IIA cybersecurity topical requirement

Kim Garcia
Trevor Foo
March 10, 2026

The IIA issued the Cybersecurity Topical Requirement (the “Requirement”), establishing a mandatory baseline for Internal Auditors when evaluating cybersecurity governance, risk management, and control processes.  

Below, we provide a summary of the Requirement and key implementation considerations. Find the full text of the Cybersecurity Topical Requirement here: Cybersecurity_Topical_Requirement Final  For implementation guidance, see the Cybersecurity Topical Requirement User Guide: Cybersecurity_TR_User_Guide  

The Requirement was approved for publication on February 5, 2025, with an effective date of February 5, 2026.

Cybersecurity

NIST defines cybersecurity as the ability to protect cyberspace from cyberattacks. It is a subset of information security, focused on safeguarding information and systems to ensure confidentiality, integrity, and availability.  

Because digital systems and data underpin critical operations, cybersecurity risk affects nearly every organization. The Requirement establishes a minimum, risk-based framework for Internal Auditors to evaluate the design and implementation of cybersecurity governance, risk management, and control processes. Organizations with higher risk profiles may require expanded coverage.

The Requirement applies when cybersecurity is:

  • Included in the internal audit plan,
  • Identified during an engagement, or
  • Requested outside the original plan.

Internal Auditors must document applicability and any exclusions. Conformance is subject to quality assessment.

Governance

Evaluating cybersecurity governance involves assessing whether leadership has established a formal cybersecurity strategy aligned with organizational objectives and whether it is periodically reviewed and communicated to the board.

Internal Auditors should determine whether a formal strategy and objectives are established and updated with appropriate board oversight and resource review; whether policies and procedures are documented and maintained; whether roles, responsibilities, and competencies are clearly defined and periodically assessed; and whether key stakeholders such as IT, risk management, HR, legal, compliance, operations, and vendors are engaged to address vulnerabilities and emerging threats. Effective governance facilitates appropriate visibility, oversight, and accountability at the board and senior management levels, consistent with The IIA’s Three Lines Model.

Risk management

The Requirement calls for a structured approach to identifying, assessing, mitigating, monitoring, and escalating cybersecurity risks.

Internal Auditors should evaluate whether cyber risk assessments are integrated into enterprise risk management and aligned with strategic objectives; whether accountability is clearly assigned; whether risks are escalated based on defined thresholds and financial and nonfinancial impacts; whether risk awareness and remediation efforts are communicated and reviewed; and whether a tested incident response and recovery process is in place. The User Guide emphasizes that applicability begins with the risk assessment and that professional judgment guides scope and documentation.

Controls

The Control Processes section sets baseline expectations for cybersecurity controls across internal systems and third-party relationships.

Internal Auditors should assess whether controls, including vendor controls, protect the confidentiality, integrity, and availability of systems and data and are periodically evaluated; whether talent management supports cybersecurity competencies; whether continuous monitoring identifies emerging threats; whether cybersecurity is integrated into the life cycle of IT assets; and whether core technical, network, and endpoint controls such as configuration management, encryption, patching, access management, firewalls, VPN, IDS or IPS, and secure communication tools are implemented.

How we can help

Socorro Partners supports Internal Audit and IT functions in strengthening cybersecurity governance, risk management, and control processes in alignment with the Cybersecurity Topical Requirement.

We work with management and boards to assess cybersecurity programs against baseline expectations, align existing frameworks such as NIST, COBIT, ISO, or sector standards, enhance risk assessment and escalation processes, evaluate incident response readiness, and provide independent or co-sourced cybersecurity assurance. Our team combines cybersecurity, risk management, and internal audit experience to help organizations enhance resilience and meet evolving standards.

Kim Garcia
Partner, Advisory & IT Risk Leader
kgarcia@socorropartners.com
+1.954.729.5680
Trevor Foo
Managing Director
tfoo@socorropartners.com
+1.954.778.6633

Glossary of terms

View all terms →

Abbreviation

Full name

IIA
Institute of Internal Auditors
IPPF
International Professional Practices Framework
NIST
National Institute of Standards and Technology
VPN
Virtual Private Network
IDS
Intrusion Detection System
IPS
Intrusion Prevention System
IIASB
International Internal Audit Standards Board
COBIT
Control Objectives for Information and Related Technologies
ISO
International Organization for Standardization
IT
Information technology
Lo último, directo a tu inbox.
Gracias.
¡Uy! Algo salió mal al enviar el formulario.