Auditing Corporate Information Security

advertisement
Auditing Corporate
Information Security
John R. Robles
Tuesday, November 1, 2005
Email: jrobles@coqui.net
Tel: 787-647-396
Auditing Corporate Information
Security
 Steps





in the Information Security Audit
Plan
Gather data
Analyze and test
Conclude
Report findings
Auditing Corporate Information
Security
 Federal
Financial Institutions Examination
Council (FFIEC)





Federal Reserve System
Federal Deposit Insurance Corporation
(FDIC)
National Credit Union Administration (NCUA)
Office of the Comptroller of the Currency
(OCC), and
The Office of Thrift Supervision (OTS)
Auditing Corporate Information
Security

Information Systems Security Standards based on:



FFIEC Information Technology
Examination Handbook
http://www.ffiec.gov/ffiecinfobase/
Audit areas include:
•
•
•
•
•
•
•
•
•
•
•
•
Audit
Business Continuity Planning
Development and Acquisition
E-Banking
FedLine
Information Security
Management
Operations
Outsourcing Technology Services
Retail Payment Systems
Supervision of Technology Service Providers
Wholesale Payment system
Auditing Corporate Information
Security

INFORMATION SECURITY WORKPROGRAM
EXAMINATION OBJECTIVE:
Assess the quantity of risk and the effectiveness
of the institution’s risk management processes
as they relate to the security measures instituted
to ensure confidentiality,
integrity, and
availability of information and to instill
accountability for actions taken on the
institution’s systems.
Auditing Corporate Information
Security


The objectives and procedures are divided into Tier 1
and Tier II:
Tier I assesses


Tier II provides


additional verification where risk warrants it.
Tier I and Tier II are intended


an institution’s process for identifying and managing risks.
to be a tool set examiners will use when selecting examination
procedures for their particular examination.
Examiners should use these procedures as necessary to
support examination objectives.
Auditing Corporate Information
Security
 Tier

1 Audit Objectives
Objective 1: Determine the appropriate scope
for the examination
 Quantity

Objective 2: Determine the complexity of the
institution’s information security environment.
 Quality

of Risk
of Risk Management
Objective 3: Determine the adequacy of the
risk assessment process.
Auditing Corporate Information
Security
 Objective
4: Evaluate the adequacy of
security policies relative to the risk to the
institution.
 Objective 5: Evaluate the security-related
controls embedded in vendor
management.
 Objective 6: Determine the adequacy of
security testing.
Auditing Corporate Information
Security
 Objective
7: Evaluate the effectiveness of
enterprise-wide security administration.
 Conclusions
 Objective 8: Discuss corrective action and
communicate findings.
Auditing Corporate Information
Security
 Tier







2 Controls
Access Rights Administration
Authentication
Network Security
Host Security
User Equipment Security
Physical Security
Personnel Security
Auditing Corporate Information
Security
 Tier







2 Controls (Continued)
Application Security
Software Development and Acquisition
Business Continuity Security
Intrusion Detection and Response
Service Provider Oversight Security
Encryption Security
Data Security
Auditing Corporate Information
Security

Audit to Information Security Standards used by
the Information Security department

ISO 17799 – world wide standard
• http://www.iso.org/iso/en/prodsservices/popstds/informationsecurity.html




Cobit – High Level Standard, www.isaca.org
Industry specific – HIPAA Final Security Standards
Industry Specific – FFIEC Standard
NIST
Auditing Corporate Information
Security

ISO 17799 - This is essentially the set of security
controls: the measures and safeguards for
potential implementation. In volume it is the main
body of the overall 'standard set' itself.
1. Security Policy
2. Security Organization
Information Security Infrastructure
Security and Third Party Access
Outsourcing
Auditing Corporate Information
Security
3. Asset Classification and Control
Accountability for assets
Information Classification
4. Personnel Security
Security in Job Definition and Resourcing
User Training
Responding to Security Incidents and
Malfunctions
5. Physical and Environmental Security
Secure Areas
Equipment Security
General Controls
Auditing Corporate Information
Security
6. Communications and Operations
Management
Operational Procedures and Responsibility
System Planning and Acceptance
Protection Against Malicious Software
Housekeeping
Network Management
Media Handling and Security
Exchanges of Information and Software
Auditing Corporate Information
Security
7. Access Control
Business Requirement for Access Control
User Access Management
User Responsibilities
Network Access Control
Operating System Access Control
Application Access Management
Monitoring System Access and Use
Mobile Computing and Telenetworking
Auditing Corporate Information
Security
8. System Development and Maintenance
Security Requirements of Systems
Security in Application Systems
Cryptographic Controls
Security of System Files
Security in Development and Support
Processes
9. Business Continuity Management
Aspects of Business Continuity Management
10. Compliance
Compliance with Legal Requirements
Reviews of Security Policy and Technical
Compliance
System Audit Considerations
Auditing Corporate Information
Security

COBIT—IT Control Framework


Four (4) IT Domains and 34 Processes
PLAN AND ORGANISE











PO1—Define a strategic IT plan
PO2—Define the information architecture
PO3—Determine the technological direction
PO4—Define the IT organization and relationships
PO5—Manage the IT investment
PO6—Communicate management aims and direction
PO7—Manage human resources
PO8—Ensure compliance with external requirements
PO9—Assess risks
PO10—Manage projects
PO11—Manage quality
Auditing Corporate Information
Security

ACQUIRE AND IMPLEMENT







AI1—Identify automated solutions
AI2—Acquire and maintain application software
AI3—Acquire and maintain technology infrastructure
AI4—Develop and maintain procedures
AI5—Install and accredit systems
AI6—Manage changes
M4—Provide for independent audit
Auditing Corporate Information
Security

DELIVER AND SUPPORT













DS1—Define and manage service levels
DS2—Manage third-party services
DS3—Manage performance and capacity
DS4—Ensure continuous service
DS5—Ensure systems security
DS6—Identify and allocate costs
DS7—Educate and train users
DS8—Assist and advise customers
DS9—Manage the configuration
DS10—Manage problems and incidents
DS11—Manage data
DS12—Manage facilities
DS13—Manage operations
Auditing Corporate Information
Security
 MONITOR AND



EVALUATE
M1—Monitor the processes
M2—Assess internal control adequacy
M3—Obtain independent assurance
Auditing Corporate Information
Security
 Test
Controls
 Document Findings
 Prepare Report and present
recommendations to management
Auditing Corporate Information
Security
Thank You!
John R. Robles
Email: jrobles@coqui.net
Tel: 787-647-396
http://home.coqui.net/jrobles
Download