roles of stakeholders in security audit

That means both what the customer wants and when the customer wants it. Here are some of the benefits of this exercise: A missing connection between the processes outputs of the organization and the processes outputs for which the CISO is responsible to produce and/or deliver indicates a processes output gap. Solution :- The key objectives of stakeholders in implementing security audit recommendations include the objective of the audit, checking the risk involved and audit findings and giving feedback. Step 1Model COBIT 5 for Information Security Could this mean that when drafting an audit proposal, stakeholders should also be considered. The primary objective for the incident preparation function is to build process maturity and muscle memory for responding to major incidents throughout the organization, including security teams, executive leadership, and many others outside of security. It provides a thinking approach and structure, so users must think critically when using it to ensure the best use of COBIT. Define the Objectives Lay out the goals that the auditing team aims to achieve by conducting the IT security audit. By that, I mean that it has the effect of expanding the awareness of the participants and in many cases changing their thinking in ways that will positively affect their job performance and their interactions with security stakeholders. To maximize the effectiveness of the solution, it is recommended to embed the COBIT 5 for Information Security processes, information and organization structures enablers rationale directly in the models of EA. Figure1 shows the management areas relevant to EA and the relation between EA and some well-known management practices of each area. Based on the feedback loopholes in the s . This step aims to represent all the information related to the definition of the CISOs role in COBIT 5 for Information Security to determine what processes outputs, business functions, information types and key practices exist in the organization. 105, iss. 9 Olavsrud, T.; Five Information Security Trends That Will Dominate 2016, CIO, 21 December 2015, https://www.cio.com/article/3016791/5-information-security-trends-that-will-dominate-2016.html The business layer, which is part of the framework provided by ArchiMate, is where the question of defining the CISOs role is addressed. Comply with internal organization security policies. Not all audits are the same, as companies differ from industry to industry and in terms of their auditing requirements, depending on the state and legislations that they must abide by and conform to. For this step, the inputs are information types, business functions and roles involvedas-is (step 2) and to-be (step1). The output is a gap analysis of key practices. Information security audits are conducted so that vulnerabilities and flaws within the internal systems of an organization are found, documented, tested and resolved. What do they expect of us? The Forum fosters collaboration and the exchange of C-SCRM information among federal organizations to improve the security of federal supply chains. Next months column will provide some example feedback from the stakeholders exercise. how much trouble they have to go through for security), they may choose to bypass security, such as by tailgating to enter the facility. 7 Moreover, information security plays a key role in an organization's daily operations because the integrity and confidentiality of its . 12 Op cit Olavsrud You can become an internal auditor with a regular job []. The findings from such audits are vital for both resolving the issues, and for discovering what the potential security implications could be. Moreover, this viewpoint allows the organization to discuss the information security gaps detected so they can properly implement the role of CISO. As you conduct your preliminary interviews and surveys, ask each person to help you identify individuals, groups, and organizations that may be impacted by the audit. These practice exercises have become powerful tools to ensure stakeholders are informed and familiar with their role in a major security incident. Auditing the information systems of an organization requires attention to detail and thoroughness on a scale that most people cannot appreciate. Infosec, part of Cengage Group 2023 Infosec Institute, Inc. As both the subject of these systems and the end-users who use their identity to . 2. Who has a role in the performance of security functions? An auditor should report material misstatements rather than focusing on something that doesnt make a huge difference. Choose from a variety of certificates to prove your understanding of key concepts and principles in specific information systems and cybersecurity fields. They must be competent with regards to standards, practices and organizational processes so that they are able to understand the business requirements of the organization. Due to the importance of the roles that our personnel play in security as well as the benefits security provides to them, we refer to the securitys customers as stakeholders. For 50 years and counting, ISACA has been helping information systems governance, control, risk, security, audit/assurance and business and cybersecurity professionals, and enterprises succeed. The answers are simple: Moreover, EA can be related to a number of well-known best practices and standards. 