Management summaries in respect of completed audit assignments Appendix B (2)

advertisement
Management summaries in respect of completed audit assignments
Appendix B (2)
Report No. NN/11/17 – Final Report issued 15 February 2011
Audit Report on Network Infrastructure, Security and Telecommunications
Audit Opinion
Limited Assurance given
Rationale supporting award of Opinion
The audit work carried out by Internal Auditindicated that there are weaknesses in the system
of internal controls such as to put the client’s objectives at risk.
Although overall the Council’s Domain Controller Configuration standards were on par with
other local authority organisations, there are still a number of weaknesses which need to be
addressed to meet good security practice and the Government Code of Connection (CoCo)
requirements. A total of 15 medium priority and three low priority recommendations have
been raised to lift controls to a good/leading practice standard; hence we have been able to
provide a limited level of assurance.
This system has not previously been audited, so there is no comparison possible with
previous findings.
Summary of Findings
Domain Account Policies – this refers to the general practices that operate such as
password policies, account lock-out policy etc. Password controls in this area are good, for
example, complexity has been enabled and other available supporting controls are in place.
There are a number of other controls that require review and recommendations on these have
been raised.
Audit Policy – The majority of the available audit functionality has been utilised, although the
logs created by the audit functionality are not reviewed. Recommendations around log review
and bringing the audit functionality not currently being used to a good practice standard have
been raised.
Event Logs – Event logs are equivalent to audit trails in the network domain. There are good
controls in the configuration of event log settings.
Security Options – The majority of available controls in this area are in line with good
practice, although it was also noted that some still require review. For example, it is not good
practice to allow the username of the previous user of a PC or laptop to be displayed to the
next user upon system start.
User Accounts – Good controls have been implemented, although the audit found that there
appears to be a large number of user accounts with passwords set to never expire and/or do
not require a password. The latter does not necessarily mean that no password is present,
just that the accounts are allowed to have no password set. A recent Code of Connection
onsite security IT Healthcheck found no accounts without passwords. Sample testing of the
leavers’ process noted a minor weakness in that two accounts out of a sample of 22 over the
period from July to September 2010 were still open. As the process clearly exists, the
weakness was discussed with management and no formal recommendation has been raised
here. However, recommendations on the accounts with no password expiry, and those which
do not require a password, have been raised.
Rights and Privileges – It was found that “rights to be granted to administrators only” were
configured in line with current good practice, although there are a number of “rights to be
granted to no one” that have been granted to users. There are also a number of
Discretionary Access Control Lists (“DACL”) that have been created for individual users, that
allow the users certain functionality within the system. Recommendations on this and the
“rights to be granted to no one” have been raised.
Trusted and Trusting Domains – Trust relationships allow one Domain to “trust” the access
rights given within another Domain (e.g. the network password would allow access to another
domain). There are no such relationships in place on the network domain.
Remote Access Service (RAS) – The RAS service has been disabled and no RAS servers
were defined within the domain. However, six supporting RAS services were still running on
the Domain Controller and one administrator account has permission to dial in using RAS.
Recommendations on stopping the services and reviewing the need to have an administrator
account with this privilege have been raised.
Services and Drivers – The domain controller had 276 services available, of which 148 were
running at the time of the audit. There is no regular review of the service to ensure that only
required services are running. A recommendation on this has been raised.
Updates and Patches – It was found that the last time any patches or updates were installed
was in January 2010 when Server 2003 Service Pack 2 was installed. There is no patch or
update review process in place that ensures that the hardware is hardened to current patches
and/or hotfixes. A recommendation on this has been raised.
Logical Drives and Network Shares – Logical drives are sections of physical drives that
have been partitioned, whilst network shares are pieces of information that can be shared
between users (e.g. shared files, shared printers). Good controls were noted here.
Backup – Good controls were noted here.
Physical and Environmental Security – Good controls were noted here.
Disaster Recovery Plan (DR) – Management have been working on drafting a Disaster
Recovery Plan although it requires further review to lift it to current good practice. A
recommendation containing suggestions for improvement has been raised.
