16
® ® 12 Most Common Questions in a Client Data Protection Audit

Data Protection Audit Checklist

Embed Size (px)

Citation preview

Page 1: Data Protection Audit Checklist

®

®

12 Most Common Questions in a Client Data Protection Audit

Page 2: Data Protection Audit Checklist

®

Data Protection Audit Pressure

Sophisticated cybercriminals have identified third party suppliers as a lucrative back door to steal sensitive information of major corporations.

Consequently, midsize companies face increasing pressure to button up their cybersecurity presence from their corporate clients. These clients are demanding that their suppliers or service providers meet stringent data protection audits.

Page 3: Data Protection Audit Checklist

®

Based on our experience with a wide range of customers who have been required to meet stringent partner or supplier data protection security audits, here are the 12 most common data protection audit questions.

Lessons Learned

Page 4: Data Protection Audit Checklist

®

Question 1 Where is sensitive data located?

Page 5: Data Protection Audit Checklist

®

Question 2 Who in your organization will use client data?

Page 6: Data Protection Audit Checklist

®

Question 3 What do your users do with data?

Page 7: Data Protection Audit Checklist

®

Question 4 Which applications will access and use the data?

Page 8: Data Protection Audit Checklist

®

Question 5 When is the data at risk?

Page 9: Data Protection Audit Checklist

®

Question 6What controls can you provide to mitigate risks?

Page 10: Data Protection Audit Checklist

®

Question 7Can you monitor and provide an audit trail with respect to data transmissions?

Page 11: Data Protection Audit Checklist

®

Question 8Can you control or inhibit inappropriate data use?

Page 12: Data Protection Audit Checklist

®

Question 9Can you ensure that data is only accessed on a need to know basis?

Page 13: Data Protection Audit Checklist

®

Question 10What happens if one of your systems is compromised?

Page 14: Data Protection Audit Checklist

®

Question 11Can you expose any anomalous activity on devices that contain client data?

CONFIDENTIAL

Page 15: Data Protection Audit Checklist

®

Question 12What is your process for revoking usage privileges for users who are no longer authorized to access data?

Page 16: Data Protection Audit Checklist

®

Additional Data Security Audit Prep

Want to learn more? Our Data Protection Security Audit Checklist: Explains what the client is really looking for with each

question Provides guidance on your “audit readiness”

Get the Checklist

Confidential 16