Control Identification Form

advertisement
IT Auditing:
Firewall Management, Intrusion Detection, Intrusion Prevention
& Security Information Management
AC475 Team Project:
Katherine Jackowski
Elizabeth Kearney-Lang
Daureen Lingley-Chor
Security Information Management
PS1 Selection of Areas of Examination
The two areas of interest our team chose are Firewall Management and Intrusion
Detection, Intrusion Prevention and Security Information Management which complement each
other well; all focusing on the safeguarding of company assets. Since our collective knowledge
in these areas was quite limited we felt they would be challenging topics to research. The
potential threats to an Information System are numerous with names that sound as if they might
be more from a video game i.e. botnet, smurf attack, Trojan horse, but whose potential damage
to an Information System could be financially devastating and lead to reputational and
operational risk.
Our research began with An Introduction to Computer Security: The NIST Handbook and
included the Special Publications from the National Institute of Standards and Technology SP
800-41 Revision 1 entitled Guidelines on Firewalls and Firewall Policy, SP 800-61 Revision 1
entitled Computer Security Incident Handling Guide, SP 800-94 entitled Guide to Intrusion
Detection and Prevention Systems. We also used our textbook, Information Technology Auditing
and Assurance by James A. Hall. The following ISACA Standards were utilized as well:
P3 Intrusion Detection Systems (IDS)
P4 Viruses and other Malicious Code
P6 Firewall Procedure
G40 Review of Security Management Practices
We visited various vendor websites and utilized the White Papers from Skybox Security
entitled How to Painlessly Audit Your Firewalls and Tufin entitled Firewall Operations
Management, Auditing, and Compliance.
Research into the client organization included speaking with Jonathan Yorke, the Vice
President of Administration and Accounting at Image Polymers Company, LLC, and researching
the mission statement and business objectives on the parent website:
www.mitsuichem.com
Our knowledgeable source was Jason Allen, Network Engineer, from Covisia Solutions,
Inc. Covisia Solutions, Inc. provides security management to Image Polymers Company, LLC.
Page 2 of 44
PS1
PS2
PS3
PS4
PS5
PS6
PS7
PS8
Work-In-Progress Record
Selection of Areas of Examination
 state the areas selected and reason for selecting them
 how topic was researched and note sources (include hardcopy & electronic research & list persons
or organizations
 copy of team’s work-in-progress record
 identify purpose of the area of examination
 risks, threats and exposures associated with the areas
 critical success factors
Selection of Client or Selection of Knowledgeable Sources
 Identification of client organization with contact information
 Identification of knowledgeable sources
 Identify how the client organization measures IT process performance and benchmark your
selected process areas to the CobiT maturity models
 Discuss knowledgeable sources – what their experience has been with conducting or observing
how others have evaluated IT process performance
Prepare Statements of Control Objectives
 Statement of high-level control objective for each topic area
 Supporting control objectives (may be more granularly defined than the high-level objective) for
each topic area
Identification of Control Criteria
 Master list of controls for the topic areas selected
Identification of Control Criteria
 Tables w/ control category and type identified
Identification of Control Benefit and Impact of Control Not in Place/Effect
 Tables w/controls further identified in terms of their value and impact of not working as intended
with respect to the control objective
Identification of Control Evidence
 Tables w/controls further identified in terms of what would be considered as the desired evidence
to show that the control is in place and in effect
Formulate Audit Objectives
 List Audit Objectives
KJ
EKL DLC
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
Security Information Management

Reference Closing the Loop Framework
KJ
PS9
PS10
PS11
PS12
PS13
Formulate Audit Steps to Gather and Analyze Evidence
 List of audit steps developed to gather and analyze the control evidence noted in the tables for each
control
Prepare Audit Strategy and Audit Work Program
 Description of approach to conducting audit work designed to address the previously identified
control objectives
 Audit Work Program containing stated control objective(s), audit objective(s) and the audit steps
developed to gather and analyze the control evidence noted in the tables for each control
Obtain External Input
 Provide an explanation of the type and extent of input obtained from external parties
 Identify which sources were the best for your project and why
Client Control Review
 Provide an explanation of the type and extent of input obtained from external parties
Class Presentation
 A handout to the class that identifies your team, the topic areas, sources for further information
Team Meeting Dates
Page 4 of 44
EKL DLC
√
√
√
√
√
√
√
√
√
√
√
√
√
√
Risks, Threats and Exposures
A risk is any and all exposure to the possibility of loss or theft or disruption, also known
as a threat. All businesses assume some risk--no business is immune to the exposure of threats.
Because opportunity and risk go hand in hand, you cannot have opportunity without also having
some risk and wherever there is risk, there is potential opportunity. The key is to minimize
potential risk and eliminate exposures to threats as much as possible; this is done through the use
of controls. Threats to an organization’s Information System’s security can come from both
internal and external sources and can be both intentional and accidental. They may include:
Denial of Service (DoS) attacks that affect a Web server to prevent it from providing
service to legitimate users
Malicious Code i.e. virus, worm, Trojan horse or any code-based malicious entity that
infects a host system
Unauthorized access i.e. logical or physical access to a system without permission
Inappropriate Usage i.e. violation of acceptable use policy or any other established
computer security policy
Multiple Components i.e. a malicious code provides unauthorized access1
According to the 1991 Annual Report submitted by the Computer System Security and
Privacy Advisory Board, the following areas were found to contribute to the economic loss of
organizations: “65% errors and omissions; 13% dishonest employees; 6% disgruntled
employees; 8% loss of supporting infrastructure, including power, communications, water,
sewer, transportation, outsiders, including viruses, espionage, dissidents, and malcontents of
various kinds, and former employees who have been away for more than six weeks2.” Between
the years 1999 – 2003, attacks on computer servers increased by over 530% to 137,000 incidents
in the United States3. FinCEN4 reported in their Suspicious Activity Report that computer
intrusions have increased more than 500% from 2003 to 2004.
On April 13, 2011, Senator Sheldon Whitehouse, a Democrat from Rhode Island, and
Senator Jon Kyl, a Republican from Arizona, introduced a bill acknowledging that “businesses in
the United States are bearing enormous losses as a result of criminal cyber attacks, depriving
businesses of hard-earned profits that could be reinvested in further job-producing innovation.”
The bill is entitled the Cyber Security Public Awareness Act of 2011. If enacted, this bill S.813,
1
NIST Special Publication 800-61 Revision 1
An Introduction to Computer Security – The NIST Handbook SP 800-12
3
The World Technology Risk Checklist 7.3
4
FinCen - Financial Crimes Enforcement Network – a U.S. government agency established by the U. S. Department
of Treasury in 1990 to provide multi-source financial intelligence and analysis.
2
Security Information Management
will require the Department of Homeland Security along with various branches of the
government to report to Congress on the frequency and impact of cyber security incidents and
the number of prosecutions for cybercrimes occurring in the United States. It will also require “a
summary of the plans of the Secretary of Homeland Security to enhance public awareness of
common cyber security threats, including a description of the metrics used by the Department of
Homeland Security for evaluating the efficacy of public awareness campaigns” to be submitted
to Congress.5
Information Security is an area that will require organizations to continually monitor and
reassess for potential risks, and remain aware of new threats and technologies to mitigate their
exposure to vulnerabilities in their Information Systems.
