SlideShare uma empresa Scribd logo
1 de 44
TransformingLives. InventingtheFuture. www.iit.edu
I ELLINOIS T UINS TI T
OF TECHNOLOGY
ITM 578 1
The Information Security Audit
Ray Trygstad
ITM 478/578 / IT 478
Spring 2004
Information Technology & Management Programs
CenterforProfessional Development
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 2
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives:
Upon completion of this lesson the
student should be able to:
– Explain what an information security
audit is
– Explain the relationship of information
security policies to the audit process
– Describe how an information security
audit is conducted
– Discuss knowledge required for members
of an information security audit team
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 3
ILLINOIS INSTITUTE OF TECHNOLOGY
Introduction
 What is an Information Security Audit?
 A measure of how the confidentiality,
availability and integrity of an organization’s
information is protected and assured
 A systematic, measurable technical
assessment of how the organization's security
policy is employed at a specific site
 Part of the on-going process of defining and
maintaining effective security policies
– Many audits will involve everyone who uses
computer resources in the organization
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 4
ILLINOIS INSTITUTE OF TECHNOLOGY
General Methodology
Assess IT security controls which
include:
– General controls at the entity level
– General controls as they are applied to
the specific application(s) being examined
– Application controls, which are the
controls over input, processing, and
output of data associated with individual
applications
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 5
ILLINOIS INSTITUTE OF TECHNOLOGY
General Controls
 Policies and procedures that apply to all or a
large segment of an entity’s information systems
and help ensure their proper operation
 Examples of primary objectives for general
controls:
– Safeguard data
– Protect computer application programs
– Prevent unauthorized access to system software
– Ensure continued computer operations in case of
unexpected interruptions
 Effectiveness of general controls a significant
factor in determining effectiveness of application
controls
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 6
ILLINOIS INSTITUTE OF TECHNOLOGY
Relationship of Policy to General Controls
Security policies are a standardization
of security practices put in writing
– Employees must read & agree to them
– In many enterprises today, security
policies may informal or unwritten
•Informal/unwritten policies not legally
enforceable
Typically policies prescribe methods of
implementing general and application
controls
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 7
ILLINOIS INSTITUTE OF TECHNOLOGY
Nature & Extent of the Audit
Depends on audit objectives and other
factors
Factors to consider:
– Nature and complexity of the information
systems
– The control environment
– Particular accounts and applications
significant to the areas of interest
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 8
ILLINOIS INSTITUTE OF TECHNOLOGY
Audit Scope
 Audit objectives determine the scope of the
audit
 Scope determination factors
– Site business plan
– Type of data being protected
– Value/importance of data to the client
organization
– Previous security incidents
– Time available to complete the audit
– Talent/expertise/experience of the auditors
 Auditors & client must agree on scope prior
to the commencement of the actual audit
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 9
ILLINOIS INSTITUTE OF TECHNOLOGY
Audit Stages
Audit is conducted in four stages
– Planning Phase
– Internal Control Phase
– Testing Phase
– Reporting Phase
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 10
ILLINOIS INSTITUTE OF TECHNOLOGY
Planning Phase
 Auditor gains an understanding of information
system operations, controls and related risks
 In view of these risks reach tentatively conclusions
as to which controls are likely to be effective
 If controls are likely to be effective and are relevant
to audit objectives, the auditor will determine
nature and extent of audit work needed to confirm
tentative conclusions.
 If controls are not likely to be effective, auditor
must develop a sufficient understanding of related
control risks to
– (1) develop appropriate findings and related
recommendations for corrective action
– (2) determine the nature, timing, and extent of
substantive testing necessary
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 11
ILLINOIS INSTITUTE OF TECHNOLOGY
Pre-Audit Tasks
Review previous audits (baselining)
Assess site survey
– Asset inventory including technical
description of the system’s hosts
– Includes management and user
demographics
Administer security questionnaires
Review previous security incidents
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 12
ILLINOIS INSTITUTE OF TECHNOLOGY
Pre-Audit Tasks
Read and evaluate the most recent
risk assessment
Read and evaluate all policies &
procedures
Develop the Audit Plan
– Prepare audit checklists tailored for the
audit environment
Discuss audit objective and details
with the client, ensuring objectives are
understood and mutually agreed upon
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 13
ILLINOIS INSTITUTE OF TECHNOLOGY
Site Survey
May need to be completed by client
staff or may be prepared by a
member of the audit team based on
an existing asset inventory and other
information provided by the client
Should present auditors with a
complete picture of the information
technology environment of the client
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 14
ILLINOIS INSTITUTE OF TECHNOLOGY
Security Questionnaires
Self-assessment tools allowing client
staff—both IT professional staff and
end users—to measure knowledge of
and compliance with security controls
in place
Should be phrased in terms of
“ranking” (i.e. 1-5, 1-10 scales) as to
knowledge and compliance in specific
areas
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 15
ILLINOIS INSTITUTE OF TECHNOLOGY
Pre-Audit Audit Report
 If policies and procedures do not prescribe
adequate controls for the described risks,
auditors may need to:
– develop appropriate findings and related
recommendations for corrective action
– delay remaining portions of the audit until
appropriate corrections have been put in place
– prepare a preliminary Audit Report to facilitate
proper implementation of controls
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 16
ILLINOIS INSTITUTE OF TECHNOLOGY
Internal Control Phase
 Auditors obtain detailed information on
control policies, procedures, and objectives
 Perform tests of control activities
 First test general controls through a
combination of procedures, which may
include
– Observation
– Inquiry
– Inspection
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 17
ILLINOIS INSTITUTE OF TECHNOLOGY
Internal Control Phase
If these controls operate effectively,
auditors should then test & evaluate
effectiveness of general controls for
applications significant to the audit
If general controls are not operating
effectively, application-level controls
are generally not tested
(note: in the audits we conduct, we
will not be testing any application-
level controls…)
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 18
ILLINOIS INSTITUTE OF TECHNOLOGY
Application Level Testing
 As an example of application-level control
testing, auditors might test a system to
ensure
– data prepared for entry is complete, valid, and
reliable;
– data is converted to an automated form and
entered into the application accurately,
completely, and on time;
– data is processed by the application completely,
on time, and in accordance with established
requirements;
– output is protected from unauthorized
modification or damage and distributed in
accordance with prescribed policies
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 19
ILLINOIS INSTITUTE OF TECHNOLOGY
Application Level Testing
Auditors evaluate and test the
effectiveness of application controls
by
– observing the controls in operation
– examining related documentation
