ISecurity Compliance with Sarbanes-Oxley & COBIT.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

ISecurity Compliance with HIPAA. Part 1 About HIPAA.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Control and Accounting Information Systems
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
The Islamic University of Gaza
Sarbanes-Oxley Compliance Process Automation
Security Controls – What Works
Chapter 1 – Introduction
Information Security Policies and Standards
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Adam Bearhalter Kristy Kelly Julie Bland Alex Tiset.
1 An Overview of Computer Security computer security.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Analysis and Recommendations. PB’s&J Presenters & Topics David Bihm User Account Management Nathan Julson Data Classification Firewall Architectures.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Session 3 – Information Security Policies
Information Systems Controls for System Reliability -Information Security-
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Information Security Framework & Standards
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
IT Control Objectives for Sarbanes-Oxley
COBIT Part 2 IT Governance Presented by George Grachis CISSP.
HIPAA PRIVACY AND SECURITY AWARENESS.
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
Vijay V Vijayakumar.  SOX Act  Difference between IT Management and IT Governance  Internal Controls  Frameworks for Implementing SOX  COSO - Committee.
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
Chapter Three IT Risks and Controls.
Chapter 5 Internal Control over Financial Reporting
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Auditing Information Systems (AIS)
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Engineering Essential Characteristics Security Engineering Process Overview.
Sarbanes-Oxley (SOX) John H. Messing, Esq. Law-on-Line,Inc. Providing 3 E’s -- E-Security, Encryption, E-Signatures 3900 E. Broadway Blvd., Suite 201 Tucson,
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Chapter 8 Auditing in an E-commerce Environment
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
The NIST Special Publications for Security Management By: Waylon Coulter.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
iSecurity Compliance with HIPAA
Chapter 17 Risks, Security and Disaster Recovery
How to Mitigate the Consequences What are the Countermeasures?
An overview of Internal Controls Structure & Mechanism
Cryptography and Network Security
Presentation transcript:

iSecurity Compliance with Sarbanes-Oxley & COBIT

Part 1 About Sarbanes-Oxley & COBIT

About Sarbanes-Oxley (SOX) United States federal law enacted in Relates to the review of dated legislative audit requirements Protects investors by Improving the accuracy and reliability of corporate disclosures Establishing public company accounting oversight board Ensuring corporate responsibility Providing for auditor independence Allowing for enhanced financial disclosure.

SOX Mandates & Requirements Sarbanes-Oxley contains 11 titles that describe specific mandates and requirements for financial reporting: Public Company Accounting Oversight Board (PCAOB) Auditor Independence Corporate Responsibility Enhanced Financial Disclosures Analyst Conflicts of Interest Commission Resources and Authority Studies and Reports Corporate and Criminal Fraud Accountability White Collar Crime Penalty Enhancement Corporate Tax Returns Corporate Fraud Accountability Click here for a resource explaining each title

About COBIT “COBIT is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues and business risks. COBIT enables clear policy development and good practice for IT control throughout organizations.” (ITGI) COBIT - Control Objectives for Information and Related Technology Established by the IT Governance Institute (ITGI) ( in 1996www.itgi.org Consists of guidelines & best practices for SOX compliance which have almost become the de facto standard There are approximately 300 generic COBIT objectives, grouped under six COBIT Components. COBIT guidelines are generally tailored to particular environments. Alternative Standards for SOX compliance are ITIL (IT Infrastructure Library) and Six Sigma. An IT organization is free to select any predefined standards, or even one they develop themselves, but the mostly widely accepted standard is COBIT.

COBIT Components Executive Summary - Explains the key concepts and principles. Framework Foundation for approach and COBIT elements - Organizes the process model into four domains: Plan and organize Acquire and implement Deliver and support Monitor and evaluate Control Objective Foundation for approach and COBIT elements - Organizes the process model into the four domains Control Practices - Identifies best practices and describes requirements for specific controls. Management Guidelines - Links business and IT objectives and provides tools to improve IT performance. Audit Guidelines - Provides guidance on how to evaluate controls, assess compliance and document risk

Part 2 SOX & iSecurity

iSecurity Products Supporting SOX (1) Firewall – prevents criminals from accessing and stealing sensitive data. Covers all 53 System communications protocols. Logs all access attempts and reports breaches. Audit – monitors and reports on all activity in the System I, performs as real- time auditing and detailed server audit trails. Compliance Evaluator – provides at-a-glance compliance checks assessing security status, strengths and weaknesses, based on industry and corporate policies. Authority on Demand – Control of user authorities, and dynamic granting of additional authorities on an as-needed basis, accompanied by more scrutinized monitoring. AP-Journal (including READ logs) – Monitoring of all changes in business- critical data & alerting of relevant personnel upon significant changes. Visualizer - Business Intelligence System for display and analysis of data from the System i

