PKI Audit Methodology
|
|
|
- Molly Flynn
- 10 years ago
- Views:
Transcription
1 A white paper describing practical methods used to perform PKI compliance audits intended for maximum reliance and affordability Scott S. Perry CPA, CISA Solution Leader, IT Risk & Control Services Slalom Consulting 2009 Slalom Consulting. All rights reserved.
2 Introduction In October 2005, we were approached by a major aerospace company to act as their Compliance Auditor in their effort to become cross-certified with CertiPath LLC, thus gaining acceptance in self-issued credentials in the CertiPath and Federal Bridge Public Key Infrastructures. Our challenges in adopting an acceptable audit methodology were many: No other commercial company had been cross-certified with CertiPath which would have created a precedent to evaluate. There is limited current guidance on the audit of public key infrastructures. Much of the groundbreaking standards-setting activities created in the period 1995-to 2001 have not been updated. We are not a CPA firm and not licensed to issue a WebTrust certificate for Certification Authorities. It also created an opportunity for us to establish a new approach to serving all constituents in the process. At Slalom, we view the auditor role in PKI compliance projects as a key one in a company s pursuit of trustworthy credentials. We see the auditor role as sounding board, arbiter, advisor and empathetic listener many of these traits at the same time while maintaining the independence clients and relying parties expect. Basis for the Methodology While we had challenges, there were precedents available: The Federal Bridge Certification Authority had created a Common Policy Framework for use by participating PKI bridges and Certification Authorities. Booz, Allen, Hamilton had created a specification document which provided a template for determining the compliance of a Certification Practice Statement (CPS) with the Common Policy Framework. The core of work required is no different than any IT attestation engagement; a party makes assertions requiring reliance by a relying party and accepts an attester s independent audit activity to generate that assurance. Our Company has individuals with a wealth of experience in performing and advising on IT attestation engagements such as SAS 70 and Sarbanes-Oxley compliance efforts. CertiPath had a clear desire to provide guidance as soon as practical. On February 16, 2006, CertiPath issued guidelines for the audit of Pre-operational infrastructures. CertiPath did not require a WebTrust certification. The basis we used in our compliance efforts have been taken from generally accepted IT audit practices and other accepted attestation engagements. In our work, we are given an already approved Certificate Policy (CP). This approval has been made by the relying party or PKI Bridge that requires conformity of any cross-certified or subordinate CA into its PKI. Therefore, this CP serves as the anchor to our work; we 2
3 are not asked to provide attestation on the client s conformity to its bridge or primary CA. It has already been done. We were asked for attestation and have methodologies in three areas: 1. The level of conformity the client s Certification Practice Statement has with its Certificate Policy (Called the CP/CPS Compliance Audit). 2. The level of conformity the client s practices and operational activities have with its Certification Practice Statement prior to full-operation (Called the Pre- Operational Audit). 3. The level of conformity the client s practices and operational activities have with its Certification Practice Statement after full-operation for a predetermined period of time. CertiPath has asked for attestation for the first six months and yearly thereafter. (Officially called the Operational Audit). For the three audit projects, we have the following approaches and methodologies: CP/CPS Compliance Analysis Methodology The essence of the Compliance Analysis is a desk-based design review. The client s Certificate Policy is delivered as a set of standards that must be achieved similar to a set of control objectives used in a SAS70, SysTrust or Web Trust engagement. The client s Certification Practice Statement is then reviewed to determine whether the design of activities therein would achieve the associated Policy sections. There is no assurance made at this point on the whether the client s practices and operational activities conform to its Certification Practice Statement; that is attested to separately. The CP/CPS Compliance Analysis project is performed in the following three steps: 1. Orientation and Baselining 2. Line-By-Line Analysis 3. Reporting Orientation and Baselining The first step of the CP/CPS compliance analysis is to thoroughly read the documents to understand the requirements of the CP and CPS. The auditor reviews the documents to ensure the wording contains language that is auditable. Auditable language clearly defines the intent of the client in details that allow evidence to clearly prove that the activities are taking place with reasonable certainty. Auditable language also is conveyed in assertions which are defined as something declared or stated positively. As a result of this initial review process, the auditor provides questions and feedback on the auditability of the documents. At that point, the client must answer the auditor s questions and should incorporate its feedback into the document which will be used in the next step. 3
