m9c12WEBTRUST

advertisement
Providing Assurance on the
World Wide Web
The WebTrust Initiative
Dsheehy@grantthornton.ca
A Little eCommerce History
1962 - Internet conceived
1969 - 4 US College campuses are linked
creating ARPANET
1971 - ARPANET grows to 23 hosts
1972 - InterNetwork (INWG)Group is born
1979 - USENET groups 1st appear
1982 - Term Internet appears
1-3
How Big is This Internet?
Difficult to predict with any certainty
Huge growth in past two years > July 13
Web now composes over 2.1 billion pages
Internet now estimated > 348m people
(148m in US and Canada)
By 2006 estimated
> 720m people
1997 Market Estimates
Projected to grow - Projections vary
The total value of goods and services
traded between companies over the
Internet will reach $8 billion this year and
$327 billion in the year 2002. The rapid
growth of intercompany commerce will
cause businesses to adopt dynamic
trading processes.
Forrester July 1997
How Big is This Market?
Still in infancy, with growing pains
One US projection: $70b (99’) – 161
billion this year, 303 billion 2001 to
$851b (2003)
Worldwide projection: $76b to $1.442
in 2003
Let’s Compare B2C Christmas
1999 - $10.5 billion
2000 – estimate $19.5 billion
Last year - 78% of internet users used the
internet in some capacity -33% bought
online and 45% gathered information
online

Shoppers - 42% female 1999
– now 63%
In the words of “Buzz Lightyear”
To Infinity and Beyond !!!
The eCommerce Transaction
Processing Cycle
To payment
processing
User
Authentication
Commerce
Server
Firewall
To transaction
processing
Demilitarized
Zone
2-1
Processing Cycle Transaction Processing
Other
processes
Transaction
Server
Firewall
Application
Server
Business
database
2-1
Processing Cycle Payment Processing
Gateway
Firewall
Firewall
Acquiring
Bank
2-1
What are the Concerns?
Client and Public ( B2C)
Privacy concerns
 Security of sites
 Timely delivery of product
 Reliable sites – impersonations

B2B

As above + confidentiality and non-repudiation
Recent News About Privacy
Sept 18 – More.com sued for releasing private info
Sept 3 – Amazon changes Privacy Policy
Sept 14 – Two leading online privacy groups drop
out of Amazon’s affiliate program
August 18 – Judge blocks Toysmart from selling
personal information
Aug 17 – Love letter virus variant steals banking info
from Swiss bank accounts
Issue Of Security
Recent Headline
Denial of Service Attacks Disrupt
Internet
eBay down! Charles Schwab down! Amazon.com
down! CNN.com down! Entire network effected
>>>>>On Monday and Tuesday, February 7 and 8,
2000, a large number of major sites across the US
were assaulted by ``Denial of Service'' (DoS)
attacks.
Internet Threats (Examples)
Spoofing
Packet sniffing
Exploiting vulnerabilities (i.e. firewall / operating
system)
Password Cracking / Guessing
Denial of Service
Buffer Overflow
Web Spoofing
The attacker’s Web server sits between the victim and the rest of the
Web, a “man in the middle attack”.
The attack is facilitated by rewriting to all of the URLs on a baiting
Web page so that they point to the attacker’s server rather than to some
real server.
For example, http://home.netscape.com becomes
http://www.attacker.org/http://home.netscape.com.
Once captured, the attacker ‘spoofs’ the user by retrieving the ‘real
page’ and re-writing before forwarding to the user.
Web Spoofing Illustrated
www.attacker.com
1. Request spoof URL
Victim’s
Browser
4. Reveal
access codes
or change
page contents
5. Spoofed page contents
IBM Compatible
3. Real page
contents
IBM Compatible
www.server.com
2. Request
real URL
Password Cracking / Guessing
Software based Dictionary checking
(extremely fast)
Social Engineering
Brute Force (maybe some intelligence)
Objective to find the “keys to the
kingdom”
(i.e. Administrator / Root / Supervisor)
Buffer Overflow
Occurs when more data placed into a computer
space than was provided for.
Example:
Placing 800 “a”s into a space defined to hold 30.
Result: Unexpected program response:



shut down service
display source code
execute attacker code (to gain superuser rights to O/S)
Background To WebTrust
Special Committee (“Elliott”)


Assurance service recommendations
On-going process for new services
Assurance Services Executive Committee
Dual focus


Build the practice for the profession
Promulgate user-oriented measurement criteria
Joint AICPA / CICA Team Efforts
3-4
Benefits of WebTrust family
Improved business disclosure and practices
Better transaction processing and security
Enhanced trust and confidence on “the net”
Greater competition, greater array of choices for
the customer
Helps “level the playing field”
Independent Verification
Independent verification can allay the majority of
these fears as does financial statement audit



Public accounting is quality controlled the world over
Also serves as valuable eCommerce consulting tool
in understanding best practices
Follows standardized process from Web site to Web
site giving comfort to oversight authorities
The WebTrust “Process”
Management makes representations about
eCommerce practices and disclosures
CA collects evidence to support
management’s assertions
CA examines representations
CA issues seal
3-4
History Of WebTrust
Conceived December 1996
December 1997 – Version 1.0
June 1998 – Version 1.1
November 1999- Version 2.0
Fall 2000 – Version 3.0 introduction
Also WebTrust for Certification Authorities
(next week) and ISPs
WebTrust now
Still the only comprehensive seal of assurance, but
now the pitch is eCommerce business solution
Focus on all aspects of eCommerce & flexible to
specific needs of eCommerce entity (Ver 3.0)
Based on WebTrust Principles and Criteria
Accountant licensed by Institute after training
Accountant’s report posted on new secure server
Site is re-evaluated every 180 days versus 90 days
Each firm and each engagement still subject to
independent QC reviews
e-Commerce Assurance –
WebTrust Version 3
Will allow reports on 1 or multiple
principles

