SlideShare uma empresa Scribd logo
1 de 115
Office of Internal Audit (OIA) Board of Regents of the University System of Georgia June 8, 2009 Erwin (Chris) L. Carrow, IT Auditor,  CISSP, INFOSEC, CSSP, CCNP, OCM, plus a bunch of others (Who Cares?) The IT Auditing Process (Everything you don’t want to know about the impending IT Audit and are afraid to ask)
Schedule of Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda and Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What IT Auditors are Not! (Despite the Similar Resemblance) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Part I –OIA Background ( The Untold Story)
Why We Audit – Mission & Charter  ,[object Object],[object Object],[object Object]
Staff Background &  Organizational Structure
Audits Selection Process – Risk Assessment & Planning Process (The “Why Us Syndrome?”) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audit Plan – We ask the Question…, What  High Critical Risk  Exist? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audit Plan – The Focus on Risk The  High Critical Risk  that Exist
Audit Methodology & Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methodology & Scope of Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Standards of Application ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Evaluation Criteria - CMMI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Areas Commonly Reviewed  & Priority of Emphasis Information Technology Department (High) Auxiliaries (Low) Academic Units (Limited) Administrative  Units  (Medium)
Types of Audits – Federal, State, Campus, and Board of Regents ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policing the Process and Safe-Guarding What's Important Purchase the Family Trunk Monkey!
[object Object],[object Object]
The Process We Follow – From Notification to Final Report ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary of Audit Flow Timeframes Audit Letter with data request sent – preliminary assessment Entrance meeting & Audit field work Draft Report Sent Final Report with Responses issued 30 Days 30 Days 2 to 6 weeks Exit Conference with President Action items reviewed quarterly 3 to 5 weeks Draft with Responses Returned
Auditing by the Numbers (Fear -Factor)?
Audit: Application of Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Snapshot of Documentation Format ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Audit Finding Executive Summary ,[object Object],[object Object],[object Object],[object Object]
Sample Audit Finding Observations – High Level ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Audit Finding Observations – Low Level ,[object Object],[object Object],[object Object],[object Object]
Sample Audit Finding Criteria, Cause, Risk/Effect ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Audit Finding Recommendation / Response ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Report – Individual Finding Ratings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overall Report Ratings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audit Finding Follow-Up Process ,[object Object],[object Object],[object Object]
Snapshot of Evidence Gathering Process  (Typically Inductive to Deductive Approach)
What Does Evidence Look like? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
We Help Support the Process …,  We are Life Savers! Purchase the First-Aid Trunk Monkey!
Part III – The On-site Audit (Preliminaries, Logistics & Execution)
Part III – The On-site Audit Preliminaries
Sample Engagement Letter To Your Institution’s Leadership ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Engagement Letter Attachments Included ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Sample Audit Plan OIA Internal Use by the Auditors - Situation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Audit Plan OIA Internal Use by the Auditors – Other Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Audit Plan OIA Internal Use by the Auditors - Mission ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Audit Plan OIA Internal Use by the Auditors – Execution of Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Audit Plan OIA Internal Use by the Auditors – Execution of Audit ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Audit Plan OIA Internal Use by the Auditors – C3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Audit Plan OIA Internal Use by the Auditors – Safety ,[object Object],[object Object],[object Object],[object Object],[object Object]
With Your IT Auditor Around …,  You have no need to fear! Purchase the Karate Trunk Monkey!
[object Object]
Your Institution  - Audit Objectives (Sample of Business Logic and Associated Risk Areas – Understanding the Objective ) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Your Institution  - Plan of Action ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Your Institution  - Schedule of Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object]
[object Object],[object Object]
IT Challenges and Business Requirements   - Where are you at?  Can seem like  HERDING CATS ! EDS “Cat Herding”  1:07 minutes
IT Challenges and Business Requirements   - Where are you at?  Can seem like herding cats! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pitch Hit – Fingers in Dike 1# Where are you at?  Prioritizing the process   We Do Understand!
Pitch Hit – Fingers in Dike 2#  Real World – Real Problems We Are Concerned!
Pitch Hit – Fingers in Dike 3# Running out of Fingers? We Recognize the Challenge!
Know Yourself – Know Your Enemy!  The Art of War  ( Chinese :  孫 子 兵 法 ;  pinyin :  Sūn Zǐ Bīng Fǎ ) is a  Chinese   military   treatise  that was written during the  6th century BC  by  Sun Tzu .  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Making a Lose / Lose Situation …,  a Win / Win ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dealing with the Nuts The Old Way…!  Assessing Risk? 20 th  Century FOX “Ice Age”  1:55 min/sec
Nuts Can Be Challenging Business Process – Gathering and Storing NUTS and the Big Squeeze ,[object Object],[object Object],[object Object],[object Object],[object Object],20 th  Century FOX “Ice Age”
In Time, Nut Requirements Change The New Way …!  Risk Assessment? 20 th  Century FOX “Ice Age 2: The Meltdown”  55 sec
Different Nuts, Different Methods History has a Way of Repeating Itself! ,[object Object],[object Object],[object Object],[object Object],20 th  Century FOX “Ice Age 2: The Meltdown”
