Management summaries in respect of completed audit assignments Appendix B (1)

advertisement
Management summaries in respect of completed audit assignments
Appendix B (1)
Report No. NN/11/08 – Final Report issued 8 February 2011
Audit Report on Exchequer Services
Audit Opinion
Adequate Assurance given
Rationale Supporting Award of Opinion
The audit work carried out by Internal Audit indicated that:
•
While there is a basically sound system of internal control, there are weaknesses,
which put some of the client’s objectives at risk.
•
There is evidence that the level of non-compliance with some of the control
processes may put some of the client’s objectives at risk.
•
This opinion results from the two medium and three low priority recommendations
that have been raised.
Summary of Findings
General
Financial procedures are set out within the Council’s constitution with Part Four, Rules of
Procedure, including a section covering Orders for Goods and Services, Authorisation of
Expenditure and Insurances; however, we could not locate procedures to instruct staff on
using the electronic ordering system.
Ordering
User access controls are in place over the E-Financials electronic ordering system and
administrative rights are limited to four officers. Controls are in place to ensure that
independent authorisation of expenditure is carried out in line with the authorised signatories
list, and there is segregation of duties in the establishment and amendment of supplier
details.
Low utilisation of the electronic ordering system was identified; approximately 40% of
payments are made using this method. A list of items not appropriate for electronic purchase
order has not been identified. Furthermore, the functionality within the electronic ordering
system to prevent orders being placed against individual budgets, where this would result in a
budget overspend, is not being utilised.
Testing identified scope for improvement around ensuring that a full audit trail is retained in
respect of payment requests, however, no recommendation has been raised as controls have
been put in place to mitigate any potential risks. It was also identified that staff within
Exchequer Services can create new suppliers and process invoices; this mainly being due to
operational reasons with the small size of the team.. There are though a number of mitigating
controls that reduce the risk of manipulating the system including the proposed payments
report which is reviewed before each payment run and therefore provides some assurance
over the validity of invoices being processed through the ledger. There are also three
‘Superusers’ who have access to full functionality with respect their areas of responsibility
within the purchase ledger system, with processing restrictions of £100 having been applied
as a consequence of the previous audit.
Creditors
Weaknesses were identified regarding the frequency of reviews of creditor system access
rights, in line with role changes within the Council, to ensure they reflect current roles.
Controls were in place regarding receipting of goods/services, prevention of duplicate
payments, verification of the appropriateness to make payment and recording of payments.
Secure arrangements were verified for ordering, storage, printing, issuing and despatch of
cheques.
Procedures for electronic transfers/one-off payments made outside of the normal payment run
were in place.
The Council is required through legislation to publicly report on purchases made in excess of
£500. Evidence was provided to demonstrate that this task is on track to be completed by
January 2011.
VAT is accounted for within Finance for purchases. VAT returns are submitted on a monthly
basis. The returns are being submitted prior to authorisation being made by the Financial
Services Manager.
Staff and members are required to declare interests to avoid potential conflicts, in particular
with regard to potential creditors. Employees are required to declare interests when they
become aware of a potential conflict of interest. This is a voluntarily disclosure; however,
guidance was in place within the employee Code of Conduct.
Corporate VISA Charge Cards
Procedure guidance for Corporate Credit Cards (CCC) was held; however, the guidance does
not provide sufficient instruction regarding appropriate online use of CCCs.
There are five CCCs in use by four members of Corporate Management Team and the ICT
Network Manager. Two bank signatories are required to authorise new car holders, the
request is then processed by the Technical Accountant. Cards statements are reconciled to
VAT receipts on a monthly basis.
Insurances
The Council undertook a joint procurement exercise in 2009/10 with a number of local
authorities led by St Edmundsbury Council, with the tender advertised in the European
Journal. The Council accepted a tender from Zurich, commencing on 1st May 2010, with an
expected five-year term.
Insurance claims have been completed on standard forms in a timely manner.
Performance Information
A local performance target of 100% of invoices being paid within 30 days is in place and
monitored. Performance was under the expected level at around 96.46% in September 2010.
Performance is monitored through TEN on a monthly basis and reported to Cabinet quarterly.
Risk Management
Financial services have not undertaken a risk assessment for 2010/11 and therefore are noncompliant with the Council’s risk management framework.
