IT Audit- Hospital Risks, Controls and Audit. AHIA Conference. Grant Thornton LLP. All rights reserved.

Size: px
Start display at page:

Download "IT Audit- Hospital Risks, Controls and Audit. AHIA Conference. Grant Thornton LLP. All rights reserved."

Transcription

1 IT Audit- Hospital Risks, Controls and Audit Approaches AHIA Conference Grant Thornton LLP. All rights reserved.

2 Agenda risk and organizational exposure understanding gyour information technology environment information technology risk assessment roadmap overview of information technology control activities discussion of IT Audit planning in a hospital discussion of IT Audit reporting Grant Thornton LLP. All rights reserved. 2

3 Risk and organizational exposure Grant Thornton LLP. All rights reserved.

4 Risk Definition A potential negative impact to an asset or some characteristic of value that may arise from some present process or future event. The probability of a loss. In information security, "risk" is defined as a function of three variables: the probability that there's a threat (a declaration of intent to inflict punishment or harm on another) the probability that there are any vulnerabilities (susceptibility to physical or emotional injury or attack) the potential impact (magnitude of the potential loss of seriousness of the event) Grant Thornton LLP. All rights reserved. 4

5 Risk Management Definition iti Risk management is the process used to identify, source and measure risk, and the development of strategies to manage it. Effective risk management strategies include: Policy and procedure Deployment of appropriate, skilled resources Preventative controls Technology architecture Regular or continuous monitoring Grant Thornton LLP. All rights reserved. 5

6 Information technology risk in the news Personal data of 1,000 UD students' exposed Dept. of Public Safety server was hacked into on April 8. delawareonline The News Journal, May 25, 2006 Hopkins data loss prompts legislative effort The loss of computer tapes containing personal information on more than 135,000 Johns Hopkins employees and patients - the data possibly tossed in a trash bin - is spurring consumer protection bills in Annapolis, including one to force prompt disclosure of such breaches. Baltimore Sun, February 11, 2007 Ohio University it suffers security breaches Data thieves may have plundered Social Security numbers and other private information--including health records--belonging to students and faculty at Ohio University following three separate computer intrusions at the school. CNET News.com, May 11, 2006 Grant Thornton LLP. All rights reserved. 6

7 Risk areas Operational risk "Our medication disbursement system is down." "Our donor files appear to have been copied." Financial & fraud risk "Our external auditor identified a $56,000 adjustment in our receivables sub-ledger." "Who authorized this $10,000 payment?" Compliance risk "There are control design gaps in our financial aid processing." Grant Thornton LLP. All rights reserved. 7

8 Risk areas Operational risk reputation risk availability of information integrity of information management decision adequacy of information and data communication timeliness of information customer/vendor relations; compliance with contractual agreements security and privacy; loss of intellectual property making, business operations Grant Thornton LLP. All rights reserved. 8

9 Risk areas Financial and fraud risk Financial risk accuracy of financial data completeness of financial data integrity of financial data Fraud risk theft misappropriation of assets Grant Thornton LLP. All rights reserved. 9

10 Risk areas Compliance risk Regulatory risk FERPA Family Education Rights & Privacy Act (Buckley Amendment) HIPAA Health Insurance Portability & Accountability Act OMB A-133 Office of Management and Budget Circular No. A-133 FISMA Federal Information Security Management Act State issued Information Security Breach and Identity Theft Prevention Acts Grant Thornton LLP. All rights reserved. 10

11 Risk areas Compliance risk (cont.) Accreditation risk institutional accreditation and specialized or programmatic accreditation agencies JCAHO - Joint Commission on Accreditation of Healthcare Organizations continuous quality improvement philosophy Grant Thornton LLP. All rights reserved. 11

12 Understanding your information technology environment Grant Thornton LLP. All rights reserved.

13 The key to a successful risk assessment Know your information technology environment 1. Physical layout of organization buildings and remote locations How many locations does our organization have? Where are these locations in comparison to each other (geographically)? How many of those locations use our IT resources? How many of those locations have IT resources on-site? Are these locations connected to each other? If so, how? Grant Thornton LLP. All rights reserved. 13

14 Know your information technology environment Telecommunications 2. How do we communicate within our organization and with others? What type of telephone system(s) do we use (analog, digital, Voice over Internet Protocol [VoIP])? Do we have modems? Do we know where they are? Are they active? Are they outbound only? Do we allow unrestricted long distance calling and transfers to outside telephone lines? Does our telephone system provide access to our computer systems? Grant Thornton LLP. All rights reserved. 14

