<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>O. Kryvoruchko, D. Gnatchenko, Functional features of the intellectual internal audit system,
Cybersecurity: Education, Science, Technology</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.3390/electronics11142181</article-id>
      <title-group>
        <article-title>compliance with international security standards⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nataliia Lishchyna</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valerii Lishchyna</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lesia Kozubtsova</string-name>
          <email>kozubtsov@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Igor Kozubtsov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Yashchuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Heroiv Krut Military Institute of Telecommunications and Informatization</institution>
          ,
          <addr-line>Knyaziv Ostrozkykh 45/1, 01011 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lutsk National Technical University</institution>
          ,
          <addr-line>Lvivska Street 75, 43018 Lutsk</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <volume>4</volume>
      <issue>24</issue>
      <fpage>40</fpage>
      <lpage>49</lpage>
      <abstract>
        <p>The article emphasizes the importance of conducting information security audits for information systems of critical infrastructure organizations. Effective protection is ensured by aligning security systems with international standards. The audit monitors and assesses compliance but remains effective only when performed regularly by trained specialists. Due to the routine nature of audits and wartime constraints, such as power outages and loss of communication, AI-based methods are often impractical. Therefore, the authors propose a temporary solution using formalized security assessment criteria with clear indicators for objective verification. The study develops a methodology for conducting audits aligned with international standards, addressing the lack of practical guidance in existing ones. It also analyzes global regulatory documents to identify typical management approaches and proposes an adaptable checklistbased methodology covering 10 key information security areas, particularly useful for organizations operating under wartime conditions.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Model</kwd>
        <kwd>audit</kwd>
        <kwd>information security</kwd>
        <kwd>international standards</kwd>
        <kwd>control</kwd>
        <kwd>indicators</kwd>
        <kwd>methodology</kwd>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Today, information systems play a key role in ensuring the efficiency of both commercial and state
enterprises. The widespread use of information systems for searching, storing, processing, and
transmitting information makes the problem of their protection particularly urgent, especially
given the global trend of increasing information attacks that cause significant financial and
material losses. To effectively protect against such attacks, companies need an objective assessment
of the information security level of their systems, which is achieved through an information
security audit.</p>
      <p>As a rule, audits are conducted by external consulting companies specializing in information
security. The initiative for carrying out such procedures may come from enterprise management,
automation services, or information security departments. In some cases, audits are also required
by insurance companies or regulatory authorities. Security audits are performed by groups of
experts, whose number and composition depend on the goals, objectives, and complexity of the
assessed system.</p>
      <p>However, in state institutions and critical infrastructure facilities with high confidentiality
requirements, the involvement of external audit companies is prohibited. In such circumstances,
organizations must develop their own audit methodologies and engage specialists with the
appropriate level of access. This limitation significantly restricts the use of standard solutions,
especially under wartime conditions in Ukraine.</p>
      <p>00000-0002-5200-536X (N. Lishchyna); 0000-0002-2371-3850 (V. Lishchyna); 0000-0002-7866-8575 (L. Kozubtsova);
0000-0002-7309-4365 (I. Kozubtsov); 0000-0003-4872-7949 (A. Yashchuk)</p>
      <p>
        The owner and/or manager of a critical infrastructure facility is legally obliged to organize and
conduct an independent information security audit in compliance with Ukrainian legislation in the
field of information protection and cybersecurity. These requirements are defined by the National
Security Strategy of Ukraine, the Concept for the Development of the Security and Defense Sector
of Ukraine [1, p. 33], the Law of Ukraine “On the Basic Principles of Cybersecurity of Ukraine” [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ],
the Cybersecurity Strategy of Ukraine [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], and the Resolution of the National Security and Defense
Council of Ukraine [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Therefore, addressing the scientific problem of conducting a critical infrastructure protection
(CIP) audit in accordance with the general requirements of the Cabinet of Ministers of Ukraine
Resolution of June 19, 2019, No. 518 “On Approval of General Requirements for Cyber Protection of
Critical Infrastructure” [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] is highly relevant today.
