PREDSTAVITEV SMERNICE Peter Grasselli, CISA, CISSP SLOVENSKI INŠTITUT ZA REVIZIJO Ljubljana G32 Bussiness Continuity Plan (BCP) Review from IT Perspective.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

Organizational Governance
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Business Continuity Training & Awareness by Sulia Toutai (ANZ)
Disaster Preparedness I Lessons Learned Don Hall Thomson Prometric 2006 Annual ConferenceAlexandria, Virginia Council on Licensure, Enforcement and Regulation.
Environmental Management System (EMS)
Business Continuity Planning and Disaster Recovery Planning
COBIT - II.
Security Controls – What Works
Laboratory Personnel Dr/Ehsan Moahmen Rizk.
IS Audit Function Knowledge
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Session 3 – Information Security Policies
Disaster Recovery Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Business Continuity Check List PageOne. - Why Does Your Business Need A Continuity Checklist? Should the unexpected occur, your business will be able.
4. Quality Management System (QMS)
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Control environment and control activities. Day II Session III and IV.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
EHS Management System Elements
Ship Recycling Facility Management System IMO Guideline A.962
Continual Service Improvement Process
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Basics of OHSAS Occupational Health & Safety Management System
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
ISA 562 Internet Security Theory & Practice
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
Presented by: Meg Boyd The Blue Mountains Drinking Water System: DWQMS Overview.
Business Continuity and Disaster Recovery Planning.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Hazards Identification and Risk Assessment
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Workshop on Implementing Audit Quality Practices Working Group on Audit Manuals and Methods March 2006 Vilnius (Lithuania) Hungarian Experiences.
ISO DOCUMENTATION. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to:  Name.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Business Continuity. Business continuity... “Drive thy business or it will drive thee.” —Benjamin Franklin ( ), American entrepreneur, statesman,
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
SecSDLC Chapter 2.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Kathy Corbiere Service Delivery and Performance Commission
Chapter 8 Auditing in an E-commerce Environment
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
MINE SAFETY MANAGEMENT PLAN. DIRECTORATE GENERAL OF MINES SAFETY DGMS n It is recommended that mines be required to put in place Mine Safety Management.
DRP Disaster Recovery Planning. Social Networking... It's the way the 21st century communicates today.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
SOLGM Wanaka Retreat Health and Safety at Work Act 2015 Ready? 4 February 2016 Samantha Turner Partner DDI: Mob:
Exercising, Maintaining and Reviewing BCM Arrangements ERMAN TASKIN
Business Continuity Disaster Planning
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
OHSAS Occupational health and safety management system.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
Visit us at E mail: Tele:
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 6 CH 5 ISO MANAGEMENT RESPONSIBILITY Philippe Bauwin Medical.
Business Continuity Planning 101
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Disaster and Emergency Planning
Cybersecurity Policies & Procedures ICA
Audit Planning Presentation - Disaster Recovery Plan
Alignment of COBIT to Botswana IT Audit Methodology
How to conduct Effective Stage-1 Audit
Presentation transcript:

PREDSTAVITEV SMERNICE Peter Grasselli, CISA, CISSP SLOVENSKI INŠTITUT ZA REVIZIJO Ljubljana G32 Bussiness Continuity Plan (BCP) Review from IT Perspective

2 Vsebina smernice  1. Ozadje  2. Kratek opis NNP s perspektive IT  3. Neodvisnost  4. Sposobnost  5. Načrtovanje  6. Izvedba pregleda UNP s perspektive IT  7. Poročanje  8. Spremljanje  9. Veljavnost

3 Guidelines provide guidance in applying IS auditing Standards. The IS auditor should consider them in determining how to achieve implementation of the standards, use professional judgment in their application and be prepared to justify any departure. The objective of the IS Auditing Guidelines is to provide further information on how to comply with the IS Auditing Standards. ISACA has designed this guidance as the minimum level of acceptable performance required to meet the professional responsibilities set out in the ISACA Code of Professional Ethics for IS auditors. ISACA makes no claim that use of this product will assure a successful outcome. OPOZORILO

4 1. Ozadje  S6 Performance of audit work  DS 4 Ensure continous service  namen  opis običajnega postopka pregleda NNP s stališča IT  identifikacija, dokumentiranje, preverjanje in ocenjevanje v organizaciji vpeljanih kontrol na področju procesa NNP (z vidika IT)  izrazoslovje

