ARTICLE
3 November 2021

What Do The Guidelines On Information And Communication Security Audits Bring?

EA
Esin Attorney Partnership

Contributor

Esin Attorney Partnership, a member firm of Baker & McKenzie International, has long been a leading provider of legal services in the Turkish market. We have a total of nearly 140 staff, including over 90 lawyers, serving some of the largest Turkish and multinational corporations. Our clients benefit from on-the-ground assistance that reflects a deep understanding of the country's legal, regulatory and commercial practices, while also having access to the full-service, international and foreign law advice of the world's leading global law firm. We help our clients capture and optimize opportunities in Turkey's dynamic market, including the key growth areas of mergers and acquisitions, infrastructure development, private equity and real estate. In addition, we are one of the few firms that can offer services in areas such as compliance, tax, employment, and competition law — vital for companies doing business in Turkey.
The Digital Transformation Office of the Presidency of the Republic of Turkey ("DTO") has published the Guidelines on Information and Communication Security Audits ("Audit Guidelines") on 27 October 2021.
Turkey Accounting and Audit
To print this article, all you need is to be registered or login on Mondaq.com.

The Digital Transformation Office of the Presidency of the Republic of Turkey ("DTO") has published the Guidelines on Information and Communication Security Audits ("Audit Guidelines") on 27 October 2021. The Guideline provides details on the audit procedures that public institutions and enterprises providing critical infrastructure services must carry out for the security of critical data.

Recent development

The Audit Guidelines published by DTO pursuant to the Guideline on Information and Communication Security explain the methodology regarding the audit procedures that public institutions and enterprises providing services in critical infrastructure sectors such as energy, electronic communication, health and finance must conduct. The Guidelines are available online  here  in Turkish.

What do the Audit Guidelines say?

Institutions within the scope of the Guideline on Information and Communication Security must complete their operations to ensure compliance with the measures under the mentioned guidelines within 24 months. After this period, institutions must initiate their audit process.

In this regard, the Audit Guidelines explain the audit process, which must be followed by the public institutions and enterprises providing critical infrastructure services. Institutions must carry out their audit process mainly through internal audit units. If internal audit units are not available or insufficient, the process may be carried out by other personnel within the institution, personnel to be assigned from other public institutions and organizations, or through service procurement. In this context, a separate guideline, which sets out the criteria for personnel and companies who will perform the audits, has also been published. You may access the relevant guideline  here.

The Audit Guidelines also include the obligations of the outsourced institutions and the auditors. Accordingly, institutions must obtain audit services from companies authorized within the scope of the Certification Program and must not obtain audit services from companies and auditors who have provided consultancy services to the relevant institutions in compliance with the Guideline on Information and Communication Security.

Pursuant to the Audit Guidelines, the purposes of audits are to evaluate the implementation of the Information and Communication Security Guideline and the effectiveness of the measures applied to asset groups. The audits consist of three steps:

(i) Planning of the audit procedure
(ii) Performing the audit procedure
(iii) Reporting of the audit results

Within the scope of planning the audit procedure, the audit team and the scope of the audit must be determined; and the audit strategy and the audit program must be prepared. The audit team must consist of at least two people and the staff should have the necessary certificates or authorizations. In order to identify the operations of the institution, the audit team must analyze the institution's organizational structure, business processes, previous audit reports, corporate asset groups, etc. The asset group that is covered by the audit must be identified. For this purpose, the audit team must act with a risk-based audit approach and take the materiality criteria as a basis. In accordance with the Guidelines, the audit team must include at least one asset group to the audit, which relates to one of the main asset groups defined under the compliance studies. After these steps, audit strategy and program must be prepared in line with audit purposes. Different methods such as interviewing, reviewing, security audits, penetration test and source code analysis specified in the Audit Guidelines may be used in the implementation of audit procedures. However, the procedure may be carried out by using additional methods as well.

Once the audit is completed, an audit report must be prepared and submitted to the DTO.

Conclusion

The Audit Guidelines provide guidance to public institutions and enterprises providing critical infrastructure services on the audit procedures for the implementation of the Information and Communication Security Guidelines and to measure the effectiveness of the measures applied to asset groups. In this context, relevant institutions and critical infrastructure providers must manage their audit process in accordance with the Guidelines, submit their reports to the DTO, and closely follow the announcements and guidance of competent authorities on the matter.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More