4 Line-By-Line Analysis After the auditor has a solid understanding of the client s documents and they are in a format that is auditable, the auditor performs a line-by-line analysis of each section of the client s CPS to determine how it compares to the CP and whether the design of CPS items will achieve the CP section requirement. Each section is then assessed into one of the following four categories: 1. Acceptable: The CPS implements the functionality specified for this CP requirement. 2. Not Comparable: The CPS contains dissimilar policy contents, which provides a lower level of assurance/security than the CP requirement. 3. Missing: The CPS does not contain procedures that can be compared to the CP requirement in any way. 4. Not Applicable: The requirement contained within the CP is not transferable or applied with the CPS. Reporting The deliverables of the Compliance Audit is an Executive Summary, Cover Letter and Detailed Report. The Detailed Report shows the method used the versions of the documents and the representative evidence used to compare the CP and CPS sections. The Detailed Report also contains the assessments of each CP/CPS section. The Cover Letter provides a summary of the method used and the versions of the documents. The Executive Summary contains only the assessments of each CP/CPS sections. 4
5 Operational Audit Methodology Operational Audit Methodology The basis of the pre-operational audit is that the client uses its Certification Practice Statement as its set of assertions they represent to be taking place. They require the compliance auditor to do its due diligence to determine the level of conformity with its CPS. PKI Operational Audit Process Overview Certificate Certificate Authority Authority (Audit (Audit Client) Client) Compliance Compliance Audit Audit Team Team The compliance auditor divides the CPS into assertions bundled into sections and audited in waves of effort using generally accepted audit techniques until conclusions are reached. Start Provide copies of CP and CPS Review CP and CPS Develop Audit Plan and Test Plans The Operational Compliance Audit project is performed in the following three steps: 1. Planning 2. Fieldwork 3. Reporting Collect Evidence/Artifacts Request Evidence/ Artifacts NO Planning Upon receiving a copy of the CP and CPS, the audit team begins developing an Audit Plan and detailed Test Plans. The Audit Plan contains an initial schedule and organization of test plans into waves of effort. Waves are a logical grouping of similar audit activities that can be combined to create greater project throughput. The wave concept also reduces the number of site visits and impact on client team-members. Each wave is approximately one week effort for the audit team. Provide Evidence/ Artifacts Remediate Review Audit Results/ Exceptions Evaluate Evidence/Artifacts Evaluate Evidence Evidence Sufficient? Complete Audit Documentation Revise Audit Documentation The audit team works with client management to adjust its audit procedures to balance schedule and impact on teammember work. The resulting Audit Plan sets expectations for schedules and time commitment by client team-members. The Audit Plan also includes a brief descriptions of acceptable evidence needed to conclude on a section of the CPS. Archive Audit Documents/ Evidence Develop Conclusions End Conclusion Process Share Audit Results 5
6 Fieldwork As the audit team begins a new wave of audit activities, it communicates in advance all the evidence requirements it needs to conclude on the affected CPS sections. During the audit, the audit team collects this evidence to determine the compliance of the client s practices and procedures with a standard the organization s Certification Practice Statement (CPS). The evidence will be tested using the following four standard audit techniques: 1. Observation: a personal visitation and visual review of the current state to determine whether expected conditions are met. This technique is used determine current settings, physical security and processes in operation. 2. Examination of Documents: documents and other printed evidence are inspected for the existence of expected attributes. This technique is used to validate the existence of documents and other documented evidence stated in the CPS. 3. Reperformance: the performance of activities by the compliance auditor according to stated process and procedures to validate whether they can be reasonably followed without artificial assistance. This may be used to follow CPS procedures or access CA related systems. 