evesecuref4

advertisement
IT Security
Julie Schmitz
James Mote
Jason Tice
Agenda
• Overview of basic IT security
• Human Resources Command-St. Louis
• Inside Financing
• Recommendations and Best Practices
• Closing and questions
IT Security Defined
• “Broadly speaking, security is keeping
anyone from doing things you do not
want them to do to, with, or from your
computers or any peripherals”
-William R. Cheswick
IT Security Overview
• Intruders - hackers and crackers
• Insiders – fraud case at Financing
• Criminals
• Online Scam artists
• Terrorists
IT Security Overview
• Hacker
– Person who enjoys exploring the details of
programmable systems and how to stretch
their capabilities
– Hackers tend to view themselves as very
knowledgeable computer programmers,
sometimes to the point of arrogance
– True hacker will look for weaknesses in a
system and publish it
Source: FBI Cyber Task Force
IT Security Overview
• Cracker
– One who breaks security on a target
computer system
– The term was coined by hackers around
1985 in defense against the journalistic
misuse of the term “hacker”
– Tend to never disclose their findings
Source: FBI Cyber Task Force
Hackers or Crackers?
How does a Hacker Effect You?
• Michael Buen and Onel de Guzman
– Both are suspected of writing the “I Love
You” virus
• David L. Smith
– Melissa virus author
– Released March 26, 1999
– Caused an estimated $80 million in
damages
Source: FBI Cyber Task Force
IT Security at your Office
• Social Engineering
• Denial of service attacks (DoS)
• E-mail bombs
• Password cracking
• Web spoofs
• Trojan, worm, virus attacks
• Antivirus tools
Source: FBI Cyber Task Force
Social Engineering
• A con game played by computer literate
criminals
• Works because people are the weakest
link in any security system
Source: FBI Cyber Task Force
Denial of Service
• Prevents users from using a computer service.
• A type of DoS attack involves continually
sending phony authentication messages to a
targeted server, keeping it constantly busy and
locking out legitimate users
• Ping attacks
• DDoS attacks
– Uses multiple computers to coordinate DoS attacks
Source: FBI Cyber Task Force
Email Bombs
• A type of denial of service attack
• Email bombs involve sending enormous
amounts of email to a particular user, in
effect, shutting down the email system
• Many spammers fall victim to this type of
attack
• No need to manually send email;
downloadable programs will do it for you
Source: FBI Cyber Task Force
Password Cracking
• Involves repeatedly trying common
passwords against an account in order to
log into a computer system
• Freely available “cracking” programs
facilitate this process
Source: FBI Cyber Task Force
Web Spoofing
• “faking the origin”
• The attacker creates a false or shadow copy of
a reputable web site; all network traffic
between the victim’s browser and the shadow
page are sent through the attacker’s machine
• Allows the attacker to acquire information such
as passwords, credit card numbers, and
account numbers
Source: FBI Cyber Task Force
What Should Have Been Displayed
What was Displayed
Trojan, Worm, and Virus
• A Trojan program does not propagate
itself from one computer to another
• A Worm reproduces ITSELF over
a network
• A Virus, like its human counterpart,
looks for ways to infect other systems
or “replicate” itself (i.e., e-mail)
Source: FBI Cyber Task Force
Trojans
• Trojans are malicious files masquerading as
harmless software upgrades, programs, help
files, screen savers, pornography, etc.