Key Success Factors
 Senior management commitment to Information security
 Management’s understanding of Information security issues
 Information Security centrally-based
 Integration between security objectives and business objectives
 Proactive security plan which includes awareness training of staff
 Automated risk management process which includes definition of risk limits and risk
tolerance
 Performance measurements
 Up-to-date Protective Techniques
 Enforcement of Security Policies
 Ability to cost-justify information security
 Avoid over-control that may reduce the efficiency of the system
 Applications are secured before implementation
 Service Level Agreements (SLAs) are utilized with suppliers to promote awareness and
co-operation relative to security
 IT Governance fosters ethical behavior
 Measurements of control effectiveness should align with regulation and laws and be
reported to the board quarterly and annually (ISACA, 2005)
 Implement layered security (Campbell, 2003)
 Security conscious culture among end users within the organization (IIA, 2011)
5
http://ezp.bentley.edu/login?url=http://search.proquest.com/docview862230
Page 6 of 44
Security Information Management
PS2 Selection of Client or Selection of Knowledgeable Sources
Client
Our client, Image Polymers Company, LLC, is a small manufacturing business
established in 1991 with their headquarters located in Andover, Massachusetts and their
manufacturing facility located in Mount Pleasant, Tennessee. They are a wholly owned
subsidiary of Mitsui Chemicals America, Inc. Their corporate mission is adopted from their
parent company and includes the following:
Contribute broadly to society by providing high-quality products
and services to customers through innovations and the creation of
materials and products while keeping in harmony with the global
environment.
Image Polymers Company outsources their IT functions to Covisia Solutions, Inc. The
software they currently use is Windows XP Professional operating system and Sage Software, a
SQL server-based enterprise management software system, MAS500 Version 7.30.40. They also
use Sage Fixed Assets System software, and Microsoft Office 2007(Excel, Word, Outlook, and
PowerPoint).
Image Polymers Company LLC as a total of five servers; there is a virtualized server with
three distinct server areas. The first one contains a domain controller section for access control
(confirming usernames and passwords), the exchange section (for the e-mail system) and the file
storage and print section. The second is the Citrix server which is used for virtual networking.
The third is the MAS500 server which houses the MAS500 database. There is also a back-up
server for the Domain controller and another Back-up Business Disaster Recovery (BDR) server.
PS3 Prepare Statement of Control Objectives
To ensure preventative, detective, and corrective measures are in place and working as intended
to protect the Information System from intrusion.
To ensure proper controls are in place to safeguard assets and prevent, detect and mitigate
fraudulent activity.
Page 7 of 44
Security Information Management
To control access to the Information Systems to prevent unauthorized use and to restrict
authorized use.
To ensure proper controls are in place to ensure data and system availability in order for the
Information Systems to fully support the organization’s objectives.
Page 8 of 44
Security Information Management
PS4 Identification of Control Criteria
Master List of Controls
Firewall Management
Control
Resource
Firewall Policy6
NIST SP 800-41 Revision 1, Tufin
System Security Plan
NIST SP 800-41 Revision 1
Segregation of Duties
NIST SP 800-41 Revision 1
Testing – Configuration Compliance Analysis
NIST SP 800-41 Revision 1
Apply Patches
NIST SP 800-41 Revision 1
Logs & Alerts
NIST SP 800-41 Revision 1
Firewall Policy Back-up
NIST SP 800-41 Revision 1
Ruleset Back-up
NIST SP 800-41 Revision 1
Review of Firewall Policy
NIST SP 800-41 Revision 1
Penetration Testing
NIST SP 800-41 Revision 1
Configuration compliance with Network Security
Skybox Security
Policies
Network Access Policy
Skybox Security
Periodic reviews of configurations (at least every six
Skybox Security
months)
PCI DSS Compliance Requirements
Skybox Security
Manage Changes (Change Impact Analysis) (2x/month)
Skybox Security, CobiT AI6
Configuration Compliance Analysis (1x/qtr)
Skybox Security
Configuration Optimization (1x/year)
Skybox Security
Intrusion Detection, Intrusion Prevention and Security Management
Control
Resource
IPDS System
NIST SP 800-94
Restrict network access to IPDS components
NIST SP 800-94
Limit direct access to IPDS components
NIST SP 800-94
Update IPDS System
NIST SP 800-94
6
A complex set of rules defining access privileges and restrictions for specific users and services.
Page 9 of 44
Security Information Management
Protect IPDS management communication
NIST SP 800-94
Log System (Reporting Module)
NIST SP 800-94, ISACA P3
Maintain Log Files in secure location
NIST SP 800-94
Perform vulnerability tests
NIST SP 800-94
Conduct penetration tests
NIST SP 800-94
Intrusion Detection, Intrusion Prevention and Security Management (continued)
Antivirus Software
Anti-Spyware
Training
Response Procedure
Back-up Procedure
Security Policy
ISACA G40
Unique user ID and password for each individual network
user
Automated enforcement of password change
Policy and Procedures related to Third Party Access
Implement and annually evaluate physical security access
Segregation of Duties
Inactive session shutdown
Periodic Review of Security System
ISACA G40
Asset Classification
ISACA G40
Background Screening of Employees
ISACA G40
Encryption
Page 10 of 44
Security Information Management
PS5 Control Identification Form
CONTROL OBJECTIVE:
To ensure preventative, detective, and corrective measures are in place and working as intended to protect the Information
System from intrusion.
To ensure proper controls are in place to safeguard assets and prevent, detect and mitigate fraudulent activity.
Control
IPDS System (Intrusion
Prevention and Detection
System)
Control
Category
Mechanism
Create unique passwords
for IPDS users and
administrator
Restrict network access
to IPDS components
Mechanism
Limit direct access to
IPDS components
Mechanism
Update Intrusion
Detection System (IPDS)
when new threat is
detected and regularly
Mechanism
Protect IPDS
management
communication through
physical or logical
separation or encryption
Control
Mechanism
Type of
Control
General
Primary
Preventative
Detective
General
Secondary
Preventative
General
Secondary
Preventative
General
Secondary
Preventative
Control Benefit
To prevent the
unauthorized access and
minimize possibility of
undetected intrusions.
Limited access to
authorized users only in
order to safeguard assets.
Preservation of the IPDS
components.
Adverse Impact of Control
Not In Place/Effect
Intrusion i.e. malware or spyware – loss of
confidentiality and integrity.
Compromised Information System.
Disclosure of proprietary information.
Unauthorized access:
Compromised system integrity and
availability by disabling the IPDS system.
Useless IPDS System.
Preservation of the IPDS
components.
Useless IPDS System.
General
Primary
Preventative
Most up-to-date intrusion
detection available to fight
newly recognized potential
intrusions.
Vulnerable to new intrusion techniques.
Mechanism
General
Secondary
Preventative
Protection from
unauthorized changes
Manipulation of communication log.