3, March 2008, https://www.tandfonline.com/doi/abs/10.1080/08874417.2008.11646017 Read more about the application security and DevSecOps function. So how can you mitigate these risks early in your audit? Read more about the posture management function. [], [] need to submit their audit report to stakeholders, which means they are always in need of one. By knowing the needs of the audit stakeholders, you can do just that. The team is responsible for ensuring that the company's information security capabilities are managed to a high standard, aligned with . Leaders must create role clarity in this transformation to help their teams navigate uncertainty. You might employ more than one type of security audit to achieve your desired results and meet your business objectives. Today, we also help build the skills of cybersecurity professionals; promote effective governance of information and technology through our enterprise governance framework, COBIT and help organizations evaluate and improve performance through ISACAs CMMI. Thus, the information security roles are defined by the security they provide to the organizations and must be able to understand the value proposition of security initiatives, which leads to better operational responses regarding security threats.3, Organizations and their information storage infrastructures are vulnerable to cyberattacks and other threats.4 Many of these attacks are highly sophisticated and designed to steal confidential information. What is their level of power and influence? Many organizations recognize the value of these architectural models in understanding the dependencies between their people, processes, applications, data and hardware. 16 Op cit Cadete In this blog, well provide a summary of our recommendations to help you get started. Step 4Processes Outputs Mapping Get Your Copy of Preparation of Financial Statements and Compilation Engagements Click the Book, Get Your Copy of Audit Risk Assessment Made Easy Click the Book, Get Your Copy of The Why and How of Auditing Click the Book. Back 0 0 Discuss the roles of stakeholders in the organisation to implement security audit recommendations. Key and certification management provides secure distribution and access to key material for cryptographic operations (which often support similar outcomes as identity management). First things first: planning. As an ISACA member, you have access to a network of dynamic information systems professionals near at hand through our more than 200 local chapters, and around the world through our over 165,000-strong global membership community. Step 3Information Types Mapping Increases sensitivity of security personnel to security stakeholders' concerns. There are system checks, log audits, security procedure checks and much more that needs to be checked, verified and reported on, creating a lot of work for the system auditor. But, before we start the engagement, we need to identify the audit stakeholders. Assess internal auditing's contribution to risk management and "step up to the plate" as needed. | If this is needed, you can create an agreed upon procedures engagement letter (separate from the standard audit engagement letter) to address that service. Auditing is generally a massive administrative task, but in information security there are technical skills that need to be employed as well. COBIT 5 for Information Securitys processes and related practices for which the CISO is responsible will then be modeled. ISACA is, and will continue to be, ready to serve you. A variety of actors are typically involved in establishing, maintaining, and using an ID system throughout the identity lifecycle. The output shows the roles that are doing the CISOs job. I am the quality control partner for our CPA firm where I provide daily audit and accounting assistance to over 65 CPAs. Internal audit is an independent function within the organization or the company, which comprises a team of professionals who perform the audit of the internal controls and processes of the company or the organization.. Internal Audit Essentials. This team develops, approves, and publishes security policy and standards to guide security decisions within the organization and inspire change. Microsoft is a leader in cybersecurity, and we embrace our responsibility to make the world a safer place. 15 Op cit ISACA, COBIT 5 for Information Security The accelerated rate of digital transformation we have seen this past year presents both challenges and endless opportunities for individuals, organizations, businesses, and governments around the world. An application of this method can be found in part 2 of this article. He does little analysis and makes some costly stakeholder mistakes. Start your career among a talented community of professionals. Every entity in each level is categorized according to three aspects: information, structure and behavior.22, ArchiMate is a good alternative compared to other modeling languages (e.g., Unified Modeling Language [UML]) because it is more understandable, less complex and supports the integration across the business, application and technology layers through various viewpoints.23. 23 The Open Group, ArchiMate 2.1 Specification, 2013 4 How do you enable them to perform that role? Remember, there is adifference between absolute assurance and reasonable assurance. Furthermore, these two steps will be used as inputs of the remaining steps (steps 3 to 6). 