IT Auditing: Firewall Management Intrusion Detection, Intrusion Prevention & Security Information Management AC475 Team Project: Katherine Jackowski Elizabeth Kearney-Lang Daureen Lingley-Chor Security Information Management PS1 Selection of Areas of Examination The two areas of interest our team chose are Firewall Management and Intrusion Detection, Intrusion Prevention and Security Information Management which complement each other well; all focusing on the safeguarding of company assets. Since our collective knowledge in these areas was quite limited we felt they would be challenging topics to research. The potential threats to an Information System are numerous with names that sound as if they might be more from a video game i.e. botnet, smurf attack, Trojan horse, but whose potential damage to an Information System could be financially devastating. Our research began with An Introduction to Computer Security: The NIST Handbook and included the Special Publications from the National Institute of Standards and Technology SP 800-41 Revision 1 entitled Guidelines on Firewalls and Firewall Policy, SP 800-94 entitled Guide to Intrusion Detection and Prevention Systems. We also used our textbook, Information Technology Auditing and Assurance by James A. Hall. The following ISACA Standards were utilized as well: P3 Intrusion Detection Systems (IDS) P4 Viruses and other Malicious Code P6 Firewall Procedure G40 Review of Security Management Practices We visited various vendor websites and utilized the White Papers from Skybox Security entitled How to Painlessly Audit Your Firewalls and Tufin entitled Firewall Operations Management, Auditing, and Compliance. Risks, Threats and Exposures A risk is any and all exposure to the possibility of loss or theft, also known as a threat. All businesses assume some risk--no business is immune to the exposure of threats. Because opportunity and risk go hand in hand, you cannot have opportunity without also having some risk and wherever there is risk, there is potential opportunity. The key is to minimize potential risk and eliminate exposures to threats as much as possible; this is done through the use of controls. Threats to an organization’s Information System’s security can come from both internal and external sources and can be both intentional and accidental. According to the 1991 Annual Report submitted by the Computer System Security and Privacy Advisory Board, the following areas were found to contribute to the economic loss of organizations: “65% errors and omissions; 13% dishonest employees; 6% disgruntled employees; 8% loss of supporting infrastructure, including power, communications, water, sewer, transportation, outsiders, including viruses, espionage, dissidents, and malcontents of various kinds, and former employees who have been away for more than six weeks1.” Between the years 1999 – 2003, attacks on computer servers increased by over 530% to 137,000 incidents in the United States2. FinCEN3 reported in their An Introduction to Computer Security – The NIST Handbook SP 800-12 The World Technology Risk Checklist 7.3 3 FinCen - Financial Crimes Enforcement Network – a U.S. government agency established by the U. S. Department of Treasury in 1990 to provide multi-source financial intelligence and analysis. 1 2 Page 2 of 22 Security Information Management Suspicious Activity Report that computer intrusions have increased more than 500% from 2003 to 2004. On April 13, 2011, Senator Sheldon Whitehouse, a Democrat from Rhode Island, and Senator Jon Kyl, a Republican from Arizona, introduced a bill acknowledging that “businesses in the United States are bearing enormous losses as a result of criminal cyber attacks, depriving businesses of hard-earned profits that could be reinvested in further job-producing innovation.” The bill is entitled the Cyber Security Public Awareness Act of 2011. If enacted, this bill S.813, will require the Department of Homeland Security along with various branches of the government to report to Congress on the frequency and impact of cyber security incidents and the number of prosecutions for cybercrimes occurring in the United States. It will also require “a summary of the plans of the Secretary of Homeland Security to enhance public awareness of common cyber security threats, including a description of the metrics used by the Department of Homeland Security for evaluating the efficacy of public awareness campaigns” to be submitted to Congress.4 Information Security is an area that will continue to require organizations to monitor and reassess potential risks, threats and exposures to their Information Systems. Key Success Factors Senior management commitment to Information security Management’s understanding of Information security issues Information Security centrally-based Integration between security objectives and business objectives Proactive security plan which includes awareness training of staff Automated risk management process which includes definition of risk limits and risk tolerance Performance measurements Up-to-date Protective Techniques Enforcement of Security Policies Avoid over-control that may reduce the efficiency of the system Applications are secured before implementation Service Level Agreements (SLAs) are utilized with suppliers to promote awareness and co-operation relative to security IT Governance fosters ethical behavior PS2 Selection of Client or Selection of Knowledgeable