The Value of Experience 5/12/08 IT Auditing So easy, a caveman can do it… Lee Barken, CPA, CISSP, CISA, CCNA, MCP

Slides:



Advertisements
Similar presentations
Nishidh, CISSP. To comply with Sarbanes oxley and other legislations To comply with industry standards and business partner requirements To protect.
Advertisements

OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Managing Outsourced Service Providers By: Philip Romero, CISSP, CISA.
The World of Access Controls
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
Module 4: Implementing User, Group, and Computer Accounts
1 Sarbanes-Oxley Section 404 June 29,  SOX 404 Background 3  SOX 404 Goals 4  SOX 404 Requirements 5  SOX 404 Assertions 6  SOX 404 Compliance.
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Security Controls – What Works
A Practical IT Approach To Sarbanes-Oxley Compliance
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
1 Pertemuan 6 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
1 Sarbanes-Oxley IT Audits. 2 Sarbanes-Oxley 2002 Recommended “audit firms place a high priority on enhancing the overall effectiveness of auditors’ work.
SOX, COSO, COBIT Timeline
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
The Information Systems Audit Process
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
The University of California Strengthening Business Practices: The Language of Our Control Environment Dan Sampson Assistant Vice President Financial Services.
Information Systems Controls for System Reliability -Information Security-
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
IT Assurance and Reliability Why Should You Care? Richard Oppenheim, CPA, CITP President, SysTrust Services Corporation Presented to ISACA Regional Meeting.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
G RADUATE PROJECT IT Policy and Audit FA D’Mico Johnson.
Introduction to IT Auditing
COBIT®. COBIT - Control Objectives for Information and related Technology C OBI T was initially created by the Information Systems Audit & Control Foundation.
Overview of Systems Audit
IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
Vijay V Vijayakumar.  SOX Act  Difference between IT Management and IT Governance  Internal Controls  Frameworks for Implementing SOX  COSO - Committee.
Chapter Three IT Risks and Controls.
Overview:  Different controls in an organization  Relationship between IT controls & financial controls  The Mega Process Leads  Application of COBIT.
David N. Wozei Systems Administrator, IT Auditor.
Information Technology Controls and Sarbanes-Oxley ISACA Roundtable Discussion April 15, 2004.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
1. IT AUDITS  IT audits: provide audit services where processes or data, or both, are embedded in technologies.  Subject to ethics, guidelines, and.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
1 Information Technology (IT) Auditing & Control Instructor: Dr. Princely Ifinedo Cape Breton University (CBU)
Advanced Accounting Information Systems Day 20 Control and Security Frameworks October 9, 2009.
Policies CIT 380: Securing Computer SystemsSlide #1.
Everyone’s Been Hacked Now What?. OakRidge What happened?
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
IMFO Annual Conference – 2015 S21: Good Governance & Oversight B2B.
Advanced Accounting Information Systems Day 19 Control and Security Frameworks October 7, 2009.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Accounting and Information Systems: a powerful combination.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
BA 559: IT Governance Ben Tsao. What is COBIT?  Control Objectives for Information and Related Technology  Control framework for IT  A set of best.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Understanding Security Policies Lesson 3. Objectives.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Welcome to the ICT Department Unit 3_5 Security Policies.
MS in IT Auditing, Cyber Security, and Risk Assessment
Information Security Policy
Risk management.
Service Organization Control (SOC)
Governance & Control in ERP Systems
Audit Findings: SQL Database
مبانی ممیزی فناوری اطلاعات
Security week 1 Introductions Class website Syllabus review
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

The Value of Experience 5/12/08 IT Auditing So easy, a caveman can do it… Lee Barken, CPA, CISSP, CISA, CCNA, MCP

Auditing IT Controls Why should I care? Because I have to: Sarbanes Oxley (SOX) SAS94 Because I have to: Sarbanes Oxley (SOX) SAS94 Because I want to: I’m Loosing Sleep. It Just Makes Sense… Because I want to: I’m Loosing Sleep. It Just Makes Sense…

Auditing IT Controls Why should I care? Because I have to: Sarbanes Oxley (SOX) SAS94 Because I have to: Sarbanes Oxley (SOX) SAS94 Because I want to: I’m Loosing Sleep. It Just Makes Sense… Because I want to: I’m Loosing Sleep. It Just Makes Sense…

Control Objective “An IT Control Objective is defined as a statement of the desired result or purpose to be achieved by implementing control procedures in a particular activity.” - COBIT

Control Activity “The policies, procedures, practices, and organizational structures designed to provide reasonable assurance that business objectives will be achieved, and that undesired events will be prevented or detected and corrected.” - COBIT

Control Activity “The policies, procedures, practices, and organizational structures designed to provide reasonable assurance that business objectives will be achieved, and that undesired events will be prevented or detected and corrected.” - COBIT

Control Objective “An IT Control Objective is defined as a statement of the desired result or purpose to be achieved by implementing control procedures in a particular activity.” - COBIT

Control Activity “The policies, procedures, practices, and organizational structures designed to provide reasonable assurance that business objectives will be achieved, and that undesired events will be prevented or detected and corrected.” - COBIT

Real-World Example

Oops…

“Hey, we need some internal controls!” Committee

Policy Thou shalt not speed.

Control Objective Control Objective = Car Safety (Risk = Crashes are Bad.)

Control Activities

Evaluating Risk When performing a risk analysis, you must consider: Probability (likelihood) Severity (impact) Low High

Evaluating Risk Low High Probability (likelihood) Severity (impact) PS (Risk = Crashes are Bad.)

