SlideShare ist ein Scribd-Unternehmen logo
1 von 44
TransformingLives. InventingtheFuture. www.iit.edu
I ELLINOIS T UINS TI T
OF TECHNOLOGY
ITM 578 1
The Information Security Audit
Ray Trygstad
ITM 478/578 / IT 478
Spring 2004
Information Technology & Management Programs
CenterforProfessional Development
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 2
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives:
Upon completion of this lesson the
student should be able to:
– Explain what an information security
audit is
– Explain the relationship of information
security policies to the audit process
– Describe how an information security
audit is conducted
– Discuss knowledge required for members
of an information security audit team
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 3
ILLINOIS INSTITUTE OF TECHNOLOGY
Introduction
 What is an Information Security Audit?
 A measure of how the confidentiality,
availability and integrity of an organization’s
information is protected and assured
 A systematic, measurable technical
assessment of how the organization's security
policy is employed at a specific site
 Part of the on-going process of defining and
maintaining effective security policies
– Many audits will involve everyone who uses
computer resources in the organization
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 4
ILLINOIS INSTITUTE OF TECHNOLOGY
General Methodology
Assess IT security controls which
include:
– General controls at the entity level
– General controls as they are applied to
the specific application(s) being examined
– Application controls, which are the
controls over input, processing, and
output of data associated with individual
applications
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 5
ILLINOIS INSTITUTE OF TECHNOLOGY
General Controls
 Policies and procedures that apply to all or a
large segment of an entity’s information systems
and help ensure their proper operation
 Examples of primary objectives for general
controls:
– Safeguard data
– Protect computer application programs
– Prevent unauthorized access to system software
– Ensure continued computer operations in case of
unexpected interruptions
 Effectiveness of general controls a significant
factor in determining effectiveness of application
controls
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 6
ILLINOIS INSTITUTE OF TECHNOLOGY
Relationship of Policy to General Controls
Security policies are a standardization
of security practices put in writing
– Employees must read & agree to them
– In many enterprises today, security
policies may informal or unwritten
•Informal/unwritten policies not legally
enforceable
Typically policies prescribe methods of
implementing general and application
controls
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 7
ILLINOIS INSTITUTE OF TECHNOLOGY
Nature & Extent of the Audit
Depends on audit objectives and other
factors
Factors to consider:
– Nature and complexity of the information
systems
– The control environment
– Particular accounts and applications
significant to the areas of interest
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 8
ILLINOIS INSTITUTE OF TECHNOLOGY
Audit Scope
 Audit objectives determine the scope of the
audit
 Scope determination factors
– Site business plan
– Type of data being protected
– Value/importance of data to the client
organization
– Previous security incidents
– Time available to complete the audit
– Talent/expertise/experience of the auditors
 Auditors & client must agree on scope prior
to the commencement of the actual audit
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 9
ILLINOIS INSTITUTE OF TECHNOLOGY
Audit Stages
Audit is conducted in four stages
– Planning Phase
– Internal Control Phase
– Testing Phase
– Reporting Phase
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 10
ILLINOIS INSTITUTE OF TECHNOLOGY
Planning Phase
 Auditor gains an understanding of information
system operations, controls and related risks
 In view of these risks reach tentatively conclusions
as to which controls are likely to be effective
 If controls are likely to be effective and are relevant
to audit objectives, the auditor will determine
nature and extent of audit work needed to confirm
tentative conclusions.
 If controls are not likely to be effective, auditor
must develop a sufficient understanding of related
control risks to
– (1) develop appropriate findings and related
recommendations for corrective action
– (2) determine the nature, timing, and extent of
substantive testing necessary
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 11
ILLINOIS INSTITUTE OF TECHNOLOGY
Pre-Audit Tasks
Review previous audits (baselining)
Assess site survey
– Asset inventory including technical
description of the system’s hosts
– Includes management and user
demographics
Administer security questionnaires
Review previous security incidents
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 12
ILLINOIS INSTITUTE OF TECHNOLOGY
Pre-Audit Tasks
Read and evaluate the most recent
risk assessment
Read and evaluate all policies &
procedures
Develop the Audit Plan
– Prepare audit checklists tailored for the
audit environment
Discuss audit objective and details
with the client, ensuring objectives are
understood and mutually agreed upon
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 13
ILLINOIS INSTITUTE OF TECHNOLOGY
Site Survey
May need to be completed by client
staff or may be prepared by a
member of the audit team based on
an existing asset inventory and other
information provided by the client
Should present auditors with a
complete picture of the information
technology environment of the client
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 14
ILLINOIS INSTITUTE OF TECHNOLOGY
Security Questionnaires
Self-assessment tools allowing client
staff—both IT professional staff and
end users—to measure knowledge of
and compliance with security controls
in place
Should be phrased in terms of
“ranking” (i.e. 1-5, 1-10 scales) as to
knowledge and compliance in specific
areas
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 15
ILLINOIS INSTITUTE OF TECHNOLOGY
