Review of Controls over Remote Access (IA /F) Steve Allen, Managing Director, Finance. Audit Conclusion: Audit closed

Size: px
Start display at page:

Download "Review of Controls over Remote Access (IA 12 407/F) Steve Allen, Managing Director, Finance. Audit Conclusion: Audit closed"

Transcription

1 FINAL INTERNAL AUDIT REPORT Review of Controls over Remote Access (IA /F) Steve Allen, Managing Director, Finance Audit Conclusion: Audit closed 16 June Issue categories Agreed actions Satisfactorily addressed Partially addressed No longer applicable Not addressed Priority Priority Priority

2 Contents EXECUTIVE SUMMARY... 3 STATUS OF AGREED ACTIONS... 4 APPENDIX 1 DISTRIBUTION LIST... 9 Audit information Version A Draft versions issued 1 Fieldwork commenced 09 May Fieldwork completed 10 June Draft report issued 12 June Page 2

3 EXECUTIVE SUMMARY Objective This audit objective was to provide assurance that external direct access to TfL through the Internet Access Gateway (IAG) and full network services via the RAS is restricted to authorised users and that the TfL data accessed is appropriately secured. Scope The audit focused on the control environment in relation to the risk of unauthorised access covering the following key sub- areas: Definition of remote access policy procedures, and key controls; Role of third party support providers in remote access management; Management of user accounts and associated RSA tokens; Granting of network access rights through the RAS server; Logical protection of authentication servers (including placement, configuration, and patch management); and Robustness of authentication methods in use. Summary of findings Our Interim Audit Report dated 19 July 2013 entitled Review of Controls over Remote Access identified two Priority 1 issues concerning the leavers process and security of the Webmail service. Nine other issues were raised. Five were rated Priority 2 and the remaining four were rated Priority 3. We have now carried out a follow up review of the management actions and found that all have been satisfactorily addressed, except one related to the Webmail service. A gap analysis was carried out by IM at the end of 2013 which also identified the risk of data loss through webmail as one of the top ten findings. A Data Loss Prevention (DLP) solution will be developed as part of the Information Security Framework and we will be auditing this framework in the coming year, when we will ensure that the issue has been satisfactorily addressed. This audit is therefore closed. Page 3

4 STATUS OF AGREED ACTIONS Priority 1 actions 1. Leavers Process Improve the leavers process by adding the IM Operation Manager and staff to the leavers report distribution list so that the RSA accounts of staff leaving service will be disabled. Align the RSA user accounts review process with network account deactivation, i.e. 90 days. 2. Webmail Security Create an implementation plan for addressing webmail security as part of the riskbased information security gap analysis performed by IM. Steve Hampson 31 July 2013 Michele Hanson 31 March Satisfactorily addressed Relevant personnel in the IM Operation team have been added to the distribution list for the starters and leavers report. The RSA user account de-provisioning process has also been aligned with the network account deactivation Partially addressed A Data Loss Prevention (DLP) solution was identified to address webmail security risks through a gap analysis performed by IM. An upcoming security proposal will address DLP as one of the top ten Page 4

5 Priority 2 actions 3. RSA Administrator Roles findings in the gap analysis. We will ensure that this action is satisfactorily addressed as part of our audit of the Information Security Framework. Remove defunct RSA administrator roles and document a process for ongoing review of RSA administrator roles and user accounts across IM. Mohammed Ali 10 June RSA administrator roles belonging to leavers have been removed and all RSA administrator and user accounts have been reviewed and unnecessary accounts were removed. A process for the ongoing review of RSA administrator roles and user accounts across IM has been documented and communicated. 4. Use of Generic and Duplicate Administrator Accounts Remove non essential generic and duplicate RSA administrator accounts Steve Hampson 09 August Non essential generic and duplicate RSA administrator accounts have Page 5

