IT Audit Processes and Audit

Slides:



Advertisements
Similar presentations
EMS Checklist (ISO model)
Advertisements

Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Document Control DAP Quality Conference May 12, 2008 Debbie Penn.
E-Discovery New Rules of Civil Procedure Presented by Lucy Isaki January 23, 2007.
BUSINESS PROCESS IMPROVEMENT INITIATIVES Chad Cleveland June 18, 2014 BAAF Meeting.
OFFICE OF PROGRAM POLICY ANALYSIS & GOVERNMENT ACCOUNTABILITY The Legislative Sunset Review Process Darwin Gamble, Senior Legislative Analyst OPPAGA February.
Institute of Municipal Finance Officers & Related Professions
Session 6: Data Integrity and Inspection of e-Clinical Computerized Systems May 15, 2011 | Beijing, China Kim Nitahara Principal Consultant and CEO META.
April 2, 2013 Longitudinal Data system Governance: Status Report Alan Phillips Deputy Director, Fiscal Affairs, Budgeting and IT Illinois Board of Higher.
Agenda 1. Definition and Purpose of Data Governance
Electronic Records Management: What Management Needs to Know May 2009.
Wetlands Reserve Program Case Study An Overview of the External Audit Process Helping People Help The Land.
Creating an Effective Policy Central Missouri Chapter Jesse Wilkins April 16, 2009.
Agency Risk Management & Internal Control Standards (ARMICS)
Best Practices: Financial Resource Management February 2011.
Internal Risk Assessments and Corrective Action Planning IT Decentralized Risk Assessment Corrective Action Planning Workgroup February, 2010.
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
U.S. Department of Education Safeguarding Student Privacy Melanie Muenzer U.S. Department of Education Chief of Staff Office of Planning, Evaluation, and.
Expectations and Accountability in Regional Accreditation Ellie A. Fogarty, EdD – Vice President Debra G. Klinman, PhD – Vice President Middle States Commission.
ITCC / IT Retreat Data Access Procedure December 10, 2009 Karl F. Lutzen Information Security Officer.
South Hunterdon Regional School District Consolidated Monitoring Report (CMR) Presentation to the SHRSD Board of Education on October 26, 2015 Audit from.
Records Management in Government Prepared by the Information Management Unit Saskatchewan Archives Board.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Financial Management Policy Statements Annual Update and Review Presented to City Council by Lena H. Ellis, Director / CFO October 27, 2009.
ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
UW-Madison Guidelines for Managing the Records of Departing Employees*
Policy & Process November 29 & 30, 2016 Lori Donavant and Joe Croom
DEVELOPMENT OF STUDY PROGRAMS IN UNIVERSITY OF PRISHTINA/KOSOVO
COCE Institutional Review Board Academic Spotlight
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Federal Programs Department: Plan4Learning
Office of Information Technology October 18, 2016
The Do’s and Don’ts of Your Last Six Months in Office
The Federal programs department September 26, 2017
City of Richmond, California FY Draft Budget
Nuclear and Treaty Law Section Office of Legal Affairs
Understanding an External Federal Financial Statement Audit
Arizona Health-e Connection Leadership from Governor Napolitano
VERMONT INFORMATION TECHNOLOGY LEADERS
Policies, Processes, and Practices
IT Governance Planning Overview
How do we carry out the election process last year?
§ 1-6. Powers The General Faculty has power:
SIS Modernization project
Overview UNC Charlotte will soon offer Acalog/Curriculog as an electronic academic program and course approval system for creating, modifying, and accessing.
UNLV Data Governance Executive Sponsors Meeting
Enterprise Risk Management (ERM) at Clayton State University
Middle States Update to President’s Cabinet October 8, 2018
Donna Kragt: HLC Liaison April 11, 2017
SCHOOL TRAINING District Contact Information Dr. Peter Straker: ext Rachelle Fougere:
Purchasing & IT Security Originally Presented at Fall ACCBO
Course Evaluation Ad-Hoc Committee Recommendations
School Site council 101.
Compliance with the Freedom of Information Act 2000
Presentation to Project Certification Committee, DoIT August 24, 2008
Larry Bugh ECAR Standard Drafting Team Chair June 1, 2005
Roles and Responsibilities
HIPAA Policy & Procedure Strategies
Roles and Responsibilities
TECHNOLOGY ASSESSMENT
1915(c) WAIVER REDESIGN 2019 Brain Injury Summit
Fort Valley State University
SCHOOL TRAINING District Contact Information Dr. Peter Straker: ext Britt Bell:
University Policy Management Program
Budget and Legislative Request
Developing and Evaluating Processes and Practices
Part II Objectives Describe how policies and procedures are used
Faculty Grievance & Dispute Resolution Office
Presentation transcript:

IT Audit Processes and 2016 Email Audit 2017

What is an IT Audit? an examination of the practices, procedures, and management controls within an information technology (IT) infrastructure.

