390 likes | 858 Views
Auditing IT Infrastructures for Compliance Chapter 14 Compliance Within the System/Application Domain. Learning Objective. Describe information security systems compliance requirements within the System/Application Domain. Key Concepts.
E N D
Auditing IT Infrastructures for Compliance Chapter 14 Compliance Within the System/Application Domain
Learning Objective • Describe information security systems compliance requirements within the System/Application Domain.
Key Concepts • Compliance law requirements and business drivers for System/Application Domain • Devices and components found in the System/Application Domain • Application traffic and performance issues, and how to maximize availability, integrity, and confidentiality (A-I-C) for the System/Application Domain • System/Application Domain policies, standards, procedures, and guidelines • Best practices for System/Application Domain compliance requirements
Business Drivers and Compliance • System/Application Domain • Provides environment for distributed applications to run • Centralizes core business functions • Supports productivity • Allows for sharing and collaboration
Business Drivers and Compliance • Data must be protected • Faulty application code presents security holes • Lax access controls result in vulnerabilities • Centralization increases security
Access Controls • Protect confidentiality and integrity of data • Operating system enforces the controls
Vulnerability and Change Management • Applications and operating system are susceptible to software vulnerabilities • Patch management “patches” vulnerabilities If you know about a vulnerability, chances are an attacker knows about it, too.
Maximize A-I-C • Create business continuity plan (BRP) • Create disaster recovery plan (DRP) • Implement access controls • DMZ • Application-based • Keep software patched
Best Practices for Compliance Requirements • Establish physical controls to protect the data center. • Use at least one firewall to limit network traffic from other domains to only authorized traffic. • Use Network Access Control (NAC) devices to restrict computers and other devices from connecting to System/Application Domain components.
Best Practices for Compliance Requirements (Continued) • Define user- or group-based access controls for each computer in the domain. • Use application-defined access controls to limit access to data. • Allow only low-privilege users to establish connections between the Internet-facing servers in the Demilitarized Zone (DMZ) and System/Application Domain servers.
Best Practices for Compliance Requirements (Continued) • Allow only escalated privilege user connections that originate from protected Web servers where users can only connect by using a secure VPN. • Update operating systems frequently with the latest security patches on all computers.
Best Practices for Compliance Requirements (Continued) • Update all application software frequently with the latest security patches. • Follow best practices of software development or software modifications.
Best Practices for Compliance Requirements (Continued) • Create a BCP and DRP. • Keep documents up to date • Test BCP and DRP at least annually • Protect all backup media in transit and storage. • Ensure all backup media is encrypted.
Best Practices for Compliance Requirements (Continued) • Encrypt all sensitive data when it is stored on disks. • Use application-monitoring software to identify performance or availability issues.
Summary • Compliance laws and business drivers for System/Application Domain • Process to monitor application traffic and performance • Ways to maximize A-I-C • Roles and responsibilities associated with System/Application Domain compliance • Best practices for System/Application Domain compliance requirements