats, or vulnerabilities to critical assets. The manager is also interested in ensuring that they comply with regulations related to accepting online payments and conducting business in the European Union (E.U.).

The IT manager starts by implementing the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF), establishing an audit scope and goals, and completing a risk assessment. The goal of the audit is to provide an overview of the risks the company might experience due to the current state of their security posture. The IT manager wants to use the audit findings as evidence to obtain approval to expand his department.

The task presented is to review the IT manager’s scope, goals, and risk assessment. Then, perform an internal audit to complete a controls assessment and compliance checklist.



Botium Toys: Audit Scope and Goals:

Summary: Perform an audit of Botium Toys’ cybersecurity program. The audit needs to align current business practices with industry standards and best practices. The audit is meant to provide mitigation recommendations for vulnerabilities found that are classified as “high risk,” and present an overall strategy for improving the security posture of the organization. The audit team needs to document their findings, provide remediation plans and efforts, and communicate with stakeholders.

Scope:

Botium Toys internal IT audit will assess the following:

  • Current user permissions set in the following systems: accounting, end point detection, firewalls, intrusion detection system, security information and event management (SIEM) tool.
  • Current implemented controls in the following systems: accounting, end point detection, firewalls, intrusion detection system, Security Information and Event Management (SIEM) tool.
  • Current procedures and protocols set for the following systems: accounting, end point detection, firewall, intrusion detection system, Security Information and Event Management (SIEM) tool.
  • Ensure current user permissions, controls, procedures, and protocols in place align with necessary compliance requirements.
  • Ensure current technology is accounted for. Both hardware and system access.


Goals:

The goals for Botium Toys’ internal IT audit are:

  • To adhere to the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF).
  • Establish a better process for their systems to ensure they are compliant.
  • Fortify system controls.
  • Implement the concept of least permissions when it comes to user credential management.
  • Establish their policies and procedures, which includes their playbooks.
  • Ensure they are meeting compliance requirements.

About

The goal of this project is to simulate an internal security audit of a fictitious company "Botium Toys". The project will be broken up into several documents, each including different parts of an internal security audit.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published