Making Peanut Butter Out of Nuts Moral:  Life is Always Going to Be a Little Squirrelly. ,[object Object],[object Object],[object Object],[object Object],20 th  Century FOX “Ice Age 2: The Meltdown”
A Business Function’s  - Rules and Practices ,[object Object],[object Object],[object Object],Control Objectives for Information and related Technology (COBIT®)
Business Requirements Objectives and Rules of Engagement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Resources New or Existing ,[object Object],[object Object],[object Object],[object Object],[object Object]
IT Processes Operational Considerations ,[object Object],[object Object],[object Object],[object Object]
Four Principles for Consideration Does a process exist or a means in place for…? ,[object Object],[object Object],[object Object],[object Object]
Four Principles for Consideration Possible Suggestions! ,[object Object],[object Object],[object Object],[object Object],Layer Change Management Operations Security Application Database Operating System Network Infrastructure
COBIT 4.01 – Business Rules, Requirements and Practices How Processes Are Evaluated?
Sample Key Process – Ecommerce e.g., One Card System Requirements? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Access Control ? Identity Management? Regulatory PCI Constrains and Requirements? Vendors ? Network Infrastructure and Security?
Example: One Card System –  Identity Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example: One Card System –  Identity Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example: One Card System –  Identity Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Business Impact Analysis (BIA) –  The ABC’s by the Numbers CISA Study Guide, SYBEX, 2006
Areas of Concern – BIA to Contingency Planning Principles of Information Security, Thompson, 2007
One Method of Service Support and Risk Assurance  Purchase the IT Trunk Monkey!
COBIT 4.01 – What Is It? Four Major Areas of Review ,[object Object],[object Object],[object Object],[object Object]
COBIT 4.01 – Narrowing the Scope Delivery and Support (DS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],13 Categories
DS5 Ensure Systems Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],11 Sub-Categories
DS5.3 Identity Management Goals and Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Logical Didactic Approach DS5.3 Identity Management (How it is Evaluated) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How We Measure Success?  Maturity Model – CMMI DS5 Snapshoot (Criteria) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COBIT 4.01 Standards to NIST Mapping –Integration with other Standards  (Alignment of IT Controls to Mitigate Risk)
NIST 800-53, Revision 1 Standards Terminology and Application
Sample Key Process – Ecommerce e.g., One Card System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COBIT 4.0-4.01 Available Mappings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object]
Birthing of a New Approach? Purchase the Birthing Trunk Monkey!
Entities Assessed During the Audit  Scope  of Application:  Areas of Emphasis (Entity or Process) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Users Involved in Business Functions and Types of System Information? (Provisioning of High Risk or Critical Information) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Following the Business Function Information from Origin to Destination ,[object Object],[object Object],[object Object],[object Object]
High level Simple Example Paradigm Shift – CAN YOU DO IT? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overall Audit Plan & Program: Summary of Situation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
High level Simple Example   Traditional Network Paradigm ,[object Object]
Management of User Space and Services -   Threat Controls ,[object Object],[object Object],[object Object],[object Object],Principles of Information Security, Thompson, 2007 Your Institution's Security Topology!
Management of User Space and Services -  Regulatory Compliance ,[object Object],CISA Study Guide, SYBEX, 2006 The LAW: We Are Not Exempt!
Management of User Space and Services Through Security Threat Gateways ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Your Institutions’  Business Function’s for … (the Audited Entities)  - What Rules and Practices Exist? ,[object Object],[object Object],[object Object],[object Object],Control Objectives for Information and related Technology (COBIT®)
Identity Management, Access Control, and Network Security  – Business Rules, Requirements and Practices Self-Evaluated? Do a Check-up If the  Vision  is  Unclear , the  Cost  is Always to  Much !
Management of User Space and Services Through Security Threat Gateways  – Sample User Survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SurveyMonkey.com  – free, easy, and effective
Management of User Space and Services Through Security Threat Gateways  – Sample User Services
Management of User Space and Services Through Security Threat Gateways  – Virtual Play Grounds Controls to Mitigate or Avoid Risk?
Management of User Space and Services Through Security Threat Gateways  – Identity Management Choke Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management of User Space and Services Through Security Threat Gateways  – Tactical Network Paradigm Shift ,[object Object],[object Object],[object Object],[object Object]
Management of User Space and Services Through Security Threat Gateways  – Keys of Success to Mitigate Risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary Overview of IT Audits ,[object Object],[object Object],[object Object],[object Object],[object Object]
Key Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Call to Action & Challenge “ Birds of a Feather, Flock Together” or “Life is For the Birds”  Be Different? PIXAR “For the Birds”  3:16 minutes
Where are you in the Process of Preparation for the Audit? Standing Alone …?  IT  Can Seem a Little Funny …,  BUT  IT  WILL WORK OUT! Moral:  “Don’t Drink the  Kool-Aid”   and Be  “Caught with Your  Shorts Down ” Possible Situation :  The Emperor has No Clothes -  Who is Going to Tell Him? Disclaimer: All  PUNS  are intended, and should not be held against the  Retarded Auditor or OIA
Discussion & Questions? Suggestion? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
Ram Srivastava
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
Guillermo Remache
 