– discussing the controls with pertinent
personnel
– reperforming the control being tested
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 20
ILLINOIS INSTITUTE OF TECHNOLOGY
Testing Phase
 In the testing phase, substantive technical
testing is performed
 This may include
– Application security and integrity testing on
appropriate workstation & terminals
• Checking for patches and updates
– Network security testing through both passive
monitoring and active measures
– Restoration of backed-up material
– If conducted in concert with a broader audit (i.e.
a financial audit), auditors may be called upon to
assist financial auditors in identifying/selecting
computer-processed transactions for testing,
possibly using computer audit software
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 21
ILLINOIS INSTITUTE OF TECHNOLOGY
Site Visit
 Internal Control and Testing phases are
normally accomplished through a site visit
 Aim of auditors is to not to adversely affect
business transactions during the audit
 Auditors should conduct an entry briefing
where they outline the scope of the audit
and what they hope to accomplish
 Auditors should be thorough, fair and apply
consistent standards and procedures
throughout the audit
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 22
ILLINOIS INSTITUTE OF TECHNOLOGY
Site Visit
 During the visit, auditors may:
– Collect data about the physical security of
computer assets
– Perform interviews of site staff
– Perform network vulnerability assessments
– Perform operating system and application
security assessments & vulnerability testing
– Perform access controls assessment
– Other evaluations
 Auditors should follow their checklists,
but keep their eyes (and ears!) open for
unexpected problems
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 23
ILLINOIS INSTITUTE OF TECHNOLOGY
Key Audit Questions
 Remember, audits are principally concerned
with how security policies are actually
implemented
 Key questions to be answered:
– Are passwords difficult to crack?
• Are they on post-it notes on the monitor or inside the
desk’s top drawer?
– Are there access control lists (ACLs) in place on
network devices to control who has access to
shared data?
– Are there audit logs to record who accesses data?
– Are the audit logs reviewed?
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 24
ILLINOIS INSTITUTE OF TECHNOLOGY
Key Audit Questions (continued)
– Are the security settings for operating systems in
accordance with accepted industry security
practices?
– Have all unnecessary applications and computer
services been eliminated for each system?
– Are these operating systems and commercial
applications patched to current levels?
– How is backup media stored? Who has access to
it? Is it up-to-date?
– Is there a disaster recovery plan? Have the
participants and stakeholders ever rehearsed the
disaster recovery plan?
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 25
ILLINOIS INSTITUTE OF TECHNOLOGY
Key Audit Questions (continued)
– Are there adequate cryptographic tools in place
to govern data encryption, and have these tools
been properly configured?
– Have custom-built applications been written
with security in mind?
– How have these custom applications been tested
for security flaws?
– How are configuration and code changes
documented at every level? How are these
records reviewed and who conducts the review?
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 26
ILLINOIS INSTITUTE OF TECHNOLOGY
Audit Checklists
Audits are conducted by checklist
Checklists are widely available but
should be tailored for each audit by
the audit team
Checklists may be challenge-
response (i.e. check-in-the-box or
yes-or-no answers) or they may be
scale rankings (1-4, 1-5, 1-10, etc.)
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 27
ILLINOIS INSTITUTE OF TECHNOLOGY
Sample Audit Checklist
General IT Controls
Audit Program
Purpose / Scope
Perform a General Controls review of Information Technology (IT). The reviews will include all IT related policies, procedures,
data security administration, data center operations, system development / maintenance, the IT Disaster / Recovery plan and its
relation to the corporate Business Continuity plan.
Audit steps Date Initials W/P Ref.
IT General Controls
Planning
Determine if committees review, approve, and report to the board on:
Short and long term information systems plans
IT operating standards
Data security policies and procedures
Resource allocation (major hardware/software acquisition and project priorities)
Status of major projects
IT budgets and current operating cost
Policies, Standards, and Procedures
Determine whether the board of directors has reviewed and approved IT policies.
Examine how IT management has defined standards and adopted a methodology
governing the process of developing, acquiring, implementing, and maintaining information
systems and related technology.
Determine if IT management has adequate standards and procedures for:
Systems development
Program change control
Data Center operations
Data Base administration
DASD management
Performance monitoring
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 28
ILLINOIS INSTITUTE OF TECHNOLOGY
Exit Briefing
 Ensure management is made aware of any
problems requiring immediate attention or
correction
 Answer questions in a very general manner
so as not to create a false impression of the
audit’s outcome
– At this stage auditors are not in a position to
provide definitive answers
– Final answers can only be provided following the
final analysis of the audit data
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 29
ILLINOIS INSTITUTE OF TECHNOLOGY
Reporting Phase
Back at the ranch, auditors will review
and analyze checklist data and analyze
any data discovered through use of
vulnerability assessment tools
There should be an initial meeting to
help focus the outcome of the audit
results
– Auditors should identify problem areas
and possible solutions
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 30
ILLINOIS INSTITUTE OF TECHNOLOGY
Writing the Audit Report
 The Audit Report may be prepared in a
number of formats
 Keep it simple and direct, containing
concrete findings with measurable ways to
correct identified deficiencies
 Typical format
– Executive summary
– Detailed findings
– Supporting data (checklists, scan reports etc.)
should be included as report appendices
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 31
ILLINOIS INSTITUTE OF TECHNOLOGY
Writing the Audit Report
 Develop executive summary first as it may
be necessary to report to management
before details are done
 Include an audit summary which may
emphasize the positive findings of the audit
 Organize audit findings in a simple and
logical manner with a half-page or full page
for each identified problem
 Each problem entry should outline the
problem, discuss implications and describe
appropriate corrective actions
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 32
ILLINOIS INSTITUTE OF TECHNOLOGY
The Audit Report
 Describe information security control weaknesses
clearly in terms understandable to those with
limited knowledge of information system issues
 Define all technical terms and avoid jargon and
acronyms
 Discuss each weakness in terms of
– related criteria
– the condition identified
– the cause of the weakness
– actual or potential impact on the organization
– appropriate corrective action
 This helps senior management to understand the
significance of the problem and to ensure
development of appropriate corrective actions
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 33
ILLINOIS INSTITUTE OF TECHNOLOGY
Technical Reporting
Weaknesses reported to technical staff
should be the same as that reported to
senior management but should include
necessary technical detail to allow the
staff
– to understand the precise cause of the
weaknesses
– to aid them in developing corrective
actions
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 34
ILLINOIS INSTITUTE OF TECHNOLOGY
Report Timeliness & Follow-Up
Prepare the Audit Report as quickly as
accuracy allows so that site staff can
correct problems identified