Password - Full password management capabilities, including enforcement of site-defined password policies. Provides detailed daily reports of unsecured passwords. Anti Virus - Protection from Windows-compatible viruses and programs used or stored on System i server. Performs automatic pre-scheduled periodic scans. Central Admin - Manages multiple systems from a single control point Action - includes real-time alarms and protective response mechanisms for the System i Capture – performs silent capturing, saving and playback of user sessions View - protects and controls the display of classified data in iSeries user workstations. Screen - Automatic protection for unattended workstations Encryption (future) - Prevents intruders from using stolen information even when they succeed in obtaining it. iSecurity Products Supporting SOX (2)

iSecurity Compliance with SOX COBIT Requirement DS5: Ensure Systems Security Description FirewallAuditVisualizerComplianceEvaluatorCentral AdminAnti-VirusAP-JournalActionCaptureViewScreenAODPasswordAssessmentnuBridges DS Manage Security Measures IT security should be managed such that security measures are in line with business requirements. √√√√√√√√√√√√√√ DS Identification, Authentication and Access The logical access to and use of IT computing resources should be restricted by the implementation of adequate identification, authentication and authorization mechanisms, linking users and resources with access rules. √√√√√√√√√√√√√√ DS Security of Online Access to Data In an online IT environment, IT management should implement procedures in line with the security policy that provides access security control based on the individual’s demonstrated need to view, add, change or delete data. √√√√√√√√√√√√√ DS User Account Management Management should establish procedures to ensure timely action relating to requesting, establishing, issuing, suspending and closing of user accounts. √√√√√√√√ √ √√√√

iSecurity Compliance with SOX COBIT Requirement DS5: Ensure Systems Security Description FirewallAuditVisualizerCompliance Evaluator Central AdminAnti-VirusAP-JournalActionCaptureViewScreenAODPasswordAssessmentnuBridges DS Security Surveillance IT security administration should ensure that security activity is logged and any indication of imminent security violation is reported immediately to all who may be concerned, internally and externally, and is acted upon in a timely manner. √√√√√ √√√√√√√√ DS Data Classification "Management should implement procedures to ensure that all data are classified in terms of sensitivity by a formal and explicit decision by the data owner according to the data classification scheme. Even data needing “no protection” should require a formal decision to be so designated." √√√√√ √√√ √√√√ DS Central Identification and Access Rights Management Controls are in place to ensure that the identification and access rights of users as well as the identity of system and data ownership are established and managed in a unique and central manner to obtain consistency and efficiency of global access control. √√√√√ √√√ √√√√

iSecurity Compliance with SOX COBIT Requirement DS5: Ensure Systems Security Description FirewallAuditVisualizerCompliance EvaluatorCentral AdminAnti-VirusAP-JournalActionCaptureViewScreenAOD PasswordAssessmentnuBridges DS Violation and Security Activity Reports IT security administration should ensure that violation and security activity is logged, reported, reviewed and appropriately escalated on a regular basis to identify and resolve incidents involving unauthorized activity. The logical access to the computer resources accountability information (security and other logs) should be granted based upon the principle of least privilege, or need-to-know. √√√√√ √√√ √ √ DS Trusted Path Organizational policy should ensure that sensitive transaction data is only exchanged over a trusted path. Sensitive information includes security management information, sensitive transaction data, passwords and cryptographic keys. To achieve this, trusted channels may need to be established using encryption between users, between users and systems, and between systems. √√√√√ √√ √ √ DS Protection of Security Functions All security related hardware and software should at all times be protected against tampering to maintain their integrity and against disclosure of secret keys. In addition, organizations should keep a low profile about their security design, but should not base their security on the design being secret. √√√√√ √√√ √ √√√ √

iSecurity Compliance with SOX COBIT Requirement DS5: Ensure Systems Security Description FirewallAuditVisualizerCompliance EvaluatorCentral AdminAnti-VirusAP-JournalActionCaptureViewScreenAOD PasswordAssessmentnuBridges DS Cryptographic Key Management Management should define and implement procedures and protocols to be used for generation, change, revocation, destruction, distribution, certification, storage, entry, use and archiving of cryptographic keys to ensure the protection of keys against modification and unauthorized disclosure. √√√√√ √√√ √ √ √ DS Malicious Software Prevention, Detection, and Correction "Regarding malicious software, such as computer viruses or Trojan horses, management should establish a framework of adequate preventative, detective and corrective control measures, and occurrence response and reporting. Business and IT management should ensure that procedures are established across the organization to protect information systems and technology from computer viruses. Procedures should incorporate virus protection, detection, occurrence response and reporting." √√√√√ √ √√ √ DS 5.20 – Firewall Architectures and Connections with Public Networks If connection to the Internet or other public networks exists, adequate firewalls should be operative to protect against denial of services and any unauthorized access to the internal resources; should control any application and infrastructure management flows in both directions; and should protect against denial of service attacks. √√√√√ √√√ √ √√√

SOX & COBIT Links SOX legislation SOX Overview ISACA Website TechTarget Introduction to COBIT COBIT forums & information Making Sense of SOX Requirements

Please visit us at Thank You!