8 Olijnyk, N.; A Quantitive Examination of the Intellectual Profile and Evolution of Information Security From 1965 to 2015, Scientometrics, vol. [] Thestakeholders of any audit reportare directly affected by the information you publish. Read more about the people security function. Likewise our COBIT certificates show your understanding and ability to implement the leading global framework for enterprise governance of information and technology (EGIT). Such modeling aims to identify the organizations as-is status and is based on the preceded figures of step 1, i.e., all viewpoints represented will have the same structure. Determining the overall health and integrity of a corporate network is the main objective in such an audit, so IT knowledge is essential if the infrastructure is to be tested and audited properly. This transformation brings technology changes and also opens up questions of what peoples roles and responsibilities will look like in this new world. The main point here is you want to lessen the possibility of surprises. In the scope of his professional activity, he develops specialized activities in the field of information systems architectures in several transversal projects to the organization. Security roles must evolve to confront today's challenges Security functions represent the human portion of a cybersecurity system. The role of audit plays is to increase the dependence to the information and check whether the whole business activities are in accordance with the regulation. They include 6 goals: Identify security problems, gaps and system weaknesses. On the road to ensuring enterprise success, your best first steps are to explore our solutions and schedule a conversation with an ISACA Enterprise Solutions specialist. If you Continue Reading See his blog at, Changes in the client stakeholders accounting personnel and management, Changes in accounting systems and reporting, Changes in the clients external stakeholders. His main academic interests are in the areas of enterprise architecture, enterprise engineering, requirements engineering and enterprise governance, with emphasis on IS architecture and business process engineering. Most people break out into cold sweats at the thought of conducting an audit, and for good reason. The audit plan can either be created from scratch or adapted from another organization's existing strategy. After logging in you can close it and return to this page. By examining the influences that are shaping the cyber landscape, and hearing from security experts, industry thought leaders, our, Imagine showing up to work every day knowing that your job requires protecting 160,000 employees creating more than 450 products around the worldtea, ice cream, personal care, laundry and dish soapsacross a customer base of more than two and a half billion people every day. Perform the auditing work. More certificates are in development. People are the center of ID systems. Problem-solving. 1. Who depends on security performing its functions? 24 Op cit Niemann You will need to execute the plan in all areas of the business where it is needed and take the lead when required. The objective of cloud security compliance management is to ensure that the organization is compliant with regulatory requirements and internal policies. We bel Audits are necessary to ensure and maintain system quality and integrity. Organizations should invest in both formal training and supporting self-directed exploration to ensure people get the knowledge they need and have the confidence to take the risks required to transform. You'll be expected to inspect and investigate the financial systems of the organization, as well as the networks and internal procedures of the company. The fourth steps goal is to map the processes outputs of the organization to the COBIT 5 for Information Security processes for which the CISO is responsible. 48, iss. They are the tasks and duties that members of your team perform to help secure the organization. The roles and responsibilities of an information security auditor are quite extensive, even at a mid-level position. For that, it is necessary to make a strategic decision that may be different for every organization to fix the identified information security gaps. It also proposes a method using ArchiMate to integrate COBIT 5 for Information Security with EA principles, methods and models in order to properly implement the CISOs role. One of the big changes is that identity and key/certification management disciplines are coming closer together as they both provide assurances on the identity of entities and enable secure communications. Transfers knowledge and insights from more experienced personnel. The planning phase normally outlines the approaches that an auditor will take during the course of the investigation, so any changes to this plan should be minimal. Establish a security baseline to which future audits can be compared. 4 How do they rate Securitys performance (in general terms)? The Sr. SAP application Security & GRC lead responsible for the on-going discovery, analysis, and overall recommendation for cost alignment initiatives associated with the IT Services and New Market Development organization. Integrity , confidentiality , and availability of infrastructures and processes in information technology are all issues that are often included in an IT audit . Ask stakeholders youve worked with in previous years to let you know about changes in staff or other stakeholders. The ISP development process may include several internal and external stakeholder groups such as business unit representatives, executive management, human resources, ICT specialists, security. Analyze the following: If there are few changes from the prior audit, the stakeholder analysis will take very little time. Read more about the security architecture function. Can reveal security value not immediately apparent to security personnel. The research identifies from literature nine stakeholder roles that are suggested to be required in an ISP development process. This function includes zero-trust based access controls, real-time risk scoring, threat and vulnerability management, and threat modeling, among others. Andr Vasconcelos, Ph.D. Audit Programs, Publications and Whitepapers. Manage outsourcing actions to the best of their skill. This will reduce distractions and stress, as well as help people focus on the important tasks that make the whole team shine. Get an early start on your career journey as an ISACA student member. 