Auditors may be called upon to assist
technical staff in implementation of
appropriate controls and solutions
Management should follow-up until all
identified deficiencies are corrected
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 35
ILLINOIS INSTITUTE OF TECHNOLOGY
Typical Problems Identified in Audits
 Lack of formal IT planning mechanisms
with the result that IT does not serve the
organizations’s pressing needs or does not
do so in a timely and secure manner
 Lack of formal security policies resulting in
a piecemeal or “after-an-incident” approach
to security
 Inadequate program change control leaving
software vulnerable to unauthorized
changes
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 36
ILLINOIS INSTITUTE OF TECHNOLOGY
Typical Problems Identified in Audits
 Little or no awareness of key security issues
and inadequate technical staff to address the
issues
 Failure to take advantage of security soft-
ware features such as selective monitoring
capabilities, enforcement of stringent pass-
word rules, & review of key security reports
 Inadequate user involvement in testing and
sign-off for new applications resulting in
systems that fail to meet user requirements
or confidentiality, integrity, and availability
needs
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 37
ILLINOIS INSTITUTE OF TECHNOLOGY
Typical Problems Identified in Audits
 Installation of software or upgrades without
adequate attention to default configurations
or default passwords
 Virus definitions not kept up-to-date
 Inadequate continuity of operation plans
 Failure to formally assign security
administration responsibilities to staff who
are technically competent, independent, and
report to senior management
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 38
ILLINOIS INSTITUTE OF TECHNOLOGY
Typical Problems Identified in Audits
Lack of user awareness
Unnecessarily high access rights
Lack of or inadequate plans for
– An information security management
program
– Physical and logical access controls
– Software change controls
– Segregated duties
– Continuity of business
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 39
ILLINOIS INSTITUTE OF TECHNOLOGY
What Should Auditors Know?
 Generally accepted accounting practices state “staff
assigned to conduct the audit should collectively
possess adequate professional proficiency for the
tasks required.”
– This includes computer skills and security knowledge for
IS audits
 Although each member of an audit team need not
have all attributes, the team must collectively
possess the requisite attributes to be able to
– Adequately plan the audit
– Assess computer-related controls
– Test the controls
– Determine the effect on the overall audit plan
– Develop findings and recommendations
– Report the results
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 40
ILLINOIS INSTITUTE OF TECHNOLOGY
What Should Auditors Know?
 Applicable knowledge is laid out well in the
National State Auditors Association/GAO
Management Planning Guide for
Information Systems Security Auditing
(table on next 2 slides)
 Typical knowledge/skill set includes
– Technical competency
– Knowledge and understanding of information
security and privacy requirements and best
practices
– (see the tables)
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 41
ILLINOIS INSTITUTE OF TECHNOLOGY
Knowledge, Skills, and Abilities
Audit Objective Associated knowledge, skills, and abilities forIS Security Audit Areas
Organizationwide security
program planning and
management
Knowledge of applicable legislative requirements for a security program
Knowledge of the sensitivity of data and the risk management process through risk assessment and risk
mitigation
Knowledge of the risks associated with a deficient security program
Knowledge of the elements of a good security program
Ability to analyze and evaluate an organization’s security policies and procedures and identify their
strengths and weaknesses
Access control Knowledge across platforms of the access paths into computer systems and of the functions of
associated hardware and software providing an access path
Knowledge of access level privileges granted to users and the technology used to provide and control
them
Knowledge of the procedures, tools, and techniques that provide for good physical, technical, and
administrative controls over access
Knowledge of the risks associated with inadequate access controls
Ability to analyze and evaluate an organization’s access controls and identify the strengths and
weaknesses
Skills to review security software reports and identify access control weaknesses
Skills to perform penetration testing of the organization’s applications and supporting computer systems
Application software
development and change
control
Knowledge of the concept of a system life cycle and of the System Development Life Cycle (SDLC)
process
Knowledge of the auditor’s role during system development and of federal guidelines for designing
controls into systems during development
Knowledge of the procedures, tools, and techniques that provide control over application software
development and modification
Knowledge of the risks associated with the development and modification of application software
Ability to analyze and evaluate the organization’s methodology and procedures for system development
and modification and identify the strengths and weaknesses
Adapted from “Knowledge, Skills, and Abilities for IS Security Audit Areas by FISCAM Objective” from
National State Auditors Association/GAO Manag e m e nt Pla nning G uide fo r Info rm atio n Syste m s Se curity Auditing , 2001
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 42
ILLINOIS INSTITUTE OF TECHNOLOGY
Knowledge, Skills, and Abilities
Audit Objective Associated knowledge, skills, and abilities forIS Security Audit Areas
System software Knowledge of the different types of system software and their functions
Knowledge of the risks associated with system software
Knowledge of the procedures, tools, and techniques that provide control over the implementation,
modification, and use of system software
Ability to analyze and evaluate an organization’s system software controls and identify the strengths and
weaknesses
Skills to use software products to review system software integrity
Segregation of duties Knowledge of the different functions involved with information systems and data processing and
incompatible duties associated with these functions
Knowledge of the risks associated with inadequate segregation of duties
Ability to analyze and evaluate an organization’s organizational structure and segregation of duties and
identify the strengths and weaknesses
Business continuity Knowledge of the procedures, tools, and techniques that provide for business continuity
Knowledge of the risks that exist when measures are not taken to provide for business continuity
Ability to analyze and evaluate an organization’s program and plans for business continuity and identify
the strengths and weaknesses
Application controls Knowledge about the practices, procedures, and techniques that provide for the authorization,
completeness, and accuracy of application data
Knowledge of typical applications in each business transaction cycle
Ability to analyze and evaluate an organization’s application controls and identify the strengths and
weaknesses
Skills to use a generalized audit software package to conduct data analyses and tests of application
data, and to plan, extract, and evaluate data samples
Adapted from “Knowledge, Skills, and Abilities for IS Security Audit Areas by FISCAM Objective” from
National State Auditors Association/GAO Manag e m e nt Pla nning G uide fo r Info rm atio n Syste m s Se curity Auditing , 2001
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 43
ILLINOIS INSTITUTE OF TECHNOLOGY
Our Audits
Pre-Audit
– Policy Review
– Administer any questionnaires
– Plan the Audit
•Create audit checklists
•Arrange site visit
Site Visit
– Entry briefing but probably no exit briefing
Prepare Report
Deliver Report
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 44
ILLINOIS INSTITUTE OF TECHNOLOGY
The End…
Questions?
Discussion!

