Sia Conseil - Energy & Utilities Management Consulting

advertisement
New York Office
641 Lexington Avenue, Suite 1322
New York, NY 10022
Tel : (212) 634 6325
Internet : www.sia-conseil.com
Sia Partners US
AIBA Presentation: IT Risk Assessments
September 20, 2012
Presenters
Gus Moreno
IT Risk Specialist
Tel : (917) 239-7549
Email : gus.moreno@sia-partners.com
Alexis Wyrofsky
Consultant
Tel : (401) 862-1661
Email : alexis.wyrofsky@sia-partners.com
Paris | New York | Rome | Milan | Casablanca | Dubai | Amsterdam | Brussels
Table of Contents
1
Introduction
2
IT Risk: In the News
3
IT Risk Hot Topics
4
IT Risk Program
5
IT Standards and Selective Article Links
2
CONFIDENTIAL © 2012 Sia Partners
page
Introduction
•
With the growing complexity of Information Technology, financial institutions are exposed to a greater
number of IT risks.
In 2012 alone, many
Information Security attacks
and operational issues
made national news
headlines:
•
Password File Hacking
Amazon Cloud Outage
SQL Injection Attacks
Mobile Device Attacks
Due to the increased threat, regulators hold companies accountable not only to regulatory requirements but
also to standards of best practices and procedures.
Guidance for regulatory
exams is published;
however, regulators’ focus
changes based on the
current IT trends. For
example, recent hot topics
in Financial Services
include:
•
•
•
•
•
•
•
•
•
Cyber Attacks
Data Leakage
Vendor Management
Disaster Recovery & Business Continuity
Plans
• Data Privacy
IT Risk expertise assists companies in navigating the current threats to their IT environment, and ensures
compliance with regulatory requirements.
3
CONFIDENTIAL © 2012 Sia Partners
page
IT Risk: In the News
Password File Hacking
SECURITY EVENT
• Since 2002, Information Security breaches have risen exponentially.
• Cyber activity has spiked this year.
• 6/2012: 3 major Password Breaches.
• LinkedIn: 6.4 million hacked passwords.
• Lastfm.com.
• eHarmony.
• Passwords were stored in database using a standard algorithm rather
than encryption.
POSSIBLE RISK MITIGATION
Controls
• Review quality of stored passwords.
• Set up security monitoring procedures that should be able to detect an
attempted breach.
• Establish adequate security perimeter controls.
• Develop a security patch deployment process.
Cost-benefit
• $200,000-300,000: set up adequate, A+ security measures, versus
• $5.5 million: the average cost to a company of a security breach.
CONFIDENTIAL © 2012 Sia Partners
4
page
IT Risk: In the News
Cloud Computing
OPERATIONAL EVENT
• 6/9/2012: Outage of Amazon Elastic Compute Cloud
(EC2) caused by severe weather conditions.
• Mainstream websites running off the Amazon cloud
were down – Netflix, Instagram, Pinterest, Heroku.
• 4/2011: Technical glitch caused an Amazon cloud outage.
• Caused service interruptions for websites Foursquare,
Reddit and HootSuite.
POSSIBLE RISK MITIGATION
Controls
• Understand availability of computer resources risk and
ensure that infrastructure is resilient.
• E.g.: Establish an automatic switch over to a standby
machine.
• Implement security monitoring in a cloud.
• Establish vendor management controls.
• Include cloud services in Disaster Recovery Plan.
• Employ geographic distribution of data centers.
5
CONFIDENTIAL © 2012 Sia Partners
page
IT Risk: In the News
SQL Injection Hacks
SECURITY EVENT
• 11/2011 - 1/2012: SQL injection hack affected over 1 million urls.1
• Infected by lilupophilupop.com malware.
• The attacker can completely take over the underlying operating system of the
SQL server and the Web application.
• Hacking process is partially manual and partially automated – suggests significant
preparation and manpower.
• Toolkit constructed for a particular attack and targets a specific application architecture.
• 3/2011: Lizamoon.com SQL injection hack:
• 500,000 urls affected via redirects that push rogue AV software.
• Quickly contained.
POSSIBLE RISK MITIGATION
• Establish patch deployment process.
• Verify Virus / Malware process.
• Set up Web application development policies and requirements.
• Inspect application on Firewalls.
• Ensure appropriate use of "least privileges."
• Assume the applications are not secure (encrypt passwords, etc.).
1
According to the SANS Internet Storm Center; Cisco claims that fewer web pages were affected as online
discussions following a hack increase hits.
6
CONFIDENTIAL © 2012 Sia Partners
page
IT Risk: In the News
Mobile Device Attacks
SECURITY EVENT
• Android malware attacks: New framework Tatanga –“man-in-the-mobile” attacks (MitMo):
• Intercept the secret codes sent by a bank via text message to a customer’s phone to verify a large
transaction request.
