Information Security Review OSU Department of Internal Audit Purpose: The purpose of this review is to gain a better appreciation for the types of information security controls currently in place throughout the university. The review is built around an international best practice model that has categorized the security model into ten components. Our review will assess an organization’s maturity level within each of the ten component areas based on the completion of questionnaire, interview (if necessary), and external vulnerability scan results. Additionally, when viewed collectively, category results should identify areas of increased risk across the university. Process Overview: The review process will be broken up into two phases. Phase 1: Customers will complete the survey (i.e., request for Information / questionnaire) and return it to Internal Audit along with appropriate supporting documentation. We will then, if needed, schedule an appointment with you to go over the responses to make sure we have a thorough understanding of your Information Security infrastructure. Phase 2: Internal Audit (IA) will run a vulnerability assessment utility (Sunbelt Network Security Inspector (SNSI)) which will scan your network for known security issues. The goal is to obtain scans from outside your environment which would represent key external threats. The results of the survey and scans will be shared with area IT management. The Questionnaire: The questionnaire you are about to complete is designed to evaluate an organization’s Information Security infrastructure using IT-industry best practices as its foundation. While this is not a comprehensive technical review, we believe it is an indication of how you control and manage your organization’s Information Security infrastructure. The questionnaire is broadly based on British Standard (BS) 7799, the United Kingdom standard for information security, which provides real, practical guidance toward achieving the goals of information security. BS 7799 Part 2:2000, is also a sub-section in the International Organization for Standards (ISO) / International Electrotechnical Commission (IEC) 17799 Code of Practice for Information Security Management. ISO/IEC 17799:2000 addresses topics in terms of policies and general good practices. The document specifically identifies itself as “a starting point for developing organization specific guidance.” As such, it is deemed to be a prudent best practice framework to evaluate an organization’s approach to managing its Information Security infrastructure. The questionnaire is based in large part from a questionnaire produced by the UK Department of Trade and Industry (http://www.dti.gov.uk/index.html). Internal Audit 106748597 Page 1 3/6/2016 The questionnaire is comprised of 11 sections. The first, General Information, is designed to provide a high level overview of your environment. The remaining 10 sections follow the BS 7799 model and are comprised of a series of YES / NO questions. These sections include Security Governance, Security Organization, Asset Classification & Control, Personnel Security, Physical & Environmental Security, Communications & Operations Management, Access Control, Systems Development & Maintenance, Business Continuity Management, and Compliance. Note: the questionnaire is not a full risk assessment and does not fully replicate the provisions of BS 7799 and cannot be used to claim adherence to the standard. Survey Instructions: The request for information and questionnaire were built using Microsoft Excel to make your data entry easy and manageable. Press TAB to move across fields. Simply complete all the fields on the request for information and questions on the questionnaire, save it, and send a copy of the file back to Internal Audit (see contact information below). Documentation identified on the request for information should be emailed or mailed to Internal Audit. While the general information section does have a few fill in the blank fields, most of the questionnaire is comprised of YES/NO questions or a variation of that. The questionnaire should take approximately 30-45 minutes to complete. If you have problems opening the document in Excel or if you have any questions, contact one of the members of our Information Systems Audit team: Joseph Volpi (8-4266), James D’Innocenzo (8-4224), or Samir Sheth (8-4496). Internal Audit Contact Information: Department of Internal Audit – Attn: IS Audit 2080 Blankenship Hall 901 Woody Hayes Drive Columbus, Ohio 43210 Email: iawebsurvey@ia.ohio-state.edu Phone: 614-292-9680 Fax: 614-292-7938 Internal Audit 106748597 Page 2 3/6/2016