26
Which External Assurance Options and Control Frameworks are Best? Presented by: Andrew Demski, Technology Director Alex Getz, Consultant Moderated by: Tonya Preston

Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Which External Assurance Options and Control Frameworks are Best?

Presented by:Andrew Demski, Technology Director

Alex Getz, Consultant

Moderated by:Tonya Preston

Page 2: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

TODAY’S PRESENTERS

Andrew Demski Technology Director

Cincinnati, OH

Alex GetzConsultant

Cincinnati, OH

Page 3: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Agenda

• IT-related control and security frameworks

• Industry-specific standards

• External assurance options

• External assurance value

• SOC Reporting

Page 4: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Current Industry and Regulatory Environment

Page 5: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

What are the frameworks governing IT/security?

Established by:• Information Systems Audit and Control Association (ISACA).Designed to: • Be a framework intended for IT governance and management• Allows organization to ensure quality, control and reliability of information

systemsOverview:• A structure for organizations to implement in which business processes

play a key role in the company model.• COBIT is a process-based model that includes Planning and Organization,

Delivering and Support, Acquiring and Implementation, and Monitoringand Evaluating.

• Objectives include Evaluate, Direct and Monitor; Align, Plan and Organize;Build, Acquire and Implement; Deliver, Service and Support; and Monitor,Evaluate and Assess.

COBIT Framework

COBIT(Control Objectives for Information and Related Technology)

Page 6: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

What are the frameworks governing IT/security?

NISTEstablished by:• The National Institute of Standards

and Technology (NIST).Designed to: • Be a US government-ordered,

cybersecurity framework.Overview:• A structure for the nation’s financial, energy, healthcare, and other critical systems to

better protect their information and physical assets from cyber attack. NIST provides acommon language with which to address and manage cyber risk in a cost-effective waybased on business needs, without additional regulatory requirements.

Page 7: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

What are the frameworks governing IT/security?

COSOEstablished by:• Committee of Sponsoring Organizations of the Treadway

Commission (sponsored by AAA, AICPA, FEI, IIA, IMA).Designed to: • Serve as an integrate framework on internal controls to design,

implement, and evaluate internal controls within organizations.Overview:• Designed for businesses to establish, assess, and enhance their Internal controls. • Consist of five major areas: Governance & Culture, Strategy & Objective-Setting,

Performance, Review & Revision and Information, Communication, & Reporting. • Newly-issued Principle 11 offers specific guidance for assessing effectiveness of

controls over IT.

Committee of Sponsoring Organizations (COSO)

Page 8: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

What are the frameworks governing IT/security?

ISO/IECEstablished by:

• The International Organization for Standardization (ISO).and the International Electrotechnical Commission (IEC).

Designed to:

• Provide requirements for an information security management system (ISMS).

Overview:

• Specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of an organization.

• It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements are intended to be applicable to all organizations, regardless of type, size, or nature.

Page 9: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

What are the frameworks governing IT/security?

ITIL (Information Technology Infrastructure Library)Established by:• UK Government’s Central Computer and Telecommunications

Agency (CCTA).Designed to: • Serves as a detailed set of IT practices for IT service

management that focuses on aligning IT services with the needs of businesses.

Overview:• ITIL as a framework describes processes, procedures, tasks and

checklists that can be applied by any organization. Establishes a baseline for organizations to plan, implement, and measure. No current form of third party compliance assessment. Some overlap with ISO/IEC.

Page 10: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Industry-Specific Standards : PCI

PCI DSS (Payment Card Industry Data Security Standards)

• Created by PCI Security Standard Council (formed by MasterCard, American Express, Visa, JCB and Discover).

• Provides a framework for payment card data security processes: prevention, detection and reaction to security incidents.

Page 11: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Industry-Specific Standards : PCI

PCI DSS (Payment Card Industry Data Security Standards)

• Failure to comply = Processing charges.

• Basic objectives: Build and maintain a secure network and systems; Protect cardholder data; Maintain a vulnerability management program; Implement strong access control measures; Regularly monitor and test networks; and Maintain an IS policy.

Page 12: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Industry-Specific Standards: HIPAA

HIPAA (Health Insurance Portability and Accountability Act)

• Created in 1996 to improve efficiency and effectiveness in the American health care system.

• Who does it affect: Users of health care/health insurance, health insurers, doctors, hospitals, life insurers, public health authorities, billing agencies, information system vendors, and health service organizations.

Page 13: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Industry-Specific Standards : HIPAA

HIPAA (Health Insurance Portability and Accountability Act)• Five main titles:

• Title I, “Health care access, portability and renewability”• Title II, “Preventing health care fraud and abuse; administrative simplification;

medical liability reform”• Title II, “Administrative simplification” (subtitle F)• Title III, “Tax-related health provisions”• Title IV, “Application and enforcement of group health plan requirements”• Title V, “Revenue offsets”

Page 14: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Industry-Specific Standards : GDPR

European GDPR

• The European Parliament adopted GDPR in April 2016, replacing an outdated data protection directive from 1995.

