Created by Claudiu Tabac - © 2026
This material is open for educational and research use. Commercial use without explicit permission from the author is not allowed.
Audit Question Bank (ECIL-AQB)
A capability-driven framework for testing enterprise security reality beyond compliance documentation
Testing Security Reality, Not Paper Compliance
The Audit Question Bank translates the ECIL into structured inquiry designed to expose the truth about security capabilities. Unlike traditional audit approaches that verify control existence through documentation, this framework tests whether security actually operates as intended in practice.
These questions cut through superficial compliance exercises to reveal whether security exists as a living, governed capability or merely as policy language on paper. The focus shifts from checkbox validation to meaningful assessment of capability maturity, governance ownership, and operational effectiveness.
In ECIL , audit questions are deliberately framework-agnostic. They serve as capability-driven prompts that can be applied across ISO, NIS2, DORA, GDPR, and SOC 2 contexts without requiring translation or adaptation.
This approach enables consistent, rigorous questioning across regulatory lenses while maintaining focus on what matters most: whether security capabilities are real, operating effectively, and properly governed at the enterprise level.
Four Core Objectives
Verify Capability Reality
Test whether security capabilities are genuinely operational and effective, not just documented in policies and procedures
Enable Consistent Inquiry
Support uniform questioning methodology across different regulatory frameworks and compliance requirements
Shift Audit Focus
Transform audits from document validation exercises into genuine capability verification processes
Drive Strategic Dialogue
Enable meaningful conversations with executives and architects about security maturity and organizational risk
Application Across Security Domains
The Audit Question Bank is designed for versatile application across multiple security assessment contexts. These questions serve as investigative tools in formal audits, capability assessments, architecture reviews, and strategic leadership discussions. They can be deployed during initial assessments, continuous monitoring activities, or deep-dive investigations into specific security domains.
Capability Validation
Assess security maturity without relying on framework-specific checklists or predetermined control inventories
Alignment Testing
Expose gaps between governance intent documented in policies and actual execution in operational environments
Systemic Analysis
Identify underlying weaknesses in security architecture rather than cataloging isolated control deficiencies
The same core questions can be strategically reused across ISO 27001, NIS2, DORA, GDPR, and SOC 2 assessments. This reusability ensures consistency in evaluation approach while allowing regulatory-specific interpretation of findings and evidence requirements.
Governance, Risk & Accountability
Executive Ownership
These questions test whether cybersecurity risk is genuinely owned and actively managed at the enterprise level, not just acknowledged in board presentations.
Risk Ownership
Who owns cybersecurity risk at enterprise level, and how is this ownership exercised through decisions, resource allocation, and accountability mechanisms?
Risk Lifecycle
How are cybersecurity risks identified, assessed, accepted, or escalated through defined processes with clear decision authority?
Management Oversight
How is management oversight demonstrated beyond policy approval through active engagement, review, and intervention?
Business Alignment
How are security priorities aligned with business risk decisions and strategic objectives?
Identity, Access & Asset Security
Identity & Access Management
  • How is access entitlement justified, reviewed, and revoked over time?
  • How are privileged access paths identified and governed?
  • How is identity risk monitored across internal and external identities?
  • How does governance ensure access decisions remain risk-based?
Asset & Endpoint Awareness
  • How does the organization know what assets exist and which are critical?
  • How is asset ownership defined and enforced?
  • How are endpoints governed differently based on risk and role?
  • How are unknown or unmanaged assets detected?
Network & Segmentation
  • How are trust boundaries defined and enforced?
  • How is network exposure assessed and reviewed?
  • How does segmentation support risk containment?
  • How is network change governed and validated?
Detection, Development & Change Control
Logging, Monitoring & Detection
What events are considered security-relevant, and why were these specific events selected?
How is detection capability tested and validated on an ongoing basis?
How are alerts triaged, escalated, and resolved with clear ownership?
How is monitoring effectiveness reviewed and improved over time?
Secure Development & Change
How is security integrated into development and delivery processes?
How are changes assessed for security impact before implementation?
How is segregation enforced across development environments?
How is security debt identified and managed through remediation?
Third-Party Risk & Incident Response
Third-Party & Supplier Risk
How are suppliers classified by risk level, and what criteria determine these classifications?
How is security assurance obtained and validated for critical service providers throughout the relationship lifecycle?
How are supplier dependencies monitored over time to detect changes in risk exposure?
How are exit scenarios and contingency plans governed for critical suppliers?
Incident Response & Resilience
How is incident readiness demonstrated beyond maintaining documentation and playbooks?
How are response roles practiced and validated through realistic exercises and simulations?
How are lessons learned from incidents integrated into governance and operational improvements?
How is resilience measured and validated rather than assumed based on theoretical capabilities?
Data Protection & Privacy Governance
Protecting Information Assets Through Structured Controls
Data protection and privacy governance form the foundation of regulatory compliance and customer trust. These questions assess whether organizations have implemented genuine protection mechanisms that operate effectively in practice, not just documented policies that look impressive on paper.
Data Identification & Classification
How is sensitive data identified, classified, and protected based on regulatory requirements and business risk?
Privacy Risk Assessment
How are privacy risks assessed and governed through defined processes with clear accountability?
Lawful Processing
How is lawful processing ensured in practice through controls, monitoring, and validation mechanisms?
Transfer Controls
How are data transfers and sharing decisions controlled, documented, and reviewed?
Cross-Framework Application Strategy
The Audit Question Bank is intentionally designed to be framework-agnostic, enabling consistent application across diverse regulatory and compliance contexts. These questions focus on underlying security capabilities rather than framework-specific control requirements, allowing the same inquiry to support multiple assessment needs simultaneously.
ISO & SOC 2
Test governance reality and control effectiveness
NIS2 & DORA
Evaluate operational readiness and resilience
GDPR
Validate accountability and protection mechanisms

Different regulatory lenses apply distinct evaluation criteria to the same underlying answers. This approach eliminates the need for separate question sets for each framework while ensuring that assessments remain appropriately rigorous and contextually relevant. Auditors and assessors can ask the same capability-focused questions while interpreting responses through the specific requirements of their target framework.
Integration with ECILComponents
The Audit Question Bank operates as one pillar within the comprehensive ECIL . Its effectiveness depends on tight integration with complementary ECIL components that define capabilities, explain failure patterns, and establish evidence requirements.
This interconnected structure ensures that audit activities move beyond superficial compliance exercises into meaningful capability assessment that reveals genuine security posture.
Security Capability Clusters
Define what must exist in security architecture
Failure Mode Library
Explain how things break when capabilities fail
Evidence Library
Validate what proof exists to support claims
The Living Voice of Enterprise Security
The Audit Question Bank represents the practical voice of ECIL . It ensures that enterprise security is examined as a living system of capabilities, governance, and accountability, rather than as a static collection of controls and documents.
By grounding audit activities in capability-driven inquiry, this framework transforms security assessment from a periodic compliance obligation into an ongoing strategic conversation. Questions probe not just whether controls exist, but whether they operate effectively, adapt to changing threats, and receive genuine governance oversight.
This approach recognizes that meaningful security assurance emerges from understanding how capabilities function in practice, how risks are genuinely managed, and how accountability operates throughout the enterprise. The Audit Question Bank provides the structured methodology to conduct these investigations with rigor, consistency, and strategic insight.

Created by Claudiu Tabac — © 2026
This material is open for educational and research use. Commercial use without explicit permission from the author is not allowed.