Mais conteúdo relacionado

Mais procurados

Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsKarthikeyan Dhayalan
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP CertificationSam Bowne
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 

Mais procurados (20)

Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Information security
Information securityInformation security
Information security
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 

Destaque

Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behaviorDhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management iDhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information managementDhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and recordsDhani Ahmad
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Beni Krisbiantoro
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 
Strategic planning
Strategic planningStrategic planning
Strategic planningDhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islamDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 

Destaque (20)

Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
The need for security
The need for securityThe need for security
The need for security
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Secure
SecureSecure
Secure
 
Physical security
Physical securityPhysical security
Physical security
 
Information system
Information systemInformation system
Information system
 
Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02
 
Database - Design & Implementation - 1
Database - Design & Implementation - 1Database - Design & Implementation - 1
Database - Design & Implementation - 1
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
Database design
Database designDatabase design
Database design
 
Information resource management
Information resource managementInformation resource management
Information resource management
 

Semelhante a The information security audit

Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effortDhani Ahmad
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptxHardikKundra
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
Pwc systems-implementation-lessons-learned
Pwc systems-implementation-lessons-learnedPwc systems-implementation-lessons-learned
Pwc systems-implementation-lessons-learnedAvi Kumar
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrainInfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSShivamSharma909
 
Cyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptxCyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptxkoushikDutta62
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Donald E. Hester
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal ControlsBharath Rao
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxJoshJaro
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxAzra'ee Mamat
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Auditing Systems Development
Auditing Systems DevelopmentAuditing Systems Development
Auditing Systems Developmentessbaih
 

Semelhante a The information security audit (20)

Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Practical IT auditing
Practical IT auditingPractical IT auditing
Practical IT auditing
 