      </p>
      <sec id="sec-1-1">
        <title>1.1. Problem statement</title>
        <p>
          An information security (IS) audit, as a systemic activity, is aimed at monitoring and verifying the
state of the IS of a protected object (in particular, an organization), as well as assessing the
adequacy of the applied means and methods of information protection in accordance with existing
threats. The foundation of effective enterprise protection lies in the timely configuration of the
security system and the periodic work of responsible personnel involved in the IS audit [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          Therefore, the general task of an IS audit is to verify the compliance of the protection system
with a set of criteria that define the security requirements. The auditor’s work is highly meticulous
and often routine, which makes the process in need of simplification. In this context, there is a need
for a scientifically grounded definition and formalization of a set of criteria that reflect the security
level of the object, along with the identification of indicators that enable objective verification
procedures. These criteria should be clearly defined and, as far as possible, measurable [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
        <p>It is worth noting that, at the early stage of establishing information protection systems and
cybersecurity, the formation of such systems, which were previously unknown, proved to be an
extremely complex task.</p>
      </sec>
      <sec id="sec-1-2">
        <title>1.2. Literature review. Analysis of recent scientific research and publications</title>
        <p>At the initial stage of addressing information security (IS) and cybersecurity problems, scientists
worldwide faced the difficult task of justifying the choice of evaluation criteria, which needed to be
clearly defined and as measurable as possible. The development of a unified approach to building a
methodology for assessing organizational cybersecurity began with debates caused by the absence
of a consistent terminological framework.</p>
        <p>The authors of [8] proposed non-standard approaches to developing a methodology for
assessing the cybersecurity of organizational communication systems. The urgent demand for such
research led to the creation of a formalized methodology for assessing the cybersecurity of
information and telecommunication systems [9]. However, in practice, the process proved to be
more complex. The existence of zero-day threats introduced unpredictability, making standard
methodologies without a well-justified choice of evaluation criteria insufficiently objective,
particularly when they did not assess the effectiveness of implemented cybersecurity measures
[10]. This gap highlighted the need for methodologies focused on evaluating the effectiveness of
cybersecurity measures, which themselves required further development [11].</p>
        <p>At the same time, scientific research was conducted under state orders [12] to develop audit
methodologies for critical infrastructure facilities. These methodologies, even after significant
simplifications [13], remained complex and posed difficulties for inexperienced auditors in
compiling a comprehensive list of checks.</p>
        <p>As separate initiatives, it is worth highlighting [14], which substantiated the need for technical
audits of information and telecommunication systems at enterprises. This work outlined audit
procedures and vulnerability testing for systems where restricted-access information is not
processed. The proposed audit technology relied primarily on active penetration testing of IT
infrastructures.</p>
        <p>The study [15] examined the problem of organizing internal audits in the realities of the
Ukrainian economy. It was determined that traditional audit methods, based on selective analysis
and retrospective control, fail to provide sufficient efficiency in the modern environment. Such
audits are characterized by large data volumes, and conventional approaches relying on manual big
data collection and periodic checks demonstrate inadequate effectiveness in digital systems.</p>
        <p>The revolution in cybersecurity auditing began with the introduction of artificial intelligence
(AI) automation [16]. Subsequent research has focused on the potential of AI in auditing and
managing cybersecurity risks in the context of digital transformation [17]. The integration of AI
technologies enables automatic anomaly detection, proactive risk assessment, generation of
recommendations, and analysis of large volumes of both structured and unstructured data (event
logs, network traffic, text reports, etc.). According to [18], the use of AI in cybersecurity audits will
significantly enhance transparency and accountability, particularly in peacetime.</p>
      </sec>
      <sec id="sec-1-3">
        <title>1.3. Highlighting understudied aspects</title>