SourceClient Our client, Image Polymers Company, LLC, is a small manufacturing business established in 1991 with their headquarters located in Andover, Massachusetts and their 4 http://ezp.bentley.edu/login?url=http://search.proquest.com/docview862230 Page 3 of 22 Security Information Management manufacturing facility located in Mount Pleasant, Tennessee. They are a wholly owned subsidiary of Mitsui Chemicals America, Inc. Image Polymers Company outsources their IT functions to Covisia Solutions, Inc. The software they currently use is Windows XP Professional operating system and Sage Software, a SQL server-based enterprise management software system, MAS500 Version 7.30.40. They also use Sage Fixed Assets System software, and Microsoft Office 2007(Excel, Word, Outlook, and PowerPoint). Image Polymers Company LLC as a total of five servers; there is a virtualized server with three distinct server areas. The first one contains a domain controller section for access control (confirming usernames and passwords), the exchange section (for the e-mail system) and the file storage and print section. The second is the Citrix server which is used for virtual networking. The third is the MAS500 server which houses the MAS500 database. There is also a back-up server for the Domain controller and another Back-up Business Disaster Recovery (BDR) server. PS3 Prepare Statement of Control Objectives To ensure preventative, detective, and corrective measures are in place and working as intended to protect the Information System from intrusion. To ensure proper controls are in place to safeguard assets and prevent, detect and mitigate fraudulent activity. To control access to the Information Systems to prevent unauthorized use and to restrict authorized use. PS4 Identification of Control Criteria Master List of Controls Firewall Management Control Resource Firewall Policy5 NIST SP 800-41 Revision 1, Tufin System Security Plan NIST SP 800-41 Revision 1 Segregation of Duties NIST SP 800-41 Revision 1 Testing – Configuration Compliance Analysis NIST SP 800-41 Revision 1 Apply Patches NIST SP 800-41 Revision 1 Logs & Alerts NIST SP 800-41 Revision 1 Firewall Policy Back-up NIST SP 800-41 Revision 1 Ruleset Back-up NIST SP 800-41 Revision 1 Review of Firewall Policy NIST SP 800-41 Revision 1 Penetration Testing NIST SP 800-41 Revision 1 5 A complex set of rules defining access privileges and restrictions for specific users and services. Page 4 of 22 Security Information Management Configuration compliance with Network Security Policies Skybox Security Network Access Policy Skybox Security Periodic reviews of configurations (at least every six months) Skybox Security PCI DSS Compliance Requirements Skybox Security Manage Changes (Change Impact Analysis) (2x/month) Skybox Security, CobiT AI6 Configuration Compliance Analysis (1x/qtr) Skybox Security Configuration Optimization (1x/year) Skybox Security Intrusion Detection, Intrusion Prevention and Security Management Control Resource IPDS System NIST SP 800-94 Restrict network access to IPDS components NIST SP 800-94 Limit direct access to IPDS components NIST SP 800-94 Update IPDS System NIST SP 800-94 Protect IPDS management communication NIST SP 800-94 Log System (Reporting Module) NIST SP 800-94, ISACA P3 Maintain Log Files in secure location NIST SP 800-94 Perform vulnerability tests NIST SP 800-94 Conduct penetration tests NIST SP 800-94 Intrusion Detection, Intrusion Prevention and Security Management (continued) Antivirus Software Spyware Training Response Procedure Back-up Procedure Security Policy ISACA G40 Unique user ID and password for each individual network user Automated enforcement of password change Policy and Procedures related to Third Party Access Implement and annually evaluate physical security access Segregation of Duties Inactive session shutdown Periodic Review of Security System ISACA G40 Asset Classification ISACA G40 Background Screening of Employees ISACA G40 Page 5 of 22 Security Information Management Page 6 of 22 Security Information Management Control Identification Form CONTROL OBJECTIVE: To ensure preventative, detective, and corrective measures are in place and working as intended to protect the Information System from intrusion. To ensure proper controls are in place to safeguard assets and prevent, detect and mitigate fraudulent activity. Control IPDS System (Intrusion Prevention and Detection System) Control Category Mechanism Create unique passwords for IPDS users and administrator Restrict network access to IPDS components Mechanism Limit direct access to IPDS components Mechanism Update Intrusion Detection System (IPDS) when new threat is detected and regularly Mechanism Protect IPDS management communication through physical or logical separation or encryption Mechanism Mechanism Type of Control General Primary Preventative Detective General Secondary Preventative General Secondary Preventative General Secondary Preventative Control Benefit To prevent the unauthorized access and minimize possibility of undetected intrusions. Limited access to authorized users only in order to safeguard assets. Preservation of the IPDS components. Adverse Impact of Control Not In Place/Effect Intrusion i.e. malware or spyware – loss of confidentiality and integrity. Compromised Information System. Disclosure of proprietary information. Unauthorized access: Compromised system integrity and availability by disabling the IPDS system. Useless