• When the user opens file, the Trojan horse runs
in the background and can cause damage to
the computer system (hard drive damage, total
access, username and password)
Source: FBI Cyber Task Force
Trojan
Control
Virus
• A program that replicates without being
asked to
• Copies itself to other computers or disks
• Huge threat to companies
Source: FBI Cyber Task Force
Antivirus Tools
• Any hardware or software designed to stop
viruses, eliminate viruses, and/or recover data
affected by viruses
• AV tools refer to software systems deployed at
the desktop or on the server to eliminate
viruses, worms, trojans, and some malicious
applets
• Should be used as part of a security policy
Source: FBI Cyber Task Force
After the Incident
• Identify means to avoid another attack
– Download latest patches
– Repair compromised systems
– Re-educate users
– Run anti-virus software
• Stay alert for signs the intruder is still in
your system
• Log traffic data
Source: FBI Cyber Task Force
Security Budget
The Facts on IT Security Budgets
• 62 percent of technology officers feel no
pressure to increase spending this year
• 40 percent of their budgets will go toward
preventing existing machinery from breaking
• Systems security tends to go unfixed until
proven broken
• A simple firewall has become the ultimate
security commodity
• Don’t use ROI to configure IT security budget
Source: FBI Cyber Task Force
Money Lost Due to Different Types of Attacks
$26,064,050
Denial of service
$11,460,000
Theft of proprietary info
$10,601,055
Insider Net abuse
$10,159,250
Abuse of wireless networks
$7,670,500
Financial fraud
$6,734,500
Laptop theft
$4,278,205
Unauthorized access
$3,997,500
Telecom fraud
$2,747,000
Misuse of public Web applications
Web site defacement
$958,100
System Penetration
$901,500
$871,000
Sabotage
$0
$5,000,000
$10,000,000
$15,000,000
$20,000,000
$25,000,000
Amount of Loss
Source: Federal Bureau of Investigation / Computer Security Institute – http://www.gocsi.com - viewed
11/4/2004
$30,000,000
I.T. SECURITY BRIEFHUMAN RESOURCES COMMAND
ST. LOUIS
Human Resources Command
St. Louis Historical Timeline
•First established in 1944 at 4300 Goodfellow
•First known as the Demobilized Personnel Records
Branch after WWII
•In 1956, moved to its present location, 9700 Page
•In 1971, Reserve Components Personnel Center at
Ft. Benjamin Harrison merged with St. Louis
•In 1985, Army Reserve Personnel Center
(ARPERCEN) was formed.
•In 2003, organization was renamed to Human
Resources Command (HRC)
Source: https://www.2xcitizen.usar.army.mil/2xhome.asp - viewed 11/1/2004
Human Resources Command
(HRC) St. Louis Overview
• Supports or conducts the Human Resources Life
Cycle for over 1.5 million customers
• Workforce comprised of over 65% civilians, 30%
Active Guard-Reserve soldiers, 5% Active
Component soldiers
• Of the military workforce, most officers are Majors
(O-4) & most non-commissioned officers are
Sergeants First Class (E-7s)
• 65-acre facility located off Page Avenue
• Total of Nine Directorates
Source: https://www.2xcitizen.usar.army.mil/2xhome.asp - viewed 11/1/2004
Human Resources Command
(HRC) Mission Statement
•To provide the highest quality human resources life
cycle management in the functional areas of
structure, acquisition, distribution, development,
deployment, compensation, sustainment and
transition for all Army Reserve Soldiers, resulting in a
trained and ready force in support of the national
military strategy.
•To provide human resource services to our retired
reserve and veterans.
Source: https://www.2xcitizen.usar.army.mil/2xhome.asp - viewed 11/1/2004
Information Assurance Office
Information Assurance Manager
(Rank: Major)
IANCO
(Rank: MSG)
Assistant IAM
(Rank: CPT)
Civilian(GS-13)
Deputy IAM
Civilian (GS-12)
Information Tech
& Sec Specialist
Civilian (GS-11)
Information Tech
& Sec Specialist
Civilian (GS-11)
Information Tech
& Sec Specialist
Source: Information Assurance Office, Human Resources Command, St. Louis
Information Assurance Manager Duties
Major:
Responsible for Overall IT Security
Master Sergeant:
Verifies Security
Clearances; Trng;
Account Requests
Captain:
Drafts &
Submits Policy
GS-13:
Updates Patches &
ACERT
Compliance
GS-12:
System Security
Authorization Agreement;
Networthiness Certification
GS-11: Investigates
Computer forensics;
Backup for updates
& patches
GS-11: Backup for
Computer forensics;
Trng; Account Req.;
Verifies Sec. Clear.