        <p>The analysis of recent research and publications has shown that it is impossible to define universal
formalized indicators and criteria for conducting audits that would be applicable to all tasks and
types of audits in peacetime. Moreover, the use of artificial intelligence in audits of information
security and cybersecurity at critical infrastructure facilities during wartime, at least in Ukraine, is
unacceptable due to frequent force majeure circumstances, such as power outages, loss of
communications, and lack of Internet access.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Purpose of the article</title>
      <p>The purpose of this article is to test the process of forming a formalized audit methodology and
practice-oriented instructions for conducting audits of an organization’s information security in
compliance with standards and regulatory requirements. Within the framework of the proposed
methodology, it is possible to develop similar instructions for any chosen standard.</p>
      <sec id="sec-2-1">
        <title>2.1. Research objectives (goals)</title>
        <p>To achieve this purpose, the following objectives are set: 1. To analyze recent research and
publications on the problem under study. 2. To present and explain the author’s own research
results.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Research methods</title>
      <sec id="sec-3-1">
        <title>3.1. Research tools</title>
        <p>To solve the defined tasks, theoretical research methods were applied, namely: analysis and
synthesis of scientific literature on the subject; analytical and comparative analysis to assess the
novelty of the study; synthesis and generalization to substantiate the methodological foundations
of the research; generalization for the formulation of conclusions and recommendations for further
studies.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Reliability and accuracy of results</title>
        <p>The reliability of the obtained results is ensured by the correct application of mathematical tools
and research methods. A set of scientific methods, comprehensively substantiated and integrated
into a single system, provided for the reliability and accuracy of the scientific outcomes in
accordance with the methodology of scientific research.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Methodological basis of the study</title>
        <p>The methodological basis of the study is formed by the procedures for selecting the audit object.
The objects of an IS audit can include a wide range of entities and processes [19], such as:
automated or information systems and their individual components; organizational and
management processes; technical means; business procedures; the overall activities of the
enterprise.</p>
        <p>From the perspective of audit form, an IS audit may be: organizational and regulatory [20],
where the subject of analysis is measures and regulatory documents ensuring IS; technical, where
the subject of analysis is the technical means of information processing.</p>
        <p>The set of IS risk analysis methods is based on two models:
1. Compliance-based model – risk is determined by comparing the compliance of the protected
object with IS requirements derived from standards, regulatory acts, and system operating
conditions.
2. Probability-damage model – risk is determined by assessing the probabilities of threats and
attacks, as well as the magnitude of potential material damage.</p>
        <p>Conceptually, IS audit models can be grouped into three practical and three theoretical
approaches.</p>
        <p>Practical approaches: audit based on risk analysis; audit based on IS standards analysis; audit
incorporating experimental studies of the object.</p>
        <p>Theoretical approaches: audit based on process modeling; audit based on an assessment model;
audit using the maturity model.</p>
        <p>One of the most widespread methods is the standards-based audit, since standards provide a set
of requirements and recommendations for IS, grounded in professional experience, and serve as
regulatory references in the professional community.</p>
        <p>
          IS audits can be conducted for compliance with international standards such as ISO/IEC TS
33030:2017 [21], ISO/IEC 21827:2008, and ISO/IEC 27001:2022 [22], depending on the organization’s
tasks. In Ukraine, the Resolution of the Cabinet of Ministers of Ukraine of 19.06.2019 No. 518 [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]
defines the general requirements for the cyber protection of critical infrastructure facilities.
However, practice has shown that without a clear understanding of cybersecurity structures and IS
standards, it is impossible to conduct audits effectively [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. The accumulated knowledge has laid
the groundwork for understanding the functional features of intelligent internal audit systems [23].