Pre-Audit Audit Report
 If policies and procedures do not prescribe
adequate controls for the described risks,
auditors may need to:
– develop appropriate findings and related
recommendations for corrective action
– delay remaining portions of the audit until
appropriate corrections have been put in place
– prepare a preliminary Audit Report to facilitate
proper implementation of controls
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 16
ILLINOIS INSTITUTE OF TECHNOLOGY
Internal Control Phase
 Auditors obtain detailed information on
control policies, procedures, and objectives
 Perform tests of control activities
 First test general controls through a
combination of procedures, which may
include
– Observation
– Inquiry
– Inspection
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 17
ILLINOIS INSTITUTE OF TECHNOLOGY
Internal Control Phase
If these controls operate effectively,
auditors should then test & evaluate
effectiveness of general controls for
applications significant to the audit
If general controls are not operating
effectively, application-level controls
are generally not tested
(note: in the audits we conduct, we
will not be testing any application-
level controls…)
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 18
ILLINOIS INSTITUTE OF TECHNOLOGY
Application Level Testing
 As an example of application-level control
testing, auditors might test a system to
ensure
– data prepared for entry is complete, valid, and
reliable;
– data is converted to an automated form and
entered into the application accurately,
completely, and on time;
– data is processed by the application completely,
on time, and in accordance with established
requirements;
– output is protected from unauthorized
modification or damage and distributed in
accordance with prescribed policies
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 19
ILLINOIS INSTITUTE OF TECHNOLOGY
Application Level Testing
Auditors evaluate and test the
effectiveness of application controls
by
– observing the controls in operation
– examining related documentation
– discussing the controls with pertinent
personnel
– reperforming the control being tested
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 20
ILLINOIS INSTITUTE OF TECHNOLOGY
Testing Phase
 In the testing phase, substantive technical
testing is performed
 This may include
– Application security and integrity testing on
appropriate workstation & terminals
• Checking for patches and updates
– Network security testing through both passive
monitoring and active measures
– Restoration of backed-up material
– If conducted in concert with a broader audit (i.e.
a financial audit), auditors may be called upon to
assist financial auditors in identifying/selecting
computer-processed transactions for testing,
possibly using computer audit software
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 21
ILLINOIS INSTITUTE OF TECHNOLOGY
Site Visit
 Internal Control and Testing phases are
normally accomplished through a site visit
 Aim of auditors is to not to adversely affect
business transactions during the audit
 Auditors should conduct an entry briefing
where they outline the scope of the audit
and what they hope to accomplish
 Auditors should be thorough, fair and apply
consistent standards and procedures
throughout the audit
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 22
ILLINOIS INSTITUTE OF TECHNOLOGY
Site Visit
 During the visit, auditors may:
– Collect data about the physical security of
computer assets
– Perform interviews of site staff
– Perform network vulnerability assessments
– Perform operating system and application
security assessments & vulnerability testing
– Perform access controls assessment
– Other evaluations
 Auditors should follow their checklists,
but keep their eyes (and ears!) open for
unexpected problems
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 23
ILLINOIS INSTITUTE OF TECHNOLOGY
Key Audit Questions
 Remember, audits are principally concerned
with how security policies are actually
implemented
 Key questions to be answered:
– Are passwords difficult to crack?
• Are they on post-it notes on the monitor or inside the
desk’s top drawer?
– Are there access control lists (ACLs) in place on
network devices to control who has access to
shared data?
– Are there audit logs to record who accesses data?
– Are the audit logs reviewed?
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 24
ILLINOIS INSTITUTE OF TECHNOLOGY
Key Audit Questions (continued)
– Are the security settings for operating systems in
accordance with accepted industry security
practices?
– Have all unnecessary applications and computer
services been eliminated for each system?
– Are these operating systems and commercial
applications patched to current levels?
– How is backup media stored? Who has access to
it? Is it up-to-date?
– Is there a disaster recovery plan? Have the
participants and stakeholders ever rehearsed the
disaster recovery plan?
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 25
ILLINOIS INSTITUTE OF TECHNOLOGY
Key Audit Questions (continued)
– Are there adequate cryptographic tools in place
to govern data encryption, and have these tools
been properly configured?
– Have custom-built applications been written
with security in mind?
– How have these custom applications been tested
for security flaws?
– How are configuration and code changes
documented at every level? How are these
records reviewed and who conducts the review?
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 26
ILLINOIS INSTITUTE OF TECHNOLOGY
Audit Checklists
Audits are conducted by checklist
Checklists are widely available but
should be tailored for each audit by
the audit team
Checklists may be challenge-
response (i.e. check-in-the-box or
yes-or-no answers) or they may be
scale rankings (1-4, 1-5, 1-10, etc.)
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 27
ILLINOIS INSTITUTE OF TECHNOLOGY
Sample Audit Checklist
General IT Controls
Audit Program
Purpose / Scope
Perform a General Controls review of Information Technology (IT). The reviews will include all IT related policies, procedures,
