Continuous compliance, continuous iteration: How to get through IT audits successfully
For most students, exam days are one of the most stressful experiences of their educational careers. Exams are a semi-public declaration of your ability to learn, absorb and regurgitate the curriculum, and while the rewards for passing are rather mundane, the ramifications of failure are tremendous.
My educational experience indicates that exam success is primarily due to preparation, with a fair bit of luck. If you were like me in school, exam preparation consisted mostly of cramming, with a heavy reliance on hope that the hours spent jamming material into my brain would cover at least 70% of the exam contents.
After I left my education career behind me and started down a path in business technology, I was rather dismayed to find that the anxiety of testing and exams continued, but in the form of IT audits. Oddly enough, the recipe for audit success was remarkably similar: a heavy dose of preparation combined with luck.
It seems that many businesses adhere to my cram-for-the-exam IT audit approach. Despite full knowledge and disclosure of the due dates and subject material, IT audit preparation in most companies I’ve encountered largely consists of ignoring it until the last minute, followed by a flurry of activity, stress, anxiety and panic.
Not surprisingly, there’s a better way to do this. Both simple and complex problems can often be attacked and solved through iteration, including achieving a defined compliance level in complex IT systems. Achieving audit compliance within your IT ecosystem can be an iterative process, and it doesn’t have to be compressed into the five days before the audit is due. Following is a four-step process I use to guide clients through the process of preparing for and successfully completing IT audits.
The first step is to clearly define what we are trying to achieve. Start big-picture and then drill down into something much smaller and achievable. This will accomplish two things: 1) build some confidence that we can do this, and 2) using what we will do here, we can “drill up” and tackle a similar problem using the same pattern.
Here is a basic example of starting big-picture and drilling down to an achievable goal: we need to monitor all logs in our organisation (too large); we need to monitor authentication logs in our organisation (still too large); we need to monitor network user authentication logs in our organisation (getting closer); we need to monitor failed network user authentication logs in our organisation (bingo!).
Identify and recognise
Given that we are going to monitor failed user logons, we need a way to do this. There are manual ways to achieve it but given that we will be doing this over and over, it’s obvious that this needs to be automated. Here is where tooling comes into play. Spend some time identifying tools that can help with log aggregation and management, then find a way to automate the monitoring of failed network user authentication logs.
Notify and remediate
Now that we have an automated way to aggregate and manage failed network user authentication logs, we need to look at our (small and manageable) defined goal and perform the necessary notifications and remediations to meet the requirement. Again, this will need to be repeated over and over, so spend some time identifying automated tools that can help with this process.
Analyse and report
Now that we are meeting the notification and remediation requirements in a repeatable and automated fashion, we need to analyse and report on the effectiveness of our remedy and, based on the analysis, make necessary improvements to the process.
The iteration (repetitive process) is simple. The scope and execution of the iteration is where things tend to break down. The key to successful iterations starts with defining and setting realistic goals. When in doubt, keep the goals small. The idea here is being able to achieve the goal repeatedly and quickly, with the ability to refine the process to improve the results. No more cramming for this particular compliance requirement - we are now handling it continuously.
Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend the Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam to learn more.
- » CircleCI secures $56 million series D funding to further expand CI/CD focus
- » IT operations in 2020: Five things to prepare for – from AIOps to multi-cloud and more
- » How public cloud will become the driving force for connected cars
- » StackRox and Skybox reports warn of dire consequences if container security is not addressed
- » Cloud Security Alliance publishes ‘egregious 11’ list of top threats to the cloud