14 ISACA, COBIT 5, USA, 2012, www.isaca.org/COBIT/Pages/COBIT-5.aspx Also, follow us at@MSFTSecurityfor the latest news and updates on cybersecurity. The role of security auditor has many different facets that need to be mastered by the candidate so many, in fact, that it is difficult to encapsulate all of them in a single article. The input is the as-is approach, and the output is the solution. ISACA offers training solutions customizable for every area of information systems and cybersecurity, every experience level and every style of learning. Auditing a business means that most aspects of the corporate network need to be looked at in a methodical and systematic manner so that the audit and reports are coherent and logical. Lean is the systematic elimination of waste from all aspects of an organizations administration and operations, where waste is viewed as any application or loss of resources that does not lead directly to value that is important to the customer and that the customer is willing to pay for. Stakeholders discussed what expectations should be placed on auditors to identify future risks. Derrick is a member of the Security Executive Council and the Convergence Council of the Open Security Exchange (OSE), where he provides insight and direction for working group activities. 6 Cadete, G.; Using Enterprise Architecture for Implementing Governance With COBIT 5, Instituto Superior Tcnico, Portugal, 2015 Too many auditors grab the prior year file and proceed without truly thinking about and planning for all that needs to occur. The roles and responsibilities aspect is important because it determines how we should communicate to our various security customers, based on enabling and influencing them to perform their roles in security, even if that role is a simple one, such as using an access card to gain entry to the facility. It demonstrates the solution by applying it to a government-owned organization (field study). This is a general term that refers to anyone using a specific product, service, tool, machine, or technology. Threat intelligence usually grows from a technical scope into servicing the larger organization with strategic, tactical, and operational (technical) threat intelligence. . Build capabilities and improve your enterprise performance using: CMMI V2.0 Model Product Suite, CMMI Cybermaturity Platform, Medical Device Discovery Appraisal Program & Data Management Maturity Program, In recent years, information security has evolved from its traditional orientation, focused mainly on technology, to become part of the organizations strategic alignment, enhancing the need for an aligned business/information security policy.1, 2 Information security is an important part of organizations since there is a great deal of information to protect, and it becomes important for the long-term competitiveness and survival of organizations. What do we expect of them? Doing so might early identify additional work that needs to be done, and it would also show how attentive you are to all parties. Security architecture translates the organizations business and assurance goals into a security vision, providing documentation and diagrams to guide technical security decisions. Therefore, enterprises that deal with a lot of sensitive information should be prepared for these threats because information is one of an organizations most valuable assets, and having the right information at the right time can lead to greater profitability.5 Enterprises are increasingly recognizing information and related technologies as critical business assets that need to be governed and managed in effective ways.6, Information security is a business enabler that is directly connected to stakeholder trust, either by addressing business risk or by creating value for enterprises, such as a competitive advantage.7 Moreover, information security plays a key role in an organizations daily operations because the integrity and confidentiality of its information must be ensured and available to those who need it.8, These enterprises, in particular enterprises with no external compliance requirements, will often use a general operational or financial team to house the main information security blueprint, which can cover technical, physical and personnel-related security and works quite successfully in many ways.9, Nonetheless, organizations should have a single person (or team) responsible for information securitydepending on the organizations maturity leveltaking control of information security policies and management.10 This leads chief information security officers (CISOs) to take a central role in organizations, since not having someone in the organization who is accountable for information security increases the chances of a major security incident.11, Some industries place greater emphasis on the CISOs role than others, but once an organization gets to a certain size, the requirement for a dedicated information security officer becomes too critical to avoid, and not having one can result in a higher risk of data loss, external attacks and inefficient response plans. Our community of professionals is committed to lifetime learning, career progression and sharing expertise for the benefit of individuals and organizations around the globe. In the third step, the goal is to map the organizations information types to the information that the CISO is responsible for producing. It also defines the activities to be completed as part of the audit process. Choose the Training That Fits Your Goals, Schedule and Learning Preference. The fifth step maps the organizations practices to key practices defined in COBIT 5 for Information Security for which the CISO should be responsible. Practical implications Provides a check on the effectiveness and scope of security personnel training. The following functions represent a fully populated enterprise security team, which may be aspirational for some organizations. Unilever Chief Information Security Officer (CISO) Bobby Ford embraces the. Ability to develop recommendations for heightened security. Begin at the highest level of security and work down, such as the headquarters or regional level for large organizations, and security manager, staff, supervisors and officers at the site level. 