Performance Audit - Audit Planning Memorandum Audit Planning Memorandum Security of ICT Infrastructure Background The Tasmanian public sector relies on many computer-based systems and services. Important Information and Communications Technology (ICT) infrastructure such as patient management systems, police databases and motor registry systems is pivotal to successful service provision. Larger systems use data centres that provide storage, availability and security. Hobart’s Bathurst Street data centre had an outage early in January 2012, shutting down the Tasmanian Government server and communications hardware consequently impacting on systems reliant on this hardware and the government services they supported1. Government ICT assets and information must be secure, with adequate protection against equipment failure, data loss or cyber-attack. The core principle of information security is to protect the confidentiality, integrity, and availability of information. Traditionally, government’s approach to ICT security has been agency-based with some whole-of-government support for management and planning2. While this model has suited government well in the past, a more coordinated and strategic focus has become necessary due to emerging factors such as: more Government services are delivered online increased need for coordinated service delivery across government entities increasing sophistication of attacks on ICT infrastructure budget pressures that demand greater efficiency of ICT services. Two units within the Department of Premier and Cabinet — the Office of eGovernment and TMD — are involved in a change process to modernise ICT practices. This has led to the creation of The Tasmanian Government ICT Strategy that includes measures such as: the eventual closure of the Bathurst St and Salamanca data centres and the switch to a private sector to provide storage and security agencies sharing resources and combining purchasing power to improve cost-efficiency and reduce duplication the development of the Tasmanian Government Information Security Policy. 1 TMD Data Centre outage 1 January 2012 2 Tasmanian Government ICT Strategy, December 2011, Page 3 The subsequent Information Security Policy Manual contains mandatory and recommended procedures to improve ICT security within and across agencies. Audit objective The objective of the audit is to assess the effectiveness of security measures for ICT infrastructure. Audit scope The audit will include ICT physical infrastructure, applications and information. The audit will consider measures to ensure appropriate availability of data and systems as well as strategies to protect systems from intrusion. The following departments and systems will be subject to audit: Premier and Cabinet Health and Human Services Police and Emergency Management Treasury and Finance Primary Industry, Parks, Water and Environment Audit criteria Criteria Sub-criteria Audit approach 1. Is there physical security over facilities, network infrastructure and servers, within gov’t buildings? 1.1 Is there effective identity Visit data storage centres. and access management Visit and inspect IT equipment over the server room and rooms in various locations. servers? Check compliance with the 1.2 Have control measures Tasmanian Government Identity been taken to protect and Access Management network infrastructure? Toolkit. 1.3 Are physical facilities Check compliance with the certified and accredited? Australian Government Physical Security Management Protocol. Document1 2 Criteria Sub-criteria Audit approach 2. Is the information safe and secure? 2.1 Is the data backed up effectively? Examine backup procedures. Interview staff about o Are backups tested and procedures and measures used stored off-site? to classify and protect data. o Is the frequency cycle effective? 2.2 Is the data safe from cyber-attack? Is the entity using controls for: o Application whitelisting o Patching applications o Patching operating system o Minimising users with administrative privileges o Disable local administrator accounts o Application based workstation firewall o Multi-factor authentication o Network segmentation and segregation o Host based intrusion detection/prevention system o Centralised and timesynchronised logging 2.3 Is confidential data only available to appropriate people? o Are access controls kept up to date? Document1 2.4 Are access controls tested and monitored? 3 Test steps taken to protect data and systems against a sample from the Top 35 Strategies to Mitigate Targeted Cyber Intrusions from the Australian Government Information Security Manual Criteria Sub-criteria Audit approach 3. Are ICT resources managed effectively? 3.1 Does the entity have an effective Information Security Plan and risk management process? Examine information security and risk management documentation. Examine minutes of Information Security Governance and Management Committee. 3.2 Does the entity have an Information Security Governance and Management Committee? Look at records of information 3.3 Are the requirements of security inspections and the Plan inbuilt? reviews. 3.4 Is there an incident recording and management system? Examine incident records and registers. 3.5 Do business and disaster continuity plans enable maintenance of business functions and security? Review business continuity plans. Examine complaint records. Look at compliance with the Information Security Policy Conduct of audit Agency(ies) involved A judgement sample of entities would allow assessment of the effectiveness of ICT security at the agency level. Agencies audited would be: Department of Health and Human Services Department of Police and Emergency Management Department of Treasury and Finance Department of Primary Industries, Water and Environment - Service Tasmania Department of Premier and Cabinet Audit approach, resource requirements and audit timing: The audit would involve gathering evidence from entities, examining strategy and risk management documentation and procedures in place to protect ICT infrastructure, availability of systems and confidentiality of data. The audit will examine disaster recovery and business continuity plans and the budget spend on ICT security. The audit will also consider any relevant work resulting from the entities’ own internal audit work program. Document1 4 The audit would then assess the suitability of the ICT strategy in providing for ongoing ICT infrastructure security by applying benchmarks from the Australian Information Commission and Australian Government information Security Manual. Consideration was given to whether an expert was required to assist with the audit. The decision was made not to use an expert as the onus is on the auditees to demonstrate and provide evidence that they have security measures in place. Proposed Audit Advisory Committee Members The Audit Advisory Committee would consist of representatives of each of the agencies selected in the judgement sample above. Department of Health and Human Services Department of Police and Emergency Management Department of Treasury and Finance Department of Primary Industries, Parks, Water and Environment Service Tasmania Department of Premier and Cabinet Document1 5