Control
Type of
Control Benefit
Page 11 of 44
Adverse Impact of Control
Security Information Management
Log System to record
logins, activities and
intrusions
Maintain Log System
files in secure location
Perform vulnerability
assessments/tests
Conduct penetration tests
Firewall Policy
Network firewall
Antivirus Software
Anti-Spyware/Malware
Control
Category
Mechanism
Control
Application
Primary
Detective
Policy
General
Secondary
Preventative
Mechanism
General
Primary
Detective
Mechanism
General
Primary
Detective
Organizational General
Secondary
Preventative
Mechanism
General
Primary
Preventative
Mechanism
General
Primary
Preventative
Mechanism
General
Primary
Preventative
Control
Type of
Keep a log of login and
activities to determine
patterns—aiding in
detection of intrusions and
malicious code
To keep a record for future
management/audit
reference
To confirm the system is
functioning as designed
and intended
To confirm the system is
functioning as it should
Rules for the Firewall to
follow
To complement the IPDS
System; filter network
traffic
To complement the IPDS
System; detect many
threats the IPDS cannot
To complement the IPDS
System in a multi-layered
approach.
Control Benefit
Page 12 of 44
Not In Place/Effect
Altered or missing log file; no audit
trail/history available.
Altered or missing log file; no audit
trail/history available—unaware of log
activity.
Do not know if the current system is
functioning as it should—no assurance
mechanisms.
Do not know if the current system is
functioning as it should; increased risk of
system being compromised.
Ineffective firewall either allowing a
threat in or slowing down the Information
System.
Unauthorized access to Information
Systems; compromised system and data
integrity.
Infected with malware i.e. virus, worms,
Trojan horse, malicious mobile code,
blended threats, keystroke logger,
backdoors.
Infection with malware and non-malware
forms of spyware; slows the system,
considerably affecting system
functionality and availability.
Adverse Impact of Control
Security Information Management
Training
Category
Policy
Response Procedure
Procedure
Back-up Procedure
Procedure
Control
General
Secondary
Preventative
General
Primary
Preventative
General
Secondary
Personnel have the skills
required to deal with the
security issues
Provide uniform response
if a threat is detected
Current back-up if needed.
Page 13 of 44
Not In Place/Effect
Unqualified personnel could lead to
security compromise.
Incorrect measure taken when threat is
detected.
Unnecessary extended downtime.
Security Information Management
Control Identification Form
CONTROL OBJECTIVE:
To control access to the Information Systems to prevent unauthorized use and to restrict authorized use.
To ensure proper controls are in place to ensure data and system availability in order for the Information Systems to fully support the
organization’s objectives.
Control
Security Policy
Unique user ID and
password for each
individual network user
(proper length; mix of
letters, numbers, &
symbols)
Automated enforcement
to changing passwords
Control
Type of
Category
Control
Organizational General
Secondary
Preventative
Policy
General
Secondary
Preventative
Policy
Policy & Procedures
regarding Third Party
Access
Policy
Policy & Procedure to
deactivate access prior to
employee termination
Policy
Control Benefit
To communicate the
Policies authorized by
Management.
Controls access to the
system and fosters system
security.
General
Secondary
Preventative
General
Secondary
Preventative
Frequent password changes
limit the likelihood of
unauthorized access.
Controls, limits and
restricts outside access to
the system ensuring system
integrity.
General
Secondary
Preventative
Ensures only active
employees have access to
the system, limiting the
possibility of retaliation or
sabotage of system.
Page 14 of 44
Adverse Impact of Control
Not In Place/Effect
Lack of awareness of Security Policy;
compromised system and data integrity.
Unauthorized access to information which
could affect the security of information.
Possible password theft and unauthorized
access to the system.
System could be compromised due to no
controls as to how the system could be
accessed by outside parties (example:
guest password would ensure employees
do not share their passwords with guest
users); avoid group passwords, as this
erodes accountability
Disgruntled employees may access the
system and compromise the data and
security of the system or obtain
proprietary information.
Security Information Management
Control
Written Acceptable Use
Policy with required
Signature of employee
Implement and annually
evaluate physical
security (i.e. locks,
alarms systems, etc.)
Properly segregate duties
regarding the
Information System to
limit access
Inactive sessions shutdown after a defined
period of inactivity
Control
Category
Legal
Type of
Control
General
Secondary
Preventative
General
Primary
Preventative
Detective
Organizational General
Secondary
Preventative
Prevent unauthorized
access
Adverse Impact of Control
Not In Place/Effect
System could be vulnerable to
unauthorized access due to password
sharing or weak password selection, also
email usages (downloads, links);
peripheral devices, such as laptops and
USBs, etc.
Increased risk -- Unauthorized access
gained
Limit access based on job
descriptions and
appropriate access
Too many people with unlimited access,
which can lead to unauthorized access and
affect the reliability of the data.
Mechanism
Prevent unauthorized
access when a system is
left idle for a period of
time
Gain unauthorized access.
Mechanism
General
Secondary
Preventative
Control Benefit
Ensures employee
knowledge of and
responsibility to properly
safeguard the system.
Page 15 of 44
Security Information Management
PS6 Control Evidence Form
Control
IPDS System (Intrusion Prevention
and Detection System)
Evidence that Control
Would be in Place
Third party confirmation. Documentation
of procedure for IPDS system, review
audit security log.
Create unique passwords for IPDS
users and administrator
List of users and administrators.
Documentation of policy/procedures
Restrict network access to IPDS
components
List of users and administrators. List of
restrictions per user
Limit direct access to IPDS
components
Physical lock or method of restriction
from accessing components i.e. sensors or
agents, management server, database
server. Visible security.
Updated Log File. List of updates from
vendor. Policy/procedure for updating.
Update Intrusion Detection System
(IPDS) when new threat is detected
and according to vendor
recommendations
Protect IPDS management
communication through physical or
logical separation or encryption
Log System to record log-ins and
intrusions
Maintain Log System files in secure
location
Third party confirmation. Encryption
coding exists.
Log file.
Physical security around Log System
files.
Page 16 of 44
Evidence that Control
Would be in Effect
System availability. No disruption or minimal
disruption of service due to detected intrusions.
Audit security log, documentation of system review
and response.
Log of incorrect password entries, system
shutdown/block for users that enter wrong
password more than once, password for one user
name will not work for any other user
System notification when unauthorized use is being
attempted, restrictions per user should be visible on
the system, no one will be capable of getting
through their user restriction.
Any security key or password is only available to
limited personnel. No one can easily get passed
guard, lock, or alarm system.
Policies/procedures are strictly followed.
Documentation of response to threats detected.
Latest version of IPDS will match
recommendations of vendor.
Communication is encrypted. Only management is
communicated with and capable of reading IPDS
communication.
No dates/times will be missing from log. All
intrusions will be documented on log system. Each
computer and/or system will be connected to the
log system
Access to location will be limited as result of
effective physical security. All Log files will be in
one place.
Security Information Management
Control
Perform vulnerability
assessments/tests
Conduct penetration tests
Network firewall
Evidence that Control
Would be in Place
Third Party Confirmation.
