IT audit of information security


The information security IT audit enables any organization to receive better protection of its key assets based on the gaps and vulnerabilities discovered in the systems used. The competent analysis of the discrepancies with generally accepted guidelines and best practices in the field of information security found during the audit provides a foundation on which organizations can set foot to take further corrective and preventive actions.

The information security audit gives an objective assessment of the extent to which the efforts of the organization and its controls are effective against existing and emerging threats. The audit should confirm that the main risks to the organization are identified, monitored and controlled, and that managers and employees have the ability to recognize and respond to new threats and risks.

The goal of an independent audit is to show to what the extent the strategic and operational solutions and mechanisms for data protection accepted by the organization meet the objectives set by the management. The well performed information security audit helps to add value and increase confidence in the organization while at the same time ensures the meeting of the requirements of regulatory bodies and information security standards.

The information security analysis considers the physical and logical asset and data protection, the administration and access levels, the policies on information security, and the ensuring of continuity of operations and planning the activities in case of emergencies, disasters and accidents. The information security audit assesses the current state of the organization’s data protection at the time of its performance. The methodology is based on a risk-based approach and complies with the requirements of ISACA. The good practices for information security standards ISO 27001/2/5, PCI DSS, COBIT, NIST, OWASP, etc. are used as a basis for the evaluation.

Conduction phases


Phase I – Planning

  • Preparation of initial audit plan, determination of staff and allocation of roles and responsibilities
  • Preliminary meeting – introducing the organization to the baseline plan and the audit team. Learning about the main strategies and goals for information security adopted by the organization
  • Identification and assessment of the risk associated with the main activities and assets of the organization based on which the audit will be planned and conducted
  • Review and correction, if necessary, of the audit plan as a result of the performed risk analysis

Phase II – Implementation

  • Assessment of the effectiveness of controls implemented by the organization to achieve information security
  • Assessment of communication and network security
  • Security assessment of the basic and web-based applications used by the organization
  • Database security assessment
  • Security assessment of the main server complexes and the services they provide
  • Analysis of the endpoints and individual workstations security mechanisms used
  • Scanning for vulnerabilities and potential threats to the information security of systems and applications available over the internet

Phase III – Reporting
Preparation and submission of complete and final report covering all findings made during the audit and including possible measures for improvement.


The information security IT audit ends with the preparation and submission of a comprehensive report containing all findings made during the audit and possible measures for improvement. The final report includes a detailed description of the conclusions after the individual security systems analyses. In addition to the report, recommendations to improve security and optimize the information environment are specified.


The benefits to the organization from fully performed information security IT audit have the following aspects:

  • The competent analysis of the current situation provides a basis on which to plan and provide better and timely active protection of key information assets
  • The audit recommendations help build a systematic approach and accurate prioritization in the design, planning and budgeting of necessary changes in the information infrastructure
  • The final report serves to draw up a concrete work program to improve information security, taking into account the discovered gaps and vulnerabilities in the used communication and information systems
  • The audit provides the prerequisites to achieve fuller compliance with best practices and regulatory requirements in the field of information security
  • The actions undertaken to remedy the audit gaps in relation to security help maintain a reliable communication with all stakeholders and improve the security of working with partners and other companies.