Enhancing Network Security

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Security Controls – What Works
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Network security policy: best practices
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Website Hardening HUIT IT Security | Sep
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
MnSCU Audit Reports Presentation to the MnSCU Audit Committee Office of the Legislative Auditor September 21, 2004.
HIPAA COMPLIANCE WITH DELL
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
Auditing Information Systems (AIS)
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Chapter 2 Securing Network Server and User Workstations.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Internal Audit Considerations for Cybersecurity Risks Posed by Vendors October th, 2015 Chicago IIA Chapter’s 2 nd Annual IIA Chicago IT Hacking.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
New A.M. Best Cyber Questionnaire
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
OTech CalCloud Security General 1  Meets the operational and compliance requirements of the State  SAM/SIMM  NIST  FedRAMP v2  Other necessary regulatory.
Information Security tools for records managers Frank Rankin.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Law Firm Data Security: What In-house Counsel Need to Know
Review of IT General Controls
BruinTech Vendor Meet & Greet December 3, 2015
New A.M. Best Cyber Questionnaire
Presenter: Mohammed Jalaluddin
WSU IT Risk Assessment Process
Cybersecurity - What’s Next? June 2017
Working at a Small-to-Medium Business or ISP – Chapter 8
Security Standard: “reasonable security”
Secure Software Confidentiality Integrity Data Security Authentication
Data Security Policies
Security and Encryption
Introduction to the Federal Defense Acquisition Regulation
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
NERC CIP Implementation – Lessons Learned and Path Forward
Audit Findings: SQL Database
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Chapter 8: Monitoring the Network
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Lesson 16-Windows NT Security Issues
Identity & Access Management
What a non-IT auditor needs to know about IT & IT controls
– Chapter 3 – Device Security (B)
Contact Center Security Strategies
Information Security Awareness
How to Mitigate the Consequences What are the Countermeasures?
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
IS4680 Security Auditing for Compliance
Cybersecurity Threat Assessment
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Anatomy of a Common Cyber Attack
Presentation transcript:

Enhancing Network Security Ashish Jain, CPA, CIA, CISA, CA Director of Internal Audit, USNH January 26, 2017

Webinar Moderator Jana Clark Don’t forget to connect with us on social media! ACUA Distance Learning Director Jana Clark Senior Internal Auditor Kansas State University

Today’s Presenter Ashish Jain, MSA, CPA, CIA, CISA, ACDA Director of Internal Audit, University System of New Hampshire a.jain@usnh.edu

University System of New Hampshire 34,000 enrolled students 4 institutions - 15 locations Largest provider of postsecondary education in NH Produces 61% of STEM graduates in state Lowest student loan default rate in US Degree completion 78% - US average is 63%

Poll # 1 Average number of IT audits performed by your IA department during a year. None 1 to 5 6 to 10 11 or more

Why Audit Network Security? Higher education culture Cybersecurity Often overlooked in internal audit plan Complexity Wide scope Internet of Things (IoT)

Common design gaps and issues Resources Key areas to cover Agenda Key risks Common design gaps and issues Resources Key areas to cover Common issues and hurdles

What is Network Security? “Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.” Source: www.sans.org/network-security

Where to Start? Network diagram Inventory of network devices Results of recent penetration testing Organization chart Network security policies, procedures, and standards

Key risks Risk Assessment Physical security Configurations Change management Access Risk analysis and monitoring Attack vectors

Audit Approach Select network devices based on Sensitivity of data Location Type of device Ask for configuration files (for selected devices)

Audit Approach Develop knowledge on selected device NIST or vendor recommendations Federal Information Processing Standard (FIPS) mode Configuration guide Policies and procedures PCI-DSS

Poll # 2 Has your internal audit department audited network security at your institution? Yes No Hired a consultant to do it Not sure

Audit Focus Areas

1. Usernames Look for Generic IDs Access justification Privilege level Password encryption

2. Password Encryption Test: Encryption settings are enabled Proper algorithm used

3. Password Policy Test Password parameter are configured in accordance with policy

4. Key Management Shared keys are used for authentication between two network resources Test: Unencrypted keys/passwords in configuration files Settings – key length, encryption Change protocols of keys Who knows and maintains these?

5. Clock Settings Appropriate settings are needed for forensics Test: Current time is accurate Daylight time settings

6. Patch Level Test: Compare OS patch level against recommended by vendor Understand upgrade procedures if significant security vulnerability is identified

7. Remote Login Protocols Inquire on existing practices and see policies & standards Test Is activity logged? Best Practices Dedicated management interface Two-factor authentication Dedicated VPN Procedures to confirm the integrity of device configurations

Poll # 3 Do your organization have a formal information security architecture? a) Yes b) No c) Unsure

8. Available Services Test: Which services are really needed Who ensures these services are appropriate Look for common exploited services, e.g., telnet Benchmark against organization’s policy on allowed services Common Finding No standards and periodic review of key configurations

9. ICMP Used to gather information about a network device Test ICMP should be limited to hosts with a business need

10. Simple Network Management Protocol (SNMP) Test: Default community names Version used – (version 3 is currently recommended) Authentication Encryption used Common audit finding – version 1 or 2c is active while version 3 is mainly used

Other Areas Enable logging and log review Anti spoofing settings Authentication, authorization, and accounting (AAA) Login banners IP fragmentation Access Control Lists (ACL) Session time outs

Common Issues Default settings Lack of network security policies, procedures, and standards Generic IDs or shared accounts Lack of network device inventory Segregation of duties between maintenance and security authorization

Poll # 4 Is a network security audit on your audit plan in the next year? a) Yes b) No c) Unsure

Summary Security standards Periodic review of key configurations Segregation between security and maintenance Physical security Key management Remote access

Questions?

Contact Information Ashish Jain, MSA, CPA, CIA, CISA, ACDA Director of Internal Audit, University System of New Hampshire a.jain@usnh.edu http://www.usnh.edu/internal-audit

Upcoming ACUA Events How Internal Audit & Billing Compliance/Privacy Functions Can Build a Synergistic Working Relationship February 16, 2017 Title IX Auditing (encore performance March 8, 2017 Intersection of ERM, Compliance, and Internal Audit March 21, 2017 2017 ACUA Midyear Conference – Austin, TX March 26-29, 2017 Using Interns in the Audit Shop April 19, 2017