Information Security
Information SecurityInformation Security
Information Security
chenpingling
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
Priyank Hada
 

Mais procurados (20)

IS audit checklist
IS audit checklistIS audit checklist
IS audit checklist
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
HITRUST Article
HITRUST ArticleHITRUST Article
HITRUST Article
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk management
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition Plan
 
Guide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information SystemsGuide for Applying The Risk Management Framework to Federal Information Systems
Guide for Applying The Risk Management Framework to Federal Information Systems
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
CISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | InfosectrainCISA Domain 4 Information Systems Operation | Infosectrain
CISA Domain 4 Information Systems Operation | Infosectrain
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
 
Information Security
Information SecurityInformation Security
Information Security
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 

Destaque

InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...
ecarrow
 
Why My E Identity Needs Protection
Why My E Identity Needs ProtectionWhy My E Identity Needs Protection
Why My E Identity Needs Protection
ecarrow
 

Destaque (7)

InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...InfoSec Technology Management of User Space and Services Through Security Thr...
InfoSec Technology Management of User Space and Services Through Security Thr...
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Oiac It Audit Wo Cartoons
Oiac It Audit Wo CartoonsOiac It Audit Wo Cartoons
Oiac It Audit Wo Cartoons
 
Why My E Identity Needs Protection
Why My E Identity Needs ProtectionWhy My E Identity Needs Protection
Why My E Identity Needs Protection
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Educause+V4
Educause+V4Educause+V4
Educause+V4
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
 

Semelhante a It Audit Expectations High Detail

Audit in Pharmacovigilance
Audit in PharmacovigilanceAudit in Pharmacovigilance
Audit in Pharmacovigilance
clarityeye
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Tammy Clark
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector
Nikhat Rasheed
 
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdf
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdfSyllabus CIISA ( Certified Internasional Information System Auditor ).pdf
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdf
Yoyo Sudaryo
 
Chap1 2007cisareviewcourse-090511232029-phpapp02
Chap1 2007cisareviewcourse-090511232029-phpapp02Chap1 2007cisareviewcourse-090511232029-phpapp02
Chap1 2007cisareviewcourse-090511232029-phpapp02
Waqas Ahmad
 

Semelhante a It Audit Expectations High Detail (20)

Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
 
Internal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality AuditsInternal Audit Best Practices for Safety, Environment, and Quality Audits
Internal Audit Best Practices for Safety, Environment, and Quality Audits
 
Audit in Pharmacovigilance
Audit in PharmacovigilanceAudit in Pharmacovigilance
Audit in Pharmacovigilance
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector
 
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdf
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdfSyllabus CIISA ( Certified Internasional Information System Auditor ).pdf
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdf
 
It management audits it management templates
It management audits   it management templatesIt management audits   it management templates
It management audits it management templates
 
Auditing
AuditingAuditing
Auditing
 
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT SystemsICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
CompTIA Security+.pptx
CompTIA Security+.pptxCompTIA Security+.pptx
CompTIA Security+.pptx
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security Baseline
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
 
Audit Report Model and Sample
Audit Report Model and SampleAudit Report Model and Sample
Audit Report Model and Sample
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Chap1 2007 Cisa Review Course
Chap1 2007 Cisa Review CourseChap1 2007 Cisa Review Course
Chap1 2007 Cisa Review Course
 
Chap1 2007cisareviewcourse-090511232029-phpapp02
Chap1 2007cisareviewcourse-090511232029-phpapp02Chap1 2007cisareviewcourse-090511232029-phpapp02
Chap1 2007cisareviewcourse-090511232029-phpapp02
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 