IPDS System. Preservation of the IPDS components. Useless IPDS System. General Primary Preventative Most up-to-date intrusion detection available to fight newly recognized potential intrusions. Vulnerable to new intrusion techniques. General Secondary Preventative Protection from unauthorized changes Manipulation of communication log. Page 7 of 22 Security Information Management Control Log System to record logins, activities and intrusions Maintain Log System files in secure location Perform vulnerability assessments/tests quarterly Conduct penetration tests periodically Firewall Policy Network firewall Antivirus Software Spyware/Malware Control Control Category Mechanism Type of Control Application Primary Detective Policy General Secondary Preventative Mechanism General Primary Detective Mechanism General Primary Detective Organizational General Secondary Preventative Mechanism General Primary Preventative Mechanism General Primary Preventative Mechanism General Primary Preventative Control Category Type of Control Control Benefit Keep a log of login and activities to determine patterns—aiding in detection of intrusions and malicious code To keep a record for future management/audit reference To confirm the system is functioning as designed and intended To confirm the system is functioning as it should Rules for the Firewall to follow To complement the IPDS System; filter network traffic To complement the IPDS System; detect many threats the IPDS cannot To complement the IPDS System in a multi-layered approach. Control Benefit Page 8 of 22 Adverse Impact of Control Not In Place/Effect Altered or missing log file; no audit trail/history available. Altered or missing log file; no audit trail/history available—unaware of log activity. Do not know if the current system is functioning as it should—no assurance mechanisms. Do not know if the current system is functioning as it should; increased risk of system being compromised. Ineffective firewall either allowing a threat in or slowing down the Information System. Unauthorized access to Information Systems; compromised system and data integrity. Infected with malware i.e. virus, worms, Trojan horse, malicious mobile code, blended threats, keystroke logger, backdoors. Infection with malware and non-malware forms of spyware; slows the system, considerably affecting system functionality and availability. Adverse Impact of Control Not In Place/Effect Security Information Management Training Policy Response Procedure Procedure Back-up Procedure Procedure General Secondary Preventative General Primary Preventative General Secondary Personnel have the skills required to deal with the security issues Provide uniform response if a threat is detected Unqualified personnel could lead to security compromise. Current back-up if needed. Unnecessary extended downtime. Page 9 of 22 Incorrect measure taken when threat is detected. Security Information Management Control Identification Form CONTROL OBJECTIVE: To control access to the Information Systems to prevent unauthorized use and to restrict authorized use. To ensure proper controls are in place to ensure data and system availability in order for the Information Systems to fully support the organization’s objectives. Control Security Policy Unique user ID and password for each individual network user (proper length; mix of letters, numbers, & symbols) Automated enforcement to changing passwords Control Type of Category Control Organizational General Secondary? Preventative Policy General Secondary Preventative Policy Policy & Procedures regarding Third Party Access Policy Policy & Procedure to deactivate access prior to employee termination Policy Control Benefit To communicate the Policies authorized by Management. Controls access to the system and fosters system security. General Secondary Preventative General Secondary Preventative Frequent password changes limit the likelihood of unauthorized access. Controls, limits and restricts outside access to the system ensuring system integrity. General Secondary Preventative Ensures only active employees have access to the system, limiting the possibility of retaliation or sabotage of system. Page 10 of 22 Adverse Impact of Control Not In Place/Effect Lack of awareness of Security Policy; compromised system and data integrity. Unauthorized access to information which could affect the security of information. Possible password theft and unauthorized access to the system. System could be compromised due to no controls as to how the system could be accessed by outside parties (example: guest password would ensure employees do not share their passwords with guest users); avoid group passwords, as this erodes accountability Disgruntled employees may access the system and compromise the data and security of the system or obtain proprietary information. Security Information Management Control Written Acceptable Use Policy with required Signature of employee Implement and annually evaluate physical security (i.e. locks, alarms systems, etc.) Properly segregate duties regarding the Information System to limit access Inactive sessions shutdown after a defined period of inactivity Control Category Legal Type of Control General Secondary Preventative General Primary Preventative Detective Organizational General Secondary Preventative Prevent unauthorized access Adverse Impact of Control Not In Place/Effect System could be vulnerable to unauthorized