Transcript
Transcript
SECURITY MANAGEMENT
ACCESS CONTROL
VULNERABILITY MANAGEMENT
Auditor: Thank you for taking the time to meet with me today. As part
of the ISO 27001 audit, I’d like to discuss how your organisation
handles access controls for information systems. Could you walk me
through the key controls in place?
Auditor: Excellent. And how often do you review user accounts and
access permissions to identify unauthorised or dormant access?
Auditor: That covers some key points around access controls. Let’s
move on to how you manage security configurations for servers,
workstations and other endpoints. Could you outline some of the
standards and procedures in place?
Auditor: How do you secure sensitive data at rest and in transit across
your infrastructure?
Sophia Martinez: Right after discovering the breach, our first step was
to contain the incident by revoking compromised credentials and
isolating affected systems. We’ve since expanded MFA enforcement to
all administrative accounts without exception and have increased our
investment in advanced threat detection technologies. We’ve also
initiated a company-wide review of access permissions to ensure that
the principle of least privilege is strictly applied. Importantly, we’re
doubling down on our phishing awareness training to help employees
better recognise and report suspicious activity.
Sophia Martinez: Thank you. It’s a team effort, and I’m confident we’ll
navigate through this successfully.
Auditor: Glad we’re aligned. Could you outline your strategies for
securing database credentials and controlling access?
Auditor: Could you explain your backup and recovery strategies for
databases?
DBA: Daily differential backups, weekly full backups with retention
policies. Critical databases have replicas for high availability. We
practice restores and have documented recovery plans.
Auditor: That covers some key points. I’m here to have a collaborative
discussion on how your DPO program operates. If I identify any areas
of non-conformance, I’ll discuss with you first to clarify and work out
recommendations before finalising audit findings. Does that align with
your expectations?
DPO: Absolutely, I appreciate you taking that approach! I’m sure we’ll
have an open and beneficial dialogue about our data policies and find
ways to strengthen our program. Shall we move on to retention and
disposal next?
Auditor: Yes, that would be great. How do you manage data retention
and secure destruction?
Auditor: Could you explain your data breach response plan and how it
is regularly tested?
DPO: Our incident response plan has specific steps for breaches
including notification timelines. We test annually with breach
simulation exercises across teams.
Auditor: What privacy and security training and awareness exists for
employees?
DPO: New hires are trained on data policies. Existing staff retake the
course annually. We share reminders on data handling via email,
intranet, and presentations.
Auditor: What are the processes if other teams do not cooperate with
data protection efforts?
DPO: Our data protection policies outline the requirements per role. I
conduct training on proper data handling, legal obligations, and
incident reporting. Data owners and line managers are accountable for
disseminating and enforcing within their teams.
DPO: We have joint responsibility along with legal for data protection
oversight. Our departments review policies and controls together. We
also liaise on incident response, regulator interactions, and advice to
the business regarding data practices.
Auditor: That covers some key items. How would you describe
collaboration with other internal teams like HR, IT and security groups?
Help desk: Employees submit tickets for new access which we vet and
approve based on established protocols. Proper provisioning channels
are followed per security guidance.
Auditor: Great overview so far. How does the help desk team stay
current on security policies and procedures?
Help desk: We undergo regular security training from the infosec team.
Knowledge base articles outline our protocols so new hires get up to
speed quickly.
Auditor: What role does the help desk play in security awareness and
education for end users?
Auditor: How are help desk systems and tools secured to prevent
unauthorised access?
Help desk: Access follows least privilege principles. Controls like MFA,
logging, and endpoint security help safeguard help desk infrastructure.
Auditor: Finally, does the help desk participate in any security drills or
exercises?
Auditor: That’s great. Are there any other ways you promote security
awareness among employees?
Auditor: How do you identify and classify security incidents when they
occur?
Auditor: Could you outline the steps in your incident response plan?