data security administration, data center operations, system development / maintenance, the IT Disaster / Recovery plan and its
relation to the corporate Business Continuity plan.
Audit steps Date Initials W/P Ref.
IT General Controls
Planning
Determine if committees review, approve, and report to the board on:
Short and long term information systems plans
IT operating standards
Data security policies and procedures
Resource allocation (major hardware/software acquisition and project priorities)
Status of major projects
IT budgets and current operating cost
Policies, Standards, and Procedures
Determine whether the board of directors has reviewed and approved IT policies.
Examine how IT management has defined standards and adopted a methodology
governing the process of developing, acquiring, implementing, and maintaining information
systems and related technology.
Determine if IT management has adequate standards and procedures for:
Systems development
Program change control
Data Center operations
Data Base administration
DASD management
Performance monitoring
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 28
ILLINOIS INSTITUTE OF TECHNOLOGY
Exit Briefing
 Ensure management is made aware of any
problems requiring immediate attention or
correction
 Answer questions in a very general manner
so as not to create a false impression of the
audit’s outcome
– At this stage auditors are not in a position to
provide definitive answers
– Final answers can only be provided following the
final analysis of the audit data
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 29
ILLINOIS INSTITUTE OF TECHNOLOGY
Reporting Phase
Back at the ranch, auditors will review
and analyze checklist data and analyze
any data discovered through use of
vulnerability assessment tools
There should be an initial meeting to
help focus the outcome of the audit
results
– Auditors should identify problem areas
and possible solutions
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 30
ILLINOIS INSTITUTE OF TECHNOLOGY
Writing the Audit Report
 The Audit Report may be prepared in a
number of formats
 Keep it simple and direct, containing
concrete findings with measurable ways to
correct identified deficiencies
 Typical format
– Executive summary
– Detailed findings
– Supporting data (checklists, scan reports etc.)
should be included as report appendices
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 31
ILLINOIS INSTITUTE OF TECHNOLOGY
Writing the Audit Report
 Develop executive summary first as it may
be necessary to report to management
before details are done
 Include an audit summary which may
emphasize the positive findings of the audit
 Organize audit findings in a simple and
logical manner with a half-page or full page
for each identified problem
 Each problem entry should outline the
problem, discuss implications and describe
appropriate corrective actions
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 32
ILLINOIS INSTITUTE OF TECHNOLOGY
The Audit Report
 Describe information security control weaknesses
clearly in terms understandable to those with
limited knowledge of information system issues
 Define all technical terms and avoid jargon and
acronyms
 Discuss each weakness in terms of
– related criteria
– the condition identified
– the cause of the weakness
– actual or potential impact on the organization
– appropriate corrective action
 This helps senior management to understand the
significance of the problem and to ensure
development of appropriate corrective actions
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 33
ILLINOIS INSTITUTE OF TECHNOLOGY
Technical Reporting
Weaknesses reported to technical staff
should be the same as that reported to
senior management but should include
necessary technical detail to allow the
staff
– to understand the precise cause of the
weaknesses
– to aid them in developing corrective
actions
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 34
ILLINOIS INSTITUTE OF TECHNOLOGY
Report Timeliness & Follow-Up
Prepare the Audit Report as quickly as
accuracy allows so that site staff can
correct problems identified
Auditors may be called upon to assist
technical staff in implementation of
appropriate controls and solutions
Management should follow-up until all
identified deficiencies are corrected
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 35
ILLINOIS INSTITUTE OF TECHNOLOGY
Typical Problems Identified in Audits
 Lack of formal IT planning mechanisms
with the result that IT does not serve the
organizations’s pressing needs or does not
do so in a timely and secure manner
 Lack of formal security policies resulting in
a piecemeal or “after-an-incident” approach
to security
 Inadequate program change control leaving
software vulnerable to unauthorized
changes
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 36
ILLINOIS INSTITUTE OF TECHNOLOGY
Typical Problems Identified in Audits
 Little or no awareness of key security issues
and inadequate technical staff to address the
issues
 Failure to take advantage of security soft-
ware features such as selective monitoring
capabilities, enforcement of stringent pass-
word rules, & review of key security reports
 Inadequate user involvement in testing and
sign-off for new applications resulting in
systems that fail to meet user requirements
or confidentiality, integrity, and availability
needs
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 37
ILLINOIS INSTITUTE OF TECHNOLOGY
Typical Problems Identified in Audits
 Installation of software or upgrades without
adequate attention to default configurations
or default passwords
 Virus definitions not kept up-to-date
 Inadequate continuity of operation plans
 Failure to formally assign security
administration responsibilities to staff who
are technically competent, independent, and
report to senior management
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 38
ILLINOIS INSTITUTE OF TECHNOLOGY
Typical Problems Identified in Audits
Lack of user awareness
Unnecessarily high access rights
Lack of or inadequate plans for
– An information security management
program
– Physical and logical access controls
– Software change controls
