ANALYSISMEMBER

Internal versus external auditor: Assessing options for CPPA cybersecurity audits

Published
Subscribe to IAPP Newsletters

Contributors:

Patrick Austin

CIPP/E, CIPP/US, CIPM, FIP, PLS

Data Privacy & Cybersecurity Counsel

Woods Rogers Vandeventer Black PLC

Editor's note: The IAPP is policy neutral. We publish contributed opinion and analysis pieces to enable our members to hear a broad spectrum of views in our domains.

On 24 July, the California Privacy Protection Agency approved a sweeping rulemaking package that will establish new regulatory requirements, including for covered businesses to conduct annual cybersecurity audits.

The rulemaking package now awaits formal approval by the California Office of Administrative Law. Once approved, covered California businesses should take steps to proactively prepare themselves for these new audit obligations, which can be found in Article 9 of the proposed regulations.

Whether to utilize an internal or external auditor to conduct the cybersecurity audit is a key question companies will need to answer early on. There are pros and cons to both options that need to be assessed in the context of the company's organizational structure and cybersecurity program.

What the regulations say about auditors

According to Section 7122 of the looming CPPA regulations, covered businesses will need to select "a qualified, objective, independent" auditor, internal or external, to conduct the cybersecurity audit. The regulations stipulate that regardless of whether the auditor is internal or external to the business, they must use "procedures and standards accepted in the profession of auditing."

In addition, an auditor cannot solely rely on assertions made by a covered business. Instead, they must "primarily" base findings on specific evidence reviewed through the course of the audit. Moreover, an auditor is required to review and assess what security safeguards the company has in place; whether the company's cybersecurity program is "appropriate" based on its size, complexity and the nature and scope of the processing; and how the business implemented the security program.

Contributors:

Patrick Austin

CIPP/E, CIPP/US, CIPM, FIP, PLS

Data Privacy & Cybersecurity Counsel

Woods Rogers Vandeventer Black PLC

MEMBER

Unlock this exclusive content and more

Join the IAPPAlready a member? Sign in

Membership opens up a world of resources

In-depth knowledge

From original research reports and daily news coverage to legislative trackers and infographics, we have the information you need to stay ahead of change.

A global network

Make valuable professional connections through more than 160 local IAPP KnowledgeNet chapters in 70 countries.

Access to the experts

Connect with top thinkers in privacy, AI governance and cybersecurity for fresh ideas and insights.

Learn what you get from membership