COBIT COBIT (COFIRT?) = Control Objectives for Information and related Technology Published by ISACA (Information Systems Audit and Control Association) A Set of Best Practices, i.e. “a Framework” 4 Domains –Plan and Organize, Acquire and Implement, Deliver and Support, Monitor and Evaluate 34 Process Areas 318 Control Objectives

IT Control Objectives Control Objective = Prevent unauthorized access. (Risk = Unauthorized access is bad.)

IT Control Activities Control Activity = Restrict access to authorized individuals. How? Passwords! Password minimum length is 8 characters. Password complexity is enabled.

Password Controls Example: 6 Character Password, No Complexity Upper Case (26) ABCDEFGHIJKLMNOPQRSTUVWXYZ Lower Case (26) abcdefghijklmnopqrstuvwxyz Numbers (10) = 62 possibilities for each character 62 ^ 6 = 56,800,235,584 unique password permutations

Password Controls Example: 6 Character Password, No Complexity Upper Case (26) ABCDEFGHIJKLMNOPQRSTUVWXYZ Lower Case (26) abcdefghijklmnopqrstuvwxyz Numbers (10) = 62 possibilities for each character 62 ^ 6 = 56,800,235,584 unique password permutations Permutations Combinations

Password Controls Example: 8 Character Password, w/Complexity Upper Case (26) ABCDEFGHIJKLMNOPQRSTUVWXYZ Lower Case (26) abcdefghijklmnopqrstuvwxyz Numbers (10) Symbols (32) !"#$%&'()*+,-./:; = 94 possible characters 94 ^ 8 = 6,095,689,385,410,816 unique password permutations

Password Controls Brute Force Attack Cain & Abel –

Password Controls Brute Force Attack Try every possible permutation in a given keyspace. aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaab aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaac ………………………………………………………………… zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz

Password Controls My slow, crappy laptop = 3,000,000 guesses per second 6 characters, Upper/Lower/Numbers (62) –62 ^ 6 = 56,800,235,584 unique password permutations 8 characters, Upper/Lower/Numbers/Symbols (94) –94 ^ 8 = 6,095,689,385,410,816 unique password permutations

Password Controls My slow, crappy laptop = 3,000,000 guesses per second 6 characters, Upper/Lower/Numbers (62) –62 ^ 6 = 56,800,235,584 unique password permutations 8 characters, Upper/Lower/Numbers/Symbols (94) –94 ^ 8 = 6,095,689,385,410,816 unique password permutations 5 Hours 64 Years

Password Controls Medium Sized Cluster = 1,000,000,000 guesses/second 6 characters, Upper/Lower/Numbers (62) –62 ^ 6 = 56,800,235,584 unique password permutations 8 characters, Upper/Lower/Numbers/Symbols (94) –94 ^ 8 = 6,095,689,385,410,816 unique password permutations

Password Controls My slow, crappy laptop = 3,000,000 guesses per second 6 characters, Upper/Lower/Numbers (62) –62 ^ 6 = 56,800,235,584 unique password permutations 8 characters, Upper/Lower/Numbers/Symbols (94) –94 ^ 8 = 6,095,689,385,410,816 unique password permutations 57 Seconds 71 Days

Password Controls Where do you stand? Medium Sized Cluster = 1,000,000,000 guesses/second No Complexity (62 characters) Complexity (94 characters) 4 characters.01 seconds.08 seconds 5 characters.92 seconds7.34 seconds 6 characters57 seconds11.5 minutes 7 characters59 minutes18 hours 8 characters2.5 days71 days 9 characters6.5 years276 years 10 characters405 years25,975 years Great! So-So Doo-Doo Legend

Password Controls What can we do? >= 8 Characters Enable Password Complexity

Password Controls What else can we can do? Maximum Password Age < days

Password Controls Any more that we can do? Enforce Password History Minimum Password Age Password Expires: (xyz) Change Password: (abc) Change Password again: (xyz) Password Expires: (xyz) Change Password: (abc) Change Password again: (xyz)

Kodak Moment There are good reasons to enforce password controls: >= 8 Characters Enable Password Complexity Maximum Password Age < days Enforce Password History Minimum Password Age

Where Are Your Risks? It’s a big ocean…

Where Are Your Risks? It’s a big ocean… How fast can I paddle? Why is the sky blue? What year was my kayak made? Do I taste like chicken? How fast can the shark swim? How close am I to shore?

Where Are Your Risks? Evaluating IT Risks IIA (Institute of Internal Auditors) Guide to Assessment of IT Controls (GAIT) ISACA (Information Systems Audit and Control Association) IT Control Objectives for Sarbanes-Oxley 2nd Edition ID=29763&TEMPLATE=/ContentManagement/ContentDisplay.cfm

Where Are Your Risks? Evaluating IT Risks IIA (Institute of Internal Auditors) Sarbanes-Oxley Section 404: A Guide for Management by Internal Controls Practitioners

Where Are Your Risks? Password Controls User Access Controls New Hire Procedure Termination Procedure Program Changes (SDLC) Physical Security / Data Center Retention Backups Disaster Recovery / Business Continuity Network Security

User Access Controls Administrators Network Shares/Folders Financial Applications

New Hire Procedure “Welcome to XYZ Corporation”

Termination Procedure “Goodbye from XYZ Corporation”

Program Changes (SDLC) In-house Software Development?

Physical Security/Data Center Physical Access to the Server Room Environmental Controls

Retention Litigation Federal Rules of Civil Procedure

Backups Data Loss

Disaster Recovery/Business Continuity St*ff Happens

Network Security Hackers and Evil-Doers

16485 Laguna Canyon Road 3rd Floor Irvine, CA T (949) F (949) High Bluff Drive Suite 200 San Diego, CA T (858) F (858) IT Auditing So easy, a caveman can do it… Lee Barken, CPA, CISSP, CISA, CCNA, MCP Questions?