5  načrt neprekinjenega poslovanja (NNP)  analiza poslovnih posledic (APP)  okrevalni načrt (ON) 1.6 Izrazoslovje  Business continuity plan (BCP)  Business impact analysis (BIA)  Disaster recovery plan (DRP) BIA OCENA TVEGANJA STRATEGIJA UNP RAZVOJ IN VPELJAVA NAČRTOV UNP GRADNJA KULTURE UNP VZDRŽEVANJE, PREVERJANJE UNP UPRAVLJANJE PROGRAMA UNP

6 2. Kratek opis NNP s perspektive IT  nepregleden  ponavljajoč BCP components include the following:  Identification—Identify potential threats and risks of the business An essential element of BCP is risk assessment, which involves the task of identifying and analysing the potential vulnerabilities and threats, including the source.

7 BIA OCENA TVEGANJA STRATEGIJA UNP RAZVOJ IN VPELJAVA NAČRTOV UNP GRADNJA KULTURE UNP VZDRŽEVANJE, PREVERJANJE UNP UPRAVLJANJE PROGRAMA UNP UPRAVLJANJE KRIZNIH SITUACIJ Kazalci pomembnosti procesov: proces je pomemben za življenje, zdravje ali varnost ljudi cilj procesa je zagotavljanje zakonodajnih ali statutarnih zahtev prekinitev procesa bi pomenila izgubo prihodka lahko bi prišlo do izgube ugleda podjetja ali strank Opis upravljanja neprekinjenega poslovanja: Opis upravljanja neprekinjenega poslovanja: Blanka Šauperl, Nataša Žabkar: Življenjski cikel upravljanja neprekinjenega poslovanja, Zbornik 12. Med. Konference o revidiranju in kontroli IS, 2004 Renato Burazer, Pavle Golob: Načrt neprekinjenga poslovanja – tehnični vidik postavitve in preizkušanja, Zbornik 12. Med. Konference o …, 2004 PAS 56: Vodnik po upravljanju neprekinjenega poslovanja ITIL: Service delivery, IT Service Continuity Management

8 3. Neodvisnost 4. Sposobnost  Potrebno znanje in izkušnje za izvedbo pregleda področja NNP in posameznih komponent NNP  Zmožen oceniti, če je NNP usklajen s potrebami organizacije.  Razumeti poslovno okolje, cilje organizacije, zakonske zahteve, poslovne cilje, poslovne procese, informacijske potrebe teh procesov, strateško pomembnost IS in stopnjo usklajenosti IS s strategijo organizacije. procesov upravljanja neprekinjenega poslovanja

9 5. Načrtovanje  Obseg in cilji pregleda

10 uspešnost učinkovitost razpoložljivost skladnost zaupnost celovitost zanesljivost

11 5. Načrtovanje  Obseg in cilji pregleda  Upoštevati razvojno fazo NNP v organizaciji

12 UNP ZAČETNA PONOVLJIVA odvisno od posameznikov odvisno od posameznikov DOLOČENA procesi so formalizirani procesi so formalizirani in odobreni in odobreni NADZIRANA procesi se procesi se kvantitativno merijo kvantitativno merijo IZBOLJŠUJOČA stalno izboljševanje stalno izboljševanje procesov procesov

13 6. Izvedba pregleda UNP s perspektive IT 6.1. Izvedba  pregled dokumentacije  najmanj osnovna ocena tveganj in tveganj na področju IT

14 Izvedba pregleda UNP s perspektive IT 6. Izvedba pregleda UNP s perspektive IT 6.1. Izvedba  pregled dokumentacije  POZOR! pomanjkljivosti NNP in izvedene spremembe poročila o incidentih poročila o testiranju poročila pregledov intervjuji z zaposlenimi in serviserji pregled opreme

15 Izvedba pregleda UNP s perspektive IT 6. Izvedba pregleda UNP s perspektive IT 6.1. Izvedba  pregled dokumentacije  POZOR! pomanjkljivosti NNP in izvedene spremembe  testiranje priprava na testiranje testiranje zaključek testiranja poročilo o testiranju test praviloma izvesti v času testiranja NNP Pregledati načrt testiranja: točnost in popolnost NNP točnost in popolnost NNP oceni delo osebja oceni delo osebja izurjenost ekip izurjenost ekip koordinacijo med ekipami koordinacijo med ekipami razpoložljivost in zmogljivost rezervne lokacije razpoložljivost in zmogljivost rezervne lokacije stanje in količino opreme premeščene na rezervno lokacijo stanje in količino opreme premeščene na rezervno lokacijo

16 Izvedba pregleda UNP s perspektive IT 6. Izvedba pregleda UNP s perspektive IT  6.2. Vidiki pregleda  Zakaj je potrebno narediti?  Kako bomo naredili?  Kdo bo naredil? Kdo bo vzdrževal?  Kaj je potrebno narediti?  Kdaj mora biti narejeno? Kdaj je nesreče končana?  Katere politike, pravila in standarde bomo upoštevali?

