Guide for Information System Security Audit

Information Security Audits and Their Importance

Cyberattacks are increasingly targeting the information systems of sensitive institutions in our country, leading to the disclosure of confidential information and endangering national security. Furthermore, the alteration of information systems (IS) is not always due to malicious actions. It can also result from failures, accidents, or human errors that affect the availability, confidentiality, integrity, or traceability of information, thereby impeding the proper functioning of information systems. Therefore, a systematic evaluation of the security of information systems is necessary to enable the development and implementation of effective security practices.

An information system security audit is an evaluation that ensures the effectiveness of implemented security measures, verifies the adoption of appropriate protection solutions, and reduces risks that could compromise IS security. It is thus imperative for public administrations and organizations to update their information systems by conducting IS security audits.

In this context, the National Directive on Information System Security (DNSSI), developed by the Directorate General of Information System Security (DGSSI) and approved by the Strategic Committee for Information System Security (CSSSI), outlines the security measures that must be applied by public administrations and organizations. These entities are required to conduct a security audit of their information systems to assess their maturity level against DNSSI regulations and to identify projects necessary for compliance.

The objective of this document is twofold: firstly, to enable state entities to clearly define their audit needs in order to draft potential calls for tenders; and secondly, to list the requirements for audit service providers to ensure the competence of auditors, the relevance of their recommendations, and the quality of the audits performed.

To report any criminal digital content, including threats to the security of individuals and groups, praise or incitement of terrorism, and violations of the rights and freedoms of children, please use the following platform : www.e-blagh.ma

DGSSI2024 All rights reserved