Coleg Gwent. Wireless Audit. Internal Audit Report (2.10/11) 23 May Overall Opinion: Amber Green

Size: px
Start display at page:

Download "Coleg Gwent. Wireless Audit. Internal Audit Report (2.10/11) 23 May 2011. Overall Opinion: Amber Green"

Transcription

1 Coleg Gwent Wireless Audit Internal Audit Report (2.10/11) 23 May 2011 Overall Opinion: Amber Green

2 Coleg Gwent CONTENTS Section Page Executive Summary 1 Action Plan 5 Findings and Recommendations 10 Debrief meeting 10 December 2010 Auditors Helen Cargill, Associate Director Draft report issued 22 December 2010 Heather Wheatley, IA Manager Responses received 25 February 2011 Sheila Pancholi, ISA Associate Director Steve Snaith, ISA Associate Director Aaron Chu, Senior ISA Consultant Final report issued Revised final report issued: 28 February May 2011 Client sponsor Distribution Lynda Astell, Vice Principal (Finance, Estate and Information Services) Lynda Astell, Vice Principal (Finance, Estate and Information Services) Mike Holcombe, Head of IT This review has been performed using RSM Tenon s bespoke internal audit methodology, i-ris. The matters raised in this report are only those which came to our attention during our internal audit work and are not necessarily a comprehensive statement of all the weaknesses that exist, or of all the improvements that may be required. Whilst every care has been taken to ensure that the information provided in this report is as accurate as possible, based on the information provided and documentation reviewed, no complete guarantee or warranty can be given with regard to the advice and information contained herein. Our work does not provide absolute assurance that material errors, loss or fraud do not exist. This report is prepared solely for the use of Board and senior management of Coleg Gwent. Details may be made available to specified external agencies, including external auditors, but otherwise the report should not be quoted or referred to in whole or in part without prior consent. No responsibility to any third party is accepted as the report has not been prepared, and is not intended for any other purpose RSM Tenon Limited RSM Tenon Limited is a member of RSM Tenon Group RSM Tenon Limited is an independent member firm of RSM International an affiliation of independent accounting and consulting firms. RSM International is the name given to a network of independent accounting and consulting firms each of which practices in its own right. RSM International does not exist in any jurisdiction as a separate legal entity. RSM Tenon Limited (No ) is registered in England and Wales. Registered Office 66 Chiltern Street, London W1U 4GB. England

3 Coleg Gwent 1 1 EXECUTIVE SUMMARY 1.1 INTRODUCTION A Wireless Audit was undertaken as part of the approved internal audit periodic plan for 2010/11. Coleg Gwent ( The College ) is the largest further education college in Wales, with five campuses and two Learn IT Centres across Gwent at Newport, Crosskeys, Ebbw Vale, Pontypool, Usk, Cwmbran and Monmouth. The College has deployed a centrally managed wireless network infrastructure manufactured by Trapeze. This infrastructure hosts two networks, with one for trusted users from the College, such as staff and students, and the other for guests. Authentication to the trusted network is based on Windows Active Directory. The guest network is open access, but it has not been designed with access to the Internet and the internal network. The College is currently engaging in a programme of investments to upgrade its IT infrastructure which includes the expansion of its wireless network coverage to its entire estate. To this end, it has commissioned a network consultancy firm LAN2LAN to devise an implementation strategy for additional wireless infrastructure. The proposal includes ways to manage guest access to the wireless network. The College had installed a new firewall as part of a trial process just before this review was performed, in order to determine the most suitable firewall solution to procure next year. The audit was designed to assess the controls in place to manage the following objectives and risks: Objective Risk To provide high level assurance that wireless network operates in a secure and controlled environment. Unauthorised access to data transmitted over the wireless network or to the wider wired network. Faults, failures or security incidents are not dealt with efficiently or effectively. 1.2 CONCLUSION Taking account of the issues identified, the Board can take reasonable assurance that the controls upon which the organisation relies to manage this risk are suitably designed, consistently applied and effective. However we have identified issues that, if not addressed, increase the likelihood of the risk materialising. The above conclusions feeding into the overall assurance level are based on the evidence obtained during the review. The key findings from this review are as follows: of control framework The following primary wireless network controls have been designed: Group policy has been designed to lock down wireless network settings on College workstations, reducing the risk of individuals gaining access to details of the security settings which may be exploited, compromising wireless network s integrity.