– Segregated duties
– Continuity of business
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 39
ILLINOIS INSTITUTE OF TECHNOLOGY
What Should Auditors Know?
 Generally accepted accounting practices state “staff
assigned to conduct the audit should collectively
possess adequate professional proficiency for the
tasks required.”
– This includes computer skills and security knowledge for
IS audits
 Although each member of an audit team need not
have all attributes, the team must collectively
possess the requisite attributes to be able to
– Adequately plan the audit
– Assess computer-related controls
– Test the controls
– Determine the effect on the overall audit plan
– Develop findings and recommendations
– Report the results
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 40
ILLINOIS INSTITUTE OF TECHNOLOGY
What Should Auditors Know?
 Applicable knowledge is laid out well in the
National State Auditors Association/GAO
Management Planning Guide for
Information Systems Security Auditing
(table on next 2 slides)
 Typical knowledge/skill set includes
– Technical competency
– Knowledge and understanding of information
security and privacy requirements and best
practices
– (see the tables)
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 41
ILLINOIS INSTITUTE OF TECHNOLOGY
Knowledge, Skills, and Abilities
Audit Objective Associated knowledge, skills, and abilities forIS Security Audit Areas
Organizationwide security
program planning and
management
Knowledge of applicable legislative requirements for a security program
Knowledge of the sensitivity of data and the risk management process through risk assessment and risk
mitigation
Knowledge of the risks associated with a deficient security program
Knowledge of the elements of a good security program
Ability to analyze and evaluate an organization’s security policies and procedures and identify their
strengths and weaknesses
Access control Knowledge across platforms of the access paths into computer systems and of the functions of
associated hardware and software providing an access path
Knowledge of access level privileges granted to users and the technology used to provide and control
them
Knowledge of the procedures, tools, and techniques that provide for good physical, technical, and
administrative controls over access
Knowledge of the risks associated with inadequate access controls
Ability to analyze and evaluate an organization’s access controls and identify the strengths and
weaknesses
Skills to review security software reports and identify access control weaknesses
Skills to perform penetration testing of the organization’s applications and supporting computer systems
Application software
development and change
control
Knowledge of the concept of a system life cycle and of the System Development Life Cycle (SDLC)
process
Knowledge of the auditor’s role during system development and of federal guidelines for designing
controls into systems during development
Knowledge of the procedures, tools, and techniques that provide control over application software
development and modification
Knowledge of the risks associated with the development and modification of application software
Ability to analyze and evaluate the organization’s methodology and procedures for system development
and modification and identify the strengths and weaknesses
Adapted from “Knowledge, Skills, and Abilities for IS Security Audit Areas by FISCAM Objective” from
National State Auditors Association/GAO Manag e m e nt Pla nning G uide fo r Info rm atio n Syste m s Se curity Auditing , 2001
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 42
ILLINOIS INSTITUTE OF TECHNOLOGY
Knowledge, Skills, and Abilities
Audit Objective Associated knowledge, skills, and abilities forIS Security Audit Areas
System software Knowledge of the different types of system software and their functions
Knowledge of the risks associated with system software
Knowledge of the procedures, tools, and techniques that provide control over the implementation,
modification, and use of system software
Ability to analyze and evaluate an organization’s system software controls and identify the strengths and
weaknesses
Skills to use software products to review system software integrity
Segregation of duties Knowledge of the different functions involved with information systems and data processing and
incompatible duties associated with these functions
Knowledge of the risks associated with inadequate segregation of duties
Ability to analyze and evaluate an organization’s organizational structure and segregation of duties and
identify the strengths and weaknesses
Business continuity Knowledge of the procedures, tools, and techniques that provide for business continuity
Knowledge of the risks that exist when measures are not taken to provide for business continuity
Ability to analyze and evaluate an organization’s program and plans for business continuity and identify
the strengths and weaknesses
Application controls Knowledge about the practices, procedures, and techniques that provide for the authorization,
completeness, and accuracy of application data
Knowledge of typical applications in each business transaction cycle
Ability to analyze and evaluate an organization’s application controls and identify the strengths and
weaknesses
Skills to use a generalized audit software package to conduct data analyses and tests of application
data, and to plan, extract, and evaluate data samples
Adapted from “Knowledge, Skills, and Abilities for IS Security Audit Areas by FISCAM Objective” from
National State Auditors Association/GAO Manag e m e nt Pla nning G uide fo r Info rm atio n Syste m s Se curity Auditing , 2001
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 43
ILLINOIS INSTITUTE OF TECHNOLOGY
Our Audits
Pre-Audit
– Policy Review
– Administer any questionnaires
– Plan the Audit
•Create audit checklists
•Arrange site visit
Site Visit
– Entry briefing but probably no exit briefing
Prepare Report
Deliver Report
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 44
ILLINOIS INSTITUTE OF TECHNOLOGY
The End…
Questions?
Discussion!