        </p>
        <p>The ISO/IEC 27002:2022 standard [24] is a key document that defines the main directions of IS
management in organizations and often serves as the foundation for audits. Notably, research such
as [25] examined the benefits of cross-implementation of cybersecurity audit standards. However,
as this approach falls outside the scope of the present study, it is not considered further.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Research results</title>
      <p>Returning to international standards, it should be noted that the vast majority of basic standards in
the field of IS protection and IS management at enterprises have a predominantly descriptive
nature. They provide sets of recommended management actions but generally lack: criteria for the
completeness of management actions; discrete and unambiguously interpretable indicators of
feasibility and effectiveness; methods for achieving the intended results; clear instructions for
implementing compliance checks.</p>
      <p>The main difficulties in conducting an IS audit for compliance with standards stem from the
absence of a clear and consistent audit methodology, as emphasized in [8]. When auditing IS,
subjectivity should be minimized, since the reliability of audit results increases with their degree of
formalization. Nevertheless, it is impossible to completely eliminate subjectivity.</p>
      <p>The formalization of audit processes is a relevant but still understudied research direction.
Attempts at formalization have been made, primarily in relation to individual aspects of audits,
using the so-called “audit approach based on the reference model” [12]. The task of formalization is
to ensure the repeatability and independence of audit procedures and results.</p>
      <p>One of the most effective practices is the development of checklists (control charts) that define
the sequence of audit procedures, the processes being verified, and their discrete indicators.</p>
      <p>To illustrate, let us consider the audit tasks and actions when assessing an organization’s IS
compliance with the ISO/IEC 27002:2022 standard. This standard defines security requirements
based on: IS risk assessment; regulatory requirements; specific organizational principles shaped by
the enterprise’s environment.</p>
      <p>The standard prioritizes protection of three categories of information: personal data;
organizational credentials; intellectual property.</p>
      <p>The set of protective measures includes: the presence of IS policies; distribution of
responsibilities for IS; staff training on IS issues; procedures for reporting IS incidents; business
continuity management.</p>
      <p>The protection of personal data and privacy is of particular importance for a modern society
[26]. Based on public needs, protective measures must be applied to each information category.
Conversely, each measure should be designed to cover all categories of information.</p>
      <p>To systematize these relationships, a generalized protection matrix (Table 1) is proposed. It
defines 15 protection functions (F11, …, F53), each of which can be assessed by the degree of
compliance with the defined requirements.
The ISO/IEC 17799:2005 standard divides IS management processes into ten key areas [27]:
1. Security policy.
2. Information security organization.
3. Asset management.
4. Human resource security.
5. Physical and environmental security.
6. Communications and operations management.
7. Information systems acquisition, development, and maintenance.
8. Business continuity management.
9. Information security incident management.
10. Compliance.</p>
      <p>The objectives and controls specified in ISO/IEC 17799:2005 are designed to address
requirements identified through risk assessment. This standard serves as a general framework and
provides practical guidance for developing organizational security standards and implementing
effective IS management practices.</p>
      <p>The auditor’s direct actions are aimed at verifying the compliance of the facility’s security
measures across these ten areas. Such checks must be carried out using the most objective and
repeatable methods available. The developed author’s model of audit control, structured within the
selected areas, is presented in Figure 1.</p>
      <p>The general scheme of the process data interaction model for information security audit
management within the framework of the implementation of the information security management
method based on dynamic expert decision support systems is presented in Figure 2.</p>
      <p>According to the proposed model, the auditor: determines the facts related to the audited
procedures and the applied methods of information protection; collects evidence (confirmations) of
these facts; uses exclusively objective, discrete criteria; records the results of the audit as
unambiguously interpreted or calculated indicators.</p>
      <p>The system of objective indicators and audit control criteria is fundamental. For this purpose,
