Skip to main content

2023 | OriginalPaper | Buchkapitel

CRAG: A Guideline to Perform a Cybersecurity Risk Audits

verfasst von : Isaac D. Sánchez-García, Tomás San Feliu Gilabert, Jose A. Calvo-Manzano

Erschienen in: Telematics and Computing

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The cybersecurity risk audit is a relatively new field. The objective of cybersecurity risk audits is to identify deficiencies or deviations in cybersecurity countermeasures. Currently, cybersecurity risk audit guidelines do not include an internal control approach that aligns with cybersecurity standards such as ISO 27001 or the NIST CSF. Internal control is essential for addressing cybersecurity risk audits. This article proposes a cybersecurity risk audit guideline called CRAG (Cybersecurity Risk Audit Guideline), created using the SADT (Structured Analysis and Design Technique) model. CRAG aims to be comprehensive in the various applications that a cybersecurity risk audit guideline can have. The CRAG guideline consists of seven steps and 28 activities, as well as the content that the resulting audit report should include. Additionally, this article provides guidelines for its proper implementation, as well as examples of its potential applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Beuren, I.M., Machado, V.N., Dall Agnol, A.J.: Relevance of internal controls for risk management: empirical evidence from the perception of its executors and reviewers in a multinational company. Corporate Governance: Int. J. Bus. Soc. 23(6), 1233–1250 (2023). https://doi.org/10.1108/CG-05-2022-0200CrossRef Beuren, I.M., Machado, V.N., Dall Agnol, A.J.: Relevance of internal controls for risk management: empirical evidence from the perception of its executors and reviewers in a multinational company. Corporate Governance: Int. J. Bus. Soc. 23(6), 1233–1250 (2023). https://​doi.​org/​10.​1108/​CG-05-2022-0200CrossRef
8.
Zurück zum Zitat Haislip, J.Z., Masli, A., Richardson, V.J., Sanchez, J.M.: Repairing organizational legitimacy following information technology (IT) material weaknesses: executive turnover, IT expertise, and IT system upgrades. J. Inf. Syst. 30(1), 41–70 (2016). https://doi.org/10.2308/isys-51294CrossRef Haislip, J.Z., Masli, A., Richardson, V.J., Sanchez, J.M.: Repairing organizational legitimacy following information technology (IT) material weaknesses: executive turnover, IT expertise, and IT system upgrades. J. Inf. Syst. 30(1), 41–70 (2016). https://​doi.​org/​10.​2308/​isys-51294CrossRef
10.
Zurück zum Zitat National Institute of Standards and Technology: NIST Cybersecurity framework. In: Proceedings of the Annual ISA Analysis Division Symposium, vol. 535, pp. 9–25 (2018) National Institute of Standards and Technology: NIST Cybersecurity framework. In: Proceedings of the Annual ISA Analysis Division Symposium, vol. 535, pp. 9–25 (2018)
12.
Zurück zum Zitat Galligan, M.E., Rau, K.: COSO in the cyber age (2015) Galligan, M.E., Rau, K.: COSO in the cyber age (2015)
14.
Zurück zum Zitat Public Company Accounting Oversight Board. Sarbanes Oxley Act. (2002) Public Company Accounting Oversight Board. Sarbanes Oxley Act. (2002)
17.
21.
Zurück zum Zitat Islamova, O.V., Zhilyaev, A.A., Bozieva, A.M.: SADT technology as a tool to improve efficiency in the use of process approach in management of engineering enterprise. In: 2016 IEEE Conference on Quality Management, Transport and Information Security, Information Technologies (IT&MQ&IS), IEEE, pp. 65–68 (2016). https://doi.org/10.1109/ITMQIS.2016.7751903 Islamova, O.V., Zhilyaev, A.A., Bozieva, A.M.: SADT technology as a tool to improve efficiency in the use of process approach in management of engineering enterprise. In: 2016 IEEE Conference on Quality Management, Transport and Information Security, Information Technologies (IT&MQ&IS), IEEE, pp. 65–68 (2016). https://​doi.​org/​10.​1109/​ITMQIS.​2016.​7751903
23.
28.
Metadaten
Titel
CRAG: A Guideline to Perform a Cybersecurity Risk Audits
verfasst von
Isaac D. Sánchez-García
Tomás San Feliu Gilabert
Jose A. Calvo-Manzano
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-45316-8_33

Premium Partner