4. Corroborative Inquiry: in some cases, interviews of client team-members may be necessary to assess compliance with the activities defined in the CPS. The corroborative inquiry technique will be used in cases where other evidence is not available or possible. (Note: Inquiry evidence provides the least amount of persuasiveness for validation). Reporting For each section of the CPS, the auditor develops a conclusion based on the evidence available. The following four conclusion categories are reported: 1. In Compliance: The PKI was in compliance with the CA s CPS section assertions. 2. Partial Compliance: The PKI was in compliance with some of the CA s CPS section assertions. 3. Not In Compliance: The PKI was not in compliance with the CA s CPS section assertions. 4. Not Applicable: The assertions contained in the CA s CPS section were not auditable or did not contain assertions to audit. As previously stated, the conclusions for each assertion are based on collected evidence. Each conclusion is documented by the Auditor and the evidence defined as of the date of the Cover Letter. The Lead Auditor on the project performs a quality review of test plans and results to ensure consistency and accuracy of conclusions. The Lead Auditor then issues an Executive Summary Report and Cover Letter. All workpapers are delivered to the client who retains custody of them. 6
7 Operational Audit Methodology CertiPath requires operational audits after the first six months of operation and then every year thereafter. Audit procedures for the operational audit are the same as the pre-operational audit with a couple of exceptions. The conclusion and the assurance provided by the auditor are for a period of time (e.g. six months, one year) as opposed to one point of time. Therefore, the audit team must extend its procedures to satisfy themselves over the coverage period. This includes two major methodology differences than the pre-operational audit: 1. The auditor should audit CPS assertions multiple times during the coverage period to satisfy themselves that the procedures were being complied with consistently during that time. If procedures are not being followed consistently, this would be considered a reportable exception and highlighted as part of audit findings under Partial Compliance. 2. While pre-operational audit activities have limited sample sizes, operational audits over six or twelve months may include hundreds or thousands of transactions. The auditor therefore extends the audit plan to ensure sample sizes and site visits are appropriately representative to conclude on the transaction population. 7
8 Bibliography CPS Evaluation Matrix for Evaluation against the Requirements for the Common Policy Framework, Booz Allen Hamilton, Version 1.2, March 30, 2005 PKI Assessment Guidelines, Public Draft for Comment June 18, 2001, Information Security Committee, Electronic Commerce Division, Section of Science, Technology & Law, American Bar Association CertiPath Commercial PKI Bridge, Pre-Operational Audit Guidelines, February 16, 2006 AICPA/CICA WebTrust Program for Certification Authorities, August 25, 2000 Version 1.0, American Institute of Certified Public Accountants, Inc., and Canadian Institute of Chartered Accountants Suitable Trust Services Criteria and Illustrations, American Institute of Certified Public Accountants & Canadian Institute of Chartered Accountants, 2003 Digital Certification Standards & Policies, Jacqueline Knoll, The Boeing Company, presented to the Digital Certificate Working Group. Information Systems Control Journal, Volume 5, 2002, Auditing and Certification of a Public Key Infrastructure By Ronald Koorn, MSc., CISA, RE, Peter van Walsem, MSc., and Mark Lundin, MSc., CISA, CPA FICC Audit Standards for PKI Shared Service Provider Entities: An Analysis of Requirements and Alternatives, Federal Identity Credentialing Committee and the Shared Service Provider Subcommittee, January 16th, 2004 PKI ASSESSMENT: The process of evaluating, verifying, and certifying your PKI, Presented by: Randy V. Sabett Vanguard Enterprise Security Expo 2001, June 5,
Independent Accountants Report
KPMG LLP 345 Park Avenue New York, NY 10154-0102 Independent Accountants Report To the Management of Unisys Corporation: We have examined the assertion by the management of Unisys Corporation (Unisys)
ASSESSMENT REPORT 13 19. Federal PKI Compliance Report September 6, 2013
ASSESSMENT REPORT 13 19 Federal PKI Compliance Report September 6, 2013 Date September 6, 2013 To Chief Information Officer From Inspector General Subject Assessment Report Federal PKI Compliance Report
Independent Accountants Report
KPMG LLP 1601 Market Street Philadelphia, PA 19103-2499 Independent Accountants Report To the Management of Unisys Corporation: We have examined the assertion by the management of Unisys Corporation (
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com
Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased
WEBTRUST SM/TM FOR CERTIFICATION AUTHORITIES EXTENDED VALIDATION AUDIT CRITERIA Version 1.1 CA/BROWSER FORUM
