Featured Posts

Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Soft Skills & Documentation

A successful audit is not just about having a strong program. It is about managing the audit itself. Four things have proven consistently effective: centralizing responses through one or two designated contacts, staying factual and concise, responding with documentation rather than verbal improvisation, and leveraging automation to produce evidence that does not require manual collection.

The most overlooked risk in any audit conversation is saying too much. Speculating, meandering, or mentioning work in progress does three things you do not want: it signals an unmanaged risk, it expands the audit scope, and it may extend the engagement or invite a follow-up review before you are ready. If you cannot clearly articulate an answer, ask for a formal documentation request and write it out.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Review

You should review your policies, standards, metrics, and exceptions at least annually — but the annual review is the floor, not the ceiling. One of the biggest value-adds of a formal review is catching scope creep before an auditor does, and making sure everything is still properly defined for the environment you are actually operating in today, not the one you documented eighteen months ago.

The more interesting opportunity is what GenAI makes possible now. An agent built to monitor your program continuously could flag drift between your defined scope and the actual landscape in your environment, surface differences between your policy language and the frameworks you adhere to, and alert you when a framework update — a new version of NIST CSF, for example — introduces requirements your current documentation does not cover. That is not a replacement for the annual review. It is the confidence going into it.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Exception Process

There is a nuanced component that sits at the intersection of scope and measurement: the exception process. An exception is not a way to manage something out of scope. Exceptions are still in scope. They are risk acceptances — situations where full compliance is not achievable or practical, but where the risk is documented, owned, and controlled.

For an exception to hold up in an audit, three things must be true. It must be transparent. It must remain within scope. And it must be tied to the formal risk register so it is not managed in isolation.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Measure

Your scope is everything when it comes to metrics. If your scope is defined correctly, your metrics will show that you are governing properly — and they do not have to be 100% to do that. In fact, a metric that always reads 100% is often a sign that something is wrong with the measurement, not that the program is perfect. Things change: systems are added, removed, and moved, and there are processes that have to run before a system is fully finalized. Your metrics should account for that.

The goal is to define two layers of measurement. The first is what your team sees — the full picture, including account lifecycle context, out-of-scope anomalies, and the calculations that explain your denominators. The second is what your executives and risk committees see: a single, well-defined metric that reflects the real effectiveness of the program.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Out of Scope

Nothing is truly ungoverned — but it may be governed under a different policy or standard than the one you are currently writing. That distinction matters more than most cybersecurity teams realize.

When you define something as out of scope, auditors do not simply move on. They have a set of controls they are expected to test, and if your document says "out of scope" without telling them where that control lives, they will find it themselves — and they will not always find it in the right place. The solution is simple but rarely done: for every exclusion in your policy or standard, point directly to the document that governs it.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Scope

Scope is everything in an audit. If you do not define it, someone else will — and they will not define it in your favor.

Your framework tells an examiner what they are measuring you against. Your scope tells them where they are allowed to test. Those are two different things, and conflating them is one of the most common mistakes a cybersecurity program can make.

The fastest way to lose control of your scope is to use absolute language in your policy and standard statements. Words like "all," "every," "always," and "never" without conditions are open invitations. Think about what "all endpoints" actually means when an auditor starts asking about your AIX servers, your ESX hosts, your AS400, and your audio/video equipment. Or what "all email" means when a third-party tool is generating automated messages you have no control over.

The goal is scope statements that are as broad as possible — but specific enough to hold a line. Too narrow and you are writing exceptions all day. Too broad and you have handed the auditor a checklist you cannot satisfy. Getting that balance right is not luck. It is how you write the statement in the first place.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - Policies & Standards

Every audit, whether internal, SOX, regulatory, or otherwise, begins with your defined policies and standards. Most cybersecurity teams know this, but far fewer take the time to write them in a way that actually works in their favor.

The most common mistake is conflating frameworks, control catalogs, policies, and standards. They are not the same thing, and treating them as interchangeable is exactly where auditors find their footing. A control catalog is not designed to measure compliance — it exists to provide a menu of potential controls for potential risks. A framework organizes your program. A policy defines what is required and who it applies to. A standard defines how that requirement is implemented, measured, and scoped.

Get those four things straight, and you have already solved most of the problems that make audits painful.

Read More
Audit Andrew Alaniz Audit Andrew Alaniz

How to Pass Every Audit - A Practitioner's Guide

Most cybersecurity teams don't fail audits because their programs are bad. They fail because their programs aren't documented in a way that survives scrutiny. This is the full series — and the written companion to the How to Pass Every Audit session at the 2026 Southeast Cybersecurity Summit.

Read More