access due to password sharing or weak password selection, also email usages (downloads, links); peripheral devices, such as laptops and USBs, etc. Increased risk -- Unauthorized access gained Limit access based on job descriptions and appropriate access Too many people with unlimited access, which can lead to unauthorized access and affect the reliability of the data. Mechanism Prevent unauthorized access when a system is left idle for a period of time Gain unauthorized access. Mechanism General Secondary Preventative Control Benefit Ensures employee knowledge of and responsibility to properly safeguard the system. Page 11 of 22 Security Information Management Control Evidence Form Control IPDS System (Intrusion Prevention and Detection System) Evidence that Control Would be in Place Third arty confirmation. Documentation of procedure for IPDS system, review audit security log. Create unique passwords for IPDS users and administrator List of users and administrators. Restrict network access to IPDS components List of users and administrators. Limit direct access to IPDS components View physical location for lock or method of restriction accessing components i.e. sensors or agents, management server, database server. Updated Log File. List of updates from vendor. Update Intrusion Detection System (IPDS) when new threat is detected and according to vendor recommendations Protect IPDS management communication through physical or logical separation or encryption Log System to record log-ins and intrusions Third party confirmation. Log file. Maintain Log System files in secure location View physical location of Log System. Perform vulnerability assessments/tests quarterly Third Party Confirmation. Observe vulnerability test. Page 12 of 22 Evidence that Control Would be in Effect System availability. No disruption or minimal disruption of service due to detected intrusions. Audit security log, documentation of system review and response. Security Information Management Conduct penetration tests bi-annually Control Network firewall Antivirus Software Spyware Training Response Procedure Back-up Procedure Third Party confirmation. Observe penetration test. Evidence that Control Would be in Place Software License. View Software License. View program in program files on equipment i.e. laptop, server. View Software License. View program in program files on equipment i.e. laptop, server. Physical written documentation. Sign-in list of employees attending training. Documents used in training classes. Written documentation of procedure. Documentation readily available in hardcopy or online. Written documentation of procedure. Documentation readily available in hardcopy or online. Page 13 of 22 Evidence that Control Would be in Effect Security Information Management Control Security Policy Unique user ID and password for each individual network user (long in length - mix of letters, numbers, & symbols) Automated enforcement to change password within a predetermined period Policy & Procedures regarding Third Party Access Evidence that Control Evidence that Control Would be in Place Would be in Effect Documented Understanding of Policy by Management. Policy. Policy is readily available in hardcopy and online. List of UserIDs. List of active employees. Number of employees matches the number of UserIDs. Documented Policy. Automated program alert. Understanding of Policy by Management and staff. Documented Policy. SLA Understanding of Policy by Management and Third Party. Policy & Procedure to deactivate access prior to employee termination Documented Policy Understanding of Policy by Management and staff. Written Acceptable Use Policy with required Signature of employee Documented Policy. Document with Employee’s signature. Understanding of Policy by Employees. Implement and annually evaluate physical security (i.e. locks, alarms systems, etc.) Properly segregate duties regarding the Information System to limit access Inactive sessions shut-down after a defined period of inactivity Documented procedure. Understanding of Procedure by Management. Documented review. RACI Chart. Organization Chart Appropriate access rights dependent upon duties. Documented Policy. Computer returns to log-in screen. Page 14 of 22 Log-in required to access system after designated allotment of time. Security Information Management Audit Objectives To determine whether controls are in place and in effect to provide reasonable assurance that preventative, detective, and corrective measures are in place and working as intended to protect the Information System from intrusion. To determine whether controls are in place and in effect to provide reasonable assurance that assets are safeguarded and fraudulent activity is prevented, detected and mitigated. To determine whether controls are in place and in effect to provide reasonable assurance that unauthorized access to the Information Systems is prevented and authorized use is restricted. To determine whether controls are in place and in effect to provide reasonable assurance that data and system availability is maintained in order for the Information Systems to fully support the organization’s objectives. Audit Steps (note: these are just bulleted thoughts I had while at the gym; I will develop real audit steps) o Gain knowledge/understanding o Identify the current infrastructure i.e. hardware, software o Mission Statement o Obtain existing policies o RACI (organization) charts