CSIA 413 UMGCIT Security Audit Policy & Plans Project Paper
CSIA 413 UMGCIT Security Audit Policy & Plans Project Paper
Project #3: IT Audit Policy and Plans
Company Background & Operating Environment
Red Clay Renovations is an internationally recognized, awarding winning firm that specializes in the renovation and rehabilitation of residential buildings and dwellings. The company specializes in updating homes using “smart home” and “Internet of Things” technologies while maintaining period correct architectural characteristics. I need help writing my essay – research paper refer to the company profile (for additional background information and information about the company’s operating environment.
Policy Issue & Plan of Action
The corporate board was recently briefed by the Chief Information Officer concerning the company’s IT Security Program and how this program contributes to the company’s risk management strategy. During the briefing, the CIO presented assessment reports and audit findings from IT security audits. These audits focused upon the technical infrastructure and the effectiveness and efficiency of the company’s implementation of security controls. During the discussion period, members of the corporate board asked about audits of policy compliance and assessments as to the degree that employees were (a) aware of IT security policies and (b) complying with these policies. The Chief Information Officer was tasked with providing the following items to the board before its next quarterly meeting:
Issue Specific Policy requiring an annual compliance audit for IT security policies as documented in the company’s Policy System
Audit Plan for assessing employee awareness of and compliance with IT security policies
Are employees aware of the IT security policies in the Employee Handbook?
Do employees know their responsibilities under those policies?
Audit Plan for assessing the IT security policy system
Do required policies exist?
Have they been updated within the past year?
Are the policies being reviewed and approved by the appropriate oversight authorities (managers, IT governance board, etc.)?