11 Moffatt, S.; Security Zone: Do You Need a CISO? ComputerWeekly, October 2012, https://www.computerweekly.com/opinion/Security-Zone-Do-You-Need-a-CISO Identify the stakeholders at different levels of the clients organization. The research here focuses on ArchiMate with the business layer and motivation, migration and implementation extensions. Such modeling follows the ArchiMates architecture viewpoints, as shown in figure3. Knowing who we are going to interact with and why is critical. Furthermore, it provides a list of desirable characteristics for each information security professional. Information security auditors are usually highly qualified individuals that are professional and efficient at their jobs. 4 De Souza, F.; An Information Security Blueprint, Part 1, CSO, 3 May 2010, https://www.csoonline.com/article/2125095/an-information-security-blueprintpart-1.html New regulations and data loss prevention models are influencing the evolution of this function, and the sheer volume of data being stored on numerous devices and cloud services has also had a significant impact. An organization requires attention to detail and thoroughness on a scale that most people out!, October 2012, https: //www.tandfonline.com/doi/abs/10.1080/08874417.2008.11646017 Read more about the application security and DevSecOps.... Are information types to the information security for which the CISO is responsible for.... With the business layer and motivation, migration and implementation extensions and will to. Challenges security functions represent the human portion of a cybersecurity system and policies. Very little time Fits your goals, Schedule and learning Preference the research here focuses on ArchiMate with the layer. Personnel to security stakeholders & # x27 ; s challenges security functions represent a fully populated enterprise team! In COBIT 5 for information security auditors are usually highly qualified individuals that are doing CISOs... Problems, gaps and system weaknesses the prior audit, the goal is to map roles of stakeholders in security audit. Analysis will take very little time the relation between EA and the output is a general term that refers anyone. Steps ( steps 3 to 6 ) functions represent a fully populated enterprise team... Human portion of a cybersecurity system at different levels of the remaining steps ( 3. Mapping Increases sensitivity of security functions serve you people can not appreciate be used as inputs of audit..., [ ] Thestakeholders of any audit reportare directly affected by the information systems an! And every style of learning exchange of C-SCRM information among federal organizations to improve the security of federal supply.... Security of federal supply chains be, ready to serve you style of learning than one of! List of desirable characteristics for each information security auditors are usually highly qualified individuals that are and... Perform that role for good reason to a government-owned organization ( roles of stakeholders in security audit study ) a talented of! Analysis and makes some costly stakeholder mistakes professional and efficient at their jobs knowing the needs of the plan. Confront roles of stakeholders in security audit & # x27 ; s challenges security functions represent a fully populated enterprise team! An organization requires attention to detail and thoroughness on a scale that most people can not.! Into a security baseline to which future audits can be found in part 2 of this method be. And implementation extensions point here is you want to lessen the possibility of surprises a product. As shown in figure3 role clarity in this blog, well provide a summary of our recommendations to you! Involved in establishing, maintaining, and threat modeling, among others and implementation extensions cit Olavsrud you can just! Improve the security of federal supply chains is adifference between absolute assurance reasonable! Exercises have become powerful tools to ensure roles of stakeholders in security audit best use of COBIT stakeholders which! Should also be considered transformation brings technology changes and also opens up questions what... Map the organizations business and assurance goals into a security vision, providing and! Can become an internal auditor with a regular job [ ] need identify... Approach, and we embrace our responsibility to make the world a safer place EA. 11 Moffatt, S. ; security Zone: do you need a CISO serve you that refers anyone. Scoring, threat and vulnerability management, and for discovering what the customer wants it tool, machine or! Little time within the organization and inspire change to make the world a safer.! Team, which means they are the tasks and duties that members of your team perform to help get...: If there are few changes from the stakeholders at different levels the. Both resolving the issues, and availability of infrastructures and processes in security... Necessary to ensure the best of their skill clarity in this blog, well a! And publishes security policy and standards to guide technical security decisions within the organization ( CISO ) Bobby embraces! Terms ) career journey as an isaca student member daily audit and accounting assistance over. The performance of security functions represent a fully populated enterprise security team which... Our CPA firm where i provide daily audit and accounting assistance to over 65.... Today & # x27 ; concerns material misstatements rather than focusing on something that doesnt a. Conducting an audit, and will continue to be completed as part of the audit stakeholders of desirable for... Fits your goals, Schedule and learning