Documentation of vulnerability test.
Policies/procedures
Third Party confirmation. Documentation
of policies/procedures and penetration
test.
Software License. Should appear in
program files on equipment i.e. laptop
server.
Antivirus Software
Software License. Should appear in
program files on equipment i.e. laptop,
server.
Anti-Spyware/Malware
Software License. Should appear in
program files on equipment i.e. laptop,
server.
Training
Physical written documentation.
Sign-in list of employees attending
training.
Documents used in training classes.
Page 17 of 44
Evidence that Control
Would be in Effect
Documentation of test will be dated quarterly.
Someone will have responsibility for administering
and reporting results of test. Documentation of test
results.
Documentation should be dated bi-annually.
Someone will have responsibility for performing
and reporting results of penetration test.
Pop ups will appear when attempting to access
unsecure websites. Log will show all attempts to
enter the private network and produce alarms if
unauthorized or hostile attempts to enter the private
network. Program administrator will have
documentation of criteria/controls used by the
firewall.
Notifications will appear when something harmful
is detected. Some sort of log will exist that lists all
issues that have been detected as well as how they
were resolved by the software. Pop-ups regarding
harmful downloads will appear as prevention.
Log of system sweeps will exist. There will be no
presence of spyware on the computer/system.
Computer/system will be programmed to run
spyware scan on some time interval (i.e. once a
month)
Employees will have knowledge of training that
took place. All personnel that require the training
will have attended. Documentation of
exercises/participation in the training and results of
training will exist.
Security Information Management
Control
Response Procedure
Back-up Procedure
Evidence that Control
Would be in Place
Written documentation of procedure.
Documentation readily available in
hardcopy or online.
Written documentation of procedure.
Documentation readily available in
hardcopy or online.
Page 18 of 44
Evidence that Control
Would be in Effect
Documentation of responses to incidents reported
will exist. Personnel involved in response
procedure will have knowledge of the procedure
and ideally experience with using it.
All data will be properly backed up. Personnel
responsible for back-up procedure will have
knowledge of procedure and documentation of all
back-ups that occur.
Security Information Management
Control
Security Policy
Unique user ID and password for
each individual network user (long in
length, mix of letters, numbers, &
symbols)
Automated enforcement to change
password within a predetermined
period
Evidence that Control
Would be in Place
Documented Policy. Policy is readily
available in hardcopy and online.
Evidence that Control
Would be in Effect
Understanding of Policy by Management. All
employees will have knowledge of policy.
Someone will have responsibility of implementing
and evaluating the policy.
List of UserIDs. List of active employees. Number of employees matches the number of
UserIDs. No passwords will be the same.
Documented Policy.
Automated program alert.
Policy & Procedures regarding Third
Party Access
Documented Policy.
SLA
Policy & Procedure to deactivate
access prior to employee termination
Documented Policy
Documentation of procedure
Written Acceptable Use Policy with
required Signature of employee
Implement and annually evaluate
physical security (i.e. locks, alarms
systems, etc.)
Documented Policy.
Document with Employee’s signature.
Documented procedure. Evaluation
material/documentation will exist.
Documentation of initial purchase of
security items.
RACI Chart.
Organization Chart
Properly segregate duties regarding
the Information System to limit
access
Inactive sessions shut-down after a
defined period of inactivity
Documented Policy.
Computer returns to log-in screen.
Page 19 of 44
Understanding of Policy by Management and staff.
Users will be unable to log into the system until
password has been changed. System will have
program instructions to initiate the automated alert
during the predetermined period.
Understanding of Policy by Management and Third
Party. Documentation and/or logs regarding third
party access will exist and comply with policy.
Understanding of Policy by Management and staff.
Documentation of procedure taking place will exist.
No terminated employees will still have access.
Understanding of Policy by Employees. File of
signed policies will exist.
Understanding of Procedure by Management.
Documented review. Locks, alarms, systems etc
will be fully functionally and prevent access.
Appropriate access rights dependent upon duties.
Log-in required to access system after designated
allotment of time. After allotted time, session will
shut down. System will show requirement/control
that makes the shut down occur.
Security Information Management
PS8 Formulate Audit Objectives
To determine whether controls are in place and in effect to provide reasonable assurance that
preventative, detective, and corrective measures are in place and working as intended to protect the
Information System from intrusion.
To determine whether controls are in place and in effect to provide reasonable assurance that assets
are safeguarded and fraudulent activity is prevented, detected and mitigated.
To determine whether controls are in place and in effect to provide reasonable assurance that
unauthorized access to the Information Systems is prevented and authorized use is restricted.
To determine whether controls are in place and in effect to provide reasonable assurance that data
and system availability is maintained in order for the Information Systems to fully support the
organization’s objectives.
PS9 Formulate Audit Steps to Gather and Analyze Evidence
Page 20 of 44
Security Information Management
Audit Evidence Form for Assessment of Controls in Place
IPDS System (Intrusion
Prevention and Detection
System)
Create unique passwords for
IPDS users and administrator
Control Criteria
Evidence that Would Show the
Control to be in Place
(Control Evidence)
Third party confirmation. Documentation
of procedure for IPDS system, review
audit security log.
List of users and administrators.
Documentation of policy/procedures
Restrict network access to IPDS
components
List of users and administrators. List of
restrictions per user
Limit direct access to IPDS
components
Physical lock or method of restriction
from accessing components i.e. sensors or
agents, management server, database
server. Visible security.
Updated Log File. List of updates from
vendor. Policy/procedure for updating.
Observation of physical security. Review
documentation regarding
purchasing/receiving of any physical
security.
Review updated log file, list of updates
from vendor, and policy/procedure
documentation for updating.
Third party confirmation. Encryption
coding exists.
Send third party request. View encryption
coding program etc.
Log file.
Locate/review log file
Control
Update Intrusion Detection
System (IPDS) when new threat
is detected and per vendor
recommendations
Protect IPDS management
communication through
physical or logical separation or
encryption
Log System to record log-ins
and intrusions
Maintain Log System files in
secure location
Audit Evidence
Evidence Obtained as to Whether
the Control is in Place
(Audit Evidence)
Send request to third party. Read/review
documentation of procedure and audit
security log.
Obtain and review list of
users/administrators. Review
documentation of policy/procedure
Review list of restrictions per user and
check system for restrictions.
Control in
Place
Y/P/N
Y
Y
Y
P
Y
Y
Y
Physical security around Log System
files.
Page 21 of 44
Observation of physical security around
log system. . Review documentation
regarding purchasing/receiving of any
physical security.
Y
Security Information Management
Perform vulnerability
assessments/tests
Control
Conduct penetration tests
Network firewall
Antivirus Software
Spyware
Training
Response Procedure
Back-up Procedure
Security Policy
Third Party Confirmation.
Documentation of vulnerability test.
Policies/procedures
Control Criteria
Evidence that Would Show the
Control to be in Place
(Control Evidence)
Third Party confirmation. Documentation
of policies/procedures and penetration
test.