6 2013 been removed. 5. RSA Administrator Account Management Re-communicate Service Request process to IS Operations team. Steve Hampson 09 August 2013 The service request process for RSA account creation has been documented and communicated. 6. RSA Accounts with Static Passwords Connect RSA accounts to Active Directory to remove static passwords from RSA. Mohammed Ali 10 June The Service Improvement Plan (SIP) to upgrade the RSA Authentication Manager has been completed that connects the RSA to the Active Directory. The static password for the Business Accountant has also been removed. 7. RSA Authentication Manager Patch Management Include the evaluation of application patches and documentation of its implementation in the existing patch management process. Sujeet Wadke 31 March Application patch management process has been documented. Page 6

7 Priority 3 actions 8. Technical Remote Access Policy Define and document IM policy for remote access. 9. Test Accounts Remove unnecessary test accounts and document process for ongoing removal 10. Multiple Assignment of Tokens Improve the process for controlling multiple assignments of tokens. Michele Hanson 28 February Mohammed Ali 10 June Michele Hanson 28 February The policy for remote access has been defined and documented. The unnecessary test accounts have been removed and the related process to manage test accounts have been developed and communicated to the IS Operations team. The IM policy for remote access services specifies that only one token will be permitted per employee. To ensure compliance Page 7

8 11. Proactive Review of Security Logs with this policy, work instructions for auditing RSA token allocation were implemented. IM Security will investigate the option for collecting administrative logs from the RSA, UAG, and AGEE into the Symantec SIEM solution, and raising alerts against certain actions. Michele Hanson 31 March IM Security has investigated the action and a decision was reached to include this as part of the new processes that will emanate from the Information Security Framework. Page 8

9 APPENDIX 1 Distribution list This report was sent to Steve Allen, Managing Director, Finance by Clive Walker, Director of Internal Audit, and copied to: Trevor Jordan Steven Townsend Mohammed Ali Michele Hanson Matthew Mills Matt Griffin Kevin Thurlwell Wayne Fitzgerald Jacques Bouwer Nigel Blore Andrea Clarke David Goldstone Howard Carter Robert Brent IM Head of IM Projects Delivery / interim Head of IM Infrastructure Services Chief Information Officer IM Infrastructure Manager IM Chief Information Security Officer IM Security Manager IM Head of Business Relationship Management IM Service Management Team Lead IM Senior Quality, Assurance & Risk Analyst as Key Risk Representative Head of Group Insurance Director of TfL Legal Chief Finance Officer General Counsel KPMG Page 9

Security of Back-up Media and Offsite Storage (IA_12_005) Steve Allen, Managing Director, Finance. Audit Conclusion: Audit Closed

Security of Back-up Media and Offsite Storage (IA_12_005) Steve Allen, Managing Director, Finance. Audit Conclusion: Audit Closed FINAL INTERNAL AUDIT REPORT Security of Back-up Media and Offsite Storage (IA_12_005) Steve Allen, Managing Director, Finance Audit Conclusion: Audit Closed Issue categories Agreed actions Satisfactorily

More information

FINAL INTERNAL AUDIT REPORT

FINAL INTERNAL AUDIT REPORT FINAL INTERNAL AUDIT REPORT Organisation and Management of Firewalls (IA 13 402/F) Steve Allen, Managing Director, Finance Audit Conclusion: Audit Closed 25 February 2015 Issue categories Agreed actions

More information

Implementation of the Performance Data Warehouse (IA 13_615 /F) Mike Brown, Managing Director, Rail and Underground. Audit Conclusion: Audit Closed

Implementation of the Performance Data Warehouse (IA 13_615 /F) Mike Brown, Managing Director, Rail and Underground. Audit Conclusion: Audit Closed FINAL INTERNAL AUDIT REPORT Implementation of the Performance Data Warehouse (IA 13_615 /F) Mike Brown, Managing Director, Rail and Underground Audit Conclusion: Audit Closed 8 August Issue categories

More information

Business Expenses and Purchasing Cards (IA 12 123/F) Steve Allen, Managing Director, Finance. Audit Conclusion: Audit Closed