Source: Information Assurance Office, Human Resources Command, St. Louis
Information Assurance Defined
• The protection of systems and information in
storage, processing, or transit from unauthorized
access or modification; denial of service to
unauthorized users; or the provision of service to
authorized users
• Also includes those measures necessary to detect,
document, and counter such threats
• This regulation designates IA as the security
discipline that encompasses COMSEC, INFOSEC,
and control of compromising emanations
Source: Army Regulation (AR) 25-2
Information Assurance Organization
Chief Information Officer
U.S. Army Reserve Command
Atlanta, Georgia
Information
Assurance Officers11 Regional Support
Commands
Information
Assurance OfficerHuman Resources
Command-St. Louis
Source: Information Assurance Office, Human Resources Command, St. Louis
In Order to Gain System Access
• All Military must have a Security
Clearance
• Some civilians must have Security
Clearance
• Other civilians must have at least a
National Agency Check (NAC)
• All employees must submit a request
for system access
Source: Information Assurance Office, Human Resources Command, St. Louis
Common End User Problems
• Pornography
• Running Businesses
• Unauthorized use of illegal
software
• Sharing of logons/passwords
Source: Information Assurance Office, Human Resources Command, St. Louis
What Happens If You
Get Locked Out?
• Go
to your local Information Mgmt
personnel assigned to serve your
directorate
Source: Information Assurance Office, Human Resources Command, St. Louis
Main Concerns of IT Security
• Information Security Training
• Purchasing automation equipment
without authorization
• Computer left on 24/7
• Having a qualified Information
Assurance Manager that is strict
• Knowledge of the system
Source: Information Assurance Office, Human Resources Command, St. Louis, MO; Information Assurance
Officer, 63rd Regional Readiness Command, Los Alamitos, California
Anti-Virus Activity
STOPPED AT GATEWAY
50000
45000
Number of Events
40000
35000
30000
25000
Events
20000
45,000 IN APRIL
15000
10000
5000
04
04
Aug-
Sep-
J ul-0
4
4
J un-0
-04
May
04
Apr-
Mar-
04
0
50
45
STOPPED AT DESKTOP
Number of Events
40
35
30
25
Events
20
15
10
5
Source: Information Assurance Office, Human Resources Command, St. Louis
04
04
Aug-
Sep-
J ul-0
4
4
J un-0
May
-04
04
Apr-
Mar-
04
0
Probes and Scans
Against Network
50000
135,000 YTD
45000
Number of Attempts
40000
35000
30000
25000
20000
15000
10000
5000
Source: Information Assurance Office, Human Resources Command, St. Louis
Sep
-04
Aug
-04
J ul-0
4
J un04
May
-04
Apr04
Mar04
04
Feb-
J an04
-03
Dec
-03
Nov
O ct-
03
0
Computer Security Model
• Bell-LaPadula Model
– Developed by the US Army in the 1970’s
– Provides framework for handling data of
different classifications
– Known as “multilevel security system”
– One of the earliest and most famous
computer security models
Source: Information Assurance Office, Human Resources Command, St. Louis;
http://infoeng.ee.ic.ac.uk/~malikz/surprise2001/spc99e/article2 - viewed 11/6/2004
Information Unable to Obtain
• IT Security Budget
• Business Policy Procedures
• Outsource IT providers information
Source: Information Assurance Office, Human Resources Command, St. Louis
Security challenges at
Financing from the
CIO’s perspective
Financing Background Info
• Financing is one of the largest domestic
providers of inventory floor financing for
several different industrial channels.
• Recent focus to use IT to reduce business
costs by processing transactions online.
• IT operates 5 different customer facing
applications handling in excess of 4
billion dollars in transactions monthly.
Source: Interview and personal comments from Financing’s CIO – October 2004
Case Study Research Method
• Interviewed CIO to gain their different
perspectives on IT security and business.
• Interview lasted approximately 2 hours
and consisted of 15 questions.
• Subsequent discussion based on what
CIO said were issues of highest concern.
Source: Interview and personal comments from Financing’s CIO – October 2004
Most Pressing Security Concerns
1. Eliminating bad user practices
2. Measures to prevent security breeches
3. Ability to quickly recover from security
failures / breeches
4. Impact of compliance with SOX
regulations
Source: Interview and personal comments from Financing’s CIO – October 2004
Security Specifics
• No specific line item budget amount.