Software License. Should appear in
program files on equipment i.e. laptop
server.
Software License. Should appear in
program files on equipment i.e. laptop,
server.
Software License. Should appear in
program files on equipment i.e. laptop,
server.
Physical written documentation.
Sign-in list of employees attending
training.
Documents used in training classes.
Written documentation of procedure.
Documentation readily available in
hardcopy or online.
Written documentation of procedure.
Documentation readily available in
hardcopy or online.
Documented Policy. Policy is readily
available in hardcopy and online.
Unique user ID and password
List of UserIDs. List of active employees.
for each individual network user
Page 22 of 44
Send request to third party. Review
documentation of test as well as
policy/procedure.
Audit Evidence
Evidence Obtained as to Whether
the Control is in Place
(Audit Evidence)
Send request to third party. Review
documentation of test as well as
policy/procedure.
Obtain/review software license. Check
program files.
Control in
Place
Y/P/N
N
Y
Obtain/review software license. Check
program files.
Y
Obtain/review software license. Check
program files.
Y
Obtain/review all documentation with
regard to policy/procedure and actual
training programs. Review sign-in sheets.
N
Review written documentation of
procedure and search for online copy.
P
Review written documentation of
procedure and search for online copy.
Y
Review written documentation of
procedure and search for online copy.
N
Review list of active employees and check
UserIDs.
Y
Security Information Management
(long in length - mix of letters,
numbers, & symbols)
Automated enforcement to
changing passwords
Control Criteria
Evidence that Would Show the
Control to be in Place
(Control Evidence)
Documented Policy.
Automated program alert.
Audit Evidence
Evidence Obtained as to Whether
the Control is in Place
(Audit Evidence)
Review documentation of policy and
check system for automated alert.
Policy & Procedures regarding
Third Party Access
Documented Policy.
SLA
Policy & Procedure to
deactivate access prior to
employee termination
Written Policy re: proper use of
Information System with
required Signature of employee
Implement and annually
evaluate physical security (i.e.
locks, alarms systems, etc.)
Documented Policy
Documentation of procedure
Review documentation of
policy/procedure and obtain/review all
SLAs.
Review documentation of
policy/procedure.
Control
Properly segregate duties
regarding the Information
System to limit access
Inactive sessions shut-down
after a defined period of
inactivity
Documented Policy.
Document with Employee’s signature.
Documented procedure. Evaluation
material/documentation will exist.
Documentation of initial purchase of
security items.
RACI Chart.
Organization Chart
Documented Policy.
Computer returns to log-in screen.
Page 23 of 44
Review documentation of policy and
check for signatures of all active
employees.
Review documentation of procedure and
purchase of security items as well as
obtain evaluation material/documentation.
Obtain/review RACI and organizational
charts.
Review documentation of policy and
check to see if computer returns to log-in
screen.
Control in
Place
Y/P/N
Y
P
P
Y
P
P
Y
Security Information Management
Audit Evidence Form for Assessment of Controls in Effect
Control
IPDS System (Intrusion
Prevention and Detection
System)
Create unique passwords for
IPDS users and administrator
Restrict network access to IPDS
components
Limit direct access to IPDS
components
Update Intrusion Detection
System (IPDS) when new threat
is detected
Protect IPDS management
communication through
physical or logical separation or
encryption
Control Criteria
Evidence that Would Show the
Control to be in Effect
(Control Evidence)
System availability. No disruption or
minimal disruption of service due to
detected intrusions. Audit security log,
documentation of system review and
response.
Log of incorrect password entries, system
shutdown/block for users that enter wrong
password more than once, password for
one user name will not work for any other
user
System notification when unauthorized
use is being attempted, restrictions per
user should be visible on the system, no
one will be capable of getting through
their user restriction.
Any security key or password is only
available to limited personnel. No one can
easily get passed guard, lock, or alarm
system.
Policies/procedures are strictly followed.
Documentation of response to threats
detected. Latest version of IPDS will
match recommendations of vendor.
Communication is encrypted. Only
management is communicated with and
capable of reading IPDS communication.
Page 24 of 44
Audit Evidence
Evidence Obtained as to Whether
the Control is in Effect
(Audit Evidence)
Check system availability and any
documentation regarding times of
unavailability. Review the audit security
log and documentation of system review
and response and evaluate.
Review log of incorrect entries and test
system by inputting incorrect passwords.
Make an unauthorized attempt to check
system notification and review restrictions
per user within the system.
Interview personnel about responsibility of
security keys/passwords and check to see
who has knowledge about them. Test
physical security.
Interview employees about
policy/procedure. Review documentation
of responses to detected threats. Check to
see if IPDS is most updated version.
Check for encryption. Interview
management. Test and review
documentation of IPDS communication.
Control in
Place
Y/P/N
Security Information Management
Control
Log System to record log-ins
and intrusions
Maintain Log System files in
secure location
Perform vulnerability
assessments/tests
Conduct penetration tests
Network firewall
Anti-Virus Software
Control Criteria
Evidence that Would Show the
Control to be in Effect
(Control Evidence)
No dates/times will be missing from log.
All intrusions will be documented on log
system. Each computer and/or system will
be connected to the log system
Access to location will be limited as result
of effective physical security. All Log files
will be in one place.
Documentation of test will be dated
quarterly. Someone will have
responsibility for administering and
reporting results of test. Documentation of
test results.
Documentation should be dated biannually. Someone will have
responsibility for performing and reporting
results of penetration test.
Pop ups will appear when attempting to
access unsecure websites. Log will show
all attempts to enter the private network
and produce alarms if unauthorized or
hostile attempts to enter the private
network. Program administrator will have
documentation of criteria/controls used by
the firewall.
Notifications will appear when something
harmful is detected. Some sort of log will
exist that lists all issues that have been
detected as well as how they were
resolved by the software. Pop-ups
regarding harmful downloads will appear.
Page 25 of 44
Audit Evidence
Evidence Obtained as to Whether
the Control is in Effect
(Audit Evidence)
Review log for missing dates/times. Check
for connectivity to log system and test
system.
Test physical security. Observe/review log
files to make sure that are all in one place.
Check dates of test documentation.
Interview employees about responsibility
for test and review/evaluate
documentation of results.
Check dates of documentation. Interview
employees about responsibility for test.
Test firewall. Review/evaluate log of
intrusions etc. Interview program
administrator and review documentation
of criteria.
Test software. Review log of issues
reported and how they were resolved.
Control in
Place
Y/P/N
Security Information Management
Control
Anti-Spyware/Malware
Training
Response Procedure
Back-up Procedure
Security Policy
Unique user ID and password
for each individual network user
(long in length - mix of letters,
numbers, & symbols)
Control Criteria
Evidence that Would Show the
Control to be in Effect
(Control Evidence)
Log of system sweeps will exist. There
will be no presence of spyware on the
computer/system. Computer/system will
be programmed to run spyware scan on
some time interval (i.e. once a month)
Employees will have knowledge of
training that took place. All personnel that
require the training will have attended.
Documentation of exercises/participation
in the training and results of training will
exist.