4 Coleg Gwent 2 Access points deployed in the public areas across the estate have been designed not to retain any network data and settings, reducing the risk of the network security configurations and related being compromised and exploited, adversely impacting the integrity of the wireless network. The trusted wireless network is designed with the WPA2/AES encryption standard, reducing the risk of the unauthorised interception of information transferred over the wireless network, adversely impacting information and network integrity. In addition, the wireless network for trusted users has been designed to require authentication using Active Directory. A contract has been established between the College and LAN2LAN to provide technical support to the wireless network, reducing the risk of issues not addressed in a timely manner that compromise the availability of the wireless network service. However, we did identify a number of weaknesses in the design of wireless network controls that impact network security, principally: The firewall has been designed with rules that that are not sufficiently restricted, increasing the risk of non-trusted individual obtaining network access. The procedure designed for revoking user accounts on Active Directory relies on monthly HR leavers reports, increasing the risk that redundant accounts are not disabled in a timely manner which may be targeted to gain unauthorised access. There is no arrangement in place to log user activities on the wireless network, including the audit policy on Active Directory, increasing the risk of the College not being able to trace security incidents retrospectively. Penetration tests are not performed periodically, increasing the risk that technical vulnerabilities on the wireless network are not identified and addressed in a timely manner. Application of and compliance with control framework We identified the following area for management attention that adversely impacts the integrity of the wireless network: The review on Active Directory found that 64 accounts had access to the wireless network management console server, increasing the risk of intruders targeting these accounts to gain access and make inappropriate changes to the configurations. Overall, we note that the College is taking actions to improve the existing wireless network infrastructure by with the development of an implementation strategy with the support from LAN2LAN. Our overriding recommendation is for the management to consider the recommendations identified in this report when finalising its implementation strategy to help strengthen the control framework that is already in place. Moreover, a number of weaknesses identified in this report require the immediate attention of the management, particularly the weaknesses in the firewall rules. 1.3 SCOPE OF THE REVIEW The objective of our audit was to evaluate the adequacy of risk management and control within the system and the extent to which controls have been applied, with a view to providing an opinion. Control activities are put in place to ensure that risks to the achievement of the organisation s objectives are managed effectively. When planning the audit, the following controls for review and limitations were agreed: Control activities relied upon: Security controls in place over the operation of wireless network; and Management monitoring controls over the wireless network. Limitations to the scope of the audit: This was a high level review of the control framework and detailed testing on the adequacy of individual components of this framework was not undertaken.

5 Coleg Gwent 3 We did not physically visit every wireless access point and location but we had undertaken base testing at the Pontypool campus as this was the location of the server hosting the management console and one of the two wireless network controllers. We did not carry out detailed firewall testing. The review of the procedure for granting student access on Active Directory was limited to the point when export files were made from the EBS enrolment database. We did not carry out a review on the process of importing student records onto EBS. Our work does not provide an absolute assurance that material errors, loss or fraud do not exist. The approach taken for this audit was a Risk-Based Audit. 1.4 RECOMMENDATIONS SUMMARY The following tables highlight the number and categories of recommendations made. The Action Plan at Section 2 details the specific recommendations made as well as agreed management actions to implement them. Recommendations made during this audit: Our recommendations address the design and application of the control framework as follows: Priority High Medium Low of control framework Application of control framework Total The recommendations address the risks within the scope of the audit as set out below: Priority Ris k High Medium Low Unauthorised access to data transmitted over the wireless network or to the wider wired network. Faults, failures or security incidents are not dealt with efficiently or effectively Total 0 5 8

6 Coleg Gwent 4 2 ACTION PLAN The priority of the recommendations made is as follows: Priority Description High Medium Low Suggestion Recommendations are prioritised to reflect our assessment of risk associated with the control weaknesses. These are not formal recommendations that impact our overall opinion, but used to highlight a suggestion or idea that management may want to consider. Ref Recommendation Categorisation Accepted (Y/N) Management Comment Implementation Date Manager Responsible 1.9 Management should review the existing firewall rules to ensure that they are robust in blocking un-trusted users gaining access to the Internet without sufficient safeguards in place. Medium Y The firewall has been replaced and a review of firewall rules undertaken. Complete N/A The accounts on Active Directory with access to the RingMaster server should be reviewed and remove all redundant access. Individual accounts should be set up on RingMaster and the generic accounts removed. Medium Y The new version release of Ringmaster provides for more granular user accounts. Increased security of Ringmaster Accounts will be implemented as part of this upgrade. May 2011 Head of IT 1.14 The IT Department should create a formal joint workflow process with HR to ensure that notifications from line mangers of Medium Y Management accept that user accounts should be de-activated on a timely basis when a July 2011 Head of IT