15 Know your information technology environment Network architecture and design 3. How is our organization connected and how do our employees, students, patients, donors, etc. access information? What type of network(s) do we have? Is it wired, wireless or a combination of the two? Is it segmented to restrict access internally? How is it protected (firewall(s), intrusion detection/prevention systems, anti-virus software, etc.)? Grant Thornton LLP. All rights reserved. 15

16 Know your information technology environment Network architecture and design (cont.) 3. How is our organization connected and how do our employees, students, patients, donors, etc. access information? How are our locations connected to each other? Do we provide access to the Internet or have an organizational Intranet? Is it for informational use only or do we process "transactions" such as enrollment, payments, donations, etc.? Do we allow remote access to our network? Who has remote access and how is it protected? Grant Thornton LLP. All rights reserved. 16

17 Know your information technology environment User workstations and information sharing 4. What type of workstations and data sharing devices are used on our network? Do we support them? laptops, desktops, tablets personal digital assistant (PDA), handheld computers USB drive, external hard drive, flash disk, "thumb drive" Grant Thornton LLP. All rights reserved. 17

18 Know your information technology environment Information communication 5. What kind of information do we send to and receive from third parties? How do we do it? file transfer protocol (FTP) patient t / student t data electronic data interchange (EDI) information downloads electronic mail web-based classroom file encryption "pod-casts" claims clearinghouse digital signatures / electronic "handshakes" Grant Thornton LLP. All rights reserved. 18

19 Know your information technology environment Outsourced environments 6. What aspects of our information technology environment are outsourced? data center / server room telecommunications infrastructure management and administration network perimeter security information technology management application / software support desktop support / helpdesk inter-location connectivity disaster recovery / business continuity Grant Thornton LLP. All rights reserved. 19

20 Know your information technology environment Information systems 7. What are the information systems we use to run our organization? operating systemsstems Network databases applications Operating System Application Data Grant Thornton LLP. All rights reserved. 20

21 Know your information technology environment Information systems operating systems The system software responsible for the direct control and management of hardware and basic system operations. Additionally, it provides a foundation upon which to run application software such as word processing programs and web browsers. Examples: Microsoft Windows UNIX (Linux, Sun Solaris etc.) IBM Mainframe - OS/390, z/os OS/400 Apple Mac OS Microsoft MS-DOS Novell Netware Grant Thornton LLP. All rights reserved. 21

22 Know your information technology environment Information systems databases A collection of data elements stored in a computer in a systematic way, such that a computer program can query it to answer questions. Database Administration: A function involved in the coordination and control of data-related t d activities. iti Grant Thornton LLP. All rights reserved. 22

23 Know your information technology environment Information systems applications Single function: general ledger accounts payable fixed assets purchasing patient accounting fundraising Ad-hoc: MS Excel or Access Multi-function: ERP (Enterprise Resource Planning) Grant Thornton LLP. All rights reserved. 23

24 Know your information technology environment Information systems For each operating system, database and application, consider the following: Logical security How are users and IT authenticated and restricted to authorized areas? What is the type and nature of information available? Who administers access? What monitoring is available / performed? Change management What is the level of customization? How are changes initiated, authorized, tested, approved and implemented? Computer operations Is information processing monitored? Are backups performed and monitored regularly? Grant Thornton LLP. All rights reserved. 24

25 Know your information technology environment Information technology department 8. What is the structure, strategy and skillset of our information technology department? Who does the IT department t report to? Do the IT staff have the skills and experience necessary to support your IT environment? Is there an IT budget, IT strategy or IT steering committee? Has there been turnover in the IT department in the last 8-12 months? Has it impacted organizational support? Grant Thornton LLP. All rights reserved. 25

26 Know your information technology environment Documentation tools Tools to assist you in documenting your understanding of the information technology environment: systems interface map network topography map information flows by process technology inventory spreadsheet organizational chart IT vendor listing Grant Thornton LLP. All rights reserved. 26

27 Information technology risk assessment roadmap Grant Thornton LLP. All rights reserved.

28 Information technology risk assessment Assessment factors Criteria for assessing risk for the various aspects of your information technology environment: Impact If this IT area was compromised or became unavailable, what would the result to your organization be? Problems Have you experienced data integrity or data availability issues? Have you experienced inappropriate or unauthorized access? Have you experienced service issues with IT vendors? Grant Thornton LLP. All rights reserved. 28

