Perimeter
1/18/2013
02:35 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Acing An Audit In 30 Minutes

Compliance audits don't have to be chaotic events

I asked a client in the insurance business about its recent audit. The president of the company told me that, once again, the audit went fine. Actually, it went better than fine. As usual, it aced the audit. Zero deficiencies, zero issues, zero problems. The auditors said it was the most organized office and easiest file review they had ever seen.

That was impressive, but the best part was yet to come. "How long did it take to prepare for the audit?" I asked. She said her staff spent about 30 minutes preparing for the auditors. Then she added that 15 minutes of that time was making sure the conference room and restrooms were tidy.

Yes, you read that right. Their audit prep time was half an hour.

Want to know how they do this every time? There's no real secret. This company's staff is focused on processes that properly support all necessary business tasks every day.

Security, compliance, documentation, and financial accountability are all built into its processes, not added on later. When there is a new problem that is not addressed with its processes, it doesn't simply address the problem; it learns from it and adjust its processes accordingly.

If a member of the staff encounters a new problem without a process to address it, then the employee brings it to management so a method can be developed to detect and/or address the problem next time.

The company's president told me new employees are either able to adapt to its problem-solving process and high-quality mind set, or they don't make it. In her words, "It's not personal; the process really works out who makes it here."

The president also realized early in the life of the business that a key to supporting processes was the appropriate technology. Instead of using off-the-shelf software, she invested in building custom software that matched her vision of compliant and efficient processes.

Was custom software expensive? Not over time. In fact, the company can now offer significantly more services than its competitors with half of the number of employees. Because the company's software was built with the end in mind, the technology makes audits a breeze, with all necessary data immediately available.

Unlike many organizations, this company never has to really do anything to get ready for an audit. The planning on appropriate and necessary processes, plus the professional discipline to follow the processes, makes them ready for an audit every day.

For this company, audits are not the test of completion and accuracy. It holds itself to that standard every day, through processes and culture. It is a system any organization can build and maintain. All it takes is forethought, adaptability, and discipline.

Glenn S. Phillips loves the company president he just wrote about. He is the president of Forte' Incorporated where he works with business leaders who want to leverage technology and understand the often hidden risks within. Glenn is the author of the book Nerd-to-English and you can find him on twitter at @NerdToEnglish. Glenn works with business leaders who want to leverage technology and understand the often hidden risks awaiting them. The Founder and Sr. Consultant of Forte' Incorporated, Glenn and his team work with business leaders to support growth, increase profits, and address ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2008-3277
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

CVE-2010-2236
Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

CVE-2011-3628
Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.0...

CVE-2012-0214
Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through 0.8.15.10 and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

CVE-2013-4768
Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web