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Information security
Information securityInformation security
Information security
 
5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Network security
Network securityNetwork security
Network security
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 

Andere mochten auch

Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
Dhani Ahmad
 
Information system
Information systemInformation system
Information system
Dhani Ahmad
 

Andere mochten auch (20)

Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
The need for security
The need for securityThe need for security
The need for security
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Secure
SecureSecure
Secure
 
Physical security
Physical securityPhysical security
Physical security
 
Information system
Information systemInformation system
Information system
 
Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02
 
Database - Design & Implementation - 1
Database - Design & Implementation - 1Database - Design & Implementation - 1
Database - Design & Implementation - 1
 
Security policy
Security policySecurity policy
Security policy
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
Database design
Database designDatabase design
Database design
 

Ähnlich wie The information security audit

· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 
Pwc systems-implementation-lessons-learned
Pwc systems-implementation-lessons-learnedPwc systems-implementation-lessons-learned
Pwc systems-implementation-lessons-learned
Avi Kumar
 
Cyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptxCyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptx
koushikDutta62
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
JoshJaro
 

Ähnlich wie The information security audit (20)

Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
 
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
 
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Practical IT auditing
Practical IT auditingPractical IT auditing
Practical IT auditing
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Pwc systems-implementation-lessons-learned
Pwc systems-implementation-lessons-learnedPwc systems-implementation-lessons-learned
Pwc systems-implementation-lessons-learned
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
Cyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptxCyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptx
 
Ict governance
Ict governanceIct governance
Ict governance
 
Compliance
ComplianceCompliance
Compliance
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
Khas bank isms 3 s
Khas bank isms 3 sKhas bank isms 3 s
Khas bank isms 3 s
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 

Mehr von Dhani Ahmad (12)

Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Implementing security
Implementing securityImplementing security
Implementing security
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentations
 
Topic 11 data management
Topic 11   data managementTopic 11   data management
Topic 11 data management
 
Topic 10 sample designs & procedures
Topic 10   sample designs & proceduresTopic 10   sample designs & procedures
Topic 10 sample designs & procedures
 
Topic 9 secondary data sources
Topic 9   secondary data sourcesTopic 9   secondary data sources
Topic 9 secondary data sources
 
Topic 8 questionnaire design
Topic 8   questionnaire designTopic 8   questionnaire design
Topic 8 questionnaire design
 
Topic 7 measurement in research
Topic 7   measurement in researchTopic 7   measurement in research
Topic 7 measurement in research
 