Business Expenses and Purchasing Cards (IA 12 123/F) Steve Allen, Managing Director, Finance. Audit Conclusion: Audit Closed FINAL INTERNAL AUDIT REPORT Business Expenses and Purchasing Cards (IA 12 123/F) Steve Allen, Managing Director, Finance Audit Conclusion: Audit Closed 17 February 2014 Issue categories Agreed actions

More information

FINAL INTERNAL AUDIT REPORT. To: Steve Allen Managing Director, Finance. Project Document Control and Management Systems. (Conclusion: Audit Closed)

FINAL INTERNAL AUDIT REPORT. To: Steve Allen Managing Director, Finance. Project Document Control and Management Systems. (Conclusion: Audit Closed) FINAL INTERNAL AUDIT REPORT To: Steve Allen Managing Director, Finance Project Document Control and Management Systems (Conclusion: Audit Closed) Ref: 20 September 2013 Fieldwork started 11 July 2013 Fieldwork

More information

London River Services Security Risk Management (IA 13 013/F) Leon Daniels, Managing Director, Surface Transport. Audit Conclusion: Audit Closed

London River Services Security Risk Management (IA 13 013/F) Leon Daniels, Managing Director, Surface Transport. Audit Conclusion: Audit Closed FINAL INTERNAL AUDIT REPORT London River Services Security Risk Management (IA 13 013/F) Leon Daniels, Managing Director, Surface Transport Audit Conclusion: Audit Closed 25 June 2014 Issue categories

More information

Voluntary Severance Process (IA 12 107/F) Tricia Riley, Director of Human Resources. Audit Conclusion: Audit Closed

Voluntary Severance Process (IA 12 107/F) Tricia Riley, Director of Human Resources. Audit Conclusion: Audit Closed FINAL INTERNAL AUDIT REPORT Voluntary Severance Process (IA 12 107/F) Tricia Riley, Director of Human Resources Audit Conclusion: Audit Closed 5 August 2013 Issue categories Agreed actions Satisfactorily

More information

FINAL INTERNAL AUDIT REPORT

FINAL INTERNAL AUDIT REPORT FINAL INTERNAL AUDIT REPORT Accounts Receivable (IA 14 123/F) Steve Allen, Managing Director, Finance Audit Conclusion: Audit Closed 5 August Issue categories Agreed actions Satisfactorily addressed Partially

More information

Financial Controls over Payments to Contractors on Major Projects (IA 12 119 F) Leon Daniels, Managing Director, Surface Transport

Financial Controls over Payments to Contractors on Major Projects (IA 12 119 F) Leon Daniels, Managing Director, Surface Transport FINAL INTERNAL AUDIT REPORT Financial Controls over Payments to Contractors on Major Projects (IA 12 119 F) Leon Daniels, Managing Director, Surface Transport Audit Conclusion: Audit Closed 28 June 2013

More information

FINAL INTERNAL AUDIT REPORT. Steve Allen, Managing Director, Finance

FINAL INTERNAL AUDIT REPORT. Steve Allen, Managing Director, Finance FINAL INTERNAL AUDIT REPORT Procure to Pay (IA 13 126/F) Steve Allen, Managing Director, Finance Audit Conclusion: Audit Closed 19 June 2015 Issue categories Agreed actions Satisfactorily addressed Partially

More information

FINAL INTERNAL AUDIT REPORT

FINAL INTERNAL AUDIT REPORT FINAL INTERNAL AUDIT REPORT Security of Data within Santander Cycle Hire (IA 15 412) Leon Daniels, Managing Director, Surface Transport Audit Conclusion: Well Controlled and Audit Closed 16 July 2015 Number

More information

FINAL INTERNAL AUDIT REPORT

FINAL INTERNAL AUDIT REPORT FINAL INTERNAL AUDIT REPORT IT Change Control Processes in Customer Experience (IA 15 431/F) Vernon Everitt, Managing Director, Customer Experience, Marketing and Communications Audit Conclusion: Well