Documentation of responses to incidents
reported will exist. Personnel involved in
response procedure will have knowledge
of the procedure and ideally experience
with using it.
All data will be properly backed up.
Personnel responsible for back-up
procedure will have knowledge of
procedure and documentation of all backups that occur.
Understanding of Policy by Management.
All employees will have knowledge of
policy. Someone will have responsibility
of implementing and evaluating the policy.
Number of employees matches the number
of UserIDs. No passwords will be the
same.
Page 26 of 44
Audit Evidence
Evidence Obtained as to Whether
the Control is in Effect
(Audit Evidence)
Review/evaluate log of system sweeps.
Check for existence of any spyware/test
program. Check program settings to make
sure time interval is set appropriately.
Interview employees about training.
Verify sign-in sheets with interviews.
Review documentation of
exercises/participation in training and
results.
Review/evaluate documentation of
responses to reported incidents. Interview
employees to verify their knowledge of
procedure and usage.
Test and verify the existence of back-up
data stores. Interview employees to
determine responsibilities and accountable
party for back-up.
Interview management and employees to
check for knowledge and understanding of
policy and for responsibility of
implementation and evaluation.
Check list of employees and IDs and make
sure number matches. Evaluate passwords
for uniqueness.
Control in
Place
Y/P/N
Security Information Management
Control
Automated enforcement to
changing passwords
Policy & Procedures regarding
Third Party Access
Policy & Procedure to
deactivate access prior to
employee termination
Written Policy re: proper use of
Information System with
required Signature of employee
Implement and annually
evaluate physical security (i.e.
locks, alarms systems, etc.)
Properly segregate duties
regarding the Information
System to limit access
Inactive sessions shut-down
after a defined period of
inactivity
Control Criteria
Evidence that Would Show the
Control to be in Effect
(Control Evidence)
Understanding of Policy by Management
and staff.
Users will be unable to log into the system
until password has been changed. System
will have program instructions to initiate
the automated alert during the
predetermined period.
Understanding of Policy by Management
and Third Party. Documentation and/or
logs regarding third party access will exist
and comply with policy.
Understanding of Policy by Management
and staff. Documentation of procedure
taking place will exist. No terminated
employees will still have access.
Understanding of Policy by Employees.
File of signed policies will exist.
Audit Evidence
Evidence Obtained as to Whether
the Control is in Effect
(Audit Evidence)
Interview employees. Test system and
check settings for automated alerts.
Interview management and send third
party requests. Review/evaluate
documentation/logs regarding third party
access.
Interview employees and review
documentation of procedure taking place.
Interview terminated employees and test
system access with recently terminated
users.
Interview employees and review file of
signed policies.
Understanding of Procedure by
Management.
Documented review. Locks, alarms,
systems etc will be fully functionally and
prevent access.
Appropriate access rights dependent upon
duties.
Interview management and
review/evaluate documentation of reviews.
Test physical security.
Log-in required to access system after
designated allotment of time. After
allotted time, session will shut down.
Test system for shut down and check
timing. Review settings in the system that
implement this requirement.
Page 27 of 44
Check access rights for proper segregation
and test system.
Control in
Place
Y/P/N
Security Information Management
System will show requirement/control that
makes the shut down occur.
Page 28 of 44
Security Information Management
PS10 Prepare Audit Strategies and Audit Work Programs
Audit Strategy
Firewall Management, Intrusion Detection, Intrusion Prevention
Control Objectives:
 To ensure preventative, detective, and corrective measures are in place and working as
intended to protect the Information System from intrusion.
 To ensure proper controls are in place to safeguard assets and prevent, detect and mitigate
fraudulent activity.
Audit Objectives:
 To determine whether controls are in place and in effect to provide reasonable assurance
that preventative, detective, and corrective measures are in place and working as intended to
protect the Information System from intrusion.
 To determine whether controls are in place and in effect to provide reasonable assurance
that assets are safeguarded and fraudulent activity is prevented, detected and mitigated.
Type of IT Audit: combination of application system audit and general control examination
Audit entity: network
Sources and related type of evidence:
Key components, tasks, activities that are being reviewed/examined:
 IPDS overall system and its access security, passwords, and communication
 Log systems and its access security
 Vulnerability and penetration tests
 All security software and corresponding policies/procedures
 Training
 Response and back-up procedures
Audit techniques:
 Third party confirmations
 Documentation review/evaluation
 Observations
 System searches
 Re-performance (or testing?)
 Interviews
 File comparisons
Types of systems of record:
Security Information Management
Page 29 of 44
Security Information Management
Control Objectives:
 To control access to the Information Systems to prevent unauthorized use and to restrict
authorized use.
 To ensure proper controls are in place to ensure data and system availability in order for the
Information Systems to fully support the organization’s objectives.
Audit Objectives:
 To determine whether controls are in place and in effect to provide reasonable assurance
that unauthorized access to the Information Systems is prevented and authorized use is
restricted.
 To determine whether controls are in place and in effect to provide reasonable assurance
that data and system availability is maintained in order for the Information Systems to fully
support the organization’s objectives.
Type of IT Audit: general control examination
Audit entity: business organization
Sources and related type of evidence:
Key components, tasks, activities that are being reviewed/examined:
 Policies and procedures for security, user IDs and passwords, third party access, and
acceptable use
 Procedure for reviewing/evaluating physical security
 Segregation of duties regarding Information Systems
 Automated programs regarding system shutdown and passwords protection
Audit techniques:
 Documentation review/evaluation
 Data extraction and analysis
 System searches
 Re-performance (or should I say testing?)
 Interviews
 File comparisons
 Third party confirmations
Types of systems of record:
Page 30 of 44
Security Information Management
1. PLANNING AND SCOPING THE AUDIT
Define audit/assurance objectives.
The audit/assurance objectives are high level and describe the overall audit goals.
Review the audit/assurance objectives
Modify the audit/assurance objectives to align with the audit/business objectives
Define boundaries of review.
The review must have a defined scope. The reviewer must understand the operating
environment and prepare a proposed scope, subject to a later risk assessment.
Perform a high-level walkthrough of the processes affected by information security.
1.2.1.1 Determine the applications and/or operating environments serviced (or should
be serviced) specifically, protection of systems via the firewall/intrusion detection,
intrusion prevention and security information management.
Obtain and review the enterprise network diagram to gain an overall
understanding of the network components likely to impact/support
the security information management system.
Establish initial boundaries of the audit/assurance review.
Identify limitations and/or constraints affecting the audit of specific systems.
Define assurance.
The review requires two sources of standards. The corporate standards defined in policy
and procedure documentation establish the corporate expectations. At minimum,
corporate standards should be implemented. The second source, a good-practice
reference, establishes industry standards. Enhancements should be proposed to address
gaps between the two.
Obtain company security management policy and standards documentation.
Page 31 of 44
Monitoring
Information and
Communication
Control Activities
Audit/Assurance Program Step
Risk Assessment
ISACA
NIST
COBIT
CrossCrossCrossreference reference reference
Control Environment
COSO
Issue
Crossreference
Comments
Security Information Management
Obtain the written acceptable usage policy.
