History of the internal audit function and cybersecurity
Given the increasing reliance on technology and the rise of cyberthreats, the internal audit function, originally rooted in financial auditing, has evolved to encompass the evaluation of cybersecurity controls. This expansion of duties has helped organizations address the growing risks associated with data breaches, cyberattacks, and the protection of sensitive information.
In the early 2000s, several high-profile corporate scandals, including Enron and WorldCom, shook investor confidence. In response, the U.S. Congress enacted the Sarbanes-Oxley Act (SOX) in 2002 to enhance corporate governance, financial reporting, and accountability. SOX also introduced requirements for internal controls, including those related to IT and cybersecurity, and created a need for cybersecurity auditors.
The role of a cybersecurity auditor involves evaluating these internal controls and the organization’s cybersecurity policies and procedures. Cybersecurity auditors assess the organization’s ability to protect sensitive data, detect and respond to cyberthreats, and comply with relevant regulations. To do so, these auditors conduct assessments, review documentation, perform technical tests, and provide recommendations to enhance the organization's cybersecurity posture. An example of a technical assessment that cybersecurity auditors perform is a pen test.
Pen testing, red teaming, and control effectiveness testing
To understand why pen testing teams should fall under the internal audit umbrella, it is helpful to understand what a pen test is and how it provides value. A pen test simulates real-world attacks, and it tests the effectiveness of an organization’s defenses, incident response capabilities, and resilience against sophisticated adversaries – played by the pen testing team.
Pen testing teams are sometimes referred to as red teams. Pen testing teams and red teams encompass distinct meanings and roles, but the terms often are used interchangeably to describe groups of security professionals that technically test an organization’s defenses. While a red team assessment is distinct from a pen test, the term “red team” generally refers to the offensive security team at large and encompasses more than just the pen testing function. By acting as an external threat actor and identifying vulnerabilities and weaknesses in an organization’s environment, systems, networks, applications, and processes, the red team can exploit these gaps to gain unauthorized access, extract sensitive information, or disrupt critical operations, thus penetrating the organization’s defenses before a real threat actor can.
With these activities also come validating the effectiveness of an organization’s security controls, testing the organization’s incident response capabilities in response to a simulated attack scenario, and enhancing the organization’s cyber resilience through proactive remediation and mitigation of vulnerabilities and risks.