Kürzlich hochgeladen

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 

The information security audit

  • 1. TransformingLives. InventingtheFuture. www.iit.edu I ELLINOIS T UINS TI T OF TECHNOLOGY ITM 578 1 The Information Security Audit Ray Trygstad ITM 478/578 / IT 478 Spring 2004 Information Technology & Management Programs CenterforProfessional Development
  • 2. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 2 ILLINOIS INSTITUTE OF TECHNOLOGY Learning Objectives: Upon completion of this lesson the student should be able to: – Explain what an information security audit is – Explain the relationship of information security policies to the audit process – Describe how an information security audit is conducted – Discuss knowledge required for members of an information security audit team
  • 3. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 3 ILLINOIS INSTITUTE OF TECHNOLOGY Introduction  What is an Information Security Audit?  A measure of how the confidentiality, availability and integrity of an organization’s information is protected and assured  A systematic, measurable technical assessment of how the organization's security policy is employed at a specific site  Part of the on-going process of defining and maintaining effective security policies – Many audits will involve everyone who uses computer resources in the organization
  • 4. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 4 ILLINOIS INSTITUTE OF TECHNOLOGY General Methodology Assess IT security controls which include: – General controls at the entity level – General controls as they are applied to the specific application(s) being examined – Application controls, which are the controls over input, processing, and output of data associated with individual applications
  • 5. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 5 ILLINOIS INSTITUTE OF TECHNOLOGY General Controls  Policies and procedures that apply to all or a large segment of an entity’s information systems and help ensure their proper operation  Examples of primary objectives for general controls: – Safeguard data – Protect computer application programs – Prevent unauthorized access to system software – Ensure continued computer operations in case of unexpected interruptions  Effectiveness of general controls a significant factor in determining effectiveness of application controls
  • 6. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 6 ILLINOIS INSTITUTE OF TECHNOLOGY Relationship of Policy to General Controls Security policies are a standardization of security practices put in writing – Employees must read & agree to them – In many enterprises today, security policies may informal or unwritten •Informal/unwritten policies not legally enforceable Typically policies prescribe methods of implementing general and application controls
  • 7. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 7 ILLINOIS INSTITUTE OF TECHNOLOGY Nature & Extent of the Audit Depends on audit objectives and other factors Factors to consider: – Nature and complexity of the information systems – The control environment – Particular accounts and applications significant to the areas of interest
  • 8. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 8 ILLINOIS INSTITUTE OF TECHNOLOGY Audit Scope  Audit objectives determine the scope of the audit  Scope determination factors – Site business plan – Type of data being protected – Value/importance of data to the client organization – Previous security incidents – Time available to complete the audit – Talent/expertise/experience of the auditors  Auditors & client must agree on scope prior to the commencement of the actual audit
  • 9. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 9 ILLINOIS INSTITUTE OF TECHNOLOGY Audit Stages Audit is conducted in four stages – Planning Phase – Internal Control Phase – Testing Phase – Reporting Phase
  • 10. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 10 ILLINOIS INSTITUTE OF TECHNOLOGY Planning Phase  Auditor gains an understanding of information system operations, controls and related risks  In view of these risks reach tentatively conclusions as to which controls are likely to be effective  If controls are likely to be effective and are relevant to audit objectives, the auditor will determine nature and extent of audit work needed to confirm tentative conclusions.  If controls are not likely to be effective, auditor must develop a sufficient understanding of related control risks to – (1) develop appropriate findings and related recommendations for corrective action – (2) determine the nature, timing, and extent of substantive testing necessary
  • 11. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 11 ILLINOIS INSTITUTE OF TECHNOLOGY Pre-Audit Tasks Review previous audits (baselining) Assess site survey – Asset inventory including technical description of the system’s hosts – Includes management and user demographics Administer security questionnaires Review previous security incidents
  • 12. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 12 ILLINOIS INSTITUTE OF TECHNOLOGY Pre-Audit Tasks Read and evaluate the most recent risk assessment Read and evaluate all policies & procedures Develop the Audit Plan – Prepare audit checklists tailored for the audit environment Discuss audit objective and details with the client, ensuring objectives are understood and mutually agreed upon
  • 13. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 13 ILLINOIS INSTITUTE OF TECHNOLOGY Site Survey May need to be completed by client staff or may be prepared by a member of the audit team based on an existing asset inventory and other information provided by the client Should present auditors with a complete picture of the information technology environment of the client
  • 14. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 14 ILLINOIS INSTITUTE OF TECHNOLOGY Security Questionnaires Self-assessment tools allowing client staff—both IT professional staff and end users—to measure knowledge of and compliance with security controls in place Should be phrased in terms of “ranking” (i.e. 1-5, 1-10 scales) as to knowledge and compliance in specific areas
  • 15. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 15 ILLINOIS INSTITUTE OF TECHNOLOGY Pre-Audit Audit Report  If policies and procedures do not prescribe adequate controls for the described risks, auditors may need to: – develop appropriate findings and related recommendations for corrective action – delay remaining portions of the audit until appropriate corrections have been put in place – prepare a preliminary Audit Report to facilitate proper implementation of controls
  • 16. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 16 ILLINOIS INSTITUTE OF TECHNOLOGY Internal Control Phase  Auditors obtain detailed information on control policies, procedures, and objectives  Perform tests of control activities  First test general controls through a combination of procedures, which may include – Observation – Inquiry – Inspection
  • 17. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 17 ILLINOIS INSTITUTE OF TECHNOLOGY Internal Control Phase If these controls operate effectively, auditors should then test & evaluate effectiveness of general controls for applications significant to the audit If general controls are not operating effectively, application-level controls are generally not tested (note: in the audits we conduct, we will not be testing any application- level controls…)
  • 18. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 18 ILLINOIS INSTITUTE OF TECHNOLOGY Application Level Testing  As an example of application-level control testing, auditors might test a system to ensure – data prepared for entry is complete, valid, and reliable; – data is converted to an automated form and entered into the application accurately, completely, and on time; – data is processed by the application completely, on time, and in accordance with established requirements; – output is protected from unauthorized modification or damage and distributed in accordance with prescribed policies
  • 19. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 19 ILLINOIS INSTITUTE OF TECHNOLOGY Application Level Testing Auditors evaluate and test the effectiveness of application controls by – observing the controls in operation – examining related documentation – discussing the controls with pertinent personnel – reperforming the control being tested