More information

FINAL INTERNAL AUDIT REPORT

FINAL INTERNAL AUDIT REPORT FINAL INTERNAL AUDIT REPORT Viewpoint Staff Survey (IA 13 139/F) Tricia Riley, HR Director Vernon Everitt, Managing Director, Customer Experience, Marketing and Communications Audit Conclusion: Audit Closed

More information

Market Conditions and Costs (IA 13 513F) Andrew Wolstenholme, Chief Executive. Audit Conclusion: Well Controlled and Audit Closed

Market Conditions and Costs (IA 13 513F) Andrew Wolstenholme, Chief Executive. Audit Conclusion: Well Controlled and Audit Closed FINAL INTERNAL AUDIT REPORT Market Conditions and Costs (IA 13 513F) Andrew Wolstenholme, Chief Executive Audit Conclusion: Well Controlled and Audit Closed 22 January 2014 Number of issues Priority 1

More information

Management of NEC3 Compensation Events (IA 12 521) Andrew Wolstenholme, Chief Executive. Audit Conclusion: Adequately Controlled and Audit Closed

Management of NEC3 Compensation Events (IA 12 521) Andrew Wolstenholme, Chief Executive. Audit Conclusion: Adequately Controlled and Audit Closed FINAL INTERNAL AUDIT REPORT Management of NEC3 Compensation Events (IA 12 521) Andrew Wolstenholme, Chief Executive Audit Conclusion: Adequately Controlled and Audit Closed 02 December 2013 Number of issues

More information

FINAL INTERNAL AUDIT REPORT

FINAL INTERNAL AUDIT REPORT FINAL INTERNAL AUDIT REPORT HR Document Management (IA 12 108/F) Tricia Riley, HR Director Audit Conclusion: Audit Closed 9 March 2015 Issue categories Agreed actions Satisfactorily addressed Partially

More information

Business Continuity Arrangements for Management and Support Activities (IA 12 113/F) EXECUTIVE SUMMARY... 3 STATUS OF AGREED ACTIONS...

Business Continuity Arrangements for Management and Support Activities (IA 12 113/F) EXECUTIVE SUMMARY... 3 STATUS OF AGREED ACTIONS... FINAL INTERNAL AUDIT REPORT Business Continuity Arrangements for Management and Support Activities (IA 12 113/F) Leon Daniels, Managing Director, Surface Transport Audit Conclusion: Audit Closed 15 May

More information

INTERIM INTERNAL AUDIT REPORT

INTERIM INTERNAL AUDIT REPORT INTERIM INTERNAL AUDIT REPORT Graduate Schemes (IA 14 137) Tricia Riley, HR Director Audit Conclusion: Well Controlled and Audit Closed 31 July 2015 TfL RESTRICTED CONTENTS EXECUTIVE SUMMARY... 3 APPENDIX

More information

Transport for London. Minutes of the Audit and Assurance Committee

Transport for London. Minutes of the Audit and Assurance Committee Transport for London Minutes of the Audit and Assurance Committee Conference Rooms 1 and 2, Ground Floor, Palestra, 197 Blackfriars Road, London, SE1 8NJ 10.00am, Tuesday 8 December 2015 s Keith Williams

More information

Agency Temporary Worker Processes (IA 12 140/F v1) Tricia Riley, HR Director. Audit Conclusion: Audit Closed

Agency Temporary Worker Processes (IA 12 140/F v1) Tricia Riley, HR Director. Audit Conclusion: Audit Closed FINAL INTERNAL AUDIT REPORT Agency Temporary Worker Processes (IA 12 140/F v1) Tricia Riley, HR Director Audit Conclusion: Audit Closed 23 October 2014 Issue categories Agreed actions Satisfactorily addressed

More information

FINAL INTERNAL AUDIT REPORT

FINAL INTERNAL AUDIT REPORT FINAL INTERNAL AUDIT REPORT Management of the new Taxi and Private Hire (TPH) contract (IA 14 616/F) Leon Daniels, Managing Director, Surface Transport Audit Conclusion: Audit Closed 5 February 2016 Issue

