Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Audits in Cybersecurity

Audits in Cybersecurity
View Sample PDF
Author(s): Regner Sabillon (Universitat Oberta de Catalunya, Spain)
Copyright: 2022
Pages: 18
Source title: Research Anthology on Business Aspects of Cybersecurity
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-6684-3698-1.ch001


View Audits in Cybersecurity on the publisher's website for pricing and purchasing information.


The objective of this chapter is to provision a comprehensive literature review of the most relevant approaches for conducting cybersecurity audits. The study includes auditing perspectives for specific scopes and the best practices that many leading organizations are providing for security and auditing professionals to follow. The chapter reviews relevant features for auditing approaches in the following order: ISO/IEC 27001:2013, ISO/IEC 27002:2013, Control Objectives for Information and Related Technology (COBIT) 2019, Information Technology Infrastructure Library (ITIL) 4, AICPA, ISACA, NIST SP 800-53, NIST CSF v1.1, IIA, PCI DSS, ITAF, COSO, ENISA, NERC CIP, and CSAM.

Related Content

Regner Sabillon. © 2022. 18 pages.
Jeffrey S. Zanzig, Guillermo A. Francia III. © 2022. 20 pages.
Gregory B. White, Natalie Sjelin. © 2022. 17 pages.
Baris Cimen, Meltem Mutluturk, Esra Kocak, Bilgin Metin. © 2022. 21 pages.
Regner Sabillon. © 2022. 63 pages.
Gregory B. White, Natalie Sjelin. © 2022. 16 pages.
Aristides Dasso, Ana Funes. © 2022. 17 pages.
Body Bottom