Pwc systems-implementation-lessons-learned
Pwc systems-implementation-lessons-learnedPwc systems-implementation-lessons-learned
Pwc systems-implementation-lessons-learned
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
Cyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptxCyber Security_Consultant_Nial Lande.pptx
Cyber Security_Consultant_Nial Lande.pptx
 
Ict governance
Ict governanceIct governance
Ict governance
 
Compliance
ComplianceCompliance
Compliance
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
Khas bank isms 3 s
Khas bank isms 3 sKhas bank isms 3 s
Khas bank isms 3 s
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Auditing Systems Development
Auditing Systems DevelopmentAuditing Systems Development
Auditing Systems Development
 

Mais de Dhani Ahmad

Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planningDhani Ahmad
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuityDhani Ahmad
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentationsDhani Ahmad
 
Topic 11 data management
Topic 11   data managementTopic 11   data management
Topic 11 data managementDhani Ahmad
 
Topic 10 sample designs & procedures
Topic 10   sample designs & proceduresTopic 10   sample designs & procedures
Topic 10 sample designs & proceduresDhani Ahmad
 
Topic 9 secondary data sources
Topic 9   secondary data sourcesTopic 9   secondary data sources
Topic 9 secondary data sourcesDhani Ahmad
 
Topic 8 questionnaire design
Topic 8   questionnaire designTopic 8   questionnaire design
Topic 8 questionnaire designDhani Ahmad
 
Topic 7 measurement in research
Topic 7   measurement in researchTopic 7   measurement in research
Topic 7 measurement in researchDhani Ahmad
 

Mais de Dhani Ahmad (11)

Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Implementing security
Implementing securityImplementing security
Implementing security
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentations
 
Topic 11 data management
Topic 11   data managementTopic 11   data management
Topic 11 data management
 
Topic 10 sample designs & procedures
Topic 10   sample designs & proceduresTopic 10   sample designs & procedures
Topic 10 sample designs & procedures
 
Topic 9 secondary data sources
Topic 9   secondary data sourcesTopic 9   secondary data sources
Topic 9 secondary data sources
 
Topic 8 questionnaire design
Topic 8   questionnaire designTopic 8   questionnaire design
Topic 8 questionnaire design
 
Topic 7 measurement in research
Topic 7   measurement in researchTopic 7   measurement in research
Topic 7 measurement in research
 

Último

CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 

Último (20)

CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 

The information security audit

  • 1. TransformingLives. InventingtheFuture. www.iit.edu I ELLINOIS T UINS TI T OF TECHNOLOGY ITM 578 1 The Information Security Audit Ray Trygstad ITM 478/578 / IT 478 Spring 2004 Information Technology & Management Programs CenterforProfessional Development
  • 2. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 2 ILLINOIS INSTITUTE OF TECHNOLOGY Learning Objectives: Upon completion of this lesson the student should be able to: – Explain what an information security audit is – Explain the relationship of information security policies to the audit process – Describe how an information security audit is conducted – Discuss knowledge required for members of an information security audit team
  • 3. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 3 ILLINOIS INSTITUTE OF TECHNOLOGY Introduction  What is an Information Security Audit?  A measure of how the confidentiality, availability and integrity of an organization’s information is protected and assured  A systematic, measurable technical assessment of how the organization's security policy is employed at a specific site  Part of the on-going process of defining and maintaining effective security policies – Many audits will involve everyone who uses computer resources in the organization
  • 4. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 4 ILLINOIS INSTITUTE OF TECHNOLOGY General Methodology Assess IT security controls which include: – General controls at the entity level – General controls as they are applied to the specific application(s) being examined – Application controls, which are the controls over input, processing, and output of data associated with individual applications
  • 5. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 5 ILLINOIS INSTITUTE OF TECHNOLOGY General Controls  Policies and procedures that apply to all or a large segment of an entity’s information systems and help ensure their proper operation  Examples of primary objectives for general controls: – Safeguard data – Protect computer application programs – Prevent unauthorized access to system software – Ensure continued computer operations in case of unexpected interruptions  Effectiveness of general controls a significant factor in determining effectiveness of application controls
  • 6. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 6 ILLINOIS INSTITUTE OF TECHNOLOGY Relationship of Policy to General Controls Security policies are a standardization of security practices put in writing – Employees must read & agree to them – In many enterprises today, security policies may informal or unwritten •Informal/unwritten policies not legally enforceable Typically policies prescribe methods of implementing general and application controls
  • 7. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 7 ILLINOIS INSTITUTE OF TECHNOLOGY Nature & Extent of the Audit Depends on audit objectives and other factors Factors to consider: – Nature and complexity of the information systems – The control environment – Particular accounts and applications significant to the areas of interest
  • 8. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 8 ILLINOIS INSTITUTE OF TECHNOLOGY Audit Scope  Audit objectives determine the scope of the audit  Scope determination factors – Site business plan – Type of data being protected – Value/importance of data to the client organization – Previous security incidents – Time available to complete the audit – Talent/expertise/experience of the auditors  Auditors & client must agree on scope prior to the commencement of the actual audit
  • 9. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 9 ILLINOIS INSTITUTE OF TECHNOLOGY Audit Stages Audit is conducted in four stages – Planning Phase – Internal Control Phase – Testing Phase – Reporting Phase
  • 10. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 10 ILLINOIS INSTITUTE OF TECHNOLOGY Planning Phase  Auditor gains an understanding of information system operations, controls and related risks  In view of these risks reach tentatively conclusions as to which controls are likely to be effective  If controls are likely to be effective and are relevant to audit objectives, the auditor will determine nature and extent of audit work needed to confirm tentative conclusions.  If controls are not likely to be effective, auditor must develop a sufficient understanding of related control risks to – (1) develop appropriate findings and related recommendations for corrective action – (2) determine the nature, timing, and extent of substantive testing necessary
  • 11. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 11 ILLINOIS INSTITUTE OF TECHNOLOGY Pre-Audit Tasks Review previous audits (baselining) Assess site survey – Asset inventory including technical description of the system’s hosts – Includes management and user demographics Administer security questionnaires Review previous security incidents
  • 12. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 12 ILLINOIS INSTITUTE OF TECHNOLOGY Pre-Audit Tasks Read and evaluate the most recent risk assessment Read and evaluate all policies & procedures Develop the Audit Plan – Prepare audit checklists tailored for the audit environment Discuss audit objective and details with the client, ensuring objectives are understood and mutually agreed upon
  • 13. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 13 ILLINOIS INSTITUTE OF TECHNOLOGY Site Survey May need to be completed by client staff or may be prepared by a member of the audit team based on an existing asset inventory and other information provided by the client Should present auditors with a complete picture of the information technology environment of the client
  • 14. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 14 ILLINOIS INSTITUTE OF TECHNOLOGY Security Questionnaires Self-assessment tools allowing client staff—both IT professional staff and end users—to measure knowledge of and compliance with security controls in place Should be phrased in terms of “ranking” (i.e. 1-5, 1-10 scales) as to knowledge and compliance in specific areas
  • 15. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 15 ILLINOIS INSTITUTE OF TECHNOLOGY Pre-Audit Audit Report  If policies and procedures do not prescribe adequate controls for the described risks, auditors may need to: – develop appropriate findings and related recommendations for corrective action – delay remaining portions of the audit until appropriate corrections have been put in place – prepare a preliminary Audit Report to facilitate proper implementation of controls
  • 16. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 16 ILLINOIS INSTITUTE OF TECHNOLOGY Internal Control Phase  Auditors obtain detailed information on control policies, procedures, and objectives  Perform tests of control activities  First test general controls through a combination of procedures, which may include – Observation – Inquiry – Inspection
  • 17. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 17 ILLINOIS INSTITUTE OF TECHNOLOGY Internal Control Phase If these controls operate effectively, auditors should then test & evaluate effectiveness of general controls for applications significant to the audit If general controls are not operating effectively, application-level controls are generally not tested (note: in the audits we conduct, we will not be testing any application- level controls…)
  • 18. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 18 ILLINOIS INSTITUTE OF TECHNOLOGY Application Level Testing  As an example of application-level control testing, auditors might test a system to ensure – data prepared for entry is complete, valid, and reliable; – data is converted to an automated form and entered into the application accurately, completely, and on time; – data is processed by the application completely, on time, and in accordance with established requirements; – output is protected from unauthorized modification or damage and distributed in accordance with prescribed policies
  • 19. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 19 ILLINOIS INSTITUTE OF TECHNOLOGY Application Level Testing Auditors evaluate and test the effectiveness of application controls by – observing the controls in operation – examining related documentation – discussing the controls with pertinent personnel – reperforming the control being tested