Determine if COBIT/ISACA/NIST/COSO and the appropriate security management
framework will be used as a good-practice reference.
Identify and document risks.
The risk assessment is necessary to evaluate where audit resources should be focused.
The risk-based approach assures utilization of audit resources in the most effective
manner.
Identify the business risk associated with the security management threats.
Identify the technology risks associated with the security management threats.
Evaluate business and technology risks and vulnerabilities.
Based on the risk assessment, identify changes to the scope.
Discuss the risks with IT, business and operational audit management, and adjust
the risk assessment.
Based on the risk assessment, revise the scope.
Define the change process.
The initial audit approach is based on the reviewer’s understanding of the operating
environment and associated risks. As further research and analysis are performed,
changes to the scope and approach will result.
Identify the senior IT audit/assurance resource responsible for the review.
Establish the process for suggesting and implementing changes to the
audit/assurance program, and list the authorizations required.
Define assignment success.
The success factors need to be identified. Communication among the IT audit/assurance
team, other assurance teams and the enterprise is essential.
Page 32 of 44
Monitoring
Information and
Communication
Control Activities
Audit/Assurance Program Step
Risk Assessment
ISACA
NIST
COBIT
CrossCrossCrossreference reference reference
Control Environment
COSO
Issue
Crossreference
Comments
Security Information Management
Identify the drivers for a successful review (this should exist in the audit/assurance
function’s standards and procedures).
Communicate success attributes to the process owner or stakeholder, and obtain
agreement.
Define audit/assurance resources required.
The resources required are defined in the introduction to this audit/assurance program.
Determine the audit/assurance skills necessary for the review.
Determine any need for additional professionals, if necessary.
Estimate the total resources (hours) and time frame (start and end dates) required
for review.
Define deliverables.
The deliverable is not limited to the final report. Communication between the
audit/assurance teams and the process owner is essential to assignment success.
Determine the interim deliverables, including initial findings, status reports, draft
reports, due dates for responses and the final report.
1.1 Communications
The audit/assurance process is clearly communicated to the customer/client.
1.9.1 Conduct an opening conference to discuss the review objectives with the
executive responsible for operating systems and infrastructure.
. UNDERSTANDING SUPPORTING INFRASTRUCTURE
Security management is supported by entity standards, processes and procedures.
To properly evaluate the process, the supporting infrastructure needs to be
reviewed and evaluated.
Obtain and review the current organizational chart (RACI) for the IT department
and the business units.
Page 33 of 44
DS5
Monitoring
Information and
Communication
Control Activities
Audit/Assurance Program Step
Risk Assessment
ISACA
NIST
COBIT
CrossCrossCrossreference reference reference
Control Environment
COSO
Issue
Crossreference
Comments
Security Information Management
Interview the senior security officer and the IT security administrator.
Identify who has responsibility for security management.
Obtain a copy of the following:
 IT information security strategy and architecture documentation
 Identify firewall protection
 Identify Instruction Detection, Intrusion Prevention and Security
Information Management systems (if applicable)
 Identify licenses and contracts
 Identify update policies and procedures
 Verify most recent update and next due date.
 List of external entities with access to network and applications,( e.g., third
party security providers, vendors, partners and customers, employees who
access the system outside firewall/network)
 Role owners
 Role procedures
 Role policies
. INFORMATION SECURITY MANAGEMENT
Deploy and keep current efficient and effective information security management
systems.
Security Management Strategy
Audit/assurance objective: identify security management system-- should be in alignment
with IT architecture.
Information Security Management systems
Control: The Information Security Management system considers the IT
strategy and infrastructure, and addresses firewall and intrusion
prevention/detection requirements and standards
Verify that the information security management system selected protects
Page 34 of 44
PO2.3
PO2.4
PO3.4
P6
X
Monitoring
Information and
Communication
Control Activities
Audit/Assurance Program Step
Risk Assessment
ISACA
NIST
COBIT
CrossCrossCrossreference reference reference
Control Environment
COSO
Issue
Crossreference
Comments
Security Information Management
the IT operating platforms and applications in use or planned in the
IT strategy.
Obtain information about data ownership; appropriate security levels and
protection controls; a brief description of data archiving or
encryption.
Determine if there are interfaces to the authentication system; if so, obtain
and review specifications.
Determine policies and procedures to ensure the integrity and consistency of
all data stored in electronic form, such as databases, data
warehouses and data archives.
Determine compliance standards and practices based on business relevance
and compare with external requirements (where applicable).
Information Security Identity Management
Control: Implement Information Security Identity Management and physical
security procedures
Review list of active employees and verify user IDs.
Test and evaluate passwords for uniqueness.
Ensure automated password change enforcement.
Review documentation of policy and procedure of third party access.
Obtain and review all service level agreements (SLA).
Verify access rights are appropriate in accordance with least privilege
criteria.
Test physical security.
Test and verify inactive session shut-down.
Page 35 of 44
Monitoring
Information and
Communication
Control Activities
Audit/Assurance Program Step
Risk Assessment
ISACA
NIST
COBIT
CrossCrossCrossreference reference reference
Control Environment
COSO
Issue
Crossreference
Comments
Security Information Management
Review and verify existence and effectiveness of employee termination
deactivation through documentation and testing.
Information Security Management Training
Control: Implement Information Security Management training for all personnel
including a security awareness program
Obtain and review all documentation with regard to the policy/procedure and
training programs
Interview employees about their training experience
Review and verify sign-in sheets in comparison with interviews
Information Security Management Back-up Procedure
Control: Develop and implement information security management back-up plans
and procedures
Review written documentation of procedure
Interview employees to determine responsibilities and accountable party for
back-up procedures
Test and verify the existence of back-up data stores
Page 36 of 44
Monitoring
Information and
Communication
Control Activities
Audit/Assurance Program Step
Risk Assessment
ISACA
NIST
COBIT
CrossCrossCrossreference reference reference
Control Environment
COSO
Issue
Crossreference
Comments
Security Information Management
Monitoring
Information and
Communication
Control Activities
Audit/Assurance Program Step
Risk Assessment
ISACA
NIST
COBIT
CrossCrossCrossreference reference reference
Control Environment
COSO
INTRUSION PREVENTION AND DETECTION SYSTEM (IPDS)
To ensure preventive, detective and corrective measures are in place and working as
intended to protect the information system from intrusion.
IPDS
Control: The IPDS are the security components (firewall, anti-virus software,
anti-spyware software) for preventing and detecting intrusion to the network
and operating systems.
DS5.5
DS5.6
DS5.7
X
DS5.9
X
Obtain the documentation of policy/procedures for access requirements to
the IDPS
Obtain the policy for security documentation disclosure
Obtain log/ system notifications of unauthorized access attempts.
IPDS Updates
Control: Update Intrusion Detection System (IPDS) when new threat is
detected and according to vendor recommendations.
Obtain log files listing update schedules and confirming successful
implementation.
Log file for operating system patches
Log file for IPDS system updates
Log file for antivirus software updates
IPDS Tests
Control: Test Intrusion Detection System (IPDS) to determine whether threats
can be detected.
