Study smarter with Fiveable
Get study guides, practice questions, and cheatsheets for all your subjects. Join 500,000+ students with a 96% pass rate.
Security audits aren't just checkbox exercises—they're the systematic process by which organizations discover what they don't know about their own defenses. When you're studying cybersecurity business concepts, you're being tested on your understanding of risk management frameworks, defense-in-depth principles, and compliance requirements. These audit procedures represent the practical application of those theoretical concepts, showing how businesses translate security policies into measurable outcomes.
The procedures covered here fall into distinct categories based on what they're designed to uncover: some identify what you have, others test whether your defenses actually work, and still others ensure you're meeting external obligations. Don't just memorize the names of these procedures—understand what type of security gap each one addresses and how they work together to create a comprehensive security posture. Exam questions often ask you to recommend the right procedure for a specific scenario, so knowing the purpose behind each one is essential.
Before you can protect assets, you need to know what you have and what threatens it. These foundational procedures establish the current state of your security environment and create the baseline against which all other audit findings are measured.
Compare: Risk Assessment vs. Asset Inventory—both are discovery procedures, but risk assessment focuses on what could go wrong while asset inventory focuses on what exists to protect. Strong FRQ answers connect these: you can't assess risk without knowing your assets first.
These procedures move beyond documentation to actively probe your defenses. They answer the critical question: do your security controls actually work? The key distinction here is between automated scanning and human-driven testing.
Compare: Vulnerability Scanning vs. Penetration Testing—scanning is automated and identifies potential weaknesses; penetration testing is manual and proves exploitability. If asked which provides stronger evidence of risk, penetration testing wins because it demonstrates actual impact.
The principle of least privilege underlies all access-related auditing. These procedures verify that people (and systems) can only access what they need—nothing more, nothing less. Excessive permissions represent one of the most common audit findings.
Compare: Access Control Review vs. Physical Security Assessment—both address unauthorized access, but one focuses on logical access (system permissions) while the other addresses physical access (facility entry). Comprehensive audits must cover both because attackers exploit whichever path is weaker.
These procedures ensure the organization meets external obligations and internal standards. They're often driven by regulatory requirements, contractual obligations, or industry frameworks rather than purely technical concerns.
Compare: Compliance Checks vs. Policy Review—compliance checks verify you're meeting external requirements; policy reviews assess whether internal documentation is current and effective. Both are governance activities, but compliance carries legal consequences while policy gaps create operational risk.
Security isn't just about prevention—it's about maintaining operations when things go wrong. These procedures test your organization's ability to detect, respond to, and recover from security incidents and disasters.
Compare: Incident Response vs. Disaster Recovery—incident response handles security events (breaches, attacks); disaster recovery addresses broader disruptions (natural disasters, infrastructure failures). Both require testing, but incident response emphasizes containment and investigation while DR focuses on restoration and continuity.
Technical controls fail when people circumvent them or when trusted partners introduce risk. These procedures address the human element of security, which remains the most unpredictable variable in any security program.
Compare: Employee Awareness vs. Vendor Review—both address human risk, but employees are inside your control boundary while vendors are outside it. You can mandate employee training; you can only contractually require vendor compliance. FRQs often explore this distinction when asking about risk management strategies.
| Concept | Best Examples |
|---|---|
| Discovery & Baseline | Risk Assessment, Asset Inventory, Log Management |
| Technical Testing | Vulnerability Scanning, Penetration Testing, Network Security Assessment |
| Access Control | Access Control Review, Physical Security Assessment |
| Compliance & Governance | Compliance Checks, Policy Review, Data Protection Audit |
| Resilience & Response | Incident Response Evaluation, Disaster Recovery Testing |
| Human Factors | Employee Awareness Evaluation, Third-Party Vendor Review |
| Automated Procedures | Vulnerability Scanning, Log Management |
| Manual/Human-Driven | Penetration Testing, Tabletop Exercises, Policy Review |
Which two procedures both involve testing security controls but differ in their use of automation versus human expertise? What are the tradeoffs between them?
If an organization discovers that former employees still have active system access, which audit procedure failed—and what principle should that procedure enforce?
Compare and contrast incident response plan evaluation with disaster recovery testing. In what scenario would you prioritize one over the other?
A company suffers a breach through a software vendor's compromised update. Which two audit procedures should have caught this risk, and why might they have missed it?
You're advising a company that has never conducted a security audit. Which three procedures would you recommend they complete first to establish a security baseline, and in what order? Justify your sequence.