Organisational aspects should be reviewed to consider that: The BCP is consistent with the organisational overall mission, strategic goals and operating plans The BCP is routinely updated and considered current The BCP is periodically tested, reviewed and verified for continuing suitability Budget allocation is available for the BCP testing, implementation and maintenance Risk analyses are performed routinely A formal procedure is in place to regularly update the IT and telecom inventory Management and personnel of the organisation have the required skills to apply the BCP and an appropriate training programme is in place Measures to maintain an appropriate control environment (such as segregation of duties and control access to data and media) are in place in case of a contingency Enablers are identified and the individuals’ roles and responsibilities are adequately defined, published and communicated.Core teams such as: the emergency action team, damage assessment team, emergency management team,… Communication channels are fully documented and publicised within the organisation The interface and its impact between departments/divisions within the organisation is understood Roles and responsibilities of external service providers are identified, documented and communicated Coordination procedures with external service providers and customers are documented and communicated. BCP teams have been identified for various BCP tasks, clearly establishing roles and responsibilities and management reporting that defines accountability Compliance with statutory and regulatory requirements is maintained Planning aspects should be reviewed to consider that: A methodology to determine activities that constitute each process is in place as part of a key business process analysis The planned IS technology architecture for the BCP is feasible and will result in safe and sound operations if a business interruption impacts key IT processes A risk assessment and BIA were performed before the BCP implementation BIA includes changes in the risks and corresponding effect on the BCP The BIA identifies the key recovery time frames of the critical business processes There is a periodic review of risks- There are appropriate incident response plans in place to manage, contain and minimise problems arising from unexpected events, including internal or external events An appropriate schedule is in place for BCP testing and maintenance An onsite test, simulation, triggering of events and their potential impacts should be performed A BCP life cycle exists and whether it is followed during development, maintenance and upgrade The BCP is reviewed at periodic intervals to confirm its continuing suitability to the organisation Procedural aspects should be reviewed to consider that: Top management is a serious driving force in implementation of the BCP Top priority is provided for safety of employees, personnel and critical resources Resources and their recovery have been prioritised and communicated to the recovery teams Awareness is created across the entire organisation on the effect to the business in the event of a disaster Adequate emergency response procedures are in place and tested The people involved in the disaster assessment/recovery process are clearly identified and roles and responsibilities are delineated throughout the organisation Appropriate levels of training are conducted including mock test drills Evacuation plans are in place and are periodically tested Backup human resources are identified and available Cell, telephone or other such communication call trees are reviewed, tested and routinely updated Alternative communications strategies are identified Backup and recovery procedures are part of the BCP Backups are retrievable An appropriate backup rotation practice is in place Offsite locations (hot, warm or cold sites) are tested for availability and reliability Appropriate offsite records are maintained Confidentiality and integrity of data and information are maintained Media liaison strategies are in place, where appropriate The BCP is periodically tested and test results documented Corrective actions are initiated based upon test results There is adequate insurance protection  6.2. Vidiki pregleda  Zakaj je potrebno narediti?  Kako bomo naredili?  Kdo bo naredil? Kdo bo vzdrževal?  Kaj je potrebno narediti?  Kdaj mora biti narejeno? Kdaj je nesreče končana?  Katere politike, pravila in standarde bomo upoštevali? Izvedba pregleda UNP s perspektive IT 6. Izvedba pregleda UNP s perspektive IT

