The Problem with Most Cybersecurity Audits

The cybersecurity audit market has a credibility problem. Too many audits are designed to produce a pass, not to find problems. Organisations engage an auditor, receive a report full of findings rated low or medium, implement a handful of quick fixes, and declare themselves secure. Then a breach happens and the audit report turns out to be worthless.

This pattern is not rare. It is the norm. The reason is structural: many audits are scoped too narrowly, conducted too quickly, or performed by teams that lack the technical depth to test controls properly. A governance review that never touches a firewall rule. A compliance checklist that asks whether a policy exists but not whether anyone follows it. A technical scan that runs automated tools but never validates findings manually.

The ASD's Annual Cyber Threat Report consistently shows that the most common attack vectors, phishing, exploitation of public-facing applications, and valid credential abuse, succeed precisely where audits should be catching weaknesses. Over 94,000 cybercrime reports were submitted to the ASD in 2023-24, with the average cost of a cybercrime incident reaching $49,600 for small businesses and $62,800 for medium businesses.

If your audit is not examining these areas with genuine rigour, it is not protecting you. It is giving you a document to point at when something goes wrong.

What a Genuine Cybersecurity Audit Should Cover

A cybersecurity audit worth paying for examines your entire security posture against a defined standard or framework. It goes beyond technical scanning to assess whether your organisation's security programme is designed, implemented, and operating effectively. Here is what that looks like in practice.

Governance and policy review

This is where most audits start, and where many of them stop. A proper governance review does not just confirm that policies exist. It assesses whether those policies are current, whether staff are aware of them, whether they reflect how the organisation actually operates, and whether accountability for security is clear from the board down to operational teams.

It should examine your security governance structure, risk appetite statement, security roles and responsibilities, and reporting lines. If your information security policy was last reviewed eighteen months ago and your environment has changed significantly since then, that is a finding. If your board receives a security update once a year in a slide deck, that is a finding too.

Technical controls assessment

This is where the audit needs technical depth. A genuine technical assessment evaluates your network security architecture, endpoint protection, identity and access management, encryption practices, logging and monitoring capability, and detection and response tooling. It should test whether controls are not just deployed but operating as intended.

For Australian organisations, this assessment should map directly to the Essential Eight mitigation strategies as a technical baseline. Application control, patching, macro settings, user application hardening, restricting administrative privileges, multi-factor authentication, regular backups, and patching operating systems. These eight controls address the vast majority of common attack techniques, and the ASD provides clear maturity level definitions for each.

Compliance gap analysis

Every audit should include a clear mapping of your current state against the frameworks that apply to your organisation. For APRA-regulated financial entities, that means CPS 234. For critical infrastructure operators, the SOCI Act. For organisations pursuing or maintaining certification, ISO 27001:2022. For government contractors, the ISM and PSPF.

The compliance gap analysis should not be a spreadsheet with green and red cells. It should identify genuine gaps between what your framework requires and what your organisation actually does, with evidence to support each finding and a clear risk rating based on business impact.

Access control and identity

Identity is where the majority of breaches begin. Your audit should examine privileged access management, MFA coverage across all critical systems, service account proliferation and hygiene, directory configuration, role-based access controls, and the processes for onboarding and offboarding users. It should ask how many accounts in your environment have administrative privileges, whether that number is justified, and when those privileges were last reviewed.

Incident response capability

An audit should evaluate whether your incident response plan would survive contact with a real incident. That means assessing the plan itself, the escalation procedures, communication protocols, evidence of regular testing through tabletop exercises or simulations, and whether lessons from previous incidents or near-misses have been incorporated.

If your incident response plan has not been tested in the last twelve months, the audit should flag it. If your plan references roles or contacts that no longer exist, the audit should flag that too.

Third-party and vendor risk

Your security posture extends beyond your own environment. A thorough audit assesses how you evaluate and monitor the security of critical third-party suppliers, whether contractual security obligations are in place and enforced, and whether you have visibility into fourth-party risk. This is an area where vendor risk management has become a regulatory expectation, not just a best practice.

Why Australian Businesses Need Cybersecurity Audits Now

The regulatory and threat environment in Australia has shifted significantly in the past three years. Several factors have made regular cybersecurity audits a practical necessity rather than a discretionary exercise.

The regulatory stack has expanded

Australian businesses now operate under an expanding set of cybersecurity obligations. The Cyber Security Act 2024 introduced mandatory ransomware payment reporting. The SOCI Act expanded critical infrastructure obligations to cover eleven sectors. The Privacy Act review is progressing toward stronger enforcement powers and mandatory breach notification enhancements. CPS 230 added operational resilience requirements for APRA-regulated entities from July 2025.

Each of these frameworks expects organisations to demonstrate, not just claim, that their security controls are effective. A cybersecurity audit is the mechanism for producing that evidence.

Insurers are demanding proof

Cyber insurance underwriting has tightened considerably. Insurers now routinely require evidence of specific controls before issuing or renewing policies. MFA coverage, patching cadence, backup practices, and incident response capability are common requirements. A recent cybersecurity audit report demonstrating compliance with recognised frameworks has become one of the most effective tools for securing reasonable coverage at reasonable premiums.