More information

3.5 The findings from the review will be reported to the next meeting of the Audit and Assurance Committee.

3.5 The findings from the review will be reported to the next meeting of the Audit and Assurance Committee. Audit and Assurance Committee Date: 15 June 2012 Item 11: KPMG Review of Internal Audit Effectiveness This paper will be considered in public 1 Summary 1.1 The purpose of this paper is to present to the

More information

Aberdeen City Council IT Security (Network and perimeter)

Aberdeen City Council IT Security (Network and perimeter) Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary

More information

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY Appendix 1c DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY DISTRIBUTION LIST Audit Team Prakash Gohil, Audit Manager Steven Snaith, Risk

More information

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION

More information

Federal Communications Commission Office of Inspector General. FY 2003 Follow-up on the Audit of Web Presence Security

Federal Communications Commission Office of Inspector General. FY 2003 Follow-up on the Audit of Web Presence Security Federal Communications Commission Office of Inspector General FY 2003 Follow-up on the Audit of Web Presence Security Audit Report No. 03-AUD-09-21 October 20, 2004 TABLE OF CONTENTS Page EXECUTIVE SUMMARY

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

Ref: Issue Raised Recommendation Priority Management Response Implementation Network and ABS E-Financials 1. Account security settings

Ref: Issue Raised Recommendation Priority Management Response Implementation Network and ABS E-Financials 1. Account security settings Appendix A Hertsmere Borough Council - Review of information technology controls 2011-12 Ref: Issue Raised Recommendation Priority Management Response Implementation Network and ABS E-Financials 1. Account

More information

Coleg Gwent. Wireless Audit. Internal Audit Report (2.10/11) 23 May 2011. Overall Opinion: Amber Green

Coleg Gwent. Wireless Audit. Internal Audit Report (2.10/11) 23 May 2011. Overall Opinion: Amber Green Coleg Gwent Wireless Audit Internal Audit Report (2.10/11) 23 May 2011 Overall Opinion: Amber Green Coleg Gwent CONTENTS Section Page Executive Summary 1 Action Plan 5 Findings and Recommendations 10 Debrief

More information

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered

More information

How To Audit A Windows Active Directory System

How To Audit A Windows Active Directory System South Northamptonshire Council Windows Active Directory Final Internal Audit Report - September Distribution list: Mike Shaw IT & Customer Services Manager David Price Director of Community Engagement

More information

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate

More information

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST udit.pathak@niiconsulting.com Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance

More information

Miami University. Payment Card Data Security Policy

Miami University. Payment Card Data Security Policy Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that

More information

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment. - 1. Policy Statement All card processing activities and related technologies must comply with the Payment Card Industry Data Security Standard (PCI-DSS) in its entirety. Card processing activities must

More information

Report 6c. Final Internal Audit Report Network and Communications. April 2008

Report 6c. Final Internal Audit Report Network and Communications. April 2008 Report 6c Final Internal Audit Report Network and Communications April 2008 Contents Page Executive Summary 3 Observations and Recommendations 4 Appendix 2 - Staff Interviewed 14 Appendix 3 Benchmark Results

More information

Internal Audit Department NeighborWorks America. Audit Review of Database Administration and Controls

Internal Audit Department NeighborWorks America. Audit Review of Database Administration and Controls Department NeighborWorks America Audit Review of Database Administration and Controls Project Number: IM.DATADMN.2013 Audit Review of Database Administration and Controls Table of Contents Project Completion

More information

Internal Audit Report 2010/11 North Norfolk District Council. February 2011

Internal Audit Report 2010/11 North Norfolk District Council. February 2011 Internal Audit Report 2010/11 North Norfolk District Council NN/11/17 Network Infrastructure, Security and Telecommunications February 2011 This report has been prepared on the basis of the limitations

More information

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology RUTGERS POLICY Section: 70.2.22 Section Title: Legacy UMDNJ policies associated with Information Technology Policy Name: Information Security: Electronic Information and Information Systems Access Control