WEBTRUST SM/TM FOR CERTIFICATION AUTHORITIES EXTENDED VALIDATION AUDIT CRITERIA Version 1.1 BASED ON: CA/BROWSER FORUM GUIDELINES FOR THE ISSUANCE AND MANAGEMENT OF EXTENDED VALIDATION CERTIFICATES Version
Frequently asked questions: SOC 2 and 3
1. Is the licensing requirement for a SOC 2 or 3 different than for a SOC 1? SOC reports are attestation reports issued in accordance with AICPA standards. Therefore, licensing requirements are the same
OUTSOURCING AND SERVICE AUDITOR S REPORTS
OUTSOURCING AND SERVICE AUDITOR S REPORTS FREEDOM TO DO BUSINESS Outsourcing and service Auditor s Reports 3 OUTSOURCING AND SERVICE AUDITOR S REPORTS SERVICE AUDITOR S REPORTS ARE GROWING IN IMPORTANCE,
WEBTRUST FOR CERTIFICATION AUTHORITIES SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 [Amended 1 ] CA/BROWSER FORUM
WEBTRUST FOR CERTIFICATION AUTHORITIES SSL BASELINE REQUIREMENTS AUDIT CRITERIA V.1.1 [Amended 1 ] BASED ON: CA/BROWSER FORUM BASELINE REQUIREMENTS FOR THE ISSUANCE AND MANAGEMENT OF PUBLICLY-TRUSTED CERTIFICATES,
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
SAS No. 70, Service Organizations
SAS No. 70, Service Organizations A standard for reporting on a service organization s controls affecting user entities' financial statements. Only for use by service organization management, existing
SOC Readiness Assessments. SOC Report - Type 1. SOC Report - Type 2. Building Trust and Confidence in Third-Party Relationships
Building Trust and Confidence in Third-Party Relationships Today s businesses rely heavily on outsourcing certain business tasks or functions to service organizations, even those that are core to their
Trust Service Principles and Criteria for Certification Authorities
Trust Service Principles and Criteria for Certification Authorities Version 2.0 March 2011 (Effective July 1, 2011) (Supersedes WebTrust for Certification Authorities Principles Version 1.0 August 2000)
OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT Chief of Audits: Juan R. Perez Senior Audit Manager:
Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016
Understanding SOC Reports for Effective Vendor Management Jason T. Clinton January 26, 2016 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2012 Wolf & Company, P.C. Before we
Federal Public Key Infrastructure (FPKI) Compliance Audit Requirements
Federal Public Key Infrastructure (FPKI) Compliance Audit Requirements July 10, 2015 Version REVISION HISTORY TABLE Date Version Description Author 10/15/09 0.0.1 First Released Version CPWG Audit WG 11/18/09
TELSTRA RSS CA Subscriber Agreement (SA)
TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this
How To Understand The Benefits Of An Internal Audit
Practice Guide Reliance by Internal Audit on Other Assurance Providers DECEMBER 2011 Table of Contents Executive Summary... 1 Introduction... 1 Principles for Relying on the Work of Internal or External
PROJECT AUDIT METHODOLOGY
PROJECT AUDIT METHODOLOGY 1 "Your career as a project manager begins here!" Content Introduction... 3 1. Definition of the project audit... 3 2. Objectives of the project audit... 3 3. Benefit of the audit
Starfield Technologies, LLC. Certificate Policy and Certification Practice Statement (CP/CPS)
Starfield Technologies, LLC Certificate Policy and Certification Practice Statement (CP/CPS) Version 3.8 April 15, 2016 i Starfield CP-CPS V3.8 Table of Contents 1 Introduction... 1 1.1 Overview... 1 1.2
Larry Laine, Deputy Land Commissioner and Chief Clerk. Annual Report on the Internal Audit Quality Assurance and Improvement Program
DATE: TO: FROM: SUBJECT: Larry Laine, Deputy Land Commissioner and Chief Clerk Tracey Hall, Deputy Commissioner of Internal Audit Annual Report on the Internal Audit The following report is presented in
Service Organization Controls. Managing Risks by Obtaining a Service Auditor s Report
Service Organization Controls Managing Risks by Obtaining a Service Auditor s Report Contributing Authors Audrey Katcher, CPA, CITP, Partner at RubinBrown, LLP Janis Parthun, CPA, CITP, Sr. Technical Manager
WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities Extended Validation Code Signing
WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities Extended Validation Code Signing Based on: CA/Browser Forum Guidelines for the Issuance and Management
SCHEDULES OF CHAPTER 40B MAXIMUM ALLOWABLE PROFIT FROM SALES AND TOTAL CHAPTER 40B COSTS EXAMINATION PROGRAM
7/30/07 SCHEDULES OF CHAPTER 40B MAXIMUM ALLOWABLE PROFIT FROM SALES AND TOTAL CHAPTER 40B COSTS Instructions: EXAMINATION PROGRAM This Model Program lists the major procedures and steps that should be
RISK ADVISORY SERVICES CONSTRUCTION AUDIT SERVICES
RISK ADVISORY SERVICES CONSTRUCTION AUDIT SERVICES AS ECONOMIC AND FINANCIAL CHALLENGES WEIGH ON, ORGANIZATIONS FIND IT INCREASINGLY DIFFICULT TO LOCATE ENOUGH MONETARY SUPPORT TO HELP FACILITATE THE CONSTRUCTION
epki Root Certification Authority Certification Practice Statement Version 1.2
epki Root Certification Authority Certification Practice Statement Version 1.2 Chunghwa Telecom Co., Ltd. August 21, 2015 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 1 1.1.1 Certification Practice Statement...