7 Coleg Gwent 5 Ref Recommendation Categorisation Accepted (Y/N) Management Comment Implementation Date Manager Responsible leavers are notified to both HR and IT concurrently to help facilitate the prompt deactivation of user accounts. As an additional control, the IT Department should perform a monthly analysis to identify and investigate accounts which have not been accessed for the past 90 days. member of staff leaves the College. The current practice can lead to a delay of up to 30 days although line managers of departments with higher risk users notify IT immediately on resignation or confirmation of leaving date. This approach balances practical consideration with risk and subject to audit committee agreement this approach will be formalised within the IT Security Policy Penetration tests should be carried out periodically to identify any security weaknesses in the wireless network infrastructure. Medium Y Proposals and costs have been obtained from suppliers. Tests are to be scheduled after the Firewall upgrade. June 2011 Head of IT 2.4 Audit policy should be enabled on Active Directory: Requirement Audit account logon events Audit account management Audit directory service access Audit logon events Audit object access Audit policy change Audit privilege use Audit process tracking Audit system events Value Success and failure Success Success Success and failure No auditing Success No auditing No auditing Success Medium Y As stated in the main body of the report previous attempts to activate the audit policy have resulted in serious degradation of network performance under Windows Server The College is now cautiously turning on the audit policy element by element and assessing network performance each time. This will continue until the full audit policy is enabled subject to maintaining network performance. December 2011 Head of IT

8 Coleg Gwent 6 Ref Recommendation Categorisation Accepted (Y/N) Management Comment Implementation Date Manager Responsible 1.1 Management should enable the password complexity security setting in accordance with best practice. Low Y The College complies with best practice requirements with the exception of enabling password complexity. By Sept 2011 Head of IT The current version of Windows server does not support a granular password policy which means that all staff and students are covered by the same password policy. Due to the diverse mix of staff and students a single complex policy is not practical and is why it is not currently enabled. The College is on track to upgrade to a new version of Windows Server by September 2011 at which point will implement password complexity on a granular, risk related basis. 1.2 A procedure should be established to seek formal acceptance from Guest Users to abide by the College s acceptable terms of usage. Low Y This will be reviewed and a suitable solution implemented August 2011 Head of IT 1.3 The Wireless Network Security Policy should be finalised and be made available to all users. Low Y A final Wireless Network Security policy will be available by July July 2011 Head of IT However, it should be noted that all key IT security issues are included in the overarching IT

9 Coleg Gwent 7 Ref Recommendation Categorisation Accepted (Y/N) Management Comment Implementation Date Manager Responsible Security Policy. The Wireless Network Security Policy will address specific wireless deployment issues such as frequency management. The College is still in the process of rolling wireless access out across the College and the draft policy has been evolving during this period 1.4 The Trapeze Wireless Configuration Documentation should be maintained and updated on a regular basis to ensure that it remains current. This should include an up to date network diagram that incorporates both the wireless and the rest of the network infrastructure of the College. Version control should be included in the documentation to track the revisions and updates made. Low Y Whilst we agree that the documentation should be maintained we also believe that the current documentation is consistent with current requirements. However, documentation will be updated and amended as part of the upcoming wireless project. August 2011 Head of IT Auditors Comment Noted 1.5 Management should consider purchasing the required software license to enable the management of the two controllers as a cluster. Low Y The Licences have now been purchased and implemented. Complete. N/A As an interim measure, the IT Department should perform a review on a regular basis to ensure that the settings

10 Coleg Gwent 8 Ref Recommendation Categorisation Accepted (Y/N) Management Comment Implementation Date Manager Responsible applied between the two controllers are consistent. Each review should be documented to ensure the existence of audit trails Completed new user request forms should be retained for the duration when the accounts remain active to provide adequate audit trails. This should include the s from line managers with the forms attached to confirm approval when the forms are not signed. A sample check should be performed on a monthly basis on the completed processed during the period to confirm that all fields have been completed accurately. Low Y Management does not accept that new user request forms need to be retained for the duration of an user account remaining active. However, it is agreed that request forms should be maintained for 12 months and that high risk users accounts should be subject to checking 1 month after set up. This will be implemented. July 2011 Head of IT 2.2 An arrangement should be established to capture activities on the College s wireless networks. Low Y This will be reviewed and an appropriate solution implemented as part of the wireless roll out project. December 2011 Head of IT 2.5 The IT Department should configure its existing alerting system to report faults developed in the wireless network infrastructure. Low Y notification has been implemented within Ringmaster to alert IT Staff of any AP or controller failures. Completed N/A

11 Coleg Gwent 9 3 FINDINGS AND RECOMMENDATIONS Risk 1: Unauthorised access to data transmitted over the wireless network or to the wider wired network. 1.1 Over-arching IT Security Policy The College has designed an IT Security Policy which is available on the Intranet, which applies to both staff and learners. It encompasses a number of security areas in particular: Reference to relevant legislation; and The acceptable use of the Internet. Password security settings. Yes The most recent version of the IT Security Policy was reviewed and approved following minor amendment. It was noted that the most recent version had not been uploaded on the intranet but were advised that this had been addressed following completion of our audit fieldwork. Although the Policy requires all passwords not to be shared and complies with best practice it does not meet best practice in terms of enabling password complexity Management should enable the password complexity security setting in accordance with best practice. Low Furthermore, there is a requirement for the Policy to be reviewed on a two yearly basis. The Policy was reviewed and agreed at both F&E Committee (20/07/10) and HR&R Committee (02/11/10).

