Dynamic audit log, ISMS software to track evidence in real-time

Like Comment

IT and ISMS audits for process improvement

Auditing is a critical piece of your ISMS software solution. Once you’ve strategised your ISMS scope, your organisation relies on having a regular and efficient cadence of independent reviews to validate and optimise your processes over time. Beyond reviewing and maintaining compliance with ISO 27001, 27002, or other standards such as NIST 800-53 and more, your auditing efforts serve as a benchmark of performance as your programme grows and matures. In the continually changing digital risk landscape, threats, and vulnerabilities continue to evolve.

While having an auditor independent of the day-to-day actives is essential for an objective review, it can lead to a time-consuming investigation to gather evidence ranging from documentation to tracking down the appropriate stakeholders for interviews. Having a GRC platform, or specifically, an ISMS software tool can help to improve your efforts across the board. The important element here is the ability to track and log activity in real-time. With detailed activity logs to start from, the auditor has a clear scope to guide their project and efforts.

Integrated ISMS software solutions

The key here is having a connected auditing solution. The integrated piece is a two-part factor. First, it’s beneficial to have an auditing solution that can seamlessly share data with your core GRC software solutions, including IT and vendor risk management, as well as your policy management solution. Leveraging a shared network of control records across these solutions is a significant advantage in fast-tracking the launch of any investigation. Several other GRC products can add to this core mix of integrated ISMS software, most notably incident management records.

There is a wealth of other information that your overall GRC platform can connect to such as, User IDs, date and time records, access or denial of access records, configuration changes, exceptions, security-related events, and more. Risk management professionals within the application will record many of these instances, but other details are initially captured by monitoring tools or directly by first line applications. Having an integrated network between your first-line application, extended security network, and GRC solution can play a huge advantage in your ability to successfully capture the necessary and many times tedious data points across sources to execute an IT audit.

Key considerations for activity logs

Having a dynamic audit log is essential to any InfoSec or ISMS investigation. Once you identify a vulnerability, you can then review key pieces of data, including who the related stakeholders, associated control records as well as their documented effectiveness score. From there, you can expand testing to evaluate the design of the control model to ensure the organisation is evaluating the practice adequately. The trail of real-time exchanges, and activity centrally logged back to your GRC solution or ISMS software solution can help guide additional inquiries and provide valuable auditing outcomes, including:

  • Evidence – Access test records for both control design and effectiveness, use as evidence to support audit findings, and the recommendations that your initial auditing reports suggest for leadership to consider. They can also serve as evidence in escalated circumstances, such as in the case of a data breach or other related lawsuit.
  • Threat identification – Audit logs can provide an overwhelming amount of data, but using continuous or real-time monitoring applications systems can recognise inconsistent behaviour that could lead to the exploitation of vulnerabilities and realisation of risk.
  • Maintain compliance – Audit logs help you maintain traditional compliance initiatives such as SOC reporting. Audit logs also serve to support your corporate compliance initiatives and can be documentation to support your security claims in instances where your organisation is the vendor evaluated.
  • Debugging and process improvement – Activity logs and general evidence collection can also help in the event of general security issues, providing a clear record of what may have led to an unintentional event.

One of the challenges noted by the National Institute of Standards and Technology (NIST) is having too many competing sources, with variations in truth such as timestamps or general formatting. Having an integrated ISMS software system rather than siloed applications can help to alleviate these inconsistencies by automating the validation data across sources and minimising the potential for human error in everyday data collection.

OneTrust GRC provides an integrated suite of GRC products to support ISMS compliance. The OneTrust GRC Audit Management solution helps fast-track auditors through the planning and scoping of a project and offers structured workpapers to guide the actual execution of an investigation. To learn more about OneTrust GRC Audit Management, click here to visit our product page.


OneTrust GRC

Sponsor, OneTrust

OneTrust GRC enables risk, compliance and audit professionals to identify, measure, and remediate risk across their business to comply with internal rules and external regulations. With OneTrust GRC, companies can seamlessly integrate risk management into their day to day activities. OneTrust GRC is a part of OneTrust, the #1 most widely used privacy, security and third-party risk platform trusted by more than 4,000 customers and powered by 60 awarded patents. OneTrust GRC seamlessly integrates with the entire OneTrust platform, including, OneTrust Privacy, OneTrust Vendorpedia™, OneTrust DataGuidance™, and OneTrust PreferenceChoice™.

To learn more, visit OneTrust.com or connect on LinkedIn.

11 Contributions
45 Following