1. Abstract......................................................................................................1 2. Introduction ................................................................................................1 3. The Red Tape ............................................................................................ 2 4. The PCAOB Proposed Auditing Standard..................................................3 5. The COSO Framework and IT Security......................................................4 The COSO Report Internal ponents..................................4 Control Environment .............................................................................4 Risk Assessment ..................................................................................6 Control Activities ...................................................................................7 Information munication ........................................................... 7 Monitoring .............................................................................................8 6. Conclusion .................................................................................................8