auditors can, in particular, be guided by the ISO/IEC 27001:2022 standard. Audit procedures within
the ISO/IEC 2700x standards system, implemented in the PDCA cycle, constitute an independent
concept and are not considered in this study.</p>
      <p>Table 2 provides an example of management objectives and measures selected from the ISO/IEC
27001:2022 standard for the area “Information Security Policy” [22].</p>
      <sec id="sec-4-1">
        <title>The information security policy must be approved by management, issued, and communicated to all employees of the organization, as well as to third-party organizations</title>
      </sec>
      <sec id="sec-4-2">
        <title>The organization’s information security policy must be analyzed and revised at specified intervals, or when significant changes occur in the characteristics of security objectives</title>
        <p>The information provided is decisive for assessing compliance, since it specifies the facts that
the auditor must confirm or refute. However, it does not contain verification criteria. Therefore,
there is a need to create a formalized scheme and/or algorithm of audit actions based on discrete
criteria and clearly defined objective indicators.</p>
        <p>Such a model can be represented as checklists consisting of clearly formulated questions, to
which only explicit, unambiguous answers are possible, thus excluding subjectivity.</p>
        <p>To build these checklists, we use the objectives, measures, and requirements formulated in the
ISO/IEC 27001:2022 standard.</p>
        <p>As an example, in the area of “Information Security Policy” the standard emphasizes the
responsibility of the organization’s top management for participation in IS-related decisions in
accordance with business objectives, laws, and regulatory requirements.</p>
        <p>The current legislation of Ukraine does not establish direct requirements for the form or content
of IS policies. As a result, organizations demonstrate diverse approaches to their development. In
contrast, the ISO/IEC 17799:2005 standard defines minimum requirements for IS policy content,
although a detailed review is beyond the scope of this study. Based on these requirements and
instructions, the auditor compiles a set of questions forming a checklist, to which answers are
sought in the form of evidence and supporting facts during the audit process.</p>
        <p>Requirements for evaluation criteria. The evaluation criteria must be objective, discrete,
calculable, measurable.</p>
        <p>Requirements for checklist questions: answers must be clear and unambiguous; answers must be
verifiable; questions must not allow for subjective reasoning.</p>
        <p>Table 3 presents a sample checklist for auditing in the area of “Information Security Policy.” The
proposed checklist can be expanded by the auditor depending on specific tasks.</p>
        <p>The principles of checklist construction are as follows: all questions are grouped into levels (in
this case, three); if the answer to a higher-level (first-level) question is negative, there is no need to
continue with the lower-level questions; alternative models of level representation for security
assessment in the audit process are also described in [27].</p>
        <p>1
2
N
1
2
2</p>
      </sec>
      <sec id="sec-4-3">
        <title>Have employees received training on information security?</title>
      </sec>
      <sec id="sec-4-4">
        <title>Answer</title>
      </sec>
      <sec id="sec-4-5">
        <title>Discrete</title>
      </sec>
      <sec id="sec-4-6">
        <title>Calculated</title>
        <p>Yes / No
Yes / No
Yes / No</p>
        <p>As shown in Table 3, all collected confirmations are expressed either in discrete values (yes/no,
present/absent, compliant/non-compliant, etc.) or in calculated indicators (average test score,
percentage of employees familiarized or trained, etc.). It is important not to confuse verification of
employees’ knowledge of a specific organizational IS policy (as an internal regulatory document)
with testing their knowledge of the general theory and methodology of information protection.
The following principles for compiling checklists can be formulated:
1. The fulfillment of each requirement of a regulatory document is determined by a control
indicator.
2. Each control indicator appears in the form of an extremely clear, unambiguously
interpreted question that provides for an unambiguous objective answer.
3. The answer to the question can be either discrete or in measurable, calculated values.
4. All questions that form control indicators are divided into levels.
5. Questions of the first (higher) level globally determine the facts of the fulfillment of the
requirements.
6. Questions of the second and subsequent (lower) levels detail the degree of fulfillment of the
requirements and characterize the level of protection.
7. The auditor collects answers to questions to confirm the facts.
8. With negative answers to questions of the upper levels, there is no point in checking
statements on questions of the lower levels.
