Part 2- An IT Auditing Framework

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

The World of Access Controls
An investigation into the security features of Oracle 10g R2 Enterprise Edition Supervisor: Mr J Ebden.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Auditing Computer-Based Information Systems
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Information Security Policies and Standards
Secure Data Transmission James Matheke Information Security Architect Ohio Department of Job and Family Services.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Unit Outline Information Security Risk Assessment Module 1: Introduction to Risk Module 2: Definitions and Nomenclature Module 3: Security Risk Assessment.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
INTERNAL CONTROL OVER FINANCIAL REPORTING
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
A Balancing Act Between Risk Appetite and Risk Tolerance Federal Information Systems Security Educators’ Association Conference March 2005 Ezra Cornell.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
What does “secure” mean? Protecting Valuables
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Architecture
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
IIA_Tampa_ Beth Breier, City of Tallahassee1 IT Auditing in the Small Audit Shop Beth Breier, CPA, CISA City of Tallahassee
Chapter 6 of the Executive Guide manual Technology.
Orphaned Servers and Broken Processes 2007 Security Professionals Conference April 12, 2007.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Advanced Accounting Information Systems Day 20 Control and Security Frameworks October 9, 2009.
Assessing Current Network Concerns Lesson 5. CERT/CC Stats.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 6 Internal Control in a Financial Statement Audit Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Advanced Accounting Information Systems Day 19 Control and Security Frameworks October 7, 2009.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Proposed UW Minimum Computer Security Standards From C&C 28 Jan 2005 Draft.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Assessing Current Network Concerns Lesson 5. The Assessment Two important elements you will need to determine in order to produce a valuable assessment.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Information Systems Security
Review of IT General Controls
Secure Software Confidentiality Integrity Data Security Authentication
What a non-IT auditor needs to know about IT & IT controls
Physical Security.
Welcome to all Participants
Presentation transcript:

Part 2- An IT Auditing Framework * 07/16/96 Part 2- An IT Auditing Framework Why do how our systems work matter? Why do how we manage our systems matter? How can systems harm a unit’s ability to accomplish its goals? *

What are you hoping to obtain from these courses? Intro questions What skills are you seeking for completing audits? What skills are you seeking to further your understanding and/or help your career? Example: Familiarize all auditors with general IT Audit concepts and audit steps Enable general auditors to feel more comfortable with IT and IT Audit terminology to provide future audit and career opportunities Show correlation between IT audit steps and the use of IT Template bridge

Foundations of System Controls Lego Blocks Introduction Groups build what they believe is the proper structural sound foundation for controls

System Control’s Foundation Blocks IT Dependent Manual Controls Application Controls (Automated) Job Scheduling and Management Application Security Network Security Change Management Data Security - Database Operating System Physical Security Lego Blocks Introduction Blocks are jumbled with labels. Groups build what they believe is the proper structural sound foundation for controls

Proposed Foundation Strategy IT Dependent Manual Controls Application Controls (Automated) Job Scheduling and Management Application Security Network Security Change Management Data Security - Database Operating System Physical Security Note Physical Security and Network Security argument may be inverted. There is not a single “correct” answer -With movement to cloud technology Network Security may be shifting to the key stone position in our infrastructure -Each block ties to a component of the IT Bridge

System Control Pyramid Network Security Data Security - Database Operating System Change Management Application Security IT Dependent Manual Controls Application Controls (Automated) Staffing Workstation Configuration Disaster Recovery Equipment Management IT General Controls Job Scheduling and Management Physical Security See each foundational control as stacking. Creates Control Dependency Difficulty exists on how to breakdown IT Environment controls (yellow) as they touch/support all ITGCs but are not exactly part of the control foundation

High Level Control Framework Framework provides higher level view of the relationship between business process and IT controls Note that the blue section ties to the area below the line on the above pyramid Note the green section ties to application controls and IT Dependent controls above the ITGC line in the above pyramid

IT General Control Definition * 07/16/96 IT General Control Definition IT General Controls (ITGCs) - Provide assurance that IT-Dependent and Application Controls can be relied upon Include controls over the IT environment, computer operations, access to applications and data (security), and program changes Note most of IT bridge is to cover system ITGCs *

Strong ITGC -Prevention and Detection Controls * Strong ITGC -Prevention and Detection Controls 07/16/96 Prevention controls stop inappropriate items from occurring New user approval process Strong password controls Access termination process Detection controls identify inappropriate items that can then be corrected Periodic Access Review *

Strong ITGC Determination Not all textbook controls must be designed and operating effectively to address significant risks and provide a strong ITGC environment In previous slide if a weak termination process existed this could be compensated for by a frequent strong periodic review. However strong new user, password, and other preventative ITGCs would still be required or require other compensating controls if applicable

Business Process Controls Automated (Application) Controls IT Dependent Manual Controls (Purely) Manual Control Ask for Automated control , IT Dependent Controls then Purely Manual Control examples. Draw Conclusions on the controls Note determination of strong business process controls same as ITGCs – not all required and sometimes overlap can occur

ITGC Controls and the Application's House * ITGC Controls and the Application's House 07/16/96 Sufficient Controls must act in concert Consider securing an application like a house *

ITGC Controls and the Application’s House * ITGC Controls and the Application’s House 07/16/96 How does a front door protect your house? What are the Key Components? Door Frame Door Door Hinges Door Handle Dead Bolt Door Handle Lock *

ITGC Controls and the Application's House House = Application with business processes Door Frame = Physical - Network Door = Data Security - Operating Systems and Database Door Hinges = Job Scheduling Management Door Handle/Metal Casing = Application Security Dead Bolt = Application Controls Door Handle Lock = IT Dependent Manual Controls Tool Box = Code Change Management

How (My) Front Door Failed * 07/16/96 How (My) Front Door Failed Burglar smashed the window on the door and accessed the dead bolt lever Subsequently battered the door handle lock until the frame caved in *

How (Application’s) Front Door Could Fail * 07/16/96 How (Application’s) Front Door Could Fail Internal hacker exploits a vulnerability in the Operating System Vulnerability used to disable application controls Hacker later uses a “brute force” attack to gain access via the network and embezzle from the University *

Compensating Control - Detection For my house’s – A camera For a server –Intrusion monitor that monitors OS activity OS activity monitoring = intrusion monitoring Neither of these controls prevent a breach. They only detect the breech so that the issue can be resolved. Monitoring Camera was added to my living room with inappropriate activity alerts Similar monitoring of Operating System activity could be implemented and reviewed by management

Where Should an Audit Start Where do you believe an audit should start? What initial items should be confirmed? Application or IT Dependent controls must first be identified to confirm further review of IT general controls should occur.

IT in the Control Universe Summary * 07/16/96 IT in the Control Universe Summary Strong ITGCs provide assurance that effective system related controls may be relied upon ITGCs build upon each other Not all textbook controls are always required ITGCs include both Preventative and Detective controls System related controls include application (automated) and IT-dependent (system supported) controls (Purely) Manual Controls do not require system review *

Future discussion items * 07/16/96 Future discussion items Evaluating Code Change Management Processes Evaluating Disaster Recovery Preparations Evaluating Server Configurations/Security Evaluating Network Concerns and Intrusion Risks Evaluating Workstation Management How should we modify our plans for future discussion items? *

Future discussion items * 07/16/96 Future discussion items Evaluating Application Design, Controls, and Integration with the Business Processes Evaluating IT strategies – Strategic vs. Tactical issues Strategies used to build the overall IT audit plan for the department Looking at IT governance frameworks -Cobit *