Privacy

Availability

Confidentiality

Security

Transaction Integrity

Non-repudiation
More Details
Security - The enterprise discloses key security policies, complies with such
security policies, and maintains effective controls to provide reasonable
assurance that access to the electronic commerce system and data is restricted
only to authorized individuals in conformity with its disclosed security
policies.
Privacy - The enterprise discloses its privacy practices, complies with such
privacy practices, and maintains effective controls to provide reasonable
assurance that personally identifiable information obtained as a result of
electronic commerce is protected in conformity with its disclosed privacy
practices.
Transaction Integrity - The enterprise discloses its business practices for
electronic commerce, executes transactions in conformity with such practices,
and maintains effective controls to provide reasonable assurance that electronic
commerce transactions are processed completely, accurately and in conformity
with its disclosed business practices.
More Details
Confidentiality - The enterprise discloses its confidentiality practices, complies
with such confidentiality practices and maintains effective controls to provide
reasonable assurance that access to information obtained as a result of electronic
commerce and designated as confidential is restricted to authorized individuals
in conformity with its disclosed confidentiality practices.
Availability - The enterprise discloses its practices for availability, complies
with such availability disclosures, and maintains effective controls to provide
reasonable assurance that e-commerce systems and data are available as
disclosed.
Non-repudiation - The enterprise discloses its practices for non-repudiation,
complies with such practices, and maintains effective controls and appropriate
records to provide reasonable assurance that the authentication and integrity of
transactions and messages received electronically are provable to third parties in
conformity with its disclosed non-repudiation practices.
More Details
Customized Disclosures – (Must be issued in conjunction with at
least one other principle). The enterprise’s specified disclosures are
consistent with professional standards for suitable criteria and
relevant to its electronic commerce business. In addition, the
enterprise maintains effective controls over the processes
supporting such disclosures to provide reasonable assurance that
such disclosures are reliable.
Status of Modules – March 5/01
Principle
(1) Privacy
(2) Security
(3) Trans. Integrity
(4) Availability
(5) Non-repudiation
(6) Confidentiality
(7) Customized disc.
Current status
Published
Published
Published
Published
in development
Exposure soon
in development
“Value Pack” Engagements
Customer protection – transaction integrity
and privacy
Service providers not yet decided
Special seals
Must meet all to get seal
What’s Easier to Sell?
Privacy is a hot issue
Security permeates – duplication with security
module
If Version 2 – then transaction integrity and
privacy – Consumer Protection
Availability – service providers, B2B extranets
Confidentiality/non-repudiation B2B extranets
etc
Customized disclosure
Modules - Framework
Firm Name
Each Module to have a common framework
Framework consists of 4 topics under which criteria
to be grouped:
 Policies (goals and objectives)
 Procedures and technology tools
 Monitoring (performance measures)
 Disclosures
Consumer recourse to be considered for each module
WebTrust Seal
Web consumer would
see the seal on a Web
page
Would then click on it to
access additional
information
Display of firm name,
logo is optional
“Click” to see report and other
information
What User Sees by
Clicking on the Seal
VeriSign certificate information
Accountant’s (XY&Z’s) report
Management’s assertions
Business practices disclosures
Link to AICPA/CICA WebTrust Principles &
Criteria
Other relevant information
Let’s look at a few sites
HD Vest
Bell Canada
Charity.ca
E-Trade
American Red Cross
WebTrust Secure Server &
Seal Design
Firm Name
Server -Outsource
management to ISP
ISP Responsibilities




verify validity of seal
post auditor’s report
Principles and criteria
managed list of valid sites
Client site contains


WebTrust seal
Disclosures
Seal Linked to secure
server
Seal Design





WebTrust is our brand
more marketable
optional addition of
firm name
Independent
Verification
Blinking “Click”
Second click of seal:

modules tested, links to
standards, report, etc.
Providing WebTrust Services
Assurance Standards (Section 5025)

Examination level
Independence
5-1
Providing WebTrust Services
Practicing across provincial, state and
international boundaries
Client & Engagement Acceptance


Client acceptance
 Nature of business, reputation, management
Engagement acceptance
 Control environment, nature of sites
 Are they likely to meet criteria?
Expertise Required



Code of Professional Ethics
Section 5025
Minimum Competencies
5-2
Providing WebTrust Services
Engagement Letters

Dates
Period covered by accountant’s report
 Period between updates

Control on seal
 Requirements of WebTrust license

5-7
Scoping the Work
Business locations, Web hosting locations, ISPs
Products / services included & excluded
Complexity - the exponential effect
Time requirements - first examination



Low-end simple sites, probably 2 or 4 weeks minimum
High-end complex sites, probably 8 to 15 weeks
Less for clients where we’ve performed work on EComm systems (audit or consulting)
Time requirements - update examinations

Changes, change management controls, etc
Estimation template
6-2
Skill Sets Needed
Professional Standards
Systems Concepts
Business & Transactions Initiation
Hardware
Software
Networks/Internet
Outside experts
6-5
Engagement Management
Documentation


Working papers
Engagement summaries
Management Representation Letter
Accountant’s Report
Dealing with Changes to the Web Site
Self Assessment Document
System of Quality Control
6-8
Implementation Planning
Skills & Competencies – TRM and Assurance
Targeting Your Clients – hot buttons
Related Services – consulting,
Sales Process- often many calls
Marketing – new materials under development
Seal Management & Administration – new process
Internal Firm Guidance
System of Quality Control –
Key Sites
www.cica.ca
www.aicpa.org
www.truste.org
Download