GOV-10

Second Line Independent Review

Oversight

Control Statement

The second line of defence regularly provides an independent review of the various cyber risk assessments and other control activities conducted by the first line of defence.

Description

The independence of the second line of defence is essential for ensuring that first-line risk assessments and control activities are credible, complete, and consistent with the organization's risk framework. This control requires that second-line functions (such as enterprise risk management, compliance, or dedicated cyber risk oversight teams) actively review, challenge, and validate the work performed by the first line. This includes examining the quality of risk assessments, the completeness of control testing, the accuracy of risk reporting, and the effectiveness of remediation activities.

Key Implementation Activities

  • 1 Establish a formal second-line review program with defined scope, frequency, and methodology for reviewing first-line cyber risk activities
  • 2 Conduct independent assessments of the quality, completeness, and accuracy of first-line risk assessments and risk ratings
  • 3 Review and challenge control testing results, remediation plans, and risk acceptance decisions made by the first line
  • 4 Provide formal findings and recommendations to first-line management and governance bodies, tracking remediation of identified issues
  • 5 Report on the overall effectiveness of first-line cyber risk management activities to executive leadership and governance committees

Evidence Examples

  • Second-line review program charter or plan defining scope, methodology, and schedule
  • Completed second-line review reports with findings, risk ratings, and recommendations
  • Evidence of first-line response to second-line findings (remediation plans, corrective actions taken)
  • Meeting records showing second-line reporting to governance committees on first-line effectiveness
  • Trend analysis showing second-line review findings over time and remediation rates

Maturity Levels

Level 1 Initial

The second line has limited involvement in reviewing cyber risk activities. Reviews, if any, are ad hoc and lack formal methodology. First-line activities are largely self-assessed without independent challenge.

Level 2 Managed

A structured second-line review program exists with regular reviews of first-line risk assessments and control activities. Findings are formally documented and tracked. The second line reports to governance committees.

Level 3 Optimized

Second-line reviews are comprehensive, risk-based, and leverage automated tools for continuous oversight. Review methodology is continuously improved. The second line proactively identifies systemic issues and emerging risk trends.

Evidence Requirements View all evidence

Type Evidence Item Frequency Level
Document Second line review program charter or plan with scope, methodology, and schedule Reviewed annually Required
Record Completed second line review reports with findings, ratings, and recommendations Per review Required
Record First line response records to second line findings (remediation plans, corrective actions) Per finding Required
Record Governance committee meeting records showing second line reporting on first line effectiveness Quarterly Required
Record Trend analysis of review findings over time and remediation rates Annually Expected
Record Evidence of second line independence (reporting structure, mandate documentation) Reviewed annually Expected

Framework Mappings

NIST CSF 2.0

GV.RR-02 GV.RR-03

ISO 27001:2022

9.1 9.2 9.3 10.1

COBIT 2019

MEA02.01 MEA02.02 MEA02.03 EDM03.02

FFIEC CAT

Governance - Independent Review