12 Coleg Gwent Guest Acknowledgement to Usage Terms and Conditions There is no arrangement in place for guest classified users to acknowledge formally the acceptance to abide by the terms and conditions on acceptance use of the wireless network. No Visitors, who may not have access to the IT Security Policy, may not know of their obligations and the acceptable use of the wireless network, increasing the risk of inappropriate use that compromise network security. In addition, the College may be liable for any inappropriate and illegal activities over the guest wireless network. A procedure should be established to seek formal acceptance to abide by the College s acceptable terms of usage. Low 1.3 Wireless Network Security Policy A draft Wireless Network Policy has been documented since March 2008, but it has not finalised. It applies to all users including visitors, and it has defined the following principal requirements: No The lack of a wireless network strategy increases the risk of the inconsistent application and implementation of the wireless network security and infrastructure, adversely impacting the wireless network integrity. The Wireless Network Security Policy should be finalised and be made available to all users. Low the use of encryption; unique authentication for each user or session login for visitors; the authorisation from the IT Department before any new wireless network can be installed; installation must comply with the wireless network architecture and standards;

13 Coleg Gwent 11 and staff and students may access the wireless network using their standard Windows credential. The policy does not set out the physical access control requirements, and the arrangements for guests connecting to the guest wireless network. Nonetheless, there is a guide for visitors on how to gain access to the guest wireless network. 1.4 Trapeze Wireless Configuration Documentation A Trapeze Wireless Configuration documentation is in place which defines the following settings: RingMaster server; Wireless Controller; VLAN; SSID; and Access point locations in each campus. No Without current standard configuration documentation for the wireless network, there is a risk that the infrastructure may be implemented inconsistently, resulting in security vulnerabilities that compromise network integrity. The Trapeze Wireless Configuration Documentation should be maintained and updated on a regular basis to ensure that it remains current. This should include an up to date network diagram that incorporates both the wireless and the rest of the network infrastructure of the College. Version control should be included in the documentation to track the revisions and updates made. Low This was prepared in August

14 Coleg Gwent but it is not up to date, for example the location of the wireless access points is not current. In addition, the documentation lists only 26 access points out of the 59 access points reported on the central management console called RingMaster. 1.5 RingMaster (Central Console) The College has deployed the software Trapeze RingMaster for managing the wireless networks centrally, including the two wireless network controllers. We have been informed by the Assistant Head of IT that due to the lack of additional software licence, the College has been prevented from managing the two controllers as a cluster. No Managing the two controllers separately increases the risk of inconsistency in the configurations, adversely impacting the integrity of the wireless networks. Management should consider purchasing the required software license to enable the management of the two controllers as a cluster. As an interim measure, the IT Department should perform a review on a regular basis to ensure that the settings applied between the two controllers are consistent. Each review should be documented to ensure the existence of audit trails. Low As a result, the current design requires the IT Department to managing the two separately on RingMaster.

15 Coleg Gwent Wireless Network Controllers The College has deployed two wireless network controllers at Pontypool and Cross Key. They are designed to connect and manage a series of access points on the wireless network infrastructure. Each access point has been designed not to store any data, encryption keys or security credentials locally. 1.7 Network Identifier (SSID) There are two SSIDs currently in use with one for the trusted users, such as learners and staff, while the other is designed for guests. 1.8 Wireless Network Encryption The trusted network is encrypted to the WPA2/AES standard. However, the guest network is unsecured. Yes Yes Yes The design of a centrally configured wireless network solution with access points that do not retain network data was found to be adequate and reduce the risk of the security settings being compromised if access points are stolen. It was observed at the Pontypool campus that both SSIDs are observed to broadcast to the public. On discussion it was noted that this is in line with best practice advice provided to the College by experts in this area. Although the trusted network has been designed to encrypt data using the WPA2/AES encryption standard, the guest wireless network is unsecured. On discussion it was ascertained that the College had taken guidance from Wireless experts on making this decision.

16 Coleg Gwent Segregation of the Wireless Networks Each wireless network has been designed as a virtual LAN (VLAN) that is separate from the internal network. For the trusted VLAN, a connection has been designed to gain access to the internal network resources. No Without keeping the network diagram up to date, there is a risk of inappropriate changes to the network infrastructure, adversely impacting network integrity. A firewall that does not contain robust rules increases the risk of un-trusted users gaining access to the Internet from the wireless network, increasing the risk of inappropriate use that may adversely impact network integrity. Management should review the existing firewall rules to ensure that they are robust in blocking un-trusted users gaining access to the Internet without sufficient safeguards in place. Medium The design of the guest VLAN is restricted with no access to the internal network and the Internet access is blocked by the FortiGate firewall, which has only been installed the day before our review on site. However, the following issues exist: The VLAN arrangements have not been documented in the current network diagram. The high-level review of the rules designed for FortiGate firewall showed that a rule had been defined to deny all outward traffic from all internal network addresses. However, in contradiction,

