Perimeter
1/18/2013
02:35 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Acing An Audit In 30 Minutes

Compliance audits don't have to be chaotic events

I asked a client in the insurance business about its recent audit. The president of the company told me that, once again, the audit went fine. Actually, it went better than fine. As usual, it aced the audit. Zero deficiencies, zero issues, zero problems. The auditors said it was the most organized office and easiest file review they had ever seen.

That was impressive, but the best part was yet to come. "How long did it take to prepare for the audit?" I asked. She said her staff spent about 30 minutes preparing for the auditors. Then she added that 15 minutes of that time was making sure the conference room and restrooms were tidy.

Yes, you read that right. Their audit prep time was half an hour.

Want to know how they do this every time? There's no real secret. This company's staff is focused on processes that properly support all necessary business tasks every day.

Security, compliance, documentation, and financial accountability are all built into its processes, not added on later. When there is a new problem that is not addressed with its processes, it doesn't simply address the problem; it learns from it and adjust its processes accordingly.

If a member of the staff encounters a new problem without a process to address it, then the employee brings it to management so a method can be developed to detect and/or address the problem next time.

The company's president told me new employees are either able to adapt to its problem-solving process and high-quality mind set, or they don't make it. In her words, "It's not personal; the process really works out who makes it here."

The president also realized early in the life of the business that a key to supporting processes was the appropriate technology. Instead of using off-the-shelf software, she invested in building custom software that matched her vision of compliant and efficient processes.

Was custom software expensive? Not over time. In fact, the company can now offer significantly more services than its competitors with half of the number of employees. Because the company's software was built with the end in mind, the technology makes audits a breeze, with all necessary data immediately available.

Unlike many organizations, this company never has to really do anything to get ready for an audit. The planning on appropriate and necessary processes, plus the professional discipline to follow the processes, makes them ready for an audit every day.

For this company, audits are not the test of completion and accuracy. It holds itself to that standard every day, through processes and culture. It is a system any organization can build and maintain. All it takes is forethought, adaptability, and discipline.

Glenn S. Phillips loves the company president he just wrote about. He is the president of Forte' Incorporated where he works with business leaders who want to leverage technology and understand the often hidden risks within. Glenn is the author of the book Nerd-to-English and you can find him on twitter at @NerdToEnglish. Glenn works with business leaders who want to leverage technology and understand the often hidden risks awaiting them. The Founder and Sr. Consultant of Forte' Incorporated, Glenn and his team work with business leaders to support growth, increase profits, and address ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web