  • 20. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 20 ILLINOIS INSTITUTE OF TECHNOLOGY Testing Phase  In the testing phase, substantive technical testing is performed  This may include – Application security and integrity testing on appropriate workstation & terminals • Checking for patches and updates – Network security testing through both passive monitoring and active measures – Restoration of backed-up material – If conducted in concert with a broader audit (i.e. a financial audit), auditors may be called upon to assist financial auditors in identifying/selecting computer-processed transactions for testing, possibly using computer audit software
  • 21. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 21 ILLINOIS INSTITUTE OF TECHNOLOGY Site Visit  Internal Control and Testing phases are normally accomplished through a site visit  Aim of auditors is to not to adversely affect business transactions during the audit  Auditors should conduct an entry briefing where they outline the scope of the audit and what they hope to accomplish  Auditors should be thorough, fair and apply consistent standards and procedures throughout the audit
  • 22. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 22 ILLINOIS INSTITUTE OF TECHNOLOGY Site Visit  During the visit, auditors may: – Collect data about the physical security of computer assets – Perform interviews of site staff – Perform network vulnerability assessments – Perform operating system and application security assessments & vulnerability testing – Perform access controls assessment – Other evaluations  Auditors should follow their checklists, but keep their eyes (and ears!) open for unexpected problems
  • 23. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 23 ILLINOIS INSTITUTE OF TECHNOLOGY Key Audit Questions  Remember, audits are principally concerned with how security policies are actually implemented  Key questions to be answered: – Are passwords difficult to crack? • Are they on post-it notes on the monitor or inside the desk’s top drawer? – Are there access control lists (ACLs) in place on network devices to control who has access to shared data? – Are there audit logs to record who accesses data? – Are the audit logs reviewed?
  • 24. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 24 ILLINOIS INSTITUTE OF TECHNOLOGY Key Audit Questions (continued) – Are the security settings for operating systems in accordance with accepted industry security practices? – Have all unnecessary applications and computer services been eliminated for each system? – Are these operating systems and commercial applications patched to current levels? – How is backup media stored? Who has access to it? Is it up-to-date? – Is there a disaster recovery plan? Have the participants and stakeholders ever rehearsed the disaster recovery plan?
  • 25. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 25 ILLINOIS INSTITUTE OF TECHNOLOGY Key Audit Questions (continued) – Are there adequate cryptographic tools in place to govern data encryption, and have these tools been properly configured? – Have custom-built applications been written with security in mind? – How have these custom applications been tested for security flaws? – How are configuration and code changes documented at every level? How are these records reviewed and who conducts the review?
  • 26. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 26 ILLINOIS INSTITUTE OF TECHNOLOGY Audit Checklists Audits are conducted by checklist Checklists are widely available but should be tailored for each audit by the audit team Checklists may be challenge- response (i.e. check-in-the-box or yes-or-no answers) or they may be scale rankings (1-4, 1-5, 1-10, etc.)
  • 27. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 27 ILLINOIS INSTITUTE OF TECHNOLOGY Sample Audit Checklist General IT Controls Audit Program Purpose / Scope Perform a General Controls review of Information Technology (IT). The reviews will include all IT related policies, procedures, data security administration, data center operations, system development / maintenance, the IT Disaster / Recovery plan and its relation to the corporate Business Continuity plan. Audit steps Date Initials W/P Ref. IT General Controls Planning Determine if committees review, approve, and report to the board on: Short and long term information systems plans IT operating standards Data security policies and procedures Resource allocation (major hardware/software acquisition and project priorities) Status of major projects IT budgets and current operating cost Policies, Standards, and Procedures Determine whether the board of directors has reviewed and approved IT policies. Examine how IT management has defined standards and adopted a methodology governing the process of developing, acquiring, implementing, and maintaining information systems and related technology. Determine if IT management has adequate standards and procedures for: Systems development Program change control Data Center operations Data Base administration DASD management Performance monitoring
  • 28. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 28 ILLINOIS INSTITUTE OF TECHNOLOGY Exit Briefing  Ensure management is made aware of any problems requiring immediate attention or correction  Answer questions in a very general manner so as not to create a false impression of the audit’s outcome – At this stage auditors are not in a position to provide definitive answers – Final answers can only be provided following the final analysis of the audit data
  • 29. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 29 ILLINOIS INSTITUTE OF TECHNOLOGY Reporting Phase Back at the ranch, auditors will review and analyze checklist data and analyze any data discovered through use of vulnerability assessment tools There should be an initial meeting to help focus the outcome of the audit results – Auditors should identify problem areas and possible solutions
  • 30. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 30 ILLINOIS INSTITUTE OF TECHNOLOGY Writing the Audit Report  The Audit Report may be prepared in a number of formats  Keep it simple and direct, containing concrete findings with measurable ways to correct identified deficiencies  Typical format – Executive summary – Detailed findings – Supporting data (checklists, scan reports etc.) should be included as report appendices
  • 31. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 31 ILLINOIS INSTITUTE OF TECHNOLOGY Writing the Audit Report  Develop executive summary first as it may be necessary to report to management before details are done  Include an audit summary which may emphasize the positive findings of the audit  Organize audit findings in a simple and logical manner with a half-page or full page for each identified problem  Each problem entry should outline the problem, discuss implications and describe appropriate corrective actions
  • 32. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 32 ILLINOIS INSTITUTE OF TECHNOLOGY The Audit Report  Describe information security control weaknesses clearly in terms understandable to those with limited knowledge of information system issues  Define all technical terms and avoid jargon and acronyms  Discuss each weakness in terms of – related criteria – the condition identified – the cause of the weakness – actual or potential impact on the organization – appropriate corrective action  This helps senior management to understand the significance of the problem and to ensure development of appropriate corrective actions
  • 33. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 33 ILLINOIS INSTITUTE OF TECHNOLOGY Technical Reporting Weaknesses reported to technical staff should be the same as that reported to senior management but should include necessary technical detail to allow the staff – to understand the precise cause of the weaknesses – to aid them in developing corrective actions
  • 34. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 34 ILLINOIS INSTITUTE OF TECHNOLOGY Report Timeliness & Follow-Up Prepare the Audit Report as quickly as accuracy allows so that site staff can correct problems identified Auditors may be called upon to assist technical staff in implementation of appropriate controls and solutions Management should follow-up until all identified deficiencies are corrected