Reporting on Control Procedures at Outsourcing Entities
Auditing Guidance Statement AGS 1042 (July 2002) Reporting on Control Procedures at Outsourcing Entities Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation
J-SOX Compliance Approach Best Practices for Foreign Subsidiaries November 8, 2007
J-SOX Compliance Approach Best Practices for Foreign Subsidiaries November 8, 2007 Protiviti Background Consulting firm dedicated to business and technology risk consulting, and internal audit services
SECURITY AND EXTERNAL SERVICE PROVIDERS
SECURITY AND EXTERNAL SERVICE PROVIDERS How to ensure regulatory compliance and manage risks with Service Organization Control (SOC) Reports Jorge Rey, CISA, CISM, CGEIT Director, Information Security
Certification Practice Statement of CERTUM s Certification Services
Certification Practice Statement of CERTUM s Certification Services Appendix 3: Guidelines for the issuance and management of Extended Validation SSL certificates Version 3.2 Date: 9 th of February, 2011
Audit Evidence. AU Section 326. Introduction. Concept of Audit Evidence AU 326.03
Audit Evidence 1859 AU Section 326 Audit Evidence (Supersedes SAS No. 31.) Source: SAS No. 106. See section 9326 for interpretations of this section. Effective for audits of financial statements for periods
Chapter 5 SUPERVISORY COMMITTEE TABLE OF CONTENTS
Chapter 5 SUPERVISORY COMMITTEE TABLE OF CONTENTS SUPERVISORY COMMITTEE... 5-1 Examination Objectives... 5-1 Associated Risks... 5-1 Overview... 5. 1 Scope Development and Planning... 5-2 Meeting with
Aboriginal Affairs and Northern Development Canada. Internal Audit Report. Audit of Internal Controls Over Financial Reporting.
Aboriginal Affairs and Northern Development Canada Internal Audit Report Audit of Internal Controls Over Financial Reporting Prepared by: Audit and Assurance Services Branch Project #: 14-05 November 2014
Assessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures. December 2005
Assessing the Adequacy and Effectiveness of a Fund s Compliance Policies and Procedures December 2005 Copyright 2005 Investment Company Institute. All rights reserved. Information may be abridged and therefore
Sarbanes-Oxley Section 404: Management s Assessment Process
Sarbanes-Oxley Section 404: Management s Assessment Process Frequently Asked Questions ADVISORY Contents 1 Introduction 2 Providing a Road Map for Management 3 Questions and Answers 3 Section I. Planning
INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN
Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit
QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT. OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0.
QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0.3 Effective Date: 20 April 2009 Version: 4.6 Copyright QuoVadis
Department of Defense External Interoperability Plan Version 1.0
Department of Defense External Interoperability Plan Version 1.0 The Office of the Assistant Secretary of Defense for Networks and Information Integration/DoD Chief Information Officer 1 INTRODUCTION...
GUIDELINES FOR AUDITS OF COUNTY AND CITY HOSPITALS BY INDEPENDENT CERTIFIED PUBLIC ACCOUNTING FIRMS
GUIDELINES FOR AUDITS OF COUNTY AND CITY HOSPITALS BY INDEPENDENT CERTIFIED PUBLIC ACCOUNTING FIRMS ISSUED JUNE 2002 INTRODUCTION On March 21, 2002, Public Law 91, 2002 amended IC 16-22-3-12 to allow county
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to
SSAE 16 and ISAE 3402: Preparing for New Service Company Control Standards Mastering Requirements Governing Your Next Controls Report
Presenting a live 110 minute teleconference with interactive Q&A SSAE 16 and ISAE 3402: Preparing for New Service Company Control Standards Mastering Requirements Governing Your Next Controls Report WEDNESDAY,
AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS:
1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org STAFF VIEWS AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN
Enterprise Risk Management & Information Technology
Enterprise Risk Management & Information Technology Presented by Scott Perry and Gary Ross Slalom Consulting, San Francisco Agenda Introductions Session Objectives Overview of Enterprise Risk Management
Service Organization Control (SOC) reports What are they?