• Initiate transfers and transactions by bypassing the out-of-bank authorization systems.
• Target small businesses using online banking; mobile attacks expected to become more prevalent.
•
Other Mobile Device Security Risks:
• High potential for mobile devices to be lost or stolen.
• Applications do not typically have encrypted containers (in place for email) or other security
measures.
POSSIBLE RISK MITIGATION
• Ensure Mobile Computing policies are in place:
• State that applications must be downloaded from a trusted source, e.g., Google Play
•
•
•
•
app stores.
Set up multifactor authentication.
Implement user security awareness training.
Move slowly into the space.
Update and ensure SDLC process is specific for mobile device applications.
7
CONFIDENTIAL © 2012 Sia Partners
page
IT Risk Hot Topics
Cyber Attacks
Cyber Attacks
•
•
1
Cause
of Risk
•
•
•
•
•
•
2
Risk
Mitigation
•
•
•
•
•
Cyber attacks are increasingly more targeted to specific corporations.
Moving from simply making a point to wreaking financial havoc.
Advanced Persistent Threats (APTs) focus on hacking an individual employee rather than the
organization’s infrastructure.
Spear Phishing: hackers obtain a company email list in order to appear as a trusted source.
Example: RSA Spear Phishing Attack in 3/2011– Hackers sent phishing emails appearing to
come from a Recruitment website to employees of RSA.
Attachment in the email placed a malicious file on the employee’s computer, enabling
attackers to gain remote access to the company network and steal information regarding
RSA’s SecurID keyfob products.
Establish effective security patch and virus/malware patch procedures.
Review network security processes to ensure that sufficient restriction exists for access to
business critical applications (either internally or externally hosted).
Perform ongoing penetration testing.
Implement a Computer Emergency Response Team (CERT) process.
Ensure Security Administration (both new hires and existing personnel) have adequate
training.
Ensure that strong password and pin requirements are included and enforced in company
policies.
Evaluate practices used by Help Desk to reduce opportunities for social engineering attacks.
8
CONFIDENTIAL © 2012 Sia Partners
page
IT Risk Hot Topics
Data Leakage
Data Leakage
•
•
1
Cause
of Risk
•
•
•
•
•
•
•
•
•
2
Risk
Mitigation
•
•
•
•
•
Reliance on the Internet and emails to transfer and store data.
Wireless networks.
Mobile devices.
Storage sites.
Personal and unauthorized websites.
File transmission, FTP, Skype, etc.
Social networking.
USB ports/thumb drives.
Remote access controls.
Assess all possible data leakage channels within the IT environment.
Apply measures to reduce the unauthorized disclosure of sensitive data to secure the
environment.
Ensure effective data classification process exists for all company information.
Identify potential leakage channels.
Establish additional controls where possible based a data classification system.
Implement monitoring solutions to manage sensitive information.
Put in place an ongoing employee awareness program.
9
CONFIDENTIAL © 2012 Sia Partners
page
IT Risk Hot Topics
Vendor Management
Vendor Management
•
1
Increasing reliance on third-party vendors to perform many IT functions and services.
 Vendors and service providers are responsible for continuous operations of key
business IT processes and proper handling of sensitive data.
Prevalence of Cloud Services.
Service disruptions or Information Security breaches result in high financial or reputational
costs.
Cause
of Risk
•
•
•
2
Risk
Mitigation
•
•
•
Ensure that due diligence is conducted on vendors.
 Prior to engagement during the Contract Phase.
– Right to Audit, Security Monitoring.
 On a periodic (annual) basis.
Manage vendor relationships – enforce the adoption of internal controls by the vendor.
Monitor the vendor’s Information Security and data-handling procedures.
 Restrict access to critical production data and information processing systems.
Implement security monitoring solutions for vendor access to business sensitive data.
10
CONFIDENTIAL © 2012 Sia Partners
page
IT Risk Hot Topics
Disaster Recovery/Business Continuity Plans
Disaster Recovery/Business Continuity Plans
•
1
Cause
of Risk
•
•
•
•
•
2
Risk
Mitigation
•
Post-9/11, Business Continuity (BCP) and Disaster Recovery (DR) became highlighted areas
for regulatory examiners.
Regulators going beyond the idea of alternate sites to the requirement that enough critical
staff be available for principal trading applications, especially for “market makers.”
Increased use of vendors would require that DR/BCP plans include an appropriate level of
testing.
Include business continuity considerations into the overall design of the business model in
order to reduce the risk of service disruptions.
Ensure plans are robust, detailed, regularly updated, tested and approved by a bank’s
Executive Management.
Include areas such as pandemic crisis management, media communication, hardware
recovery and security measures.