29 Information technology risk assessment Assessment factors (cont.) Criteria for assessing risk for the various aspects of your information technology environment: Complexity Does this IT area require skilled professionals to support it? Relative to industry standards and your organizational peers, is this IT area more or less complex? Is this IT area standard/vanilla/"off-the-shelf" or customized? Is this environment relatively stable? Change Is this a new or modified system, application, device, utility, environment, etc.? Have you had turnover of the individual(s) who support this aspect of your IT environment? Have there been modifications to policy or procedure? Grant Thornton LLP. All rights reserved. 29

30 Information technology risk assessment Risk assessment format The network architecture example provided below illustrates how to perform risk analysis activities for the various aspects of your information technology environment. Sub Cycle Risk Type Risk Rating Impact Change Problems Complexity Preliminary perceptions on controls Network architecture t O Moderate F Moderate C Moderate Comp Moderate O - Operational Risk F - Financial Risk C - Compliance Risk Comp - Composite Score rated from 1 (low) to 5 (high) rated strong, moderate (default) or low Grant Thornton LLP. All rights reserved. 30

31 Information technology risk assessment Sample results Sub Cycle Risk Rating Preliminary perceptions on controls Network architecture 3.5 Moderate Network perimeter security 2.8 High Remote access to systems 3.3 Moderate Information technology organization 3.2 Moderate Application security administration 3.7 Moderate Application change management 3.3 High Information communication i with 3 rd parties Moderate Vendor management / monitoring 3.4 Low Telecommunications 2.3 Moderate Grant Thornton LLP. All rights reserved. 31

32 Information technology risk assessment Sample results (cont.) SWOT Analysis Strengths Highly positive "tone at the top" promotes attention to risk management activities and a strong overall control environment Tenured IT department Robust application change management process Use of independent consultants for security vulnerability assessments Ensure that all purchases of IT related hardware and software, and related IT projects are channeled through IT for approval Formalize disaster recovery and business continuity plans Opportunities Grant Thornton LLP. All rights reserved. Weaknesses Remote authentication ti ti criteria i Data center physical security Overall Information security / privacy strategy Increased demands on information sharing Pressure on ability to contain IT costs On-going compliance with federal and state requirements and changes in those requirements Increasing dependency on IT increases potential vulnerability to external attacks, worms, viruses, etc. Threats Internal Audit Plan Proposed Audit Area Network security and vulnerability assessment SDLC / Change management review HIPAA Security review Inherent Risk FY 08 Hours High 200 Medium 120 High 160 FY 09 Hours Antivirus software Medium 85 Disaster recovery / business continuity planning Estimated Annual Internal Audit Hours Medium Comments/ Rationale Recently redesigned network Custom applications and IT employee turnover New Compliance Officer Growth in virus attacks Information availability critical to remote student body 32

33 Overview of Information Technology (IT) controls IT general controls Automated / application / programmed controls IT dependent manual controls Grant Thornton LLP. All rights reserved.

34 Information technology controls Definition Information technology general controls Procedures pervasive to an organization or multiple segments/ environments of an organization that assure the secure, stable and reliable performance of computer hardware, software and IT personnel Automated / application / programmed controls Automated or programmed procedures performed by individual systems to ensure the validity, accuracy, completeness and availability of input, processed and stored data. Function as designed d and are not subject to intermittent error, unless modified. IT dependent manual controls Manual procedures that rely on output directly from an IT system Grant Thornton LLP. All rights reserved. 34

35 Information technology control structure Business Process A Business Process B Business Process C IT dependent manual controls Application / automated controls IT general controls Grant Thornton LLP. All rights reserved. 35

36 IT general controls Access to programs and data 1. logical access path 2. user administration 3. powerful authorities 4. segregation of duties 5. review of user access 6. physical security Grant Thornton LLP. All rights reserved. 36

37 Access to programs and data Logical access path System Users Security Resources Logon User Identification & Verification Transactions Access Request Resource Authorization Checking Access Files Data Access Violation Violation Logging & Access Reporting Event Logs Note: Powerful access can circumvent established security settings and procedures. Administration Report Grant Thornton LLP. All rights reserved. 37

38 IT general controls Application development and maintenance 1. program change process / SDLC 2. separation of IT environments 3. segregation of duties 4. importance of monitoring 5. configuration change management 6. emergency change control Grant Thornton LLP. All rights reserved. 38

39 IT general controls Computer operations and data processing 1. data processing - job scheduling - operations monitoring 2. antivirus 3. backup and recovery 4. business continuity and disaster recovery 5. data center environmental controls Grant Thornton LLP. All rights reserved. 39