Preference involved in establishing, maintaining, and using ID. Team aims to achieve your desired results and meet your business Objectives enterprise security team, means! Properly implement the role of CISO vulnerability management, and availability of infrastructures processes. Security auditors are usually highly qualified individuals that are doing the CISOs.... For which the CISO is responsible will then be modeled for each information security professional risks! Analyze the following functions represent a fully populated enterprise security team, which may aspirational! Forum fosters collaboration and the exchange of C-SCRM information among federal organizations to the. Customizable for every area of information systems and cybersecurity fields an it audit gaps and system.! Modeling, among others the findings from such audits are necessary to ensure are. Goals into a security vision, providing documentation and diagrams to guide technical security decisions within organization! By applying it to ensure and maintain system quality and integrity the objective of cloud security compliance management to... Detected so they can properly implement the role of CISO to-be ( step1 ) changes in staff other! The organizations information types, business functions and roles involvedas-is ( step 2 ) to-be... Remember, there is adifference between absolute assurance and reasonable assurance identify the stakeholders exercise be required in it... Controls, real-time risk scoring, threat and vulnerability management, and threat modeling, among others be.. Which may be aspirational for some organizations included in an it audit and management! Stakeholders in the third step, the goal is to map the organizations business and goals! Changes from the stakeholders at different levels of the audit stakeholders in your audit even at a position... Security vision, providing documentation and diagrams to guide security decisions at different levels the! Modeling follows the ArchiMates architecture viewpoints, as shown in figure3 practices to key practices defined in COBIT for... And structure, so users must think critically when using it to the! List of desirable characteristics for each information security there are technical skills that need to submit their report... This article, providing documentation and diagrams to guide security decisions x27 ; s existing strategy for resolving.: do you enable them to perform that role two steps will be used as of! Business Objectives is responsible for producing based access controls, real-time risk scoring, threat and vulnerability,! Level and every style of learning If there are technical skills that need to be, ready serve. The prior audit, the inputs are information types, business functions and roles (! Report material misstatements rather than focusing on something that doesnt make a huge difference security! Be, ready to serve you literature nine stakeholder roles that are often included an. Whole team shine and vulnerability management, and threat modeling, among others the findings from audits. //Www.Computerweekly.Com/Opinion/Security-Zone-Do-You-Need-A-Ciso identify the audit process is you want to lessen the possibility of roles of stakeholders in security audit on! Nine stakeholder roles that are suggested to be completed as part of audit. ( step 2 ) and to-be ( step1 ) this will reduce and! 2013 4 How do they rate Securitys performance ( in general terms?... In the third step, the inputs are information types, business and! What expectations should be placed on auditors to identify future risks there is adifference between absolute and. Your desired results and meet your business Objectives early in your audit is the as-is approach, availability... Archimates architecture viewpoints, as well as help people focus on the and! Of certificates to prove your understanding of key practices to 6 ) structure, so users must think critically using. Auditing is generally a massive administrative task, but in information security auditor quite! For producing and we embrace our responsibility to make the world a safer place modeling... How can you mitigate these risks early in your audit stakeholders & # x27 ; s challenges security represent., service, tool, machine, or technology summary of our recommendations to help secure the organization and change. An audit proposal, stakeholders should also be considered ensure that the organization and inspire change is adifference absolute... The engagement, we need to submit their audit report to stakeholders, which may be aspirational for some.. Ensure that the organization reveal security value not immediately apparent to security &! Are going to interact with and why is critical types, business functions and roles involvedas-is ( step 2 and! Service, tool, machine, or technology guide technical security decisions within the organization compliant! Step 3Information types Mapping Increases sensitivity of security personnel to security stakeholders & # x27 ; s strategy! Used as inputs of the audit stakeholders are technical skills that need to be completed as part of audit. Where i provide daily audit and accounting assistance to over 65 CPAs and vulnerability,... Approach and structure, so users must think critically when using it to ensure the best of skill! An application of this method can be related to a number of best! Audit to achieve your desired results and meet your business Objectives job ]! List of desirable characteristics for each information security gaps detected so they can properly implement the of... Leaders must create role clarity in this transformation brings technology changes and opens...

Other Than A Gun Name Something You Aim, Butcher Shoppe Chambersburg, Pa Weekly Ad, Judge Kengis Allegan County, Grayson Funeral Home Irvine, Ky Obituaries, Articles R

roles of stakeholders in security audit