Sarbanes-Oxley, Section 404, requires public companies to annually assess and report on the effectiveness of internal controls over financial reporting. A component of risk management is information technology (IT) risk management and should be part of any IT security program. Every organization, no matter whether private or public, has a mission. For example, if your organization’s mission is to become one of the nation’s (or county’s or state’s) largest financial holdings companies, and you offer services such as commercial and retail banking, mortgage financing and servicing, consumer finance and asset management, then what are you going to protect and how are you going to protect it?
Requests for information arising from internal or external IT auditors are normally fielded by the IT and Security departments. In one particular audit I experienced while working for a financial firm, there was an IT audit finding due to the existence of numerous Domain Admins (everyone in IT had made himself or herself a Domain Admin and Domain Admins have total access to everything on a Windows network).
There are some basic risk management concepts that need to be ingrained into the technology manager’s mind before developing applications, and before deploying applications and technology. For starters, IT managers can look to the National Institute of Standards and Technology for some guidance. NIST Special Publication 800-30, published in July 2002, entitled Risk Management Guide for Information Technology Systems is a good place to start. It is free and does a decent job of explaining the basic concepts and providing a risk management methodology.
For example, “Risk is a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization”, is the opening definition of risk.
With management support and IT’s commitment to work through this, you can perform an internal IT risk assessment with some success yourself.
http://www.bankinfosecurity.com/articles.php?art_id=166&PHPSESSID=ceea138966d3138528becabe0eb4b292