More information

Access Control Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Access Control Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Access Control Policy Document Status Security Classification Version 1.0 Level 4 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention Change

More information

Identity and Access Management Policy

Identity and Access Management Policy Page 1 of 5 Identity and Access Management Policy Reference number 0605-IAM Interim HEMIS Classification 0605 Purpose Date of implementation 1 December 2012 Review date Previous reviews Policy owner Policy

More information

Commissioners Deanna Tanner Okun, Chairman Irving A. Williamson, Vice Chairman Charlotte R. Lane Daniel R. Pearson Shara L. Aranoff Dean A.

Commissioners Deanna Tanner Okun, Chairman Irving A. Williamson, Vice Chairman Charlotte R. Lane Daniel R. Pearson Shara L. Aranoff Dean A. The U.S. International Trade Commission is an independent, nonpartisan, quasi-judicial federal agency that provides trade expertise to both the legislative and executive branches of government, determines

More information

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution David Mateju RSA Sales Consultant, RSA CSE david.mateju@rsa.com Adding an information-centric view Infrastructure Information

More information

Copyright 2014 http://itfreetraining.com

Copyright 2014 http://itfreetraining.com This video will look the different versions of Active Directory Federation Services. This includes which features are available in each one and which operating system you need in order to use these features.

More information

Agreement for the provision of IT Management Services and IT Services

Agreement for the provision of IT Management Services and IT Services Board Date: 26 March 2015 Item 16: Agreement for the provision of IT Management Services and IT Services This paper will be considered in public 1 Summary 1.1 This paper asks the Board to approve extended

More information

Data Network Security Policy

Data Network Security Policy Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005

More information

SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011

SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011 SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011 This report and the work connected therewith are subject to the Terms and Conditions of the contract dated 18/06/07 between South

More information

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing

More information

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INTERNET- BASED NETWORK SECURITY

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INTERNET- BASED NETWORK SECURITY Appendix 1c DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INTERNET- BASED NETWORK SECURITY DISTRIBUTION LIST Audit Team David Esling, Head of Audit Assurance, Risk

More information

EA-ISP-012-Network Management Policy

EA-ISP-012-Network Management Policy Technology & Information Services EA-ISP-012-Network Management Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 01/04/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref:

More information

The Annual Audit Letter for Torbay Council

The Annual Audit Letter for Torbay Council The Annual Audit Letter for Torbay Council Year ended 31 March 2014 October 2014 Alex Walling Engagement Lead T 0117 305 7804 E alex.j.walling@uk.gt.com Mark Bartlett Manager T 0117 305 7896 E mark.bartlett@uk.gt.com

More information

Remote Access and Network Security Statement For Apple

Remote Access and Network Security Statement For Apple Remote Access and Mobile Working Policy & Guidance Document Control Document Details Author Adrian Last Company Name The Crown Estate Division Name Information Services Document Name Remote Access and

More information

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management Appendix 1b DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Review of Mobile Portable Devices Management DISTRIBUTION LIST Audit Team David Esling, Head of Audit and Assurance

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

VERIFONE ENHANCED ZONE ROUTER

VERIFONE ENHANCED ZONE ROUTER VERIFONE ENHANCED ZONE ROUTER Security, remote management, and network connectivity offering more solutions for your c-store. SUMMARY The Verifone Enhanced Router is designed for customers to implement

More information

STATE OF ARIZONA Department of Revenue

STATE OF ARIZONA Department of Revenue STATE OF ARIZONA Department of Revenue Douglas A. Ducey Governor September 25, 2015 David Raber Director Debra K. Davenport, CPA Auditor General Office of the Auditor General 2910 North 44 th Street, Suite

More information

Infrastructure security Active Directory and beyond.

