Risk Assessments are a lot like physicals. Though you don’t necessarily look forward to either, you know you need both. And when you get a clean bill of health or receive feedback on improvements you can make for a healthier body or system, you’re glad you did it.
At LBMC Information Security, our job is to take our clients painlessly through the audit process. It’s our job to ensure your data and your network are both safe and secure. With the development of our new risk assessment platform, BALLAST, we can not only deliver a thorough and easy-to-read risk assessment, but we can now also make the remediation process simple and efficient.
Before we talk about how BALLAST can change the way you look at risk assessments, let’s talk about:
- Why risk assessments are important to auditors
- Why the traditional risk assessment process can be difficult
Why Risk Assessments Are Important to Auditors
Beyond demonstrating that an organization is paying attention to security, requests for artifacts around the risk assessment process find their way into audit programs because auditors love to build on tried and true standards.
Here are a few of the standards and regulations that mandate risk analysis in the IT security realm.
- SOC Principles CC3 (and new SSAE 18 standards)
- ISO 27001:2013 8.2 & 8.3
- COBIT EDM03 & APO12
- COSO Risk Assessment Domain
- FISMA (NIST 800-53 R4) RA (entire domain)
- NIST Cybersecurity Framework ID.GV, ID.RA1-6, ID.RM 1-3
- PCI DSS 10.6.2 & 12.2
- HIPAA Security Rule Risk Management Process
This list is by no means exhaustive. Just about every significant framework or regulatory mandate around information security includes a requirement for risk assessment (or risk analysis) as part of a broader risk management program. So, there you have it. That’s how it made its way into their audit program.
What Makes the Risk Assessment Audit Process So Difficult?
Despite the fact that risk assessments are mandated by security standards—and we intuitively know that we need them—it can still be difficult to produce the artifacts auditors want.
Here are a few reasons why:
- Reliance on manual processes (spreadsheets and interviews)
- It’s difficult to easily engage all the stakeholders who need to participate.
- They don’t generate actionable data.
- They take too much time away from our other tasks.
- Typically, nothing happens after the assessment.
All of these issues together make the IT audit process a lot more arduous than it should be for you and the auditor who will have to write up an exception this year related to risk assessment documentation.
Eliminate the Guesswork (and Annoying Work) with BALLAST
At LBMC Information Security, we’ve had years of experience working alongside IT professionals through the risk assessment and audit process. We’ve seen the challenges first hand. Seeing all the work IT pros had to do in order to pull together risk management artifacts is one of the primary reasons we created BALLAST.
With BALLAST, we wanted to make the IT audit process more enjoyable by helping you:
- Provide IT auditors with the exact information they need based on your business and industry.
- Avoid expensive security technologies that really don’t address actual risks.
- Justify additional resources (human and technical) to mitigate actual areas of weakness.
- Ensure great program visibility to executive stakeholders.
- Enhance the security of your organization.
- Achieve compliance with important standards, and, in some industries, regulatory mandates.
In the end, we wanted to use our experience to develop an easy way to eliminate the guesswork…and annoying work…of IT audits.