– Security costs are encompassed in other
budget items, such as system development
& testing, data center operations, etc.
• No dedicated resources focusing solely
on security.
– Security related activities fall under
responsibility of existing IT staff.
Source: Interview and personal comments from Financing’s CIO – October 2004
Security Challenges:
End User Security
“Security is a 50/50 proposition. A system
can be perfectly secure; however, if users
don’t properly use the provided security
features, then there might as well be no
security at all.”
-Anonymous
End User Security:
Typical Financing User
• Non-technology savvy office clerks and
book keepers.
• No on-site IT support to maintain
individual system security.
• Many dealers have Broadband access
without firewall protection.
Source: Interview and personal comments from Financing’s CIO – October 2004
End User Security:
Typical Financing User
• Non-technology savvy office clerks and
book keepers.
• No on-site IT support to maintain
individual system security.
• Many dealers have Broadband access
without firewall protection.
•What is so risky about this???
Source: Interview and personal comments from Financing’s CIO – October 2004
End User Security:
Typical Financing User (2)
• Known problems with Spyware and
viruses.
• Account reps reported seeing multiple
users post their username and
password in plain view in their offices.
Source: Interview and personal comments from Financing’s CIO – October 2004
End User Security:
Typical Financing User (2)
• Known problems with Spyware and
viruses.
• Account reps reported seeing multiple
users post their username and
password in plain view in their offices.
•Poor password selection by users
consistently cited as one of the top
three IT Security issues.
Source: Cupps, John; How To Identify and Contain Some of the Information Security Problems
Created By Unique Business Environments; http://www.sans.org/rr/whitepapers/casestudies/666.php;
viewed 11/3/2004
Password Survey
Password Survey
• Sit down if you
change your
password once a
week.
• Put your hand down
if your password has
both letters and
numbers in it.
Password Security Level: Strong
Password Survey
• Sit down if you
change your
password every
month.
• Put your hand down
if your password is a
NOT word in the
dictionary
Password Security Level: Good
Password Survey
• Sit down if you
change your
password only a few
times each year.
• Put your hand down
if you use the SAME
password on multiple
systems.
Password Security Level: Weak
Password Survey
• Sit down if you
NEVER change your
password.
• Put your hand down
if your password is
simply part of your
name or username.
Password Security Level: Poor
Bad Habits are Hard To Break
• Use familiar words, names that can be easily
guessed.
• Use a password that is too short, therefore
fewer characters to guess / crack.
• Use the same password on multiple systems.
• Do not change password regularly.
• Share passwords with others.
• Post passwords somewhere around their
computer.
Need for Strong Passwords
Today’s computers are capable of trying
millions of word variations per second
and often can guess a good number of
passwords in less than a minute.
- Rob Lemos
Source: Lemos, Rob; Hackers can crack most in less than a minute;
http://news.com.com/Passwords+The+weakest+link/2009-1001_3-916719.html; viewed 10/27/2004
Improving Passwords at Financing
• 8 Month project to consolidate and
enhance application passwords
• Start November 2003, End May 2004
• Completed as a Green Belt project for 2
business and 2 IT project managers
Source: Interview and personal comments from Financing’s CIO – October 2004
Before consolidation . . .
DB
DB
DB
DB
DB
• 3 applications only required a password with 3
characters.
• Only 1 application had users change their
password annually.
• Users could only reset their password by calling
the support center.
After consolidation . . .
Single Sign On
• 5 distinct applications now use a Single Sign
On process.
• All applications share 1 common
authentication source and logon process.
User Benefits
• Only have to remember 1 password for
all 5 applications.
• Once logged into one application, can
jump right into other application.
• Navigation of applications is now much
easier for users.
Source: Interview and personal comments from Financing’s CIO – October 2004
The Big Question ???
Did the project ‘Do The Right Thing?’
-orDid the project ‘Do The Thing Right?’
Was ‘The Right Thing’ . . .