Network Topology (layout) and Resilience – Single points of failure (which, if it failed,
would mean that a significant part of the network would also fail) were noted at the Firewall
and router switch. Spare devices are available to replace the active devices and
management are confident in their ability to do so with little delay. The Council’s
infrastructure is small and these controls have been considered to be adequate for their
needs.
Network Support – The support team is small, although there is good cross training in place
to help ensure adequate network management resourcing. However, there are weaknesses
in terms of security alert management and the lack of regular review of service desk activities
to identify any support trends that may require off line resolution. Recommendations on these
have been raised.
Network Device Security – The CISCO switches allow connections between, and within the
network. The CISCO switch configuration is such that one of the passwords has been
encrypted using a CISCO “Type 7” algorithm, which is known to be weak.
A
recommendation to harden this encryption to the stronger Type 5 encryption has been raised.
The Council currently has no Intrusion Detection System in place. A recommendation to
consider implementation of such a system has also been raised.
Remote Virtual Private Network (VPN) Access – These allow users to access the network
from other locations, e.g. through the internet. Good controls were noted. A VASCO (a data
security company) token 2-factor authentication mechanism is in place.
Network Management and Administration – Good controls have been noted in that there
appears to be adequate budget and resource in place to manage the network infrastructure,
although no Service Level Agreement between IT and the Business Areas is in place. In
addition, there is no separate Network Strategy. Recommendations on these weaknesses
have been raised.
Firewall – Good controls were noted in that there is evidence of regular (annual) penetration
testing in place. Management use a range of different external vendors to implement these
tests in order to get a cross section of opinion.
Telecommunications Administration – The Council uses older technology with a small
amount of Voice-over IP (VOIP) technology, which is used internally only. There is a range of
Disaster Recovery options available to management should such an event be invoked. Billing
is handled by apportioning total amounts equally across the total number of Council
employees.
Adequacy
and
Effectiveness
Assessments
Area of Scope
Domain Accounts
Policy
Audit Policy
Event Logs
Security Options
User Accounts
Rights and Privileges
Trusted and Trusting
Domains
Remote Access
Service (RAS)
Services and Drivers
Updates and Patches
Logical Drives and
Network Shares
Backup
Physical and
Environmental
Security
Disaster Recovery
Plan
Network Topology
and Resilience
Network Support
Network Device
Security
Remote Virtual
Private Network
(VPN) Access
Network
Management and
Administration
Firewall
Telecommunications
Administration
Adequacy
of Controls
Effectiveness
of Controls
Amber
Amber
High
0
Medium
1
Low
0
Amber
Green
Amber
Amber
Amber
Green
Amber
Green
Amber
Amber
Amber
Green
0
0
0
0
0
0
2
0
1
1
2
0
0
0
0
1
0
0
Amber
Amber
0
1
0
Amber
Amber
Green
Amber
Amber
Green
0
0
0
0
1
0
1
0
0
Green
Green
Green
Green
0
0
0
0
0
0
Amber
Amber
0
1
0
Green
Green
0
0
0
Amber
Amber
Amber
Amber
0
0
2
1
0
1
Green
Green
0
0
0
Amber
Amber
0
2
0
Green
Green
Green
Green
0
0
0
0
0
0
0
15
3
Total
Recommendations Raised
High Priority Recommendations
We have raised no high priority recommendations as a result of this audit
Management Responses
Management have disagreed with one recommendation raised:
Recommendation 18 – Network Strategy (low priority)
Management should draft and agree a Network Strategy to complement the existing ICT
Strategy. The document should include reference to the timescales that the strategy covers,
the level of current planned investment in the infrastructure and the aims of the strategy in
terms of how it is aligned to identified business needs over the lifetime of the strategy.
Rationale supporting Recommendation 18
A formal Network Strategy will help to ensure transparency and accountability for the network
and help to demonstrate how the IT area are supporting identified business objectives over
time.
There is currently no formal network strategy, although there are brief references to network
plans within the main ICT strategy.
A lack of formal Network Strategy increases the risk that the networks management will be
ineffective and not support business objectives over time.
Management Response
Disagreed. However, we shall include a network plan as part of the ICT strategy instead of
generating a separate document. This is to minimise the number of strategies.
Download