  • 20. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 20 ILLINOIS INSTITUTE OF TECHNOLOGY Testing Phase  In the testing phase, substantive technical testing is performed  This may include – Application security and integrity testing on appropriate workstation & terminals • Checking for patches and updates – Network security testing through both passive monitoring and active measures – Restoration of backed-up material – If conducted in concert with a broader audit (i.e. a financial audit), auditors may be called upon to assist financial auditors in identifying/selecting computer-processed transactions for testing, possibly using computer audit software
  • 21. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 21 ILLINOIS INSTITUTE OF TECHNOLOGY Site Visit  Internal Control and Testing phases are normally accomplished through a site visit  Aim of auditors is to not to adversely affect business transactions during the audit  Auditors should conduct an entry briefing where they outline the scope of the audit and what they hope to accomplish  Auditors should be thorough, fair and apply consistent standards and procedures throughout the audit
  • 22. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 22 ILLINOIS INSTITUTE OF TECHNOLOGY Site Visit  During the visit, auditors may: – Collect data about the physical security of computer assets – Perform interviews of site staff – Perform network vulnerability assessments – Perform operating system and application security assessments & vulnerability testing – Perform access controls assessment – Other evaluations  Auditors should follow their checklists, but keep their eyes (and ears!) open for unexpected problems
  • 23. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 23 ILLINOIS INSTITUTE OF TECHNOLOGY Key Audit Questions  Remember, audits are principally concerned with how security policies are actually implemented  Key questions to be answered: – Are passwords difficult to crack? • Are they on post-it notes on the monitor or inside the desk’s top drawer? – Are there access control lists (ACLs) in place on network devices to control who has access to shared data? – Are there audit logs to record who accesses data? – Are the audit logs reviewed?
  • 24. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 24 ILLINOIS INSTITUTE OF TECHNOLOGY Key Audit Questions (continued) – Are the security settings for operating systems in accordance with accepted industry security practices? – Have all unnecessary applications and computer services been eliminated for each system? – Are these operating systems and commercial applications patched to current levels? – How is backup media stored? Who has access to it? Is it up-to-date? – Is there a disaster recovery plan? Have the participants and stakeholders ever rehearsed the disaster recovery plan?
  • 25. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 25 ILLINOIS INSTITUTE OF TECHNOLOGY Key Audit Questions (continued) – Are there adequate cryptographic tools in place to govern data encryption, and have these tools been properly configured? – Have custom-built applications been written with security in mind? – How have these custom applications been tested for security flaws? – How are configuration and code changes documented at every level? How are these records reviewed and who conducts the review?
  • 26. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 26 ILLINOIS INSTITUTE OF TECHNOLOGY Audit Checklists Audits are conducted by checklist Checklists are widely available but should be tailored for each audit by the audit team Checklists may be challenge- response (i.e. check-in-the-box or yes-or-no answers) or they may be scale rankings (1-4, 1-5, 1-10, etc.)
  • 27. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 27 ILLINOIS INSTITUTE OF TECHNOLOGY Sample Audit Checklist General IT Controls Audit Program Purpose / Scope Perform a General Controls review of Information Technology (IT). The reviews will include all IT related policies, procedures, data security administration, data center operations, system development / maintenance, the IT Disaster / Recovery plan and its relation to the corporate Business Continuity plan. Audit steps Date Initials W/P Ref. IT General Controls Planning Determine if committees review, approve, and report to the board on: Short and long term information systems plans IT operating standards Data security policies and procedures Resource allocation (major hardware/software acquisition and project priorities) Status of major projects IT budgets and current operating cost Policies, Standards, and Procedures Determine whether the board of directors has reviewed and approved IT policies. Examine how IT management has defined standards and adopted a methodology governing the process of developing, acquiring, implementing, and maintaining information systems and related technology. Determine if IT management has adequate standards and procedures for: Systems development Program change control Data Center operations Data Base administration DASD management Performance monitoring
  • 28. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 28 ILLINOIS INSTITUTE OF TECHNOLOGY Exit Briefing  Ensure management is made aware of any problems requiring immediate attention or correction  Answer questions in a very general manner so as not to create a false impression of the audit’s outcome – At this stage auditors are not in a position to provide definitive answers – Final answers can only be provided following the final analysis of the audit data
  • 29. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 29 ILLINOIS INSTITUTE OF TECHNOLOGY Reporting Phase Back at the ranch, auditors will review and analyze checklist data and analyze any data discovered through use of vulnerability assessment tools There should be an initial meeting to help focus the outcome of the audit results – Auditors should identify problem areas and possible solutions
  • 30. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 30 ILLINOIS INSTITUTE OF TECHNOLOGY Writing the Audit Report  The Audit Report may be prepared in a number of formats  Keep it simple and direct, containing concrete findings with measurable ways to correct identified deficiencies  Typical format – Executive summary – Detailed findings – Supporting data (checklists, scan reports etc.) should be included as report appendices
  • 31. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 31 ILLINOIS INSTITUTE OF TECHNOLOGY Writing the Audit Report  Develop executive summary first as it may be necessary to report to management before details are done  Include an audit summary which may emphasize the positive findings of the audit  Organize audit findings in a simple and logical manner with a half-page or full page for each identified problem  Each problem entry should outline the problem, discuss implications and describe appropriate corrective actions
  • 32. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 32 ILLINOIS INSTITUTE OF TECHNOLOGY The Audit Report  Describe information security control weaknesses clearly in terms understandable to those with limited knowledge of information system issues  Define all technical terms and avoid jargon and acronyms  Discuss each weakness in terms of – related criteria – the condition identified – the cause of the weakness – actual or potential impact on the organization – appropriate corrective action  This helps senior management to understand the significance of the problem and to ensure development of appropriate corrective actions
  • 33. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 33 ILLINOIS INSTITUTE OF TECHNOLOGY Technical Reporting Weaknesses reported to technical staff should be the same as that reported to senior management but should include necessary technical detail to allow the staff – to understand the precise cause of the weaknesses – to aid them in developing corrective actions
  • 34. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 34 ILLINOIS INSTITUTE OF TECHNOLOGY Report Timeliness & Follow-Up Prepare the Audit Report as quickly as accuracy allows so that site staff can correct problems identified Auditors may be called upon to assist technical staff in implementation of appropriate controls and solutions Management should follow-up until all identified deficiencies are corrected