Monitor and analyze the results of testing:
 Identify areas requiring special attention.
 Personnel that could benefit from additional training.
11
CONFIDENTIAL © 2012 Sia Partners
page
IT Risk Hot Topics
Data Privacy
Data Privacy
•
Differences in global data privacy regulations and standards:
United States
1
Cause
of Risk
•
US government has limited power to
protect citizens’ data privacy.
• Federal Trade Commission rarely takes
action against US companies for privacy
breaches; usually levies small fines.
•
If company has lawful access to data it
may use it, as long as it is not
prohibited (such as under GrammLeach-Bliley Act).
•
Importance of privacy policy /
statement: as long as a customer is
made aware of the policy when data is
collected and does not object, the
company can use it.
•
Patriot Act allows US officials to access
phone, email and financial information
without a warrant.
Europe
•
•
1995 EU Directive on Data Protection
Protects citizens' privacy and states
that permission is required by a
consumer for a company to use or
exchange personal data.
•
2012: EC proposed General Data
Protection Regulation, a draft update
of the Directive.
• Requires reporting a data breach
within 24 hours.
Asia
•
2011 marked a pivotal year in Asia
with the introduction of many data
protection regulations.
•
South Korea: Personal Information
Protection Act considered the most
stringent data privacy regulation globally.
May require companies to delete • Creates a Data Protection Commission.
consumer data if its retention is not • Mandates a Privacy Compliance Officer
for businesses.
justified.
• Requires data breach notification.
• Conforms data privacy rules across EU.
• Introduces Privacy Impact Assessments.
•
•
US companies would be heavily
penalized for releasing EU citizens’
personal data to US authorities (such
as by complying with National
Security Letters)
•
Hong Kong and the Philippines have
both recently passed significant data
privacy regulations.
• Review data protection control jurisdictions of business activities and verify their adherence to sovereign laws.
2
Risk
Mitigation
• Corroborate that policies support the segregation of company and personal information that might go cross-border.
• Review the security monitoring process, particularly the communication procedure in the event of a security breach.
• Verify that cloud and email storage infrastructure supports infrastructure requirements.
• Ensure that the DR solution is not in violation of regional standards.
CONFIDENTIAL © 2012 Sia Partners
12
page
IT Risk Program
How to Monitor & Control IT Risk
Designing and Implementing an IT Risk Program:
–Set up security controls
–Perform an annual independent IT Risk Assessment
–Conduct application security reviews
–Perform internal and external penetration tests
–Ensure security patches/malware patches are completed on a timely basis
–Maintain risk reporting that provides information on patching process (up-to-date)
–Verify that adequate number of Information Security personnel have adequate skillset
–Ensure existence of training program; up-to-date training of current employees
–Confirm that IS Policy allows for personal use on business devices and use of personal devices for
business purposes
13
CONFIDENTIAL © 2012 Sia Partners
page
IT Risk Program
IT Risk Assessment Methodology
Methodology and Process of an IT Risk Assessment:
•
Conduct in accordance with established industry and regulatory guidance (FFIEC, COBIT, etc., further discussed on slide 16).
In addition to the previously mentioned “Hot Topics” scope should include the following areas:
• Risk Management
• Information Security Administration
• Asset Management
• Human Resources Security
• Physical and Environmental Security
• Network, Communications & Operations Management
• Access Control
• Information Systems Acquisition, Development & Maintenance
• Incident Event & Communications Management
• Compliance
Risk Assessment Process Should Encompass:
• Review existing IT Risk related material in place
• Develop specific control tools (such as the RCM discussed on slide 15)
• Conduct interviews with key IT and IS personnel and management, as well as other relevant staff such as HR, Administration, Audit &
Compliance
IT Risk Assessment Enables Management to:
• Obtain a comprehensive and documented understanding of risks in the IT / IS operational environment
• Grasp the severity and level of urgency for each associated risk
• Appropriately and accordingly take measures to reduce risks in order of priority
• Ensure resources are deployed to address risks that have the most significant implications for the organization at that time
• Plan and budget for projects that mitigate IT / IS risk according to assessed risk and priorities with varying mandates and longevity
• Acknowledge and accept risks not considered by management to pose a significant threat
CONFIDENTIAL © 2012 Sia Partners
14
page
IT Risk Program
Risk Control Matrix
Risk Control Matrix (RCM) Tool:
•
•
•
•
•
•
Provides a qualitative assessment of the expected controls for each area of the IT environment.
Documents whether relevant control objectives are met.
Identifies open risk issues based on gaps between the required control and the control in place.
Categorizes issues based on a risk rating such as “High” “Medium” and “Low.” The determination of the risk rating is based
on the severity of the risk and the probability of its occurrence.