• Enabling ‘Single Sign On’ was ‘the right thing to
do’ only when implemented in conjunction with
new password rules, recommended by IBM:
– Password must have been 8 and 12 characters
– Password must have at least 1 number in it.
– Password cannot contain elements of user’s name,
company, address, or email address.
– New Passwords must be different from prior 12
passwords.
– New passwords cannot contain more than 6
repeated characters from the last password.
– Passwords must be changed every 90 days.
Additional Benefit
• Enhanced applications to allow users to
reset their password online if they forgot
it.
– This eliminated nearly 200 calls per month
to the application support center.
Source: Interview and personal comments from Financing’s CIO – October 2004
Results of Project
• Application security improved through
enforcing strong password rules.
• Users initially complained about having to
remember a more complicated password;
however, these complaints were short lived
when users realized they only had to remember
a single password for all 5 applications.
• Call center costs reduced by eliminating calls
from users who had forgotten their password.
Source: Interview and personal comments from Financing’s CIO – October 2004
Further Enhancing Security
• IT Department publishes articles focusing
on security in monthly newsletter to
customers.
• Currently considering
modifying ‘Single Sign
On’ system to use
security key validation.
Source: Interview and personal comments from Financing’s CIO – October 2004
Security Challenges:
Preventing Breeches
• Technology Use to Enhance On-Line
Security
 All user application traffic is transported
using SSL encryption.
Source: Interview and personal comments from Financing’s CIO – October 2004
Encryption Explained
Browser
Server
KEY
INTERNET
KEY
My Credit Card
My Address
My Phone Number
My Credit Card
My Address
My Phone Number
Jdhd923k
Jdss938jds
djdskzyu
Safety of Encryption ???
True or False:
Encryption prevents all third parties from
intercepting transactions?
The Answer is False . . .
• In reality, a third party could determine the
correct key and decode the encrypted
transactions if given enough time.
• The time and effort to crack a 128-bit
encryption key is so large, given the limited
strength of computing technologies, encrypted
data is considered security since the costs to
crack the encryption outweigh the potential
gains.
IT Infrastructure & Security
• IT resources for applications are
geographically separated across country.
• Applications are run on multiple server
clusters.
– If a single server goes down, other servers in
the cluster can immediately take over the
load from the down server.
Source: Interview and personal comments from Financing’s CIO – October 2004
Application Monitoring
• Impossible to predict when a system breech or
system outage may occur.
• IT cannot react to a situation until it has
occurred.
• Staff needs to be informed as soon as possible
when an outage occurs to reduce downtime.
• Fast disaster reaction time is made possible
through 24 / 7 application monitoring.
Source: Interview and personal comments from Financing’s CIO – October 2004
Application Monitoring (2)
• All applications are monitored by a third
party software tool run from multiple
locations.
• Question: Why must the monitoring tool
be run from multiple locations?
Source: Interview and personal comments from Financing’s CIO – October 2004
Application Monitoring (2)
• All applications are monitored by a third
party software tool run from multiple
locations.
• Question: Why must the monitoring tool
be run from multiple locations?
Answer: To insure that the
application is being monitored
even if one of the locations
crashes.
Key Components of Monitoring
• Monitoring tool confirms that the application is
up and running and can be accessed by
customers. Simulates the same actions as if a
user connects to the application through their
own web browser.
• Since the monitoring tool is acting like a user,
many times it is called a ‘robot’.
• Monitoring tool access the application and
invokes the most frequently used traffic flows
and transactions performed by users.
• The response time for each traffic flow and
transaction is recorded.
Preventing System Outages
• Each robot reports transaction times to a
central database.
• A system alarm is sounded if any transaction
time slows beyond a predetermined limit.
• Slow transactions point to a possible system
problem that needs to be investigated further,
possibly caused by a Denial of Service attack,
or a hardware problem (broken disk, failed
memory/processor, etc).
Benefits of System Monitoring
• Reduce application downtime by proactively
responding to problems before they cause a
system outage.
• Allow for High – Availability Service Level
Agreements.
• Quickly determine if reported system outages
are caused by network connectivity problems
as opposed to application problems.