17 Coleg Gwent 15 there were rules designed allowing services from all internal network addresses to all external destinations. While some of these rules had a pre-requisite requirement for Active Directory authentication before traffic was permitted, it was observed that access could be gained external access using a network file transfer protocol on the guest wireless network with no authentication or encryption designed. Note: The network will revert to the legacy firewall from 16 December Lockdown of Network Settings Group policy has been configured to prevent users from gaining access to network connection properties, and access to the advanced configuration settings. Yes The design of using group policies to lockdown network configurations was found to be adequate and reduce the risk of users gaining access to and making inappropriate changes to the wireless network settings, compromising the end-point wireless network security integrity.

18 Coleg Gwent Logical Access Control RingMaster There are three levels of logical access controls designed for RingMaster: Active Directory authentication to gain access to the dedicated server hosting RingMaster; restrictions of memberships on Active Directory with access to the RingMaster server; and RingMaster authentication itself. Yes The design of the three-level logical access controls for the access to RingMaster was found to be adequate and reduce the risk of unauthorised changes to the wireless network configurations that adversely impact the wireless network s integrity. We reviewed the list of user access on Active Directory and found that 64 accounts had access to the RingMaster server: User Group No. IT Support 39 Users 22 Business Systems 2 Network Admin 1 Total 64 The number of accounts with access at the server level is considered excessive. In addition, we reviewed the list of accounts on RingMaster and found that two generic accounts had been set up rather than accounts for each individual as expected. One of the accounts provided the full administrator access while the other was view only. The accounts on Active Directory with access to the RingMaster server should be reviewed and redundant / not necessary access removed. Individual accounts should be set up on RingMaster and the generic accounts removed. Medium Overall, the control is not operating as intended, increasing the risk of unauthorised access to RingMaster through the exploitation of Active Directory and

19 Coleg Gwent Logical Access Control Trusted Users The College has designed the wireless access points to require Active Directory authentication to gain access to the trusted wireless network. Yes RingMaster accounts. The design of using Windows Active Directory user authentication as a way to control the logical access to the trusted wireless network was found to be adequate and reduce the risk of unauthorised access by an unauthorised individual, compromising the integrity of the trusted wireless and internal network Two arrangements have been designed to grant user access on Active Directory: Staff: A completed New User Request Form with line manager authorisation and a valid staff number is required before an account can be set up by the IT Department. Students: Student records are retrieved from the EBS enrolment database by the IT Department in CSV format which is then uploaded manually to AD Manager to create student user accounts in batches. Yes The design of the arrangement for granting user access on Active Directory was found to be adequate and reduce the risk of inappropriate access which may be exploited, adversely impacting network integrity. To validate controls operation, we selected a sample of 10 student accounts from the network Active Directory and found that all had records on the EBS student enrolment database. A sample of 10 staff accounts were selected from Active Directory, and found that only the forms completed in 2010 were retained. As a result, we selected an additional 5 accounts which were created in 2010 for testing. Completed new user request forms should be retained for the duration when the accounts remain active to provide adequate audit trails. This should include the s from line managers with the forms attached to confirm approval when the forms are not signed. A sample check should be performed on a monthly basis on the completed processed during the period to confirm that all fields have been completed accurately. Low In all we found the following:

20 Coleg Gwent 18 Result No. of cases Forms missing due to 8 accounts created prior to 2010 Accounts created in 2010 with 6 forms retrieved Account created in 2010 but 1 form was missing Total 15 For the 6 forms found, 3 were fully completed. For the remaining samples, two were submitted to the IT Department by e- mail and they were not retained along with the forms, and one was found to have the employment status box incomplete. Overall, the control is not operating as intended, increasing the risk of accounts created inappropriately and without accountability on Active Directory, compromising the integrity of the trusted wireless network.

Coleg Gwent. Business Continuity Plan Test - Post Implementation Review (PIR) Internal Audit Report (12.09/10)

Coleg Gwent. Business Continuity Plan Test - Post Implementation Review (PIR) Internal Audit Report (12.09/10) Internal Audit Report 1 June 2010 Business Continuity Plan Test Post Implementation Review (PIR) CONTENTS Section Page Executive Summary 1 Action Plan 4 Findings and Recommendations 5 Debrief meeting 28

More information

Essex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion

Essex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion Essex Fire Authority Fleet Management Internal Audit Report (4.12/13) 28 February 2013 FINAL Overall Opinion Essex Fire Authority Fleet Management 4.12/13 CONTENTS Section Page Executive Summary 1 Action