Breach costs keep climbing

The cost of a data breach in Australia continues to rise. Beyond the direct financial impact, the reputational damage, customer attrition, and regulatory scrutiny that follow a breach can be existential for mid-market businesses. The Medibank, Optus, and Latitude Financial breaches demonstrated that no sector is immune, and that post-breach regulatory response in Australia is becoming more assertive.

A genuine audit conducted proactively is orders of magnitude cheaper than breach remediation conducted reactively.

How to Tell a Good Audit from a Compliance Exercise

Not all audits are equal. Here are the markers that distinguish a genuine cybersecurity audit from a box-ticking exercise.

Scope is defined by risk, not by budget. A good audit scopes the engagement around your actual risk profile and regulatory obligations, not around what can be done in the cheapest possible timeframe. If the scope excludes your cloud environment, your third-party ecosystem, or your identity architecture, the audit has blind spots by design.

Findings are evidence-based. Every finding in a quality audit report is supported by specific evidence: a screenshot of a misconfiguration, a log showing a control gap, a policy document that contradicts operational reality. Findings without evidence are opinions, and opinions do not survive regulatory scrutiny.

Risk ratings reflect business impact. Technical severity is not the same as business risk. A critical vulnerability on an isolated test system is less urgent than a medium-severity gap in your payment processing environment. Good auditors rate findings by what they mean for the business, not just by what the scanning tool says.

The report is actionable. A useful audit report does not just list problems. It provides a prioritised remediation roadmap with effort estimates, dependencies, and quick wins identified. It should tell your team what to fix first, what can wait, and what requires architectural change rather than a patch.

The auditor challenges you. If every finding in your audit is low risk and the overall conclusion is that your security programme is in good shape, either you genuinely have an exceptional security posture or you have a compliant auditor. In our experience, the former is rare.

Cybersecurity Audit vs Penetration Test: Understanding the Difference

These two services are complementary, not interchangeable, and confusing them is one of the most common mistakes we see.

A penetration test answers a specific question: can an attacker break into this system, network, or application? It simulates real attack techniques against your defences and reports what an adversary could achieve. It is technical, targeted, and focused on exploitability.

A cybersecurity audit answers a broader question: is your security programme designed, implemented, and operating effectively? It examines governance, policy, technical controls, compliance posture, and operational practices against a defined framework. It is structured, evidence-based, and focused on the health of the entire programme.

Most organisations need both. A penetration test without an audit tells you where you are vulnerable today but not whether your programme will prevent new vulnerabilities from appearing tomorrow. An audit without a penetration test tells you whether your controls are designed correctly but not whether they hold under pressure. The combination gives you both the strategic view and the tactical evidence.

When Your Organisation Needs a Cybersecurity Audit

Certain triggers should prompt an audit beyond the regular annual cycle:

  • Regulatory change. New or updated compliance obligations that affect your sector. The Cyber Security Act 2024, SOCI Act expansions, and CPS 230 are all recent examples that warrant a targeted audit.
  • Significant environmental change. Cloud migrations, acquisitions, major system deployments, or organisational restructures that change your attack surface or control environment.
  • Post-incident review. After a security incident or near-miss, a structured audit identifies root causes, control failures, and improvements needed to prevent recurrence.
  • Pre-certification preparation. Before an ISO 27001 certification audit or an Essential Eight maturity assessment, an internal audit identifies remaining gaps and prepares your team.
  • Insurance renewal. When your insurer requires evidence of security controls or when your existing coverage terms have changed.
  • Board or investor scrutiny. When leadership, investors, or customers require independent assurance that your security programme is effective.

What Good Looks Like

An organisation with a mature approach to cybersecurity auditing does several things consistently.

They audit against a defined framework, not against a generic checklist. They choose the standard that matters to their business, whether that is ISO 27001, the Essential Eight, CPS 234, or the NIST CSF, and they measure themselves against it honestly.

They treat audit findings as a risk management input, not as a compliance burden. Findings feed into the risk register, remediation is tracked, and progress is reported to leadership as part of the regular governance cycle.

They use audits to build a baseline and measure improvement over time. Comparing results across audit cycles shows whether remediation is working, whether new risks are emerging, and whether the security programme is maturing or stagnating.

They separate the audit function from the teams being audited. Independence is not optional. An audit conducted by the same team that built and operates the controls has an inherent conflict of interest, regardless of good intentions.

And they act on the results. The most expensive audit is one where the findings sit in a drawer. The second most expensive is one where only the easy fixes get addressed.

Where to Start

If your organisation has never conducted a formal cybersecurity audit, or if your last audit was a lightweight exercise that did not challenge you, start with an honest assessment of where you stand today. If you are looking for a cybersecurity audit provider, learn about our cybersecurity audit services or book a conversation directly.

A Lighthouse Assessment gives you an independent, multi-specialist evaluation of your security posture, covering governance, technical controls, and compliance alignment. It is designed to be transferable, with no lock-in, and it produces the kind of evidence-based findings that support both internal decision-making and external obligations.

If you already have an audit programme but suspect it is not rigorous enough, we are happy to have that conversation honestly. Call us on (02) 8916 6389.