Source: Interview and personal comments from Financing’s CIO – October 2004
Security Challenges:
Fraud Prevention
“Currently so much emphasis has been put
on protecting systems from unauthorized
access and attack, that many have not
considered or made provisions for
security and fraud issues created by valid
application users themselves.”
- Financing’s CIO, 10/2004
Primary Fraud Concerns
• Applications do not allow transfer of funds to
external accounts, minimizing risk of external
fraud.
• Higher probability of customers trying to
manipulate data stored in system to their
advantage.
• Must walk the fine line between respecting the
customer while not allowing the customer to
take advantage of the company.
Source: Interview and personal comments from Financing’s CIO – October 2004
Application Logging
• All applications log all user activity from Logon
to Logout.
• Also logged are: IP address of computer used
for access, hostname of system used for
access, browser type, operating system, etc.
• System transactions such an interest
calculations and online document requests are
also logged. Allows for tracking of calculation
or processing errors in back-end systems.
Source: Interview and personal comments from Financing’s CIO – October 2004
Business Intelligence & Security
• Logs are stored by username in a
separate database.
• Current data center capacity allows for
live storage of more than 2 years of logs.
• Live database allow for on-demand
searching of any user’s activity.
Database streamlines investigation
process and reduces call center call time.
Source: Interview and personal comments from Financing’s CIO – October 2004
Sample Fraud cases from 2004
Case 1: Fraudulent Payments
Customer calls to report that their bank
account has been debited several
thousand dollars in excess. The caller
suspects someone has broken into the
payment system using their account.
Source: Interview and personal comments from Financing’s CIO – October 2004
Fraud Investigation Process
• User calls Support Center to report suspicious
problem.
• Call center pulls up all of user’s transactions in
suspect period.
• Call center and customer identify suspicious
sessions / transactions, by comparing the
system log with the customer’s records.
• If fraud is identified, evidence is sent to fraud
department for investigation.
Source: Interview and personal comments from Financing’s CIO – October 2004
Problems with Fraud Investigation
• Fraud department borrows resources
from processing department and IT (both
support and development) to track down
error and determine root cause.
• When fraud is identified, fraud
department determines what reparations
will be given.
• Fraud investigation has a very high cost.
Source: Interview and personal comments from Financing’s CIO – October 2004
Preventing Fraud via Logging
• Transaction activity database allows for
83% of fraud cases to be resolved in one
call to the support center.
• Nearly 65% of suspected fraud cases are
not fraudulent and are resolved in less
than 20 minutes.
• How does this benefit the company?
Source: Interview and personal comments from Financing’s CIO – October 2004
Benefits to Company
• Lower risk, attract additional investment.
• Significant cost savings through minimal
fraud investigation.
• Increased shareholder and customer
confidence.
• Maintain high company image in light of
recent corporate account scandals.
Source: Interview and personal comments from Financing’s CIO – October 2004
Sample Fraud cases from 2004
Case 1: Fraudulent Payments – What happened?
• While a dealer’s bookkeeper (caller) was on vacation in
Florida, the dealer owner received a call from their
account rep telling them about a special discount
program if they made several extra payments that
month.
• Consequently the dealership owner logged into the
payment system, using the bookkeeper’s username
and password that were posted in plain view on a ‘postit’ note on her monitor, and made several payments.
Source: Interview and personal comments from Financing’s CIO – October 2004
Sample Fraud cases from 2004
Case 1: Fraudulent Payments – Resolution:
• Matter was resolved in one 12 minute call to the call
center.
 Call center rep was able to locate the suspect
transactions, confirm where and when they were
made.
 The bookkeeper was able to figure out what
happened by asking other staff around their office
who had used her computer while she was away.
 No need to escalate case to fraud department for
further investigation.
Source: Interview and personal comments from Financing’s CIO – October 2004
Security Challenges:
Sarbanes-Oxley Act of 2002
Sarbanes-Oxley Act Defined:
• Federal legislation passed in result of
accounting scandals at Enron, WorldCom, etc.
• Requires formal documentation of all
processes where securities are exchanged.
• Process documentation must be audited
annually to insure it remains current.