9. The quality of the formulations of control questions is determined by their objectivity,
which is expressed in The indisputability of the answers even from the standpoint of
thirdparty interest.</p>
        <p>In the general case, based on the stated principle of checklist formation, each question
(indicator) Si is described as the following function (1):</p>
        <p>Si ( j)={X i∣Zi },
where i – the question number, j – the question level, X – the discrete value of the answer
(1 – “yes”, “fulfilled”, “present”; 0– “no”, “not fulfilled”, “absent”);</p>
        <p>Z – the calculated value of the answer (expressed in fractions, percentages, or other units, e.g.:
1 – “fully satisfied”, 0.75– “mostly satisfied”, 0.5– “partially satisfied”, 0.25– “to a lesser extent”,
0 – “not satisfied”).</p>
        <p>For first-level controls, it is advisable to use only questions with discrete answers.</p>
        <p>The audit requirements are defined as follows:(1) = 1 compliance with 100% of the first-level
criteria; achievement of a minimum pre-defined performance threshold for the second and
subsequent levels.</p>
        <p>The thresholds for minimum performance are set as:
1. For the second level: at least 80% of the questions must be answered positively.
2. For the third level: at least 60% of the questions must be answered positively.</p>
        <p>When preparing for the audit, checklists must be developed for all ten areas defined in the
standard. Each question () is mapped to the corresponding function(s) F11, …, F53, forming a
correspondence matrix (Table 4). To ensure the maximum connectivity between indicators and
functions, the total number of completed measures is calculated along the rows (t) and columns (k)
of the matrix, which reflects compliance both horizontally and vertically.
(1)
(2)
The sums of all responses at each level are calculated using formula (2):
where j – the current level.</p>
        <p>The number of correspondences between answers and functions (3) is calculated:
n
D N =∑ Si ( j) . (3)</p>
        <p>i=1</p>
        <p>The relevance of the compiled model is evaluated according to the principle of homogeneity,
i.e., the obtained values of CN and DN should not differ significantly from each other. For the case
with 15 functions F11, …, F53, the value of CN is expected to lie approximately within the range
of 3-5.</p>
        <p>During the verification process, the auditor may also include additional measures in the
checklists to assess the adequacy and effectiveness of information protection mechanisms, or
organize them as part of a separate security research program. Such measures may include tests of
the organizational structure’s resistance to information-technical influences, and
informationpsychological influences.</p>
        <p>While the assessment of resistance to information-technical influences is carried out within the
framework of a technical and instrumental audit, the assessment of resistance to
informationpsychological influences can serve as a useful complement to the documentary audit. It helps
identify the practical resilience of the organization’s staff to information security threats.</p>
        <p>Such test measures can be developed by the auditor, taking into account structural models of
socio-psychological threats to information security.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>Thus, an information security audit is currently one of the most effective tools for obtaining an
independent and objective assessment of the enterprise’s security level against information threats.
Moreover, audit results form the basis for developing an organization’s information security
strategy. It should be emphasized that an audit is not a one-time procedure but must be conducted
on a regular and systematic basis. Only under this condition will the audit produce real results and
contribute to improving the company’s overall level of information security.g channels, and
creating a connection graph. The results are stored in the database for future use.</p>
      <p>The proposed audit method is based on the formalization of the protection matrix and the
development of objective checklists. The principles for compiling such checklists and assessing
their relevance have been defined. An IS audit conducted according to the described model
provides objective, repeatable, and unambiguous results, while also allowing the identification of
weaknesses in the protection system and the development of recommendations for improving
organizational security. Therefore, the application of this model is particularly advisable for audits
of state institutions and critical infrastructure in Ukraine.</p>
      <p>To enhance information security, it is recommended that government agencies in Ukraine
conduct audits of critical infrastructure facilities in accordance with the PDCA (Plan–Do–Check–
Act) cycle. The influence of audit frequency on the level of compliance is illustrated in Figure 3.
1. Awareness and motivation of the management of critical infrastructure facilities.
2. Confidentiality.</p>
      <p>3. Trust.