More information

The Learning Zone - Project Management Arrangements

The Learning Zone - Project Management Arrangements Coleg Gwent Internal Audit Report () 6 June 2012 Overall Opinion The Learning Zone - Project Management Arrangements CONTENTS Section Page Executive Summary 1 Action Plan 4 Findings and Recommendations

More information

Aberdeen City Council IT Security (Network and perimeter)

Aberdeen City Council IT Security (Network and perimeter) Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary

More information

How To Audit A Windows Active Directory System

How To Audit A Windows Active Directory System South Northamptonshire Council Windows Active Directory Final Internal Audit Report - September Distribution list: Mike Shaw IT & Customer Services Manager David Price Director of Community Engagement

More information

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure

Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section

More information

Solihull Metropolitan Borough Council. IT Audit Findings Report September 2015

Solihull Metropolitan Borough Council. IT Audit Findings Report September 2015 Solihull Metropolitan Borough Council IT Audit Findings Report September 2015 Version: Responses v6.0 SMBC Management Response July 2015 Financial Year: 2014/2015 Key to assessment of internal control

More information

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INTERNET- BASED NETWORK SECURITY

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INTERNET- BASED NETWORK SECURITY Appendix 1c DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INTERNET- BASED NETWORK SECURITY DISTRIBUTION LIST Audit Team David Esling, Head of Audit Assurance, Risk

More information

Report 6c. Final Internal Audit Report Network and Communications. April 2008

Report 6c. Final Internal Audit Report Network and Communications. April 2008 Report 6c Final Internal Audit Report Network and Communications April 2008 Contents Page Executive Summary 3 Observations and Recommendations 4 Appendix 2 - Staff Interviewed 14 Appendix 3 Benchmark Results

More information

Use of Exchange Mail and Diary Service Code of Practice

Use of Exchange Mail and Diary Service Code of Practice Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are

More information

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority Internal Audit Progress Report (19 th August 2015) Contents 1. Introduction 2. Key Messages for Committee Attention 3. Work in progress Appendix A: Risk Classification and Assurance Levels Appendix B:

More information

Coleg Gwent Internal Audit Report 2012/13 Assets and Inventory. Assurance Rating:

Coleg Gwent Internal Audit Report 2012/13 Assets and Inventory. Assurance Rating: Coleg Gwent Internal Audit Report 2012/13 Assets and Inventory Assurance Rating: Distribution List: Draft Report: Principal Vice Principal, (Finance, Estates and Information Services) Clerk to the Corporation

More information

SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011

SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011 SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011 This report and the work connected therewith are subject to the Terms and Conditions of the contract dated 18/06/07 between South

More information

Dacorum Borough Council Final Internal Audit Report

Dacorum Borough Council Final Internal Audit Report Dacorum Borough Council Final Internal Audit Report ICT Change Management Distribution list: Chris Gordon Group Manager Neil Telkman - Information, Security and Standards Officer Gary Osler ICT Service

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Coleg Gwent Internal Audit Report 2012/13 Payroll and HR. Assurance Rating: Payroll

Coleg Gwent Internal Audit Report 2012/13 Payroll and HR. Assurance Rating: Payroll Coleg Gwent Internal Audit Report 2012/13 Payroll and HR Assurance Rating: Payroll HR Distribution List: Final Report Audit Committee Principal Vice Principal, (Finance, Estates and Information Services)

More information

ESSEX FIRE AUTHORITY. Internal Audit Progress Report. Audit Sub-Committee Meeting: April 2012

ESSEX FIRE AUTHORITY. Internal Audit Progress Report. Audit Sub-Committee Meeting: April 2012 ESSEX FIRE AUTHORITY Internal Audit Progress Report Audit Sub-Committee Meeting: April Essex Fire Authority CONTENTS Section Page 1 Introduction 1 2 Final reports 1 3 Key Findings from Internal Audit Work

More information

EA-ISP-012-Network Management Policy

EA-ISP-012-Network Management Policy Technology & Information Services EA-ISP-012-Network Management Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 01/04/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref:

More information

REVIEW OF THE FIREWALL ARRANGEMENTS

REVIEW OF THE FIREWALL ARRANGEMENTS WEST DORSET DISTRICT COUNCIL REVIEW OF THE FIREWALL ARRANGEMENTS Report issued: December 2007 The matters raised in this report are only those, which came to the attention of the auditor during the course

More information

Cheshire Fire Authority

Cheshire Fire Authority Cheshire Fire Authority Internal Plan 2013/2014 Presented at the Cheshire Fire Authority meeting of: 17 April 2013 Lisa Randall Head of Internal 1 INTRODUCTION This document sets out the approach we have

More information

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION

More information

Ref: Issue Raised Recommendation Priority Management Response Implementation Network and ABS E-Financials 1. Account security settings

