Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Security Audit Preparation Without Tears

Avatar for Tony Rice Tony Rice
October 03, 2025

Security Audit Preparation Without Tears

Preparations for security audits often forces teams to chase the same evidence across multiple systems, wasting time and resources. This session details how leveraging overlapping requirements among SOC 2, ISO 27001, and FedRAMP can reduce effort, eliminate redundancy, and improve control coverage during audit preparation. Attendees will learn practical strategies for integrating automation and system workflows, plus cultural approaches that enable continuous compliance, making security audit prep less burdensome and compliance a natural outcome of secure operations.

Avatar for Tony Rice

Tony Rice

October 03, 2025
Tweet

More Decks by Tony Rice

Other Decks in Programming

Transcript

  1. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Audit preparation without tears Tony Rice Duo Security Risk & Compliance
  2. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Agenda + Too many controls + If you've never done this before + Get organized + Automate + Continuous Audit + Iterate
  3. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Cisco Secure Access products
  4. 1100+ 325 300+ 100 ? 93 250 114 73 12

    800+ 223 3400 controls? 93 controls
  5. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Add photo over this circle How did you do that? nonsense courtesy: RCG Productions / FX Networks / Paddy's Pub LLC
  6. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Add photo over this circle Cloud Security Alliance Tools
  7. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Where to start nonsense courtesy: ZAZ / Paramount CCM v4.0 Auditing Guidelines
  8. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Getting started CCM v4.0 Auditing Guidelines
  9. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Get Organized + A&A - Audit & Assurance + AIS - Application & Interface Security + BCR - Business Continuity Mgmt & Op Resilience + CCC - Change Control & Configuration Management + CEK - Cryptography, Encryption, & Key Management + DCS - Datacenter Security + DSP - Data Security & Privacy + GRC - Governance, Risk Management, & Compliance + HRS - Human Resources Security + IAM - Identity & Access Management + IPY - Interoperability & Portability + IVS - Infrastructure & Virtualization Security + LOG - Logging & Monitoring + SEF - Sec. Incident Mgmt, E-Disc & Cloud Forensics + STA - Supply Chain Mgmt, Transparency, & Accountability + TVM - Threat & Vulnerability Management + UEM - Universal Endpoint Management
  10. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public #!/bin/bash # Gather a list of rds snapshots as evidence of our nightly snapshots aws rds describe-db-snapshots \ --query "DBSnapshots[*]. {Identifier:DBSnapshotIdentifier,Encrypted:Encrypted,KmsKeyId:KmsKeyId}" \ --region us-west-2 \ --output table \ >> "$COLLECTION_FILE_NAME" for region in eu-west-1 us-east-2 do echo $region >> "$AUTOMATED_BACKUP_FILE_NAME" aws rds describe-db-instances \ --region $region \ --query "DBInstances[*].[DBInstanceIdentifier]" \ >> "$AUTOMATED_BACKUP_FILE_NAME" aws rds describe-db-instance-automated-backups \ --region $region \ >> "$AUTOMATED_BACKUP_FILE_NAME" done BCR-08 Periodically backup data stored in the cloud. Ensure the confidentiality, integrity and availability of the backup, and verify data restoration from backup for resiliency.
  11. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Runbooks for the rest
  12. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Add photo over this circle Don't repeat yourself Identify controls common across teams or products • password management • user onboarding / access provisioning • data protection • privacy • contingent workers • PII and other HR data handling
  13. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Continuous Audit nonsense courtesy: Zoë Roth / Mebane Fire Department The Continuous Audit Metrics Catalog Version 1.0
  14. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public workflow & guardrail ideas and how to measure them The Continuous Audit Metrics Catalog Version 1.0
  15. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public Questions? linkedin.com/in/tonyrrice/ speakerdeck.com/tonyrice
  16. © 2025 Cisco Systems, Inc. / Security Business Group /

    all rights reserved. So there! Cisco Public CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.