5.1. Scientific novelty. Scientific justification
The scientific uniqueness of this work lies in the proposed formalized model of information
security audit for organizational compliance with international standards. The model is based on
the principles of independence and objectivity of audit activities. It introduces an approach
grounded in a system of objective indicators comparable to protection functions, and relies on the
development of checklists with clear criteria linking indicators to verification methods. The
obtained scientific result expands the scope of technical sciences in the field of cybersecurity.</p>
      <sec id="sec-5-1">
        <title>5.2. Practical use</title>
        <p>The proposed scientific solution is ready for practical implementation by audit committees,
provided that auditors are adequately trained and supported by organizational management and
security administrators.</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.3. Prospects for further research and study</title>
        <p>Future research should focus on refining the methodology for developing checklists applicable to
any standard or regulatory document that may require compliance audits.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used ChatGPT in order to: Grammar and spelling
check. After using these tools/services, the authors reviewed and edited the content as needed and
take full responsibility for the publication’s content.
[8] I. M. Kozubtsov, L. M. Kozubtsova, V. V. Kutsaiev, T. P. Tereshchenko, Methodology for
assessing the cybersecurity of an organization's communication system, Modern Information
Technologies in Security and Defense 1 (31) (2018) 43–46. URL:
https://sit.nuou.org.ua/article/view/158236/158380.
[9] I. M. Kozubtsov, L. M. Kozubtsova, Setting the task of developing a methodology for assessing
the cybersecurity of information and telecommunications systems, in: Proceedings of the
International Scientific and Practical Conference “Joint Actions of Military Formations and
Law Enforcement Agencies of the State: Problems and Prospects”, Military Academy, Odessa
Ukraine, 2019, pp. 228–229.
[10] L. M. Kozubtsova, O. I. Beskrovnyi, I. M. Kozubtsov, Structure of the methodology for
evaluating the effectiveness of measures aimed at ensuring the cybersecurity of critical
information infrastructure facilities, in: Proceedings of the International Scientific and
Technical Conference Systems and Technologies of Communication, Informatization, and
Cybersecurity: Current Issues and Development Trends, VITI, Kyiv Ukraine, 2021, p. 160.
[11] L. M. Kozubtsova, Yu. I. Khlaponyn, I. M. Kozubtsov, Methodology for assessing the
effectiveness of cybersecurity measures for critical information infrastructure facilities of
organizations, Modern Information Technologies in Security and Defense 2 (41) (2021) 17–22.
doi:10.33099/2311-7249/2021-41-2-17-22.
[12] M. V. Artemchuk, R. M. Shtonda, I. H. Neshcheret, T. P. Tereshchenko, I. V. Tsymbal, V. O.</p>
      <p>Prydatchenko, Methodology for conducting an independent audit of an institution's
information security regarding the effectiveness of information protection, Bulletin of VITI.</p>
      <p>Communication and Information Systems 2 (2021) 4–17.
[13] I. Kozubtsov, N. Lishchyna, L. Kozubtsova, I. Trush, A. Yashchuk, Information technology of
information security audit of objects of critical infrastructure, in: Proceedings of the Selected
Papers of the Workshop on Emerging Technology Trends on the Smart Industry and the
Internet of Things, TTSIIT ’2022, CEUR Workshop Proceedings, Aachen, Germany, pp. 97–106.
[14] Yu. Yakymenko, D. Rabchun, T. Muzhanova, M. Zaporozhchenko, Yu. Shchavinskyi, Technical
audit of the security of information and telecommunications systems of enterprises,
Cybersecurity: Education, Science, Technology 4 (20) (2023) 45–61.
doi:10.28925/26634023.2023.20.4561.
[15] A. Desyatko, V. Gamaliy, R. Shirshov, Information technologies and systems for organizing
internal auditing of enterprises, Cybersecurity: Education, Science, Technology 1 (29) (2025)
867–876. doi:10.28925/2663-4023.2025.29.947.