Ref: Issue Raised Recommendation Priority Management Response Implementation Network and ABS E-Financials 1. Account security settings Appendix A Hertsmere Borough Council - Review of information technology controls 2011-12 Ref: Issue Raised Recommendation Priority Management Response Implementation Network and ABS E-Financials 1. Account

More information

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY Appendix 1c DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY DISTRIBUTION LIST Audit Team Prakash Gohil, Audit Manager Steven Snaith, Risk

More information

Implementation of Internal Audit Recommendations: Summary of Progress Report by Head of Finance

Implementation of Internal Audit Recommendations: Summary of Progress Report by Head of Finance Financial Scrutiny and Audit Committee 11 February 2014 Agenda Item No 13 Implementation of Internal Audit : Summary of Progress Report by Finance Summary: This report updates members on progress in implementing

More information

University System of Maryland University of Maryland, College Park Division of Information Technology

University System of Maryland University of Maryland, College Park Division of Information Technology Audit Report University System of Maryland University of Maryland, College Park Division of Information Technology December 2014 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298 California State Senate Bill 1386 / Assembly Bill 1298 InterSect Alliance International Pty Ltd Page 1 of 8 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty

More information

Use of The Information Services Active Directory Service (AD) Code of Practice

Use of The Information Services Active Directory Service (AD) Code of Practice Use of The Information Services Active Directory Service (AD) Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be

More information

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network... Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless

More information

NHS Dorset Clinical Commissioning Group. Internal Audit Annual Report 2014/15. May 2015

NHS Dorset Clinical Commissioning Group. Internal Audit Annual Report 2014/15. May 2015 Internal Audit Annual Report 2014/15 May 2015 Internal Audit Annual Report INTRODUCTION This is the 2014/15 Annual Report by TIAA on the internal control environment at Dorset Clinical Commissioning Group.

More information

The University of Information Technology Management System

The University of Information Technology Management System IT Monitoring Code of Practice 1.4 University of Ulster Code of Practice Cover Sheet Document Title IT Monitoring Code of Practice 1.4 Custodian Approving Committee Deputy Director of Finance and Information

More information

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management Appendix 1b DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Review of Mobile Portable Devices Management DISTRIBUTION LIST Audit Team David Esling, Head of Audit and Assurance

More information

Aberdeen City Council

Aberdeen City Council Aberdeen City Council Internal Audit Report Final Contract management arrangements within Social Care & Wellbeing 2013/2014 for Aberdeen City Council January 2014 Internal Audit KPI Targets Target Dates

More information

Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010

Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010 Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010 This report has been prepared on the basis of the limitations set

More information

2.1.1 This policy and any future changes requires ratification by CAUDIT.

2.1.1 This policy and any future changes requires ratification by CAUDIT. 1.0 Background to this document 1.1 This document sets out guidelines that cover the control of the supply and receipt of Internet access for educational purposes, that is primarily (but not exclusively)

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/ Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system

More information

Essex Fire Authority

Essex Fire Authority Internal Audit Report (2.13/.14) FINAL with the Civil Contingencies Act 1 October 2013 Contents Section Page Executive Summary 1 Action Plan 5 Findings and Recommendations 6 Debrief meeting 15 August 2013

More information

HIPAA Compliance for the Wireless LAN

HIPAA Compliance for the Wireless LAN White Paper HIPAA Compliance for the Wireless LAN JUNE 2015 This publication describes the implications of HIPAA (the Health Insurance Portability and Accountability Act of 1996) on a wireless LAN solution,

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

INTERNAL AUDIT 2008/09 INFORMATION TECHNOLOGY (BUSINESS CONTINUITY)

INTERNAL AUDIT 2008/09 INFORMATION TECHNOLOGY (BUSINESS CONTINUITY) 2008/09 SUMMARY Location Subject Business Sponsor Staff engaged Coleg Gwent Information Technology (Business Continuity) Lynda Roberts Sue Harris Head of Internal Audit Gaynor Rains Manager David Bratt

More information

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed.

1. Perimeter Security Dealing with firewall, gateways and VPNs and technical entry points. Physical Access to your premises can also be reviewed. Service Definition Technical Security Review Overview of Service Considering the increasing importance of security, the number of organisations that allow for contingency in their Information Security

More information

Aberdeen City Council IT Asset Management

Aberdeen City Council IT Asset Management Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government

Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax

More information

Police and Crime Commissioner for Avon and Somerset and Avon and Somerset Constabulary

Police and Crime Commissioner for Avon and Somerset and Avon and Somerset Constabulary Avon and Somerset Constabulary Traffic Accidents Internal Audit Report (10.12/13) 12 February 2013 Overall Opinion: Amber/Green CONTENTS Section Page Executive Summary 1 Action Plan 5 Findings and Recommendations

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INCIDENT AND PROBLEM MANAGEMENT

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INCIDENT AND PROBLEM MANAGEMENT Appendix 1c DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INCIDENT AND PROBLEM MANAGEMENT DISTRIBUTION LIST Audit Team David Esling, Head of Audit Assurance, Risk