Infrastructure security Active Directory and beyond. Infrastructure security Active Directory and beyond. Konstantin Shurunov DLP-2010 2009 2010 Quest Software, Inc. ALL RIGHTS RESERVED Quest solutions & Financial industry. Financial organizations of all

More information

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/ Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system

More information

Appendix 1C. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA PAYROLL CONTROL FRAMEWORK

Appendix 1C. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA PAYROLL CONTROL FRAMEWORK Appendix 1C DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA PAYROLL CONTROL FRAMEWORK DISTRIBUTION LIST Audit Team Prakash Gohil, Audit Manager Karen Walker, Risk and Assurance

More information

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed. Service Definition Technical Security Review Overview of Service Considering the increasing importance of security, the number of organisations that allow for contingency in their Information Security

More information

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07 EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014

More information

U 09 Remote Access Policy

U 09 Remote Access Policy Dartmoor National Park Authority U 09 Remote Access Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

Use of The Information Services Active Directory Service (AD) Code of Practice

Use of The Information Services Active Directory Service (AD) Code of Practice Use of The Information Services Active Directory Service (AD) Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be

More information

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements

Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Analyze the impact of Active Directory on the existing technical environment. Analyze hardware and software

More information

Case Management for Blaise using Lotus Notes. Fred Wensing, Australian Bureau of Statistics Brett Martin, Statistics New Zealand

Case Management for Blaise using Lotus Notes. Fred Wensing, Australian Bureau of Statistics Brett Martin, Statistics New Zealand Case Management for Blaise using Lotus Notes Fred Wensing, Australian Bureau of Statistics Brett Martin, Statistics New Zealand Introduction A significant aspect of field based interviewing is the need

More information

Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government

Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS Technical audits in accordance with Regulation 211/2011 of the European Union and according to Executional Regulation 1179/2011 of the

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority Internal Audit Progress Report (19 th August 2015) Contents 1. Introduction 2. Key Messages for Committee Attention 3. Work in progress Appendix A: Risk Classification and Assurance Levels Appendix B:

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

RSA Event Source Configuration Guide. RSA Data Loss Prevention Suite

RSA Event Source Configuration Guide. RSA Data Loss Prevention Suite Configuration Guide RSA Data Loss Prevention Suite Last Modified: Wednesday, October 02, 2013 Event Source (Device) Product Information Vendor RSA, The Security Division of EMC Event Source (Device) Data

More information

University of Bedfordshire ISD Change Management Policy

University of Bedfordshire ISD Change Management Policy 1 Introduction 1.1 This paper documents the Change Management Policy that is used within the Information Services Directorate (ISD) in the University of Bedfordshire, as part of the Service Support process

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

DBC 999 Incident Reporting Procedure

DBC 999 Incident Reporting Procedure DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible

More information

Data Security and Healthcare

Data Security and Healthcare Data Security and Healthcare Complex data flows Millions of electronic medical records across many systems New and emerging business relationships Changing and maturing compliance frameworks Diverse population

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Office of Research, Analysis, and Statistics Needs to Address Computer Security Weaknesses September 17, 2008 Reference Number: 2008-20-176 This report

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information

Implementation of Internal Audit Recommendations: Summary of Progress Report by Head of Finance

Implementation of Internal Audit Recommendations: Summary of Progress Report by Head of Finance Financial Scrutiny and Audit Committee 11 February 2014 Agenda Item No 13 Implementation of Internal Audit : Summary of Progress Report by Finance Summary: This report updates members on progress in implementing

More information

Windows Password Change Scenarios

Windows Password Change Scenarios Windows Password Change Scenarios Summary This document captures various Windows environment password change scenarios and the underlying event data. It covers NetVision s ability to capture the events,

More information

EVALUATION REPORT. The Department of Energy's Unclassified Cybersecurity Program 2014

EVALUATION REPORT. The Department of Energy's Unclassified Cybersecurity Program 2014 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections EVALUATION REPORT The Department of Energy's Unclassified Cybersecurity Program 2014 DOE/IG-0925 October 2014 Department

More information

INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED AND MONITORED

INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED AND MONITORED Department of Health and Human Services OFFICE OF INSPECTOR GENERAL INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED

