Best Practices in Auditing and Reviewing Cybersecurity Procedures and Compliance with Controls