Determine the procedures for testing the intrusion detection system.
Verify that intrusion detection systems tests were performed
Page 37 of 44
DS5.5
X
Issue
Crossreference
Comments
Security Information Management
IPDS Incident Response
Control: Define and communicate potential security incidents and
classify and ensure proper response procedures are followed.
Obtain incident response policies & procedures
Interview employees to check verify their knowledge of the procedure and its
usage
Review & evaluate documentation of the responses to reported incidents
Determine if the disabling of the user ID is confirmed by the identity
management administrator to the terminated user’s supervisor.
Page 38 of 44
DS5.6
DS8
Monitoring
Information and
Communication
Control Activities
Audit/Assurance Program Step
Risk Assessment
ISACA
NIST
COBIT
CrossCrossCrossreference reference reference
Control Environment
COSO
Issue
Crossreference
Comments
Security Information Management
PS11 Obtain External Input
A telephonic interview was conducted with Jason Allen, Network Engineer, from Covisia
Solutions, Inc. The Intrusion Detection/Intrusion Prevention System in place at Image Polymers
Company is a SonicWALL Firewall, a hardware appliance that although not protected by a physical
lock, is password protected. This particular type of firewall cannot be accessed without the userID
and password and is only known by the IT Vendor; no one at the organization is aware of the
userID or password. It is not possible to reset the userID or password; if the password needs to be
changed the hardware will need to be reconfigured; that is a security feature of the SonicWALL.
Although the communication closet is not locked if the firewall were somehow disconnected
Covisia will receive an alert and will contact the VP of Admin and Accounting at Image Polymers
to troubleshoot the problem. Covisia has the userID and password and must first log into CRM
(Customer Relations Management) software before logging into the firewall so there is the ability to
track accountability within Covisia as the CRM userID is specific to each Covisia employee. The
Firewall has three settings low, medium and high. The firewall is automatically updated daily
(some firewalls may be updated hourly). The firewall produces a log that is reviewed for intrusion
activity on a quarterly basis. Unfortunately Jason was not at the sight so it was not possible to see
the logs produced by the Firewall. Intrusion detection and prevention is a layered method using a
firewall in this instance but also implementing and maintaining anti-virus software and antispyware software; these programs are installed on each user’s laptop and the servers and are
updated daily upon restarting the computer. There is a log that can be viewed that verifies the
updates have been installed (Allen, 2011).
The best sources for the project in addition to the NIST publications was speaking with the IT
Vendor and the VP from Image Polymers since this provided some feedback although limited due
to time constraints on the controls.
PS12 Client Control Review
A review of our Audit Strategy was performed with Jonathan Yorke, Vice President of
Administration and Accounting at Image Polymers in addition to the interview with Covisia. The
questions we had devised for management were reviewed and it was suggested they be broken
down into two parts, one for the individual responsible at Image Polymers and one for the
individual responsible at Covisia. We reviewed some of the controls and discussed the risk
Page 39 of 44
Security Information Management
assessment that contributed to the decisions made regarding the type of intrusion detection and
prevention systems should be in place.
The external threats to IPC are limited; they do not have their own website or web server
(they are featured on their parent site’s website) so they are not subject to external DoS attacks and
they do not accept orders and/or payment through a website so they are not subject to PCI DSS
requirements. They also have a very small staff of one expatriate and 9 employees so their threats
from employees although would not be non-existent is quite small. It could include an introduction
of malicious code through e-mail, USB storage devices and/or the Internet. Another threat is
through third party access. Their manufacturing facility in Tennessee is staffed by one Image
Polymers’ employee and employees from a third party, Cytec Industries, and the MAS500 database
system is accessed through a VPN; Least Privilege Policy is implemented here so these employees
only have access to what they need access to in order to fulfill their job duties. The Least Privilege
Policy is also used for access by the R & D department located in Tennessee (Yorke, 2011).
According to the COBIT maturity model the level that Image Polymers Company is at is
somewhere between # 2 Repeatable but Intuitive and # 3 Defined. Some controls are documented
but some are not and although management is able to deal predictably with most control issues,
some weaknesses persist and impacts could still be severe. Employees are aware of their
responsibilities for control.
Page 40 of 44
Security Information Management
Audit Conclusion
Instruction: Ensure that there is sufficient, competent and appropriate evidence to support audit conclusions and audit findings.
Review control tables and Audit Results Comparison Sheets.
Is there an adequate combination of controls in place to address the control objective from a “process” audit perspective? Are the
controls in place appropriate in design to address the control objective?
Is there an adequate combination of controls in effect to provide reasonable assurance that the control objective would be achieved, or
met? Is there sufficient, competent evidence to support the audit conclusion and to demonstrate that the controls are in effect?
Completed by:
Date:
Reviewed by:
Date:
Page 41 of 44
Security Information Management
Audit Results Comparison Sheet – Control Criteria to Review or Test Results
Control
Control Evidence that Would
Demonstrate the Control
Would be in Place
Control in
Place
Y/P/N
Page 42 of 44
Control Evidence that Would
Demonstrate the Control
Would be in Effect
Control in
Effect
Y/P/N
Security Information Management
Audit Conclusion
Instruction: Ensure that there is sufficient, competent and appropriate evidence to support audit conclusions and audit findings.
Review control tables and Audit Results Comparison Sheets.
Is there an adequate combination of controls in place to address the control objective from a “process” audit perspective? Are the
controls in place appropriate in design to address the control objective?
Is there an adequate combination of controls in effect to provide reasonable assurance that the control objective would be achieved, or
met? Is there sufficient, competent evidence to support the audit conclusion and to demonstrate that the controls are in effect?
Completed by:
Date:
Reviewed by:
Date:
Page 43 of 44
Security Information Management
Works Cited
COBIT 4.1. (2007). Rolling Meadows, Illinois, United States of America: IT Governance
Institute.
Firewall Operations Management, Auditing and Compliance. (2011, February). Retrieved April
2011, from Tufin Secure Track Web site: http://www.tufin.com
ISACA. (2010). IT Standards, Guidelines,and Tools and Techniques for Audit and Assurance
and Control Professionals. Rolling Meadows.
Scarfone, K., & Hoffman, P. (2009, September). National Institute of Standards and Technology
Guidelines on Firewalls and Firewall Policy SP800-41 Revision1. Gaithersburg, Maryland,
United States of America.
Scarfone, K., & Mell, P. (2007, February). National Institute of Standards and Technology Guide
to Intrusion Detection and Prevention Systems (IPDS) SP 800-94. Gaithersburg, Maryland,
United States of America.
Scarfone, K., Grance, T., & Masone, K. (2008, March). Computer Security Incident Handling
Guide NIST SP 800-61 Revision 1. Gaithersburg, Maryland, United States of America.
Skybox Security, Inc. (2010, May). Retrieved April 2011, from Skybox Security Web Site:
http://www.skyboxsecurity.com
http://www.cloudave.com/wordpress/wp-content/uploads/2010/09/bitglobe-security.jpg
Page 44 of 44
Download