  • 35. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 35 ILLINOIS INSTITUTE OF TECHNOLOGY Typical Problems Identified in Audits  Lack of formal IT planning mechanisms with the result that IT does not serve the organizations’s pressing needs or does not do so in a timely and secure manner  Lack of formal security policies resulting in a piecemeal or “after-an-incident” approach to security  Inadequate program change control leaving software vulnerable to unauthorized changes
  • 36. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 36 ILLINOIS INSTITUTE OF TECHNOLOGY Typical Problems Identified in Audits  Little or no awareness of key security issues and inadequate technical staff to address the issues  Failure to take advantage of security soft- ware features such as selective monitoring capabilities, enforcement of stringent pass- word rules, & review of key security reports  Inadequate user involvement in testing and sign-off for new applications resulting in systems that fail to meet user requirements or confidentiality, integrity, and availability needs
  • 37. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 37 ILLINOIS INSTITUTE OF TECHNOLOGY Typical Problems Identified in Audits  Installation of software or upgrades without adequate attention to default configurations or default passwords  Virus definitions not kept up-to-date  Inadequate continuity of operation plans  Failure to formally assign security administration responsibilities to staff who are technically competent, independent, and report to senior management
  • 38. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 38 ILLINOIS INSTITUTE OF TECHNOLOGY Typical Problems Identified in Audits Lack of user awareness Unnecessarily high access rights Lack of or inadequate plans for – An information security management program – Physical and logical access controls – Software change controls – Segregated duties – Continuity of business
  • 39. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 39 ILLINOIS INSTITUTE OF TECHNOLOGY What Should Auditors Know?  Generally accepted accounting practices state “staff assigned to conduct the audit should collectively possess adequate professional proficiency for the tasks required.” – This includes computer skills and security knowledge for IS audits  Although each member of an audit team need not have all attributes, the team must collectively possess the requisite attributes to be able to – Adequately plan the audit – Assess computer-related controls – Test the controls – Determine the effect on the overall audit plan – Develop findings and recommendations – Report the results
  • 40. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 40 ILLINOIS INSTITUTE OF TECHNOLOGY What Should Auditors Know?  Applicable knowledge is laid out well in the National State Auditors Association/GAO Management Planning Guide for Information Systems Security Auditing (table on next 2 slides)  Typical knowledge/skill set includes – Technical competency – Knowledge and understanding of information security and privacy requirements and best practices – (see the tables)
  • 41. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 41 ILLINOIS INSTITUTE OF TECHNOLOGY Knowledge, Skills, and Abilities Audit Objective Associated knowledge, skills, and abilities forIS Security Audit Areas Organizationwide security program planning and management Knowledge of applicable legislative requirements for a security program Knowledge of the sensitivity of data and the risk management process through risk assessment and risk mitigation Knowledge of the risks associated with a deficient security program Knowledge of the elements of a good security program Ability to analyze and evaluate an organization’s security policies and procedures and identify their strengths and weaknesses Access control Knowledge across platforms of the access paths into computer systems and of the functions of associated hardware and software providing an access path Knowledge of access level privileges granted to users and the technology used to provide and control them Knowledge of the procedures, tools, and techniques that provide for good physical, technical, and administrative controls over access Knowledge of the risks associated with inadequate access controls Ability to analyze and evaluate an organization’s access controls and identify the strengths and weaknesses Skills to review security software reports and identify access control weaknesses Skills to perform penetration testing of the organization’s applications and supporting computer systems Application software development and change control Knowledge of the concept of a system life cycle and of the System Development Life Cycle (SDLC) process Knowledge of the auditor’s role during system development and of federal guidelines for designing controls into systems during development Knowledge of the procedures, tools, and techniques that provide control over application software development and modification Knowledge of the risks associated with the development and modification of application software Ability to analyze and evaluate the organization’s methodology and procedures for system development and modification and identify the strengths and weaknesses Adapted from “Knowledge, Skills, and Abilities for IS Security Audit Areas by FISCAM Objective” from National State Auditors Association/GAO Manag e m e nt Pla nning G uide fo r Info rm atio n Syste m s Se curity Auditing , 2001
  • 42. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 42 ILLINOIS INSTITUTE OF TECHNOLOGY Knowledge, Skills, and Abilities Audit Objective Associated knowledge, skills, and abilities forIS Security Audit Areas System software Knowledge of the different types of system software and their functions Knowledge of the risks associated with system software Knowledge of the procedures, tools, and techniques that provide control over the implementation, modification, and use of system software Ability to analyze and evaluate an organization’s system software controls and identify the strengths and weaknesses Skills to use software products to review system software integrity Segregation of duties Knowledge of the different functions involved with information systems and data processing and incompatible duties associated with these functions Knowledge of the risks associated with inadequate segregation of duties Ability to analyze and evaluate an organization’s organizational structure and segregation of duties and identify the strengths and weaknesses Business continuity Knowledge of the procedures, tools, and techniques that provide for business continuity Knowledge of the risks that exist when measures are not taken to provide for business continuity Ability to analyze and evaluate an organization’s program and plans for business continuity and identify the strengths and weaknesses Application controls Knowledge about the practices, procedures, and techniques that provide for the authorization, completeness, and accuracy of application data Knowledge of typical applications in each business transaction cycle Ability to analyze and evaluate an organization’s application controls and identify the strengths and weaknesses Skills to use a generalized audit software package to conduct data analyses and tests of application data, and to plan, extract, and evaluate data samples Adapted from “Knowledge, Skills, and Abilities for IS Security Audit Areas by FISCAM Objective” from National State Auditors Association/GAO Manag e m e nt Pla nning G uide fo r Info rm atio n Syste m s Se curity Auditing , 2001
  • 43. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 43 ILLINOIS INSTITUTE OF TECHNOLOGY Our Audits Pre-Audit – Policy Review – Administer any questionnaires – Plan the Audit •Create audit checklists •Arrange site visit Site Visit – Entry briefing but probably no exit briefing Prepare Report Deliver Report
  • 44. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 44 ILLINOIS INSTITUTE OF TECHNOLOGY The End… Questions? Discussion!

Notas do Editor

  1. Upon completion of this lesson the student should be able to: Explain what an information security audit is Explain the relationship of information security policies to the audit process Describe how an information security audit is conducted Discuss knowledge required for members of an information security audit team