Chapter 5 — Information Asset Protection
Information asset protection encompasses the controls that keep information confidential, accurate, and available — the operational reality of cybersecurity from the audit perspective. The frameworks have been discussed in earlier subjects; the technical controls have been examined in cryptography, networks, cloud security, and other technical subjects. This chapter applies them through the audit-practitioner lens: how to systematically assess whether an organisation's information assets are appropriately protected, what evidence to gather, what tests to run, and what findings typically emerge. The four subtopics — security frameworks, identity and access management, encryption and PKI, and network and cloud security — together cover most of the technical control surface the auditor examines in a typical engagement.
5.1 Security frameworks — practitioner application
Framework selection for audit criteria
The auditor selects criteria based on:
Organisational adoption. What frameworks the organisation has chosen.
Regulatory requirements. What frameworks are mandated.
Industry norms. What frameworks peers use.
Engagement objectives. What questions the audit answers.
Stakeholder preferences. What stakeholders expect.
Common selections for Nepali bank IS audit:
- ISO 27001 (if certified) or its controls as criteria.
- NRB IT directives.
- CIS Controls v8 for technical depth.
- COBIT 2019 for governance.
- Application-specific (PCI-DSS for card data).
ISO 27001 control testing
For each Annex A control deemed applicable, audit testing:
Control existence. Documentation exists.
Control implementation. Operational evidence.
Control effectiveness. Achieves intended outcome.
Control monitoring. Performance tracked.
Specific control examples
A.5.7 — Threat intelligence. New in 2022.
Audit tests:
- Threat intelligence programme documented.
- Intelligence sources identified.
- Collection mechanism operational.
- Analysis performed.
- Distribution to relevant teams.
- Integration with security operations.
- Periodic effectiveness assessment.
A.5.23 — Information security for use of cloud services. New in 2022.
Audit tests:
- Cloud service policy documented.
- Approval process for cloud services.
- Security requirements defined.
- Vendor assessment process.
- Contract terms appropriate.
- Ongoing monitoring.
- Exit considerations.
A.8.16 — Monitoring activities. New in 2022.
Audit tests:
- Monitoring scope defined.
- Monitoring tools deployed.
- Alert thresholds defined.
- 24/7 monitoring or appropriate alternative.
- Alert response procedures.
- Incident escalation.
- Effectiveness review.
Risk-based framework application
Not all controls equally important; risk-based application:
Material risk areas. Where audit attention concentrates.
Compensating controls. Where primary controls weak.
Effectiveness testing. Beyond mere existence.
Continuous monitoring. Where appropriate.
Common framework application findings
Documentation-implementation gap. Documents exist; implementation incomplete.
Coverage gaps. Some controls not addressed.
Effectiveness questions. Controls in place but not achieving outcomes.
Monitoring gaps. Control effectiveness not tracked.
Improvement absence. Issues not addressed.
5.2 Identity and access management controls
IAM scope
Identity and Access Management is the discipline of managing identities (people, services, devices) and their access to organisational resources — encompassing identity lifecycle (provisioning, modification, deprovisioning), authentication (verifying identity), authorisation (determining what access is permitted), and accountability (recording who did what) — providing the foundation for access control in modern environments.
The audit examines each component.
Identity lifecycle audit
Provisioning.
- Joiner process documented.
- Authorisation required for access.
- Default access principles (least privilege).
- Documentation of access granted.
- Audit trail.
Modification.
- Mover process for role changes.
- Removal of unneeded access.
- Approval for additional access.
- Documentation.
Deprovisioning.
- Leaver process documented.
- Timely access removal.
- Comprehensive coverage (all systems).
- Verification of removal.
- Account disposition (deletion vs disabling).
Common findings:
Orphaned accounts. Accounts for former employees still active.
Excess access. Users accumulate access beyond need.
Slow deprovisioning. Access not removed promptly at departure.
Inadequate authorisation. Access granted without proper approval.
Documentation gaps. Audit trail incomplete.
Authentication audit
Password policies.
- Complexity requirements.
- Length minimums.
- Rotation policies (or rationale for not requiring rotation).
- History (preventing reuse).
- Lockout settings.
NIST SP 800-63B has updated guidance — long passwords without forced rotation, MFA emphasis.
Multi-factor authentication.
- Deployment scope.
- Methods used.
- Strength of methods (TOTP vs SMS vs FIDO2).
- Universal vs partial deployment.
- Bypass procedures (if any).
Single sign-on.
- SAML, OIDC implementations.
- Integration with identity provider.
- Federation arrangements.
Privileged access.