ISM: There can be some initial resistance to new policies but we focus
on education and bridging gaps collaboratively. Demonstrating risk
data helps gain buy-in. Persistent issues may require CISO or executive
involvement. But generally teams understand the need once
communicated.
Auditor: How are security training completion rates tracked across the
organisation?
Interviewer: Given your role, how did you experience the recent data
breach? What were your initial thoughts when it was discovered?
Raj Patel: When the breach was first discovered, it was a wake-up call
for all of us. The initial alert came from our automated monitoring
systems, which flagged unusual database activity. My first thought was
to identify the scope of the breach and work with the Security
Operations Center to isolate the affected systems. It was clear early on
that a compromised credential was involved, and our priority was to
cut off the attacker’s access as quickly as possible.
Interviewer: Since the breach, what steps have you taken to improve
CloudCore’s IT security measures?
Raj Patel: One of the biggest challenges is keeping pace with the
evolving threat landscape. Cyber threats are becoming more
sophisticated, and attackers are always looking for new ways to exploit
vulnerabilities. Another challenge is balancing security with operational
efficiency. For example, while tightening access controls is crucial, it
can also slow down workflows if not managed properly. We need to
find the right balance between robust security measures and
maintaining a seamless user experience.
Interviewer: Thanks for your time, Raj. Any final thoughts on how
CloudCore can better prepare for future challenges?
Raj Patel: You’re welcome. It’s all about teamwork and staying ahead
of the curve.
Transcript of interview with Legal
COMPLIANCE
DATA PROTECTION
RISK MANAGEMENT
Auditor: I’d like to discuss how legal considerations relate to
information security. How are security requirements incorporated into
client & vendor contracts?
Auditor: Good to hear. And what review process exists for new
technologies or partnerships with security impacts?
Manager: We complete due diligence and risk assessments on vendors.
Contracts go through an approval workflow including security and
compliance teams to ensure appropriate clauses are present.
Auditor: That covers some key points. Lastly, how would you describe
collaboration between legal and infosec teams?
Auditor: What role does legal play in security risk assessments and
vulnerability disclosure?
Auditor: What security expertise and background exists within the legal
team?
on known bad signatures. We also capture netflow data and use a SIEM
for Network Engineer: Intrusion detection sensors analyse traffic
patterns and alert visibility. Access to monitoring tools is tightly
controlled.
Auditor: Excellent. And could you outline some of your network access
and authentication controls?
Auditor: Could you outline your remote access capabilities and security
controls?
Auditor: Finally, could you speak about the redundancy built into the
network in case of device failure?
Auditor: How are network access issues escalated and resolved with
security teams?
Auditor: Great to hear. I’m here to understand how your systems are
secured in an open discussion. If any gaps arise, I’ll work with you on
practical recommendations. Does that sound agreeable?
Auditor: Glad we’re on the same page. Could you tell me about how
you perform patch management and keep systems up-to-date?
Auditor: What tools and capabilities do you utilise for monitoring and
logging system activity?
Auditor: Could you outline the key controls you have in place to secure
privileged access to systems?
Employee: Yes absolutely. The open door policy with leadership makes
it comfortable to voice concerns. I know reporting mechanisms exist
anonymously also without fear of retaliation.
Auditor: That’s good collaboration. Lastly, are there any gaps you
perceive in security practices either at an organisational or individual
level?
Auditor: What tools or systems do you use daily that are critical for
your productivity?
Employee: The VPN can be slow during peak usage times, likely due to
the MFA requirements. Other than minor annoyances like that, no
major issues come to mind.
Auditor: Are there any areas of the business more reluctant to adopt
security best practices in your experience?
Auditor: That covers the key points. To summarise - you have the
appropriate internal security posture, align to our policies
contractually, and maintain open communication channels for risk
management. Is that correct?
Vendor: Yes, that accurately represents our security relationship. We
take our clients’ requirements very seriously and aim to enable their
programs through our information security capabilities and practices.