More information

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The

More information

C21 Introduction to User Access

C21 Introduction to User Access C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What

More information

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298 California State Senate Bill 1386 / Assembly Bill 1298 InterSect Alliance International Pty Ltd Page 1 of 8 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty

More information

Security aspects of e-tailing. Chapter 7

Security aspects of e-tailing. Chapter 7 Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing

More information

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor bfranklin@compassitc.com January 23, 2014

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor bfranklin@compassitc.com January 23, 2014 PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor bfranklin@compassitc.com January 23, 2014 Agenda Introduction PCI DSS 3.0 Changes What Can I Do to Prepare? When Do I Need to be Compliant? Questions

More information

Audit Follow-Up Status As of September 30, 2015

Audit Follow-Up Status As of September 30, 2015 Audit Follow-Up Status As of September 30, 2015 Active Directory T. Bert Fletcher, CPA, CGMA City Auditor (Report #1210 issued June 19, 2012) Report #1603 January 11, 2016 Summary This is the third follow-up

More information

We propose that further follow up work is performed in this respect and reported to the next meeting of the Audit Panel.

We propose that further follow up work is performed in this respect and reported to the next meeting of the Audit Panel. FOLLOW UP - Use of Agency Staff Appendix 6c Following the issue of the final Internal Audit report in July 006 a follow up review was performed during January 007 to determine the progress made in implementing

More information

Dublin Institute of Technology IT Security Policy

Dublin Institute of Technology IT Security Policy Dublin Institute of Technology IT Security Policy BS7799/ISO27002 standard framework David Scott September 2007 Version Date Prepared By 1.0 13/10/06 David Scott 1.1 18/09/07 David Scott 1.2 26/09/07 David

More information

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods: SSL Web Proxy Vigor2930, Vigor2950 and VigorPro 5500/5510 series router support SSL Web Proxy function to let user access lots of servers in security via Internet environment. We provide a general user

More information

IT Operations User Access Management Policies

IT Operations User Access Management Policies 1. Approval and Authorisation Completion of the following signature blocks signifies the review and approval of this Process (signed copy held in safe) Name Job Title Signature Date Authored by:-

More information

Time Is Not On Our Side!

Time Is Not On Our Side! An audit sets the baseline. Restricting The next steps Authenticating help prevent, Tracking detect, and User Access? respond. It is rare for a few days to pass without news of a security breach affecting

More information

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Cloud Computing Best Practices Cloud Computing Best Practices Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Overview Cloud Computing

More information

RSA Identity Management & Governance (Aveksa)

RSA Identity Management & Governance (Aveksa) RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity

More information

RSA ARCHER AUDIT MANAGEMENT

RSA ARCHER AUDIT MANAGEMENT RSA ARCHER AUDIT MANAGEMENT Solution Overview INRODUCTION AT A GLANCE Align audit plans with your organization s risk profile and business objectives Manage audit planning, prioritization, staffing, procedures

More information

Department of Public Safety and Correctional Services Information Technology and Communications Division

Department of Public Safety and Correctional Services Information Technology and Communications Division Audit Report Department of Public Safety and Correctional Services Information Technology and Communications Division March 2008 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND

More information

RSA Authentication Manager

RSA Authentication Manager McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained

More information

APPENDIX 4 GREATER LONDON AUTHORITY SUN ACCOUNTS UNIX REVIEW FINAL AUDIT REPORT. Auditor: Chris Power & Michael Lacey Date: April 2003 Reference: 320

APPENDIX 4 GREATER LONDON AUTHORITY SUN ACCOUNTS UNIX REVIEW FINAL AUDIT REPORT. Auditor: Chris Power & Michael Lacey Date: April 2003 Reference: 320 APPENDIX 4 GREATER LONDON AUTHORITY SUN ACCOUNTS UNIX REVIEW FINAL AUDIT REPORT Auditor: Chris Power & Michael Lacey Date: April Reference: 320 Table of Contents 1 INTRODUCTION 2 Page 2 OBJECTIVES AND

More information