- Strong authentication for privileged.
- Just-in-time access where appropriate.
- Session recording where appropriate.
- Privileged account management tools.
Authorisation audit
Access models.
- Role-Based Access Control (RBAC).
- Attribute-Based Access Control (ABAC).
- Mandatory Access Control (MAC).
- Discretionary Access Control (DAC).
Implementation.
- Roles defined.
- Role memberships managed.
- Periodic review.
- Exception management.
Least privilege.
- Default minimal.
- Justified expansions.
- Regular reviews to remove unneeded.
Segregation of duties.
- Conflicting roles identified.
- Conflicts prevented or compensated.
- Periodic SoD review.
For Nepali bank context, NRB IT directives require specific SoD provisions; audit verifies compliance.
Access reviews
Periodic verification:
Frequency. Quarterly for privileged; annually for general.
Process. Manager review of subordinates' access.
Completion tracking. Reviews actually performed.
Action follow-up. Excess access removed.
Documentation. Evidence of reviews.
Tool support. Many organisations use specialised tools.
Common finding: reviews performed but cursory; subordinate access rubber-stamped without genuine examination.
Privileged access management
Privileged Access Management is the specific discipline of controlling, monitoring, and recording access by accounts with elevated privileges — administrative accounts, service accounts, application accounts — through measures such as vaulting credentials, just-in-time provisioning, session recording, and approval workflows, given that privileged accounts represent disproportionate risk.
PAM tools:
- CyberArk.
- BeyondTrust.
- Delinea (formerly Centrify and Thycotic).
- HashiCorp Vault (for secrets).
- AWS Secrets Manager, Azure Key Vault, GCP Secret Manager.
Audit examines:
PAM deployment scope. Privileged accounts covered.
Vaulting. Credentials securely stored.
Just-in-time provisioning. Where appropriate.
Session monitoring. Recording of privileged sessions.
Approval workflows. For sensitive access.
Service account management. Often weak area.
Emergency access procedures. Documented and controlled.
For Nepali banks, PAM tool adoption increasing at major institutions; smaller institutions often have weaker controls.
Federation and SSO audit
For federated environments:
Trust relationships. Documented.
Identity provider security. Hardened.
Token validation. Implemented properly.
Attribute mapping. Correct.
Just-in-time provisioning. Where used.
Monitoring. Federation activity logged.
IAM in cloud
Cloud IAM specific considerations:
Cloud provider IAM. AWS IAM, Azure RBAC, GCP IAM.
Cross-account / cross-tenant. Trust relationships.
Federation with on-premises. SSO across boundaries.
Service identities. IAM roles, managed identities, service accounts.
Key management. Cloud KMS integration.
Access patterns. Programmatic vs interactive.
Audit examines each within applicable cloud context.
IAM common findings
Stale accounts. Active accounts no longer needed.
Excessive privileges. Beyond least privilege.
Inadequate MFA coverage. Not universal.
Weak password policies. Below current best practice.
SoD violations. Conflicting access combinations.
Access review gaps. Reviews not performed or not substantive.
Privileged access weaknesses. Inadequate PAM implementation.
Service account weaknesses. Often unmanaged.
Documentation gaps. Authorisation evidence missing.
5.3 Encryption and PKI systems audit
Cryptography in audit context
Cryptography covered in depth in ENCTNS502. The auditor examines cryptography use, not cryptographic theory.
Cryptographic audit scope
Cryptography policy. Documented standards.
Algorithm selection. Current and appropriate.
Key management. Generation, distribution, storage, rotation, destruction.
Cryptographic implementation. Use of standards rather than custom.
Cryptographic libraries. Approved versions used.
Key escrow. Where applicable.
Cryptographic monitoring. Use tracked.
Algorithm appropriateness
Current standards (2026):
Symmetric encryption. AES-128 minimum; AES-256 preferred. ChaCha20-Poly1305 alternative.
Asymmetric encryption. RSA 2048 minimum; RSA 3072+ preferred. Elliptic curve (ECDSA, EdDSA) preferred for new deployment.
Hashing. SHA-256 minimum; SHA-384 / SHA-512 for higher assurance. SHA-1 deprecated; MD5 broken.
Authenticated encryption. AES-GCM, ChaCha20-Poly1305 preferred over older modes.
Key derivation. Argon2, PBKDF2 with sufficient iterations, bcrypt.
Post-quantum cryptography. ML-KEM, ML-DSA, SLH-DSA (NIST standards 2024).
The auditor flags use of deprecated algorithms (DES, RC4, MD5, SHA-1 for signatures) as findings.