Communicate the results, Prevent misunderstanding of the results, and Facilitate follow-up corrective
action. - Answers What is the purpose of the audit report?
Executive Summary - Answers A concise yet informative review intended for senior level management or
those with decision-making power.
A single page or multiple pages - Answers An executive summary can be how long?
Qualified Opinion - Answers The auditor notes one or more conditional exceptions were found.
Unqualified Opinion - Answers The auditor found no discovered exceptions.
Intro, Objective and Scope, Methodology, Finding, Recommendations, Action plan - Answers
Components found in the final report as well as the executive summary.
Criteria - Answers This provides the context for evaluating the evidence collected by the auditor and the
subsequent procedures the auditor performs.
Circumstance - Answers This identifies the situation within the IT environment that exists.
Cause - Answers This identifies the reason for the gap between the circumstance and the criteria.
Impact - Answers This identifies the effect or potential impact on the IT landscape based on the
difference between the circumstance and the desired state.
Introduction - Answers This provides the purpose and scope of the assessment. This includes the
systems, personal, locations, and other details about the assessed environment.
Approach - Answers This describes the methods taken. This includes those involved as part of the
assessment and the techniques and tools use to collect information.
System Characterization - Answers This provides details about the infrastructure systems. This includes
the hardware, software, data, interfaces, and associated users.
Threat Statement - Answers This is a complete outline of potential threat sources and associated
activities.
Summary - Answers This provides a concise review of the observations as well as risk levels. This may
include any recommendations.
High 1.0 - Answers The threat source is highly motivated and sufficiently capable and controls to prevent
the vulnerability from being exercised and ineffective.
Medium 0.5 - Answers The threat source is motivated and capable but controls are in place that may
impede successful exercise of the vulnerability.