IT Examiner School, Seaside, CA

Technology Overview

• Risk assessments for networks should be performed annually • Network topologies should be updated regularly • Appropriate monitoring deployed • Vulnerability Assessments and Penetration Tests should be performed annually • Applications and systems should be patched regularly

5

Audit

• Performed by independent personnel • Conducted by knowledgeable individuals • Based on risk assessment/complexity • Findings/recommendations are documented • Results are reported to the Board/Committee • Conducted separately or all at once • IT scope & frequency based on inherent or residual risk

FFIEC specifies that high risk areas should be audited/reviewed at least annually

6

Made with FlippingBook - Online catalogs