More information

Standard: Event Monitoring

Standard: Event Monitoring Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information

More information

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)

How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud) SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,

More information

AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR

AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY

More information

Spillemyndigheden s Certification Programme Information Security Management System

Spillemyndigheden s Certification Programme Information Security Management System SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

Internal Audit Report 2010/11 North Norfolk District Council. February 2011

Internal Audit Report 2010/11 North Norfolk District Council. February 2011 Internal Audit Report 2010/11 North Norfolk District Council NN/11/17 Network Infrastructure, Security and Telecommunications February 2011 This report has been prepared on the basis of the limitations

More information

Business Telephony Security

Business Telephony Security Business Telephony Security Toll Fraud - What is it? Toll Fraud or Phreaking is the process of illegal hacking of telecoms systems for the purpose of exploiting phone numbers to profit from premium rate

More information

Password Reset PRO INSTALLATION GUIDE

Password Reset PRO INSTALLATION GUIDE Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. March 2009

More information

Working Practices for Protecting Electronic Information

Working Practices for Protecting Electronic Information Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that

More information

University of Brighton School and Departmental Information Security Policy

University of Brighton School and Departmental Information Security Policy University of Brighton School and Departmental Information Security Policy This Policy establishes and states the minimum standards expected. These policies define The University of Brighton business objectives

More information

COLEG GWENT FURTHER EDUCATION CORPORATION. HUMAN RESOURCES & REMUNERATION COMMITTEE 2 nd November 2010

COLEG GWENT FURTHER EDUCATION CORPORATION. HUMAN RESOURCES & REMUNERATION COMMITTEE 2 nd November 2010 HR&R/Nov/10/22 COLEG GWENT FURTHER EDUCATION CORPORATION HUMAN RESOURCES & REMUNERATION COMMITTEE 2 nd November 2010 Report on Policies reviewed under the 2 year cycle: IT Security Policy Purpose of Report:

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

Guideline on Access Control

Guideline on Access Control CMSGu2011-08 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Access Control National Computer Board Mauritius Version 1.0

More information

Data Network Security Policy

Data Network Security Policy Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005

More information

How To Protect Information At De Montfort University

How To Protect Information At De Montfort University Network Security Policy De Montfort University January 2006 Page 1 of 18 Contents 1 INTRODUCTION 1.1 Background... 1.2 Purpose and Scope... 1.3 Validity... 1.4 Assumptions... 1.5 Definitions... 1.6 References..

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Access Control Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Access Control Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Access Control Policy Document Status Security Classification Version 1.0 Level 4 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention Change

More information

EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH

EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH OIOS conducted an audit of information and communications technology (ICT) governance

More information

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise InterSect Alliance International Pty Ltd Page 1 of 9 About this document The PCI/DSS documentation provides guidance on a set of baseline security measures

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS) Payment Card Industry Data Security Standard (PCI / DSS) InterSect Alliance International Pty Ltd Page 1 of 12 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Procedure Title: TennDent HIPAA Security Awareness and Training

Procedure Title: TennDent HIPAA Security Awareness and Training Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

How To Manage Web Content Management System (Wcm)

How To Manage Web Content Management System (Wcm) WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201 Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...

More information

How to complete the Secure Internet Site Declaration (SISD) form

How to complete the Secure Internet Site Declaration (SISD) form 1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,

More information

Cathay Business Online Banking

Cathay Business Online Banking Cathay Business Online Banking A QUICK GUIDE TO CATHAY BUSINESS ONLINE BANKING R6119 CATHAY 8_5x11 Cover V2.indd 1 6/11/13 5:50 PM Welcome Welcome to Cathay Business Online Banking (formerly known as Cathay

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Supplier name Address Contact name Contact email Contact telephone Parent Teacher Online

More information

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 -------------- w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt.

TICSA. Telecommunications (Interception Capability and Security) Act 2013. Guidance for Network Operators. www.gcsb.govt.nz www.ncsc.govt. TICSA Telecommunications (Interception Capability and Security) Act 2013 Guidance for Network Operators www.gcsb.govt.nz www.ncsc.govt.nz Contents Introduction...2 Overview of the Guidance...3 Focus of

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

Informatics Policy. Information Governance. Network Account and Password Management Policy

Informatics Policy. Information Governance. Network Account and Password Management Policy Informatics Policy Information Governance Policy Ref: 3589 Document Title Author/Contact Document Reference 3589 Document Control Network Account Management and Password Policy Pauline Nordoff-Tate, Information

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

New Systems and Services Security Guidance

New Systems and Services Security Guidance New Systems and Services Security Guidance Version Version Number Date Author Type of modification / Notes 0.1 29/05/2012 Donna Waymouth First draft 0.2 21/06/2012 Donna Waymouth Update re certificates

More information