Service Organization Control (SOC) reports What are they? Jeff Cook, CPA, CITP, CIPT, CISA June 2015 Introduction Service Organization Control (SOC) reports are on the rise in the IT assurance and compliance
Performance Measures for Internal Auditing
Performance Measures for Internal Auditing A simple question someone may ask is Why measure performance? An even simpler response would be that what gets measured gets done. McMaster University s discussion
The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011
The Changing SAS 70 Landscape Dan Hirstein Director Rebecca Goodpasture Senior Manager Deloitte & Touche LLP January 13, 2011 Table of Contents A Short History of SAS 70 Overview of SSAE 16 and ISAE 3402
ANDRE BELLEFEUILLE Anne-Marie Gammon, MBA, FCMA, CPA(NB), CMA Chief Executive Officer
ANDRE BELLEFEUILLE Anne-Marie Gammon, MBA, FCMA, CPA(NB), CMA Chief Executive Officer Andre Bellefeuille, CMA Director, Marketing, Business Dev & Comm CPA Atlantic School of Business April 15, 2015 Agenda
SERVICE ORGANIZATION CONTROL REPORTS SM. Formerly SAS 70 Reports
SERVICE ORGANIZATION CONTROL REPORTS SM Formerly SAS 70 Reports SAS No. 70, Service Organizations Standard for reporting on a service organization s controls affecting user entities financial statements
Establishing a Quality Assurance and Improvement Program
Chapter 2 Establishing a Quality Assurance and Improvement Program O v e rv i e w IIA Practice Guide, Quality Assurance and Improvement Program, states that Quality should be built in to, and not on to,
Vendor Management Best Practices
23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion
Asset Manager Guide to SAS 70. Issue Date: October 7, 2007. Asset
Asset Manager Guide to SAS 70 Issue Date: October 7, 2007 Asset Management Group A s s e t M a n a g e r G u i d e SAS 70 Table of Contents Executive Summary...3 Overview and Current Landscape...3 Service
Special Purpose Reports on the Effectiveness of Control Procedures
Auditing Standard AUS 810 (July 2002) Special Purpose Reports on the Effectiveness of Control Procedures Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation
Based on: CA/Browser Forum. Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Version 1.1.
WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities SSL Baseline with Network Security Version 2.0 Based on: CA/Browser Forum Baseline Requirements
GlobalSign CA Certificate Policy
GlobalSign CA Certificate Policy Date: December 17 th 2007 Version: v.3.0 Table of Contents Document History...1 Acknowledgments...2 1. Introduction...3 1.1 Overview...4 1.1.1 GlobalSign Rootsign...5 1.1.2
The Auditor s Consideration of the Internal Audit Function in an Audit of Financial Statements
Auditor s Consideration of Internal Audit Function 1805 AU Section 322 The Auditor s Consideration of the Internal Audit Function in an Audit of Financial Statements (Supersedes SAS No. 9.) Source: SAS
GAO. Government Auditing Standards: Implementation Tool
United States Government Accountability Office GAO By the Comptroller General of the United States December 2007 Government Auditing Standards: Implementation Tool Professional Requirements Tool for Use
TRUST SERVICE PROVIDERS SUPERVISORY QUESTIONNAIRE for Natural Persons
CENTRALE BANK VAN CURAÇAO EN SINT MAARTEN (CENTRAL BANK) TRUST SERVICE PROVIDERS SUPERVISORY QUESTIONNAIRE for Natural Persons Supervisory Questionnaire as of January 1, 20. For: (Name of trust service
SSAE 16 Everything You Wanted To Know But Are Afraid To Ask. Kurt Hagerman CISA, CISSP, QSA Managing Director, Coalfire December 8, 2011
SSAE 16 Everything You Wanted To Know But Are Afraid To Ask Kurt Hagerman CISA, CISSP, QSA Managing Director, Coalfire December 8, 2011 1 Agenda SAS 70 Misunderstood and Overused o Why the change? SSAE
Comptroller of Public Accounts Effectiveness of Internal Engagement May 1997
