620 likes | 646 Views
IT System Controls. Presented By Steve Cornell and Nadine Kilcullen. Why We’re Here. Roslyn School District CPA Audits Long-term IT Plan. Audit Objectives. Are IT controls appropriately designed (and placed in operation)? Are IT controls operating effectively?
E N D
IT System Controls Presented By Steve Cornell and Nadine Kilcullen
Why We’re Here. • Roslyn School District • CPA Audits • Long-term IT Plan
Audit Objectives • Are IT controls appropriately designed (and placed in operation)? • Are IT controls operating effectively? • … to safeguard assets from loss or misuse
IT Assets • Data/Information • Software • Hardware • Facilities • Networks
Risk Factors • Organization • Remote Access • Processing/Complexity • Changes
Threats • Errors and Omissions • Fraud and Theft • Employee Sabotage • Loss of Physical/Infrastructure Support • Malicious Hackers • Malicious Code • Threats to Personal Privacy
Control Types • Management Controls • Operational Controls • Technical Controls
Risk Management • Risk is the possibility an adverse result • Risk management is the process of: • Assessing risk • Taking steps to reduce risk to an acceptable level • Maintaining that level of risk.
Life Cycle • Many models exist for the IT system life cycle. Most contain 5 basic phases: • Initiation • Development/Acquisition • Implementation • Operation • Disposal
Certification & Accreditation • Certification and accreditation provides a form of assurance of the security of the system.
System Security Plan • System security plans provide an overview of the security requirements and describe the controls in place or planned for meeting those requirements. • The plan delineates responsibilities and expected behavior of all individuals who access the system.
System Security Plan • Formal Policy and Procedures • System Security Plan • Rules of Behavior • Security-related Activity Planning
Personnel Security • Many important issues in computer security involve human users, designers, implementers, and managers. • A broad range of security issues relate to how individuals interact with computers, and the access and authorities needed to do their jobs.
Personnel Security • Formal Policy and Procedures • Position Categorization • Personnel Screening • Personnel Termination
Personnel Security • Personnel Transfer • Access Agreements • Third-Party Personnel Security • Personnel Sanctions
Physical and Environmental Protection • Physical security and environmental security are the measures taken to protect systems, buildings, and supporting infrastructures against threats to their physical environment.
Physical & Environmental • Formal Policy and Procedures • Physical Access Authorizations • Physical Access Controls • Access Control for Transmission Medium
Physical & Environmental • Access Control for Display Medium • Monitoring Physical Access • Visitor Control • Access Logs
Physical & Environmental • Power Equipment and Cabling • Emergency Shutoff • Emergency Power & Lighting • Fire Protection
Physical & Environmental • Temperature and Humidity Controls • Water Damage Protection • Delivery and Removal • Alternate Work Site
Production, Input/Output Controls • Many aspects to supporting IT operations. • Topics range from a user help desk to procedures for storing, handling and destroying media.
Production, Input/Output Controls • Formal Policy and Procedures • Media Access • Media Labeling • Media Storage
Production, Input/Output Controls • Media Transport • Media Sanitation and Disposal
Contingency Planning • Contingency planning involves more than planning for a move offsite after disaster destroys a facility. • It also addresses how to keep an organization’s critical functions operating in the event of disruptions, large and small.
Contingency Planning • Formal Policy and Procedures • Contingency Plan • Contingency Training • Contingency Plan Testing
Contingency Planning • Contingency Plan Update • Alternate Storage Sites • Alternate Processing Sites • Telecommunication Services
Contingency Planning • IT System Backup • IT System Recovery and Reconstitution
Hardware/Software Maintenance • Controls to monitor the installation of, and updates to, hardware and software • Controls ensure that the system functions as expected and that a historical record is maintained of changes.
Hardware/Software Maint. • Formal Policy and Procedures • Periodic and Timely Maintenance • Maintenance Tools • Remote Maintenance • Maintenance Personnel
Data Integrity • Data integrity controls are used to protect data from accidental or malicious alteration or destruction • Controls provide assurance that the information meets users’ quality and integrity expectations.
Data Integrity • Formal Policy and Procedures • Flaw Remediation • Malicious Code Protection • IT System Monitoring Tools/Techniques
Data Integrity • Security Alerts and Advisories • Security Functionality Verification • Software and Information Integrity • Spam Protection
Data Integrity • Information Input Restrictions • Accuracy, Completeness, Validity, Authenticity • Error Handling • Information Output Handling, Retention
Security Awareness, Training and Education • People are a critical factor in ensuring the security of computer systems and information resources. • Training and education enhance security by improving awareness of the need to protect resources. • Training develops skills and knowledge so computer users can perform their jobs more securely.
Security Awareness, Training and Education • Formal Policy and Procedures • Security Awareness • Security Training (& Records) • Contacts with Security Groups/Associations
Incident Response Capability • Computer security incidents are adverse events in a computer system or network. • Incidents are becoming more common with far-reaching impact.
Incident Response Capability • Formal Policy and Procedures • Incident Response Training • Incident Response Testing • Incident Handling
Incident Response Capability • Incident Monitoring • Incident Reporting • Incident Response Assistance
Configuration Management • Process for controlling modifications to hardware, firmware, software, and documentation. • Controls ensure that IT systems are protected against improper modifications before, during and after implementation.
Configuration Management • Formal Policy and Procedures • Baseline Configuration and System Component Inventory • Configuration Change Control • Monitoring Configuration Changes
Configuration Management • Access Restrictions for Change • Configuration Settings • Least Functionality
Identification/Authentication • Identification and authentication prevents unauthorized people (or unauthorized processes) from entering an IT system. • Access control usually requires the system to identify and differentiate users.
Identification/Authentication • Formal Policy and Procedures • User Identification and Authentication • Device Identification and Authentication • Identifier & Authenticator Management
Logical Access Controls • Logical access controls are the system-based mechanisms used to designate: • Who (or what) can access a specific system resource • The type of transactions and functions that are permitted.
Logical Access Controls • Formal Policy And Procedures • Account Management • Access Enforcement • Information Flow Enforcement
Logical Access Controls • Separation of Duties • Least Privilege • Unsuccessful Login Attempts • Previous Login Notification
Logical Access Controls • Session Lock • Session Termination • Supervision and Review – Access Control • Permitted Actions without I & A
Logical Access Controls • Remote Access • Wireless Access Restrictions • Access Control - Portable/Mobile Devices • Personally Owned IT Systems
Audit Trails • Audit trails maintain a record of system activity by system processes and by user activity. • Using appropriate tools and procedures, audit trails can provide a means to establish individual accountability, reconstruct events, detect intrusions, and identify problems.
Audit Trails • Formal Policy and Procedures • Auditable Events • Content of Audit Records • Audit Storage Capacity & Retention