Application Review and Auditing Databases Quinn Gaalswyk, CISA Ted Wallerstedt, CISA, CIA Office of Internal Audit University of Minnesota.

Slides:



Advertisements
Similar presentations
The World of Access Controls
Advertisements

All Rights Reserved, Duke Medicine 2007 IT Security Presented by: Trisha Craig and Don Elsner Principal Auditors – IT Audit Duke University 1.
Network Detective Prepared For: ABC Corp Prepared By: Roger G. Best.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Auditing Active Directory Presented to the National State Auditors Association 2014 Information Technology Conference.
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Database Vault with Oracle Database 12c Chi Ching Chui Senior Development.
Module 4: Implementing User, Group, and Computer Accounts
Information Security Policies and Standards
Web Services, SOA and Security May 11, 2009 Michael Burnett.
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Controls for Information Security
Important when you launch Yammer Enterprise Create an engaged and trusted community Decide about User Profile Syncs Various User and Admin.
Identity Management, what does it solve By Gautham Mudra.
SAP An Introduction October 2012.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Application Controls - Intro Ted Wallerstedt, CISA, CIA Principal Information Systems Auditor University of Minnesota.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Best Practices for Securing Oracle EBS R12
Cloud Computing Cloud Security– an overview Keke Chen.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Web Services Quality Model V2.0 Business Value Quality Group Business Value Quality Cost Suitability Effect Service Measurement Quality Group Service Level.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Module 14: Configuring Server Security Compliance
Chapter 6 of the Executive Guide manual Technology.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Auditing Information Systems (AIS)
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
Workstation Security Ted Wallerstedt, CISA, CIA Principal Information Systems Auditor University of Minnesota.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Database Role Activity. DB Role and Privileges Worksheet.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Increasing security by disabling DML statements to a dba user in Oracle database Hakik PACI Polytechnic University of Tirana.
Chapter 13Introduction to Oracle9i: SQL1 Chapter 13 User Creation and Management.
Is Federation Putting you at Risk? Presenter: Dan Dagnall – Chief Operating Officer, Fischer International Identity, LLC.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Module 7: Designing Security for Accounts and Services.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 Security Aspects of TPM 7.1.
Security Principles.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Prototype Security New Feature: Send Mass & Activity Code.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1.
Review of IT General Controls
DATA SECURITY FOR MEDICAL RESEARCH
Design for Security Pepper.
Cloud Security– an overview Keke Chen
Developing Production Quality SQL Code
Office 365 Security Assessment Workshop
What are IAM Key Processes.
KERBEROS.
A simple and secure single sign-in authentication service, designed to help businesses prove who they are when transacting with public services online.
Review - week 4 Basic device access security
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Information Technology Auditing
Session 1 – Introduction to Information Security
Presentation transcript:

Application Review and Auditing Databases Quinn Gaalswyk, CISA Ted Wallerstedt, CISA, CIA Office of Internal Audit University of Minnesota

Application Controls - Agenda Introduction & Ice Breaker - 9:00 App. Best Practices - 9:10 App. Reports - 9:25 App. Control Recap – 9:30 Database Security – 9:45 Timesheets Scenario – 10:45 Adjourn – 11:30

Where were you in 1991?

Best Practices Apply defense-in-depth. Use a positive security model. Fail safely. Run with least privilege. Avoid security by obscurity.

Best Practices Keep security simple. Detect intrusions and keep logs. Never trust infrastructure and services. Establish secure defaults. Use open standards

Application Security – Reports Overview Quinn Gaalswyk, CISA Senior Information Systems Auditor University of Minnesota

Report Overview Reports should support functional activities o Management reports – tie to business need o Exception reports Pragmatic and useful

Report Auditing Confirm activity is writing to report o Test data and test environment o Obtain reports from production Interview functional user to confirm reports serve needs Confirm reports are reviewed

Application Reports and Controls Recap Quinn Gaalswyk, CISA Senior Information Systems Auditor University of Minnesota

Application Input Controls #1 REVIEW AND EVALUATE DATA INPUT CONTROLS Prevent #2 DETERMINE THE NEED FOR ERROR/EXCEPTION REPORTS RELATED TO DATA INTEGRITY, AND EVALUATE WHETHER THIS NEED HAS BEEN FULFILLED Detect

Application Interface Controls #3 REVIEW AND EVALUATE THE CONTROLS IN PLACE OVER DATA FEEDS TO AND FROM INTERFACING SYSTEMS.

Data Synchronization #4 IN CASES WHERE THE SAME DATA ARE KEPT IN MULTIPLE DATABASES AND/OR SYSTEMS, PERIODIC 'SYNC' PROCESSES SHOULD BE EXECUTED TO DETECT ANY INCONSISTENCIES IN THE DATA.

Authentication #7. DOES AN AUTHENTICATION METHOD EXIST? Way to access application #12. ARE THERE STRONG PASSWORD CONTROLS IN PLACE? Two Factor Single Sign-on

Session Timeout #14. ARE USERS LOGGED OUT WHEN INACTIVE?

User Provisioning & De- Provisioning #13. IS BUSINESS NEED VERIFIED BEFORE ACCESS IS GRANTED? Approval #11. ARE RIGHTS REMOVED WHEN NO LONGER NEEDED? Automated Removal

Authorization #8. IS AUTHENTICATION AND AUTHORIZATION REQUIRED FOR ACCESS? Type of access provided #10. IS THERE TRANSACTION APPROVAL IN THE APPLICATION? #16. CAN DEVELOPERS CHANGE PRODUCTION SYSTEMS?

Application Administration #9. IS THE ADMIN FUNCTION ADEQUATE? User Admin System Admin

Data Encryption #15. IS DATA PROTECTED IN TRANSIT AND AT REST? -Encrypted in all states

Application Audit Trail #5 REVIEW AND EVALUATE THE AUDIT TRAILS PRESENT IN THE SYSTEM AND THE CONTROLS OVER THOSE AUDIT TRAILS.

Data Traceability #6 THE SYSTEM SHOULD PROVIDE A MEANS TO TRACE A TRANSACTION OR PIECE OF DATA FROM THE BEGINNING TO THE END OF THE PROCESS ENABLED BY THE SYSTEM.