IT security questionnaire
Assign topic to the user
“….as part of the risk assessment the IT Security Questionnaire is completed by third parties providing details around their information security management system and control environment.”
As a growing publicly listed firm, my IT team get a lot of new software requests from our staff. Due to the maturity of some of the Fintechs that I’m asked to review I can tell that IT security framework is not that great. Hence the need for a questionnaire.
Answer: Included in the toolkit you bough there is an Internal Audit Checklist template that you can use to evaluate IT aspects of information security management.
Sections covering the controls from Annex A, specially sections A.6.2, A.9, A.10., A.12, A.13, A.14 and A.15 can help you evaluate not only your own infrastructure but also from third parties.
This template is locate on folder 10 Procedure for Internal Audit.
Comment as guest or Sign in
Jul 05, 2018