Determines and tracks management’s decision whether each flagged risk should be remediated, partially remediated,
accepted or a combination.
Prescribes recommendations on steps to address the risk deemed to need mitigation.
Sample RCM
Control Objective
& Associated Risks
Current or Planned Controls, Procedures
Other Risk Mitigating Factors
Residual Risk
Recommended Actions
D. Vendor Management
1.
1.
1.
1.
15
CONFIDENTIAL © 2012 Sia Partners
page
IT Risk Program
Guidance & Internal Audit’s Role
IT Risk Guidance
• FFIEC:
• Maintains and publishes 11 FFIEC Information Technology Examination Handbooks which outline examination
objectives and procedures for evaluating IT environments of financial institutions.
• Provides introductory, reference, and educational training material on specific topics of interest to field examiners
from the FFIEC member agencies.
• CobiT:
• IT governance framework established by ISACA, the former Information Systems Audit and Control Association;
• Shared Assessments:
• Evaluation program of security controls focusing on Information Technology and Information Security.
• Created by several major US Banks (JPMorgan Chase, Bank of America, Citigroup, BNY Mellon) in association with the
Big 4 accounting firms.
• ISO/IEC 27002:
• Standard aimed at Information Security, which was published jointly by the International Organization for
Standardization (ISO) and the International Electrotechnical Commission (IEC).
Role of Internal Audit
• Audit the IT/IS Control Program.
• IT Risk Assessment:
• Perform the IT Risk Assessment (if done in-house)
• Collaborate with external vendor firm to oversee performance of assessment.
16
CONFIDENTIAL © 2012 Sia Partners
page
IT Standards and Selective Article Links
• http://ithandbook.ffiec.gov/it-booklets.aspx
•http://www.isaca.org/Knowledge-Center/cobit/Pages/COBIT-Assessment-Programme.aspx
•http://www.nytimes.com/2012/06/11/technology/linkedin-breach-exposes-light-security-even-at-data-companies.html?pagewanted=2&_r=1&emc=eta1
• http://mobile.blogs.wsj.com/cio/2012/06/06/linkedin-password-breach-illustrates-endemic-security-issue/
•http://www.forbes.com/sites/anthonykosner/2012/06/30/amazon-cloud-goes-down-friday-night-taking-netflix-instagram-and-pinterest-with-it/
•http://www.forbes.com/sites/anthonykosner/2012/07/01/survey-of-effects-of-cloud-outage-shows-how-much-of-the-web-runs-on-amazon/
•http://www.wired.com/cloudline/2012/06/amazon-outage-pilot-error/
•http://www.forbes.com/sites/kellyclay/2012/06/30/aws-power-outage-questions-reliability-of-public-cloud/
•http://www.huffingtonpost.com/2012/07/02/amazon-power-outage-cloud-computing_n_1642700.html
•http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/
•http://mobile.eweek.com/c/a/Security/New-Android-Malware-Better-at-Targeting-Bank-Transactions-161221/
•http://www.nftc.org/default/Innovation/PromotingCrossBorderDataFlowsNFTC.pdf
•http://www.informationweek.com/security/attacks/sql-injection-hack-infects-1-million-web/232301355
•http://www.darkreading.com/database-security/167901020/security/attacks-breaches/232301285/latest-sql-injection-campaign-infects-1-million-webpages.html?itc=edit_stub
•http://www.wired.com/threatlevel/2011/08/how-rsa-got-hacked/
•http://www.informationweek.com/government/security/nsa-chief-china-behind-rsa-attacks/232700341
•http://blogs.rsa.com/rivner/anatomy-of-an-attack/
•https://www.bit9.com/blog/2011/03/18/rsa-and-the-apt-attack/
•http://www.msnbc.msn.com/id/15221111/ns/technology_and_science-privacy_lost/t/la-difference-stark-eu-us-privacy-laws/#.UFEG95afht0
•http://cyberlaw.stanford.edu/node/5544
•http://www.computing.co.uk/ctg/news/2162386/europe-s-protection-laws-cause-conflict-warn-legal-experts
•http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2120983
17
CONFIDENTIAL © 2012 Sia Partners
page
Contacts at Sia Partners US
Gus Moreno
Alexis Wyrofsky
IT Risk Specialist
Consultant
Sia Partners US
Sia Partners US
641 Lexington Ave.
Suite 1322
New York, NY 10022
Office :(212) 634-6325 – Cell: (917) 239-7549
Email: gus.moreno@sia-partners.com
641 Lexington Ave.
Suite 1322
New York, NY 10022
Office :(212) 634-6325 – Cell: (401) 862-1661
Email: alexis.wyrofsky@sia-partners.com
18
CONFIDENTIAL © 2012 Sia Partners
page
Download