Table of Contents Comptroller of Public Accounts Effectiveness of Internal Engagement May 1997 Overall Conclusion...1 The Internal Audit Department Is Currently Effective in All Eight Criteria, But Could
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
Audit Considerations Relating to an Entity Using a Service Organization
Audit Considerations Relating to an Entity 349 AU-C Section 402 Audit Considerations Relating to an Entity Using a Service Organization Source: SAS No. 122; SAS No. 128. Effective for audits of financial
Weighing in on the Benefits of a SAS 70 Audit for Payroll Service Providers
Weighing in on the Benefits of a SAS 70 Audit for Payroll Service Providers With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener eye
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
Service Organization Controls. Managing Risks by Obtaining a Service Auditor s Report
Service Organization Controls Managing Risks by Obtaining a Service Auditor s Report Contributing Authors Audrey Katcher, CPA/CITP, Partner at RubinBrown, LLP Janis Parthun, CPA/CITP, Sr. Technical Manager
Information for Management of a Service Organization
Information for Management of a Service Organization Copyright 2011 American Institute of Certified Public Accountants, Inc. New York, NY 10036-8775 All rights reserved. For information about the procedure
Audit Report. Office of Inspector General. Department of the Treasury
Audit Report Report Number: OIG-SBLF-14-011 STATE SMALL BUSINESS CREDIT INITIATIVE: Indiana s Use of Federal Funds for Other Credit Support Programs June 18, 2014 Office of Inspector General Department
RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0
Forum RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying and distribution
GUIDELINE NO. 22 REGULATORY AUDITS OF ENERGY BUSINESSES
Level 37, 2 Lonsdale Street Melbourne 3000, Australia Telephone.+61 3 9302 1300 +61 1300 664 969 Facsimile +61 3 9302 1303 GUIDELINE NO. 22 REGULATORY AUDITS OF ENERGY BUSINESSES ENERGY INDUSTRIES JANUARY
FIRST CITIZENS BANCSHARES, INC. FIRST-CITIZENS BANK & TRUST COMPANY CHARTER OF THE JOINT AUDIT COMMITTEE
FIRST CITIZENS BANCSHARES, INC. FIRST-CITIZENS BANK & TRUST COMPANY CHARTER OF THE JOINT AUDIT COMMITTEE As amended, restated, and approved by the Boards of Directors on July 28, 2015 This Charter sets
Farewell to SAS 70. What you need to know about the New Standard for Service Organization Reporting
Farewell to SAS 70 What you need to know about the New Standard for Service Organization Reporting ADVISORY rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International Cooperative
Resolution Agreement. Montana School for the Deaf and Blind OCR Reference No. 10161160
Resolution Agreement Montana School for the Deaf and Blind OCR Reference No. 10161160 The Office for Civil Rights (OCR) of the U.S. Department of Education initiated an investigation into an allegation
United States Patent and Trademark Office
U.S. DEPARTMENT OF COMMERCE Office of Inspector General United States Patent and Trademark Office FY 2009 FISMA Assessment of the Patent Cooperation Treaty Search Recordation System (PTOC-018-00) Final
OF CPAB INSPECTION FINDINGS
PROTOCOL FOR AUDIT FIRM COMMUNICATION OF CPAB INSPECTION FINDINGS WITH AUDIT COMMITTEES CONSULTATION PAPER NOVEMBER 2013 The Canadian Public Accountability Board ( CPAB ) is requesting comments on the
GREAT AMERICAN TITLE OF HOUSTON, LLC D/B/A GREAT AMERICAN TITLE COMPANY EXAMINATION REPORT NOVEMBER 24, 2015
GREAT AMERICAN TITLE OF HOUSTON, LLC D/B/A GREAT AMERICAN TITLE COMPANY EXAMINATION REPORT NOVEMBER 24, 2015 INDEPENDENT ACCOUNTANTS' REPORT To the Board of Directors of Great American Title of Houston,
GlobalSign Data Protection Policy
GlobalSign Data Protection Policy Version 1.6 IMPORTANT NOTICE: YOU MUST READ THE GLOBALSIGN CERTIFICATION PRACTICE STATEMENT (HEREUNDER, CPS) BEFORE APPLYING FOR A CERTIFICATE: http://www.globalsign.net/repository/