18 BIA includes changes in the risks and corresponding effect on the BCP The BIA identifies the key recovery time frames of the critical business processes Risk analyses are performed routinely The interface and its impact between departments/divisions within the organisation is understood Compliance with statutory and regulatory requirements is maintained Resources and their recovery have been prioritised and communicated to the recovery teams The planned IS technology architecture for the BCP is feasible and will result in safe and sound operations if a business interruption impacts key IT processes The BCP is consistent with the organisational overall mission, strategic goals and operating plans Top priority is provided for safety of employees, personnel and critical resources Alternative communications strategies are identified There is adequate insurance protection There are appropriate incident response plans in place to manage, contain and minimise problems arising from unexpected events, including internal or external events Measures to maintain an appropriate control environment (such as segregation of duties and control access to data and media) are in place in case of a contingency Enablers are identified and the individuals’ roles and responsibilities are adequately defined, published and communicated.Core teams such as: the emergency action team, damage assessment team, emergency management team,… Communication channels are fully documented and publicised within the organisation Roles and responsibilities of external service providers are identified, documented and communicated Coordination procedures with external service providers and customers are documented and communicated. BCP teams have been identified for various BCP tasks, clearly establishing roles and responsibilities and management reporting that defines accountability Adequate emergency response procedures are in place and tested The people involved in the disaster assessment/recovery process are clearly identified and roles and responsibilities are delineated throughout the organisation Backup human resources are identified and available Backup and recovery procedures are part of the BCP Backups are retrievable An appropriate backup rotation practice is in place Confidentiality and integrity of data and information are maintained Media liaison strategies are in place, where appropriate Management and personnel of the organisation have the required skills to apply the BCP and an appropriate training programme is in place Top management is a serious driving force in implementation of the BCP Awareness is created across the entire organisation on the effect to the business in the event of a disaster Appropriate levels of training are conducted including mock test drills There is a periodic review of risks- An appropriate schedule is in place for BCP testing and maintenance An onsite test, simulation, triggering of events and their potential impacts should be performed The BCP is reviewed at periodic intervals to confirm its continuing suitability to the organisation The BCP is routinely updated and considered current The BCP is periodically tested, reviewed and verified for continuing suitability A formal procedure is in place to regularly update the IT and telecom inventory Evacuation plans are in place and are periodically tested Cell, telephone or other such communication call trees are reviewed, tested and routinely updated Offsite locations (hot, warm or cold sites) are tested for availability and reliability The BCP is periodically tested and test results documented A methodology to determine activities that constitute each process is in place as part of a key business process analysis A risk assessment and BIA were performed before the BCP implementation A BCP life cycle exists and whether it is followed during development, maintenance and upgrade Budget allocation is available for the BCP testing, implementation and maintenance Appropriate offsite records are maintained Corrective actions are initiated based upon test results

19 Izvedba pregleda UNP s perspektive IT 6. Izvedba pregleda UNP s perspektive IT 6. 3 Zunanje izvajanje storitev usklajenost NNP uporabnika/dobavitelja usklajenost NNP uporabnika/dobavitelja kako je uporabnik storitve zagotovil, da bo storitev v skladu z njegovim NNP kako je uporabnik storitve zagotovil, da bo storitev v skladu z njegovim NNP ali pogodba predvideva možnost revizijskega pregleda s stranu uporabnika ali pogodba predvideva možnost revizijskega pregleda s stranu uporabnika ali je uporabnik primerno zaščiten v primeru prekinitev poslovanja ponudnika ali je uporabnik primerno zaščiten v primeru prekinitev poslovanja ponudnika ali pogodba predvideva zagotavljanje storitev v primeru nesreče ali pogodba predvideva zagotavljanje storitev v primeru nesreče zagotavljanje celovitosti, zaupnosti in razpoložljivosti podatkov pri ponudniku zagotavljanje celovitosti, zaupnosti in razpoložljivosti podatkov pri ponudniku dostopne kontrole in upravljanje varnosti pri ponudniku dostopne kontrole in upravljanje varnosti pri ponudniku ponudnik poroča o incidentih in ukrepih po njih ponudnik poroča o incidentih in ukrepih po njih nadzor nad mrežo, upravljanjem sprememb in testiranjem nadzor nad mrežo, upravljanjem sprememb in testiranjem

20 7. Poročanje  revizijskemu odboru  vodstvu  slabosti NNP:  lastniku poslovnega procesa  odgovornemu za NNP v IS  pomembne: vodstvu

21 8. Spremljanje Posledice slabosti v NNP običajno zajemajo široko področje in predstavljajo visoko tveganje. Revizor IS naj, če je to primerno, sprotno in v zadostni meri spremlja, če je vodstvo takoj ukrepalo. Za primerno zagotovitev učinkovitosti pregleda naj revizor IS izvede ponovni pregled in preveri, če so bila priporočila izvedena in če so vpeljani popravljalni ukrepi učinkoviti.

22 9. Smernico je potrebno upoštevati od VPRAŠANJA