40 Application / automated controls 1. Security access (i.e., user access to approve student financial aid application) 2. Calculations and programmed procedures (i.e., currency exchange automated calculated) 3. Edit / validation checks (i.e., no alpha characters allowed in numeric date field) 4. Tolerance limits or thresholds (i.e., automatically pay vendor invoice if within 2% of Purchase Order) 5. Application interfaces (i.e., automated reconciliation of donations entered/processed in fundraising subsystem and loaded into general ledger application) Grant Thornton LLP. All rights reserved. 40

41 IT dependent manual controls Key reports or output the organization relies upon that is produced directly from IT systems 1. Key reporting (i.e., A/R aging report) 2. Exception reporting (i.e., daily claims processing error report) 3. End user computing (i.e., validation and review of critical spreadsheets and ad-hoc reporting) Grant Thornton LLP. All rights reserved. 41

42 Information technology control resources The Information Systems Audit and Controls Association (ISACA), the IT Governance Institute (created by ISACA) and the Institute for Internal Auditors (IIA) have all created IT control frameworks and guidelines including: Control Objectives for Information and Related Technology (COBIT) IT Control Objectives for Sarbanes-Oxley Global Technology Audit Guide (GTAG) Effective IT governance helps ensure that IT supports business goals, maximizes i business investment t in IT and appropriately manages IT-related risks and opportunities Grant Thornton LLP. All rights reserved. 42

43 Contact information Scott D. Smith P E Scott.Smith@gt.com Pooja Walia P E Pooja.Walia@gt.com Grant Thornton LLP. All rights reserved. 43

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

Information Technology Risk

Information Technology Risk Information Technology Risk Paul Kanneman National Business Advisory Practice Leader Grant Thornton Stephen Landry Chief Information Officer Seton Hall University Agenda Recent developments Seton Hall

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec. The OCR Auditors are coming - Are you next? What to Expect and How to Prepare On June 10, 2011, the U.S. Department of Health and Human Services Office for Civil Rights ( OCR ) awarded KPMG a $9.2 million

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

How To Protect Research Data From Being Compromised

How To Protect Research Data From Being Compromised University of Northern Colorado Data Security Policy for Research Projects Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope... 1 4.0 Definitions, Roles, and Requirements... 1 5.0 Sources of Data...

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

Information Security: A Perspective for Higher Education

Information Security: A Perspective for Higher Education Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose

More information

Enterprise Governance and Planning

Enterprise Governance and Planning GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

ELECTRONIC INFORMATION SECURITY A.R.

ELECTRONIC INFORMATION SECURITY A.R. A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Information Security Policy

Information Security Policy Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011 Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Hengtian Information Security White Paper

Hengtian Information Security White Paper Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...

More information

Practical Guidance for Auditing IT General Controls. September 2, 2009

Practical Guidance for Auditing IT General Controls. September 2, 2009 Practical Guidance for Auditing IT General Controls Chase Whitaker, CPA, CIA September 2, 2009 About Hospital Corporation of America $28B annual revenue $24B total assets $4.6B EBDITA $673M Net Income

More information

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central.

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central. POLICIES Campus Data Security Policy Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central Policy Statement Policy In the course of its operations, Minot State University

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Is Your IT Environment Secure? November 18, 2015. Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

Is Your IT Environment Secure? November 18, 2015. Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting Is Your IT Environment Secure? November 18, 2015 Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting Clark Schaefer Consulting Serving elite and emerging companies with practical solutions

More information

Fortinet Solutions for Compliance Requirements

Fortinet Solutions for Compliance Requirements s for Compliance Requirements Sarbanes Oxley (SOX / SARBOX) Section / Reference Technical Control Requirement SOX references ISO 17799 for Firewall FortiGate implementation specifics IDS / IPS Centralized

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Course: Information Security Management in e-governance

Course: Information Security Management in e-governance Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security

More information

HIPAA Security Rule Changes and Impacts

HIPAA Security Rule Changes and Impacts HIPAA Security Rule Changes and Impacts Susan A. Miller, JD Tony Brooks, CISA, CRISC HIPAA in a HITECH WORLD American Health Lawyers Association March 22, 2013 Baltimore, MD Agenda I. Introduction II.