• Major changes to business processes may
require more auditing.
• Nicknamed SOX for short.
Initial SOX Challenges
• All five of Financing’s primary applications
were identified as exchanging securities and
would be audited for SOX compliance.
• Initial process documentation difficult to
complete due to lack of good product
documentation and staff changes.
• Technical IT staff struggled to produce quality
documentation that could be used for audit
purposes. Initially had to borrow resources
from business units to draft documents.
Source: Interview and personal comments from Financing’s CIO – October 2004
Compliance with SOX
• Pros & Cons ???
Compliance with SOX
• Pros:
– Avoid legal action
(SOX is a federal law)
– Prevent Corporate
fraud
– Insure overall
economic stability
– Improve public and
shareholder image
• Cons:
– Additional auditing
tasks
– Increased workload
for existing resources
– Additional costs for
auditing
– Slower development
time
Maintaining SOX Compliance
• Ongoing auditing requires further assistance
from technical staff to verify system behavior.
• SOX auditing is performed by external vendors,
such as KPMG, to insure compliance.
• Any changes to application requirement review
of SOX documentation and possible revision,
hence, increasing time required to make
enhancements.
Source: Interview and personal comments from Financing’s CIO – October 2004
SOX Costs
• Majority of SOX auditing costs have fallen within
IT budget, as only IT analysts have full
knowledge of business processes and how they
are being technically implemented, which is
necessary for full documentation.
• Costs for SOX auditing have been fully funded
while still decreasing IT’s annual budget
through shifting more development and support
to Financing’s offshore resources.
Source: Interview and personal comments from Financing’s CIO – October 2004
SOX Compliance:
Lessons Learned
• Project management must allow sufficient time to
allow for SOX documentation.
• Appoint a SOX owner for each application who is
responsible for ongoing audits of documentation for
that application.
• Encourage all team members to think proactively
about SOX compliance. SOX owners are encouraged to
include technical staff in their ongoing reviews to help
develop strong documentation skills.
• Edit SOX documentation in an on-going fashion.
Source: Interview and personal comments from Financing’s CIO – October 2004
Security Comparison
Topic
HRC
Financing
No line item budget
amount. Security tasks
are encompassed with
other budget items.
Budget
Information Not
Available.
Dedicated
Security
Resources
Dedicated resources
Staff from other IT
responsible for systems functions also serve to
and user accounts.
fulfill security
responsibilities.
Security
Testing
Information Not
Available.
Penetration test is
conducted by external
vendor annually.
Security Comparison (2)
Topic
HRC
Financing
Risk
Assessment
Risk controlled through
maintaining access
levels on all users and
data.
Business responsible for
identifying business areas
at risk, IT responsible for
technical areas of risk
Security
Architecture
Security practices
based on well-known
models, such as BellLaPadula Model
Applications designed in
house; hence,
architecture team defined
security framework based
on risks
Annual audits are
performed by security
officers.
Security provisions are
reviewed on an on-going
basis as part of
maintaining SOX docs.
Review
Process
Security Best Practice
Recommendations
From HRC:
From Financing:
• Password policies
• Firewall in place to
discourage illegal sites
• Ensure you have a
procedure in place to
ensure all personnel you
let on the network have
been fully screened.
• Virus protection
• Do Audits
• Use a strong password and
change it regularly.
• Monitor / Restrict Internet
Access on workstations.
• Hire a third party expert to
evaluate security of
systems.
• Keep complete logs /
backups for recovery
purposes.
• Proactively seek new /
better security provisions.
Sources Utilized
•
•
•
•
•
http: //archive.ncsa.uiuc.edu
http://www.itsecurity.com/dictionary.html
https://www.2xcitizen.usar.army.mil/2xhome.asp
http://www.acerts.net
http://www.infragard.net
Sources Utilized
• “FrontLine-Tips and Techniques to Protect Your
Information”; June 2004
• United States Army Reserve Information
Assurance Office
• Human Resources Command-St. Louis
Information Assurance Office
• Army Regulation (AR) 25-2, 14 November 2004
• Army Regulation (AR) 25-1, 30 June 2004
Download