It Audit Expectations High Detail

  • 1. Office of Internal Audit (OIA) Board of Regents of the University System of Georgia June 8, 2009 Erwin (Chris) L. Carrow, IT Auditor, CISSP, INFOSEC, CSSP, CCNP, OCM, plus a bunch of others (Who Cares?) The IT Auditing Process (Everything you don’t want to know about the impending IT Audit and are afraid to ask)
  • 2.
  • 3.
  • 4.
  • 5. Part I –OIA Background ( The Untold Story)
  • 6.
  • 7. Staff Background & Organizational Structure
  • 8.
  • 9.
  • 10. Audit Plan – The Focus on Risk The High Critical Risk that Exist
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Areas Commonly Reviewed & Priority of Emphasis Information Technology Department (High) Auxiliaries (Low) Academic Units (Limited) Administrative Units (Medium)
  • 16.
  • 17. Policing the Process and Safe-Guarding What's Important Purchase the Family Trunk Monkey!
  • 18.
  • 19.
  • 20. Summary of Audit Flow Timeframes Audit Letter with data request sent – preliminary assessment Entrance meeting & Audit field work Draft Report Sent Final Report with Responses issued 30 Days 30 Days 2 to 6 weeks Exit Conference with President Action items reviewed quarterly 3 to 5 weeks Draft with Responses Returned
  • 21. Auditing by the Numbers (Fear -Factor)?
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Snapshot of Evidence Gathering Process (Typically Inductive to Deductive Approach)
  • 33.
  • 34. We Help Support the Process …, We are Life Savers! Purchase the First-Aid Trunk Monkey!
  • 35. Part III – The On-site Audit (Preliminaries, Logistics & Execution)
  • 36. Part III – The On-site Audit Preliminaries
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47. With Your IT Auditor Around …, You have no need to fear! Purchase the Karate Trunk Monkey!
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55. IT Challenges and Business Requirements - Where are you at? Can seem like HERDING CATS ! EDS “Cat Herding” 1:07 minutes
  • 56.
  • 57. Pitch Hit – Fingers in Dike 1# Where are you at? Prioritizing the process We Do Understand!
  • 58. Pitch Hit – Fingers in Dike 2# Real World – Real Problems We Are Concerned!
  • 59. Pitch Hit – Fingers in Dike 3# Running out of Fingers? We Recognize the Challenge!
  • 60.
  • 61.
  • 62. Dealing with the Nuts The Old Way…! Assessing Risk? 20 th Century FOX “Ice Age” 1:55 min/sec
  • 63.
  • 64. In Time, Nut Requirements Change The New Way …! Risk Assessment? 20 th Century FOX “Ice Age 2: The Meltdown” 55 sec
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73. COBIT 4.01 – Business Rules, Requirements and Practices How Processes Are Evaluated?
  • 74.
  • 75.
  • 76.
  • 77.
  • 78. Business Impact Analysis (BIA) – The ABC’s by the Numbers CISA Study Guide, SYBEX, 2006
  • 79. Areas of Concern – BIA to Contingency Planning Principles of Information Security, Thompson, 2007
  • 80. One Method of Service Support and Risk Assurance Purchase the IT Trunk Monkey!
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87. COBIT 4.01 Standards to NIST Mapping –Integration with other Standards (Alignment of IT Controls to Mitigate Risk)
  • 88. NIST 800-53, Revision 1 Standards Terminology and Application
  • 89.
  • 90.
  • 91.
  • 92.
  • 93. Birthing of a New Approach? Purchase the Birthing Trunk Monkey!
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104. Identity Management, Access Control, and Network Security – Business Rules, Requirements and Practices Self-Evaluated? Do a Check-up If the Vision is Unclear , the Cost is Always to Much !
  • 105.
  • 106. Management of User Space and Services Through Security Threat Gateways – Sample User Services
  • 107. Management of User Space and Services Through Security Threat Gateways – Virtual Play Grounds Controls to Mitigate or Avoid Risk?
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113. Call to Action & Challenge “ Birds of a Feather, Flock Together” or “Life is For the Birds” Be Different? PIXAR “For the Birds” 3:16 minutes
  • 114. Where are you in the Process of Preparation for the Audit? Standing Alone …? IT Can Seem a Little Funny …, BUT IT WILL WORK OUT! Moral: “Don’t Drink the Kool-Aid” and Be “Caught with Your Shorts Down ” Possible Situation : The Emperor has No Clothes - Who is Going to Tell Him? Disclaimer: All PUNS are intended, and should not be held against the Retarded Auditor or OIA
  • 115.