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Circular to All Licensed Corporations on Information Technology Management

Circular to All Licensed Corporations on Information Technology Management Circular 16 March 2010 Circular to All Licensed Corporations on Information Technology Management In the course of our supervision, it has recently come to our attention that certain deficiencies in information

More information

How To Protect A Hampden County Hmis From Being Hacked

How To Protect A Hampden County Hmis From Being Hacked Hampden County HMIS Springfield Office of Housing SECURITY PLAN Security Officers The Springfield Office of Housing has designated an HMIS Security Officer whose duties include: Review of the Security

More information

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA

More information

H.I.P.A.A. Compliance Made Easy Products and Services

H.I.P.A.A. Compliance Made Easy Products and Services H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 Info-HIPAA@prevare.com 877-232-9191 Dear Health Care Professional,

More information

Network and Security Controls

Network and Security Controls Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS

REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

FIREWALL POLICY November 2006 TNS POL - 008

FIREWALL POLICY November 2006 TNS POL - 008 FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

External Penetration Assessment and Database Access Review

External Penetration Assessment and Database Access Review External Penetration Assessment and Database Access Review Performed by Protiviti, Inc. At the request of Internal Audit April 25, 2012 Note: This presentation is intended solely for the use of the management

More information

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating to all users of UNH IT resources, and improve the availability

More information

IT OUTSOURCING SECURITY

IT OUTSOURCING SECURITY IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland Audit Report Effectiveness of IT Controls at the Global Fund Follow-up report GF-OIG-15-20b Geneva, Switzerland Table of Contents I. Background and scope... 3 II. Executive Summary... 4 III. Status of

More information

PRIVACY IMPACT ASSESSMENT

PRIVACY IMPACT ASSESSMENT Name of System/Application: LAN/WAN PRIVACY IMPACT ASSESSMENT U. S. Small Business Administration LAN/WAN FY 2011 Program Office: Office of the Chief Information Officer A. CONTACT INFORMATION 1) Who is

More information

On-Site Computer Solutions values these technologies as part of an overall security plan:

On-Site Computer Solutions values these technologies as part of an overall security plan: Network Security Best Practices On-Site Computer Solutions Brian McMurtry Version 1.2 Revised June 23, 2008 In a business world where data privacy, integrity, and security are paramount, the small and

More information

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured! Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured! Presented by: Kristen Zarcadoolas, Jim Soenksen, and Ed Sale PART 2: plan, act, repeat (from the look, plan,

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Software as a Service (SaaS) Requirements

Software as a Service (SaaS) Requirements Introduction Software as a Service (SaaS) Requirements Software as a Service (SaaS) is a software service model where an application is hosted as a service provided to customers across the Internet. By

More information

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /

More information

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Topics: Explain why it is important for firms of all sizes to address cybersecurity risk. Demonstrate awareness

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Healthcare Technology Audit Basics. Session Objectives

Healthcare Technology Audit Basics. Session Objectives Healthcare Technology Audit Basics Jennifer McGill, CIA, CISA, CGEIT April 20, 2015 Session Objectives Review information technology basic concepts. Use real world examples to identify and understand healthcare

More information

3/17/2015. Healthcare Technology Audit Basics. Session Objectives. Jennifer McGill, CIA, CISA, CGEIT April 20, 2015

3/17/2015. Healthcare Technology Audit Basics. Session Objectives. Jennifer McGill, CIA, CISA, CGEIT April 20, 2015 Healthcare Technology Audit Basics Jennifer McGill, CIA, CISA, CGEIT April 20, 2015 Session Objectives Review information technology basic concepts. Use real world examples to identify and understand healthcare

More information

Click to edit Master title style

Click to edit Master title style EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

AL RAFEE ENTERPRISES Solutions & Expertise.

AL RAFEE ENTERPRISES Solutions & Expertise. AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2.

Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2. Chapter 7: Trends in technology impacting SDLC... 2 7.1 Learning objective... 2 7.1 Introduction... 2 7.2 Technology Trends... 2 7.2.1 Virtualization... 2 Characteristics of virtualizations affecting SDLC...

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Specific observations and recommendations that were discussed with campus management are presented in detail below.

Specific observations and recommendations that were discussed with campus management are presented in detail below. CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE

More information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...

More information

Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)

Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004) Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

University System of Maryland University of Maryland, College Park Division of Information Technology

University System of Maryland University of Maryland, College Park Division of Information Technology Audit Report University System of Maryland University of Maryland, College Park Division of Information Technology December 2014 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND

More information

Page 1. Copyright 2009. MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved.

Page 1. Copyright 2009. MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved. Page 1 Page 2 Page 3 Agenda Defining the Massachusetts Personal Data Security Law Becoming Compliant Page 4 Massachusetts Privacy Law Defining the Massachusetts Personal Data Security Law - 201 CMR 17.00

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups

More information

CISA TIMETABLE (4 DAYS)

CISA TIMETABLE (4 DAYS) CISA TIMETABLE (4 DAYS) ISACA-CISA Day 1 9.00 9.30 Welcome, Introductions, Coffee 9.30 11.00 About the CISA Exam Domain 1 - The Process of Auditing Information Systems Auditing Types of Audits Audit Methodology

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information