o Business objectives o Assess and determine risk (do we need to assess the risk of the organization as well as audit risk?) o Current risk o Risk appetite o Risk tolerance o Define scope o Determine qualifications (existing and needed) o Get specialist (where necessary) o Determine procedures o Tests of controls o Report o Review with management o Revise o submit Page 15 of 22 Security Information Management Audit Evidence Form for Assessment of Controls in Place Control IPDS System (Intrusion Prevention and Detection System) Create unique passwords for IPDS users and administrator Control Criteria Evidence that Would Show the Control to be in Place (Control Evidence) Obtain list of users and administrators. Interview management and staff and IT staff. Restrict network access to IPDS components Limit direct access to IPDS components Update Intrusion Detection System (IPDS) when new threat is detected and quarterly Protect IPDS management communication through physical or logical separation or encryption Log System to record log-ins and intrusions Maintain Log System files in secure location View physical location for lock or method of restriction accessing components i.e. sensors, agents, View log file. View physical location of Log System. Perform vulnerability assessments/tests quarterly Page 16 of 22 Audit Evidence Evidence Obtained as to Whether the Control is in Place (Audit Evidence) Control in Place Y/P/N Security Information Management Control Control Criteria Evidence that Would Show the Control to be in Place (Control Evidence) Conduct penetration tests biannually Network firewall Antivirus Software Spyware Training Response Procedure Back-up Procedure Page 17 of 22 Audit Evidence Evidence Obtained as to Whether the Control is in Place (Audit Evidence) Control in Place Y/P/N Security Information Management Control Control Criteria Evidence that Would Show the Control to be in Place (Control Evidence) Security Policy Unique user ID and password for each individual network user (long in length - mix of letters, numbers, & symbols) Automated enforcement to changing passwords Policy & Procedures regarding Third Party Access Policy & Procedure to deactivate access prior to employee termination Written Policy re: proper use of Information System with required Signature of employee Implement and annually evaluate physical security (i.e. locks, alarms systems, etc.) Properly segregate duties regarding the Information System to limit access Inactive sessions shut-down after a defined period of inactivity Page 18 of 22 Audit Evidence Evidence Obtained as to Whether the Control is in Place (Audit Evidence) Control in Place Y/P/N Security Information Management Audit Conclusion Instruction: Ensure that there is sufficient, competent and appropriate evidence to support audit conclusions and audit findings. Review control tables and Audit Results Comparison Sheets. Is there an adequate combination of controls in place to address the control objective from a “process” audit perspective? Are the controls in place appropriate in design to address the control objective? Is there an adequate combination of controls in effect to provide reasonable assurance that the control objective would be achieved, or met? Is there sufficient, competent evidence to support the audit conclusion and to demonstrate that the controls are in effect? Completed by: Date: Reviewed by: Date: Page 19 of 22 Security Information Management Audit Results Comparison Sheet – Control Criteria to Review or Test Results Control Control Evidence that Would Demonstrate the Control Would be in Place Control in Place Y/P/N Page 20 of 22 Control Evidence that Would Demonstrate the Control Would be in Effect Control in Effect Y/P/N Security Information Management Audit Conclusion Instruction: Ensure that there is sufficient, competent and appropriate evidence to support audit conclusions and audit findings. Review control tables and Audit Results Comparison Sheets. Is there an adequate combination of controls in place to address the control objective from a “process” audit perspective? Are the controls in place appropriate in design to address the control objective? Is there an adequate combination of controls in effect to provide reasonable assurance that the control objective would be achieved, or met? Is there sufficient, competent evidence to support the audit conclusion and to demonstrate that the controls are in effect? Completed by: Date: Reviewed by: Date: Page 21 of 22 Security Information Management Works Cited Firewall Operations Management, Auditing and Compliance. (2011, February). Retrieved April 2011, from Tufin Secure Track Web site: http://www.tufin.com ISACA. (2010). IT Standards, Guidelines,and Tools and Techniques for Audit and Assurance and Control Professionals. Rolling Meadows. Scarfone, K., & Hoffman, P. (2009, September). National Institute of Standards and Technology Guidelines on Firewalls and Firewall Policy SP800-41 Revision1. Gaithersburg, Maryland, United States of America. Scarfone, K., & Mell, P. (2007, February). National Institute of Standards and Technology Guide to Intrusion Detection and Prevention Systems (IPDS) SP 800-94. Gaithersburg, Maryland, United States of America. Skybox Security, Inc. (2010, May). Retrieved April 2011, from Skybox Security Web Site: http://www.skyboxsecurity.com http://www.cloudave.com/wordpress/wp-content/uploads/2010/09/bitglobe-security.jpg Page 22 of 22