This document discusses how a PEST (Political, Economic, Social, Technological) analysis can be used as an effective model for security managers to audit security procedures. It provides an overview of what each factor in PEST analysis entails - political (government policies), economic (economic conditions), social (cultural trends), technological (technological changes). The document then explains how considering these PEST factors through a SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis can help identify potential threats to security from changes in the external environment. This would allow security managers to plan adequate responses and updates to procedures in advance to mitigate threats.