Skip to content
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский
FreedomLab logoFreedomLab
  • Home
  • About
  • Training Center
    • Managing Risks: Safety and Security in Human Rights Work
    • Human Rights Monitoring
    • Trauma-Informed Interviewing: Skills and Techniques for Monitors
    • Independent Monitoring of Freedom of Peaceful Assembly
    • Other Educational Resources
  • Starlight Stadium
    • Episodes
      • Episode 1
      • Episode 2
      • Episode 3
      • Episode 4
    • Meet the Team
    • Behind the Scenes
  • Tool Library
  • Русский

Conducting a security audit

Breadcrumb Abstract Shape
Breadcrumb Abstract Shape
Breadcrumb Abstract Shape

Conducting a security audit

  • February 19, 2025
  • Com 0
Managing Risks: Safety and Security in Human Rights Work Module 3: Risk Management is not a One-off Activity Conducting a security audit

In this video, you will:

  • Explore the role of security audit and how it contributes to strengthening resilience
  • Understand your role in the audit process and how you contribute to its success
  • Understand the role of (external) auditors and how their expertise enhances security  
Main takeaways:
  • Conducting a security audit helps organisations assess vulnerabilities based on their specific risks, ensuring a targeted and effective security approach.
  • The management of the organization should provide auditors with a list of identified main risks. If they cannot identify the main risks themselves, the auditors can help in creating a list as the audit cannot begin without one.
  • The management should ensure that the auditors have access to relevant information and stakeholders to provide an accurate evaluation of the organization's security status. Evaluation can be done through various means, such as interviews, technical assessments and policy reviews.
  • Auditors provide a clear risk status overview and may suggest new risk management strategies. Management is then responsible for deciding how to handle each risk.
  • Ideally, a risk-based audit should take place regularly, and be integrated into an ongoing risk management cycle.
Exercise
Tailor the risk management process to your context

As you reach the end of your journey diving into the risk management cycle, take a moment to reflect and continue building on your own situation by completing the remaining sections of the risk management process exercise:

  • Assess whether the implementation is effective and identify any areas for improvement (Step 4)
  • Develop a plan to ensure the cycle is regularly repeated (Step 5)

Feel free to revisit any section of the form and fill in any missing information. You can also use this form as a template whenever you find it useful for practicing the risk management process!

Click here to start the exercise

Before moving on to the quiz, we recommend you to review the main takeaways of this module, and to check the additional resources provided under the “Materials” tab above.

Mandatory Resources:

Personal toolbox: wellbeing and stress-management
Toolbox Thumbnail
Exercise template: The risk management process
Exercise Thumbnail

Recommended Resources:

📄 Security audit framework: Safetag Project
📄 Guide: Strengthening the Inclusion, Protection and Wellbeing of Human Rights Defenders with Disabilities, Protection International
📄 Protection Manual for LGBTI Defenders, Protection International
📄 Guide: Our Rights, Our Safety: Resources for Women Human Rights Defenders, Just Associates 

For additional resources on security and safety, feel free to also explore our Repository of Tools.

Please note that the recommended external resources listed are not managed by FreedomLab. Please exercise caution when reviewing them.

Quizzes
Module 3 Quiz: Risk Management is not a One-off Activity
Previous Topic
Back to Lesson
Next Lesson
15_1

FreedomLab is supported by the
OSCE Office for Democratic Institutions and Human Rights.

  • About us
  • Training Center
  • Tool Library
  • Starlight Stadium
  • Contact Us
  • Privacy Policy
Icon-facebook Icon-linkedin2 X-twitter
Copyright 2025 FreedomLab. All Rights Reserved.
FreedomLab logo
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
FreedomLab logoFreedomLab
Login
Accessing this course requires a login. Please enter your credentials below!

Lost Your Password?
Register
Don't have an account? Register one!
Register an Account