Adequacy
and
Effectiveness
Assessments
Area of
Scope
Adequacy
of
Controls
Effectiveness
of Controls
Recommendations
Raised
General
Ordering
Creditors
Corporate
Credit Cards
Insurances
Performance
Information
Risk
Management
Green
Amber
Green
Amber
Amber*
Amber
Amber
Amber
High
0
0
0
0
Green
Green
Green
Green
0
0
0
0
0
0
n/a
Red
0
1
0
2
3
Total
0
* Recommendation raised within the ordering area also relates to this area
Medium
0
1
0
0
High Priority Recommendations
No high priority recommendations have been raised as a result of this audit.
Management Responses
Management have agreed, or agreed in principle, with all recommendations raised.
Low
0
1
1
1
Appendix B (2)
Report No. NN/11/17 – Final Report issued 15 February 2011
Audit Report on Network Infrastructure, Security and Telecommunications
Audit Opinion
Limited Assurance given
Rationale supporting award of Opinion
The audit work carried out by Internal Auditindicated that there are weaknesses in the system
of internal controls such as to put the client’s objectives at risk.
Although overall the Council’s Domain Controller Configuration standards were on par with
other local authority organisations, there are still a number of weaknesses which need to be
addressed to meet good security practice and the Government Code of Connection (CoCo)
requirements. A total of 15 medium priority and three low priority recommendations have
been raised to lift controls to a good/leading practice standard; hence we have been able to
provide a limited level of assurance.
This system has not previously been audited, so there is no comparison possible with
previous findings.
Summary of Findings
Domain Account Policies – this refers to the general practices that operate such as
password policies, account lock-out policy etc. Password controls in this area are good, for
example, complexity has been enabled and other available supporting controls are in place.
There are a number of other controls that require review and recommendations on these have
been raised.
Audit Policy – The majority of the available audit functionality has been utilised, although the
logs created by the audit functionality are not reviewed. Recommendations around log review
and bringing the audit functionality not currently being used to a good practice standard have
been raised.
Event Logs – Event logs are equivalent to audit trails in the network domain. There are good
controls in the configuration of event log settings.
Security Options – The majority of available controls in this area are in line with good
practice, although it was also noted that some still require review. For example, it is not good
practice to allow the username of the previous user of a PC or laptop to be displayed to the
next user upon system start.
User Accounts – Good controls have been implemented, although the audit found that there
appears to be a large number of user accounts with passwords set to never expire and/or do
not require a password. The latter does not necessarily mean that no password is present,
just that the accounts are allowed to have no password set. A recent Code of Connection
onsite security IT Healthcheck found no accounts without passwords. Sample testing of the
leavers’ process noted a minor weakness in that two accounts out of a sample of 22 over the
period from July to September 2010 were still open. As the process clearly exists, the
weakness was discussed with management and no formal recommendation has been raised
here. However, recommendations on the accounts with no password expiry, and those which
do not require a password, have been raised.
Rights and Privileges – It was found that “rights to be granted to administrators only” were
configured in line with current good practice, although there are a number of “rights to be
granted to no one” that have been granted to users. There are also a number of
Discretionary Access Control Lists (“DACL”) that have been created for individual users, that
allow the users certain functionality within the system. Recommendations on this and the
“rights to be granted to no one” have been raised.
Trusted and Trusting Domains – Trust relationships allow one Domain to “trust” the access
rights given within another Domain (e.g. the network password would allow access to another
domain). There are no such relationships in place on the network domain.
Remote Access Service (RAS) – The RAS service has been disabled and no RAS servers
were defined within the domain. However, six supporting RAS services were still running on
the Domain Controller and one administrator account has permission to dial in using RAS.
Recommendations on stopping the services and reviewing the need to have an administrator
account with this privilege have been raised.
Services and Drivers – The domain controller had 276 services available, of which 148 were
running at the time of the audit. There is no regular review of the service to ensure that only
required services are running. A recommendation on this has been raised.
Updates and Patches – It was found that the last time any patches or updates were installed
was in January 2010 when Server 2003 Service Pack 2 was installed. There is no patch or
update review process in place that ensures that the hardware is hardened to current patches
and/or hotfixes. A recommendation on this has been raised.
Logical Drives and Network Shares – Logical drives are sections of physical drives that
have been partitioned, whilst network shares are pieces of information that can be shared
between users (e.g. shared files, shared printers). Good controls were noted here.
Backup – Good controls were noted here.
Physical and Environmental Security – Good controls were noted here.