• Relies on interpretation and not on specific standards and a “reasonable” protection of data.

Page 15: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Industry-Specific Standards : GDPR

European GDPR

• Places equal liability on data controllers (data owners) and data processers (3rd party data management).

• 3rd party processor not in compliance means you are not in compliance.

Page 16: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

External Assurance Options

Risk Consulting• Internal Controls Consulting

− Tests of design/effectiveness, gap analysis, implementation

• Regulatory Compliance− PCI DSS, HIPAA, GDPR, ISO/IEC

• Risk Assessments − Vulnerability assessments, risk modeling/ranking

• Internal Audit/IT Audit Training

Page 17: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

External Assurance Options

Third-Party Assurance

SOC 1 (Readiness/Type I/Type II)• Report on Controls Relevant to User Entities’ Internal Control

over Financial Reporting

SOC 2 (Readiness/Type I/Type II)• Report on Controls at a Service Organization Relevant to

Security, Availability, Processing Integrity, Confidentiality or Privacy

Page 18: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

External Assurance Options

Third-Party Assurance, continued

SOC 3 (Trust Services Criteria for General Use)

SOC for Cybersecurity (Readiness)• Report on Controls at a Service Organization Relevant to Security,

Confidentiality & Availability, as well as a Cybersecurity Risk Management Program

SOC for Vendor Supply Chain (Readiness)

Page 19: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

System & Organization Controls (SOC)

Page 20: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Overall Subject Matter

• Controls at a service organization relevant to user entities internal control overfinancial reporting.

• Auditors of the user entity’s financial statements, management of the user entities,management of the service organization.

Type 1 Report - report on the fairness of the presentation of management’s description of theservice organization’s system and the suitability of the design of the controls to achieve the relatedcontrol objectives included in the description as of a specified date.

Type 2 Report - report on the fairness of the presentation of management’s description of theservice organization’s system and the suitability of the design and operating effectiveness of thecontrols to achieve the related control objectives included in the description throughout a specifiedperiod.

SOC 1 (Internal Control over Financial Reporting)

Page 21: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Overall Subject Matter

• Controls at a service organization relevant to security, availability, processingintegrity, confidentiality or privacy.

Intended Users of the Report

• Parties knowledgeable about: nature of services provided, how serviceorganization’s systems interact with user entities, subservice organizations andother parties, management.

Type 1 Report - report on the fairness of the presentation of management’s description of theservice organization’s system and the suitability of the design of the controls to achieve the relatedcontrol objectives included in the description as of a specified date.

Type 2 Report - report on the fairness of the presentation of management’s description of theservice organization’s system and the suitability of the design and operating effectiveness of thecontrols to achieve the related control objectives included in the description throughout a specifiedperiod.

SOC 2 (Trust Services Criteria)

Page 22: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Overall Subject Matter

• Controls at a service organization relevant to security, availability, processing integrity, confidentiality or privacy

Intended Users of the Report

• Anyone (Marketing / Limited Information provided)

No Type 1/Type 2 report; is intended for general use

SOC 3 (Trust Services Criteria for General Use)

Page 23: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

SOC for Cybersecurity

Report Purpose

Intended Users

Professional Standards

Responsible Party

Distribution

Subject Matter

Engagement Criteria

Page 24: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

SOC for Vendor Supply Chain (Upcoming)

Overall Subject Matter

• Controls at a service organization relevant to the organization’s production, manufacturing or distribution system(s).

Intended Users of the Report

• Business customers, business partners, non-regulatory standard-setting bodies, prospective customers or business partners.

No Type 1/Type 2 report; is intended for general use.

Page 25: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

SOC Report Components

SOC 1 SOC 2 SOC 3 SOC for Cyber SOC for Vendor

• System Description• Management

Assertion• Auditor’s report

with opinion on the design and effectiveness (type 2) of controls

• In a type 2, description of tests of controls and results

• System Description• Management

Assertion• Auditor’s report

with opinion on the design and effectiveness (type 2) of controls

• In a type 2, description of tests of controls and results

• Auditor’s report on if the entity maintained effective controls over its system as it relates to security, availability, confidentiality or privacy

• System Description• Management

Assertion• Auditor’s report

with opinion on the design and effectiveness of controls

• System Description• Management

Assertion• Auditor’s report

with opinion on the design and effectiveness of controls

Page 26: Which External Assurance Options and Control Frameworks ...€¦ · • A structure for organizations to implement in which business processes play a key role in the company model

Questions?

Andrew DemskiTechnology Director

Cincinnati, OH

Alex GetzConsultant

Cincinnati, OH