  • 35. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 35 ILLINOIS INSTITUTE OF TECHNOLOGY Typical Problems Identified in Audits  Lack of formal IT planning mechanisms with the result that IT does not serve the organizations’s pressing needs or does not do so in a timely and secure manner  Lack of formal security policies resulting in a piecemeal or “after-an-incident” approach to security  Inadequate program change control leaving software vulnerable to unauthorized changes
  • 36. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 36 ILLINOIS INSTITUTE OF TECHNOLOGY Typical Problems Identified in Audits  Little or no awareness of key security issues and inadequate technical staff to address the issues  Failure to take advantage of security soft- ware features such as selective monitoring capabilities, enforcement of stringent pass- word rules, & review of key security reports  Inadequate user involvement in testing and sign-off for new applications resulting in systems that fail to meet user requirements or confidentiality, integrity, and availability needs
  • 37. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 37 ILLINOIS INSTITUTE OF TECHNOLOGY Typical Problems Identified in Audits  Installation of software or upgrades without adequate attention to default configurations or default passwords  Virus definitions not kept up-to-date  Inadequate continuity of operation plans  Failure to formally assign security administration responsibilities to staff who are technically competent, independent, and report to senior management
  • 38. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 38 ILLINOIS INSTITUTE OF TECHNOLOGY Typical Problems Identified in Audits Lack of user awareness Unnecessarily high access rights Lack of or inadequate plans for – An information security management program – Physical and logical access controls – Software change controls – Segregated duties – Continuity of business
  • 39. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 39 ILLINOIS INSTITUTE OF TECHNOLOGY What Should Auditors Know?  Generally accepted accounting practices state “staff assigned to conduct the audit should collectively possess adequate professional proficiency for the tasks required.” – This includes computer skills and security knowledge for IS audits  Although each member of an audit team need not have all attributes, the team must collectively possess the requisite attributes to be able to – Adequately plan the audit – Assess computer-related controls – Test the controls – Determine the effect on the overall audit plan – Develop findings and recommendations – Report the results
  • 40. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 40 ILLINOIS INSTITUTE OF TECHNOLOGY What Should Auditors Know?  Applicable knowledge is laid out well in the National State Auditors Association/GAO Management Planning Guide for Information Systems Security Auditing (table on next 2 slides)  Typical knowledge/skill set includes – Technical competency – Knowledge and understanding of information security and privacy requirements and best practices – (see the tables)
  • 41. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 41 ILLINOIS INSTITUTE OF TECHNOLOGY Knowledge, Skills, and Abilities Audit Objective Associated knowledge, skills, and abilities forIS Security Audit Areas Organizationwide security program planning and management Knowledge of applicable legislative requirements for a security program Knowledge of the sensitivity of data and the risk management process through risk assessment and risk mitigation Knowledge of the risks associated with a deficient security program Knowledge of the elements of a good security program Ability to analyze and evaluate an organization’s security policies and procedures and identify their strengths and weaknesses Access control Knowledge across platforms of the access paths into computer systems and of the functions of associated hardware and software providing an access path Knowledge of access level privileges granted to users and the technology used to provide and control them Knowledge of the procedures, tools, and techniques that provide for good physical, technical, and administrative controls over access Knowledge of the risks associated with inadequate access controls Ability to analyze and evaluate an organization’s access controls and identify the strengths and weaknesses Skills to review security software reports and identify access control weaknesses Skills to perform penetration testing of the organization’s applications and supporting computer systems Application software development and change control Knowledge of the concept of a system life cycle and of the System Development Life Cycle (SDLC) process Knowledge of the auditor’s role during system development and of federal guidelines for designing controls into systems during development Knowledge of the procedures, tools, and techniques that provide control over application software development and modification Knowledge of the risks associated with the development and modification of application software Ability to analyze and evaluate the organization’s methodology and procedures for system development and modification and identify the strengths and weaknesses Adapted from “Knowledge, Skills, and Abilities for IS Security Audit Areas by FISCAM Objective” from National State Auditors Association/GAO Manag e m e nt Pla nning G uide fo r Info rm atio n Syste m s Se curity Auditing , 2001
  • 42. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 42 ILLINOIS INSTITUTE OF TECHNOLOGY Knowledge, Skills, and Abilities Audit Objective Associated knowledge, skills, and abilities forIS Security Audit Areas System software Knowledge of the different types of system software and their functions Knowledge of the risks associated with system software Knowledge of the procedures, tools, and techniques that provide control over the implementation, modification, and use of system software Ability to analyze and evaluate an organization’s system software controls and identify the strengths and weaknesses Skills to use software products to review system software integrity Segregation of duties Knowledge of the different functions involved with information systems and data processing and incompatible duties associated with these functions Knowledge of the risks associated with inadequate segregation of duties Ability to analyze and evaluate an organization’s organizational structure and segregation of duties and identify the strengths and weaknesses Business continuity Knowledge of the procedures, tools, and techniques that provide for business continuity Knowledge of the risks that exist when measures are not taken to provide for business continuity Ability to analyze and evaluate an organization’s program and plans for business continuity and identify the strengths and weaknesses Application controls Knowledge about the practices, procedures, and techniques that provide for the authorization, completeness, and accuracy of application data Knowledge of typical applications in each business transaction cycle Ability to analyze and evaluate an organization’s application controls and identify the strengths and weaknesses Skills to use a generalized audit software package to conduct data analyses and tests of application data, and to plan, extract, and evaluate data samples Adapted from “Knowledge, Skills, and Abilities for IS Security Audit Areas by FISCAM Objective” from National State Auditors Association/GAO Manag e m e nt Pla nning G uide fo r Info rm atio n Syste m s Se curity Auditing , 2001
  • 43. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 43 ILLINOIS INSTITUTE OF TECHNOLOGY Our Audits Pre-Audit – Policy Review – Administer any questionnaires – Plan the Audit •Create audit checklists •Arrange site visit Site Visit – Entry briefing but probably no exit briefing Prepare Report Deliver Report
  • 44. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 44 ILLINOIS INSTITUTE OF TECHNOLOGY The End… Questions? Discussion!

Hinweis der Redaktion

  1. Upon completion of this lesson the student should be able to: Explain what an information security audit is Explain the relationship of information security policies to the audit process Describe how an information security audit is conducted Discuss knowledge required for members of an information security audit team