Disaster Recovery Plan (DR) – Management have been working on drafting a Disaster
Recovery Plan although it requires further review to lift it to current good practice. A
recommendation containing suggestions for improvement has been raised.
Network Topology (layout) and Resilience – Single points of failure (which, if it failed,
would mean that a significant part of the network would also fail) were noted at the Firewall
and router switch. Spare devices are available to replace the active devices and
management are confident in their ability to do so with little delay. The Council’s
infrastructure is small and these controls have been considered to be adequate for their
needs.
Network Support – The support team is small, although there is good cross training in place
to help ensure adequate network management resourcing. However, there are weaknesses
in terms of security alert management and the lack of regular review of service desk activities
to identify any support trends that may require off line resolution. Recommendations on these
have been raised.
Network Device Security – The CISCO switches allow connections between, and within the
network. The CISCO switch configuration is such that one of the passwords has been
encrypted using a CISCO “Type 7” algorithm, which is known to be weak.
A
recommendation to harden this encryption to the stronger Type 5 encryption has been raised.
The Council currently has no Intrusion Detection System in place. A recommendation to
consider implementation of such a system has also been raised.
Remote Virtual Private Network (VPN) Access – These allow users to access the network
from other locations, e.g. through the internet. Good controls were noted. A VASCO (a data
security company) token 2-factor authentication mechanism is in place.
Network Management and Administration – Good controls have been noted in that there
appears to be adequate budget and resource in place to manage the network infrastructure,
although no Service Level Agreement between IT and the Business Areas is in place. In
addition, there is no separate Network Strategy. Recommendations on these weaknesses
have been raised.
Firewall – Good controls were noted in that there is evidence of regular (annual) penetration
testing in place. Management use a range of different external vendors to implement these
tests in order to get a cross section of opinion.
Telecommunications Administration – The Council uses older technology with a small
amount of Voice-over IP (VOIP) technology, which is used internally only. There is a range of
Disaster Recovery options available to management should such an event be invoked. Billing
is handled by apportioning total amounts equally across the total number of Council
employees.
Adequacy
and
Effectiveness
Assessments
Area of Scope
Domain Accounts
Policy
Audit Policy
Event Logs
Security Options
User Accounts
Rights and Privileges
Trusted and Trusting
Domains
Remote Access
Service (RAS)
Services and Drivers
Updates and Patches
Logical Drives and
Network Shares
Backup
Physical and
Environmental
Security
Disaster Recovery
Plan
Network Topology
and Resilience
Network Support
Network Device
Security
Remote Virtual
Private Network
(VPN) Access
Network
Management and
Administration
Firewall
Telecommunications
Administration
Adequacy
of Controls
Effectiveness
of Controls
Amber
Amber
High
0
Medium
1
Low
0
Amber
Green
Amber
Amber
Amber
Green
Amber
Green
Amber
Amber
Amber
Green
0
0
0
0
0
0
2
0
1
1
2
0
0
0
0
1
0
0
Amber
Amber
0
1
0
Amber
Amber
Green
Amber
Amber
Green
0
0
0
0
1
0
1
0
0
Green
Green
Green
Green
0
0
0
0
0
0
Amber
Amber
0
1
0
Green
Green
0
0
0
Amber
Amber
Amber
Amber
0
0
2
1
0
1
Green
Green
0
0
0
Amber
Amber
0
2
0
Green
Green
Green
Green
0
0
0
0
0
0
0
15
3
Total
Recommendations Raised
High Priority Recommendations
We have raised no high priority recommendations as a result of this audit
Management Responses
Management have disagreed with one recommendation raised:
Recommendation 18 – Network Strategy (low priority)
Management should draft and agree a Network Strategy to complement the existing ICT
Strategy. The document should include reference to the timescales that the strategy covers,
the level of current planned investment in the infrastructure and the aims of the strategy in
terms of how it is aligned to identified business needs over the lifetime of the strategy.
Rationale supporting Recommendation 18
A formal Network Strategy will help to ensure transparency and accountability for the network
and help to demonstrate how the IT area are supporting identified business objectives over
time.
There is currently no formal network strategy, although there are brief references to network
plans within the main ICT strategy.
A lack of formal Network Strategy increases the risk that the networks management will be
ineffective and not support business objectives over time.
Management Response
Disagreed. However, we shall include a network plan as part of the ICT strategy instead of
generating a separate document. This is to minimise the number of strategies.
Download