[16] N. Anjum, M. R. Chowdhury, Revolutionizing cybersecurity audit through artificial
intelligence automation: A comprehensive exploration, Int. J. Adv. Research in Computer and
Communication Engineering 13 (5) (2024) 493–502. doi:10.17148/IJARCCE.2024.13575.
[17] V. Obodyak, M. Otroshchenko, V. Lyubchak, Artificial intelligence capabilities for
cybersecurity audit and risk management, Cybersecurity: Education, Science, Technology 1
(29) (2025) 319–330. doi:10.28925/2663-4023.2025.29.872.
[18] P. Lakarasu, AI for cybersecurity audits: Enhancing transparency and accountability, 2025.</p>
      <p>URL:
https://medium.com/@phanishlakarasu/ai-for-cybersecurity-audits-enhancingtransparency-and-accountability-a4572a59b436.
[19] H. A. Reijers, Business process management: The evolution of a discipline, Computers in</p>
      <p>Industry 126 (2021). doi:10.1016/j.compind.2021.103404,
[20] S. I. Makarenko, Information security audit: Milestones, conceptual framework, classification
of activities, Sistemy upravleniya, svyazi i bezopasnosti 1 (2018) 1–29.
[21] ISO/IEC TS 33030:2017, Information technology – Process assessment – An exemplar
documented assessment process, 2017. URL: https://www.iso.org/standard/55121.html.
[22] ISO/IEC 27001:2022, Information security, cybersecurity and privacy protection – Information
security management systems – Requirements, 2022. URL:
https://www.iso.org/standard/27001.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Petrenko</surname>
          </string-name>
          ,
          <article-title>Action plan for the implementation of defense reform in 2016-2020 (roadmap for defense reform</article-title>
          ),
          <source>Kyiv, DVPSP and MS of the Ministry of Defense of Ukraine</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] Law of Ukraine “On basic principles of ensuring cybersecurity of Ukraine”</article-title>
          ,
          <year>2017</year>
          . URL: https://zakon.rada.gov.ua/laws/show/2163-
          <fpage>19</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] On the decision of the National Security and Defense Council of Ukraine of January 27, 2016 “On the cybersecurity strategy of Ukraine”</article-title>
          , Presidential Decree No.
          <volume>96</volume>
          /
          <year>2016</year>
          ,
          <year>2016</year>
          . URL: https://zakon5.rada.gov.ua/laws/show/96/
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] Decision of the National Security</article-title>
          and
          <source>Defense Council of Ukraine of 10.07</source>
          .17 “
          <article-title>On the status of implementation of the decision of the NSDC of 29</article-title>
          .12.
          <year>2016</year>
          '
          <article-title>On threats to state cybersecurity and urgent measures to neutralize them'”</article-title>
          , Presidential Decree No.
          <volume>254</volume>
          /
          <year>2017</year>
          ,
          <year>2017</year>
          . URL: https://zakon.rada.gov.ua/laws/show/n0006525-
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>[5] Resolution of the Cabinet of Ministers of Ukraine No. 518 of 19.06</source>
          .19 “
          <article-title>On approval of general requirements for cyber protection of critical infrastructure facilities</article-title>
          ”,
          <year>2019</year>
          . URL: https://zakon.rada.gov.ua/laws/show/518-2019-п.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Ya. V.</given-names>
            <surname>Roi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. P.</given-names>
            <surname>Mazur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Information security audit - the basis for effective enterprise protection</article-title>
          ,
          <source>Cybersecurity: Education, Science, Technology</source>
          <volume>1</volume>
          (
          <issue>1</issue>
          ) (
          <year>2018</year>
          )
          <fpage>86</fpage>
          -
          <lpage>93</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2018</year>
          .
          <volume>1</volume>
          .8693.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sirotskiy</surname>
          </string-name>
          ,
          <article-title>Metric approach to assessing information security in banking organizations</article-title>
          ,
          <source>Sistemy bezopasnosti 25</source>
          (
          <year>2016</year>
          )
          <fpage>126</fpage>
          -
          <lpage>129</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>