Auditing Agencies Federal Louisiana Legislative LSU Internal Typically grant-related Reports go to granting federal agency Louisiana Legislative Reports go to Legislature LSU Internal Reports go to University leadership

Process for Addressing IT Audits Receive audit findings from Internal Audit. Draft management response to audit findings. CFO and Provost approve management response. Communicate audit findings, responses, and initial timetable to departmental Technology Support Personnel (TSP) so they can absorb and respond. Develop draft policy language through security advisory committee. Submit draft policy to Academic Affairs for formal process and review by affected stakeholders. Receive and merge concerns from TSP’s and stakeholders. Determine which concerns can be addressed relative to the findings and how.  Develop strategy or strategies to address. Surface identified issues and strategies with ITS Faculty IT Advisory Council and other groups with interest. Revisit with internal audit and senior departmental admins to evolve strategies. Iterate to step 7 until all issues resolved or decisions rendered.

2016 Email Audit Conducted by LSU Internal Audit in early 2016 Areas of Focus Proper retention of email Disaster recovery and business continuity planning Logical and physical security Initial findings presented in July of 2016 Management response and final report in November 2016

2016 Email Audit Findings 5 Findings 3 Findings affect the Baton Rouge campus

Finding 1 Finding Response LSU management should revise PS 6.15, “Email Use Policy” to recognize the institution's responsibility for ensuring compliance with retention requirements. Response The LSU IT Security and Policy Group will convene an advisory group and begin the process of revising PS 06.15 and possibly other information security policies in the current fiscal year (FY17).

Finding 2 Finding Response LSU should take steps to implement the legal hold or archival controls of emails as soon as possible. LSU ITS has tested and is prepared to deploy legal hold controls for the campus-wide Office 365 email system. The legal hold controls provided will ensure that emails are retained as required. Response Implemented August 1, 2016 (for central email systems).

Finding 3 Finding Response Notes All departments currently operating independent email systems, with the exceptions noted below, should begin migration of users to the LSU Office365 email system. All employees on the LSU campus are provided with an LSU email account within the Office 365 system deployed by LSU ITS. This recommended action would provide email services at no additional cost to departments and would eliminate unnecessary duplication of services. The migration of email to the LSU Office 365 email system will also provide the necessary controls to address the legal requirements for email retention following the implementation of Recommendation 2. Response The LSU IT Security and Policy Group will begin developing a tentative plan for migrating unit email services to the central Office 365 service in the current fiscal year. Notes Louisiana Revised Statutes, Title 44

Status of the Mitigation Process for the 2016 Email Audit Receive audit findings from Internal Audit. Draft management response to audit findings. CFO and Provost approve management response. Communicate audit findings, responses, and initial timetable to departmental Technology Support Personnel (TSP) so they can absorb and respond. Develop draft policy language through security advisory committee. Submit draft policy to Academic Affairs for formal process. Receive and merge concerns from TSP’s and senior departmental admins. Determine which concerns can be addressed relative to the findings and how.  Develop strategy or strategies to address. Surface issues and strategies with ITS Faculty IT Advisory Council and other groups with interest. Revisit with internal audit and senior departmental admins to evolve strategies. Iterate to step 7 until all issues resolved.

Draft Policy Language General Policy LSU owns all LSU.EDU e-mail addresses/ accounts/ boxes. E-mail addresses/ accounts/ boxes are assigned to individuals as a tool for facilitating teaching, research, and conducting University business.    Primary e-mail accounts are not to be transferred to any other person; however, primary e-mail accounts may be shared with another individual, based on business requirements.

Draft Policy Language Naming Convention (email accounts) Employees and affiliated individuals who are granted an LSU e-mail account will receive an address in a format and design determined by the University that is distinguishable, as well as unique. Departmental Email Services The University is required to comply with Louisiana R.S.Title 44 which outlines the requirements for retention or archiving of e-mail. Thus, University departments shall not operate their own departmental e-mail services in order to facilitate compliance and public records requests.

Draft Policy Language Email Retraction The University’s Information Security Team may also retract messages from University e-mail accounts that have been identified to be malicious and intended to cause harm to the University community, systems and/or network. Any retraction to be conducted by the Information Security Team shall be provided to the Chief Information Security Officer (CISO) in writing and approved prior to being implemented. 

What’s next? Formal review of policy language through Academic Affairs established process Documentation and validation of any business requirements surfaced by TSP’s and reviewers University decision on the question of branding Selection and implementation of new Identity and Access Management System (IAM) and other IT solutions to address identified and accepted business requirements.

Questions?