STATE OF NORTH CAROLINA
|
|
|
- Chastity Bailey
- 10 years ago
- Views:
Transcription
1 STATE OF NORTH CAROLINA INFORMATION SECURITY VULNERABILITY ASSESSMENT PRELIMINARY STATEWIDE ASSESSMENT (PHASE I) COMPREHENSIVE VULNERABILITY ASSESSMENT (PHASE II) AT DEPARTMENT OF REVENUE DEPARTMENT OF STATE TREASURER OFFICE OF THE STATE CONTROLLER DEPARTMENT OF HEALTH AND HUMAN SERVICES DECEMBER 2002 OFFICE OF THE STATE AUDITOR RALPH CAMPBELL, JR. STATE AUDITOR
2 INFORMATION SECURITY VULNERABILITY ASSESSMENT PRELIMINARY STATEWIDE ASSESSMENT (PHASE I) COMPREHENSIVE VULNERABILITY ASSESSMENT (PHASE II) AT DEPARTMENT OF REVENUE DEPARTMENT OF STATE TREASURER OFFICE OF THE STATE CONTROLLER DEPARTMENT OF HEALTH AND HUMAN SERVICES DECEMBER 2002
3 STATE OF NORTH CAROLINA Office of the State Auditor Ralph Campbell, Jr. State Auditor 2 S. Salisbury Street Mail Service Center Raleigh, NC Telephone: (919) Fax: (919) Internet AUDITOR S TRANSMITTAL The Honorable Michael F. Easley, Governor Members of the North Carolina General Assembly Secretary E. Norris Tolson Secretary Carmen Hooker Odom Treasurer Richard H. Moore Controller Robert L. Powell George Bakolia, CIO Ladies and Gentlemen: The Office of the State Auditor, in consultation and coordination with Information Technology Services, undertook a series of projects to evaluate the network and computer security in place over computer operations within state government. In early May 2001, the Office of the State Auditor used a private contractor to attempt to penetrate the network security systems at 22 of the state s computer systems in the Executive, Judicial and Legislative branches of state government. The Office of the State Auditor then initiated a series of information security assessments of the North Carolina Department of Revenue, Department of State Treasurer, Office of the State Controller, and Department of Health and Human Services. These assessments were conducted during the period from December 11, 2001 through September 13, The assessments were conducted under the authority granted by North Carolina G.S (c)(18) which states: The Auditor shall, after consultation and in coordination with the State Chief Information Officer, assess, confirm, and report on the security practices of information technology systems. If an agency has adopted standards pursuant to G.S (d)(1) or (2), the audit shall be in accordance with those standards. The Auditor s assessment of information security practices shall include an assessment of network vulnerability. The Auditor may conduct network penetration or any similar procedure as the Auditor may deem necessary. The Auditor may investigate reported information technology security breaches, cyber attacks, and cyber fraud in State Government. The Auditor shall issue public reports on the general results of the reviews undertaken pursuant to this subdivision, but may provide agencies with detailed reports of the security issues identified pursuant to this subdivision which shall not be disclosed as provided in G.S (c).
4 AUDITOR S TRANSMITTAL (CONCLUDED) This report represents the general results of our assessments. A detailed report containing the conditions found and recommended corrective action was provided to each agency at the conclusion of our fieldwork. The primary objective of these assessments was to evaluate the security controls over the information network at the Agency. The scope of our assessment included security policies, network architecture, network vulnerability, host vulnerability, and other security areas. We wish to express our appreciation to the staff at each agency for the courtesy, cooperation and assistance provided to us during this audit. North Carolina General Statutes require the State Auditor to make reports available to the public. Copies of reports issued by the Office of the State Auditor may be obtained through one of the options listed in the back of this report. Respectfully submitted, Ralph Campbell, Jr. State Auditor
5 TABLE OF CONTENTS PAGE EXECUTIVE SUMMARY....1 OBJECTIVES AND SCOPE..3 PHASE I: PRELIMINARY STATEWIDE ASSESSMENT.. 3 PHASE II: COMPREHENSIVE VULNERABILITY ASSESSMENT 5 NEXT STEPS. 11 AGENCY RESPONSES 13 DISTRIBUTION OF AUDIT REPORT
6 EXECUTIVE SUMMARY The Office of the State Auditor, in conjunction with Information Technology Services, undertook a series of projects to evaluate the network and computer security in place over computer operations within state government. In early May 2001, the Office of the State Auditor used a private contractor to attempt to penetrate the network security systems at 22 of the state s computer systems in the Executive, Judicial and Legislative branches of state government. These penetration tests were performed in the presence of the Agency Head and Information Systems Director. Using a Pass-Fail grading formula, 21 of the 22 systems were rated as Failed because access to a computer or device identified as owned by the agency was achieved. The contractor employed by the Office of the State Auditor was able to take control of computers on the 21 systems, using programs that are readily available to hackers and the public. One system was not successfully attacked because the vulnerability identified was actually on a computer hosted by a different agency. To further evaluate the effectiveness of the State s computer security, a comprehensive information security assessment was performed at the Department of Revenue, Department of Treasurer, Office of the State Controller, and Department of Health and Human Services. Funding for these assessments was provided from the Terrorism Defense Fund. The goal of the security assessment was to assist the agencies with achieving a best practices level of information security in order to protect agency internal systems, data, and assets. The comprehensive information security assessment focused on five key areas: Security Policy Assessment, which evaluates the implementation of security policies and procedures. Network Architecture Assessment, which is a detailed review of a network design. Network Vulnerability Assessment, which provides a thorough understanding of security-related weaknesses and exposures in networks. Host Vulnerability Assessment, which reviews the current security configuration of mainframes and operating systems. Secure Build Review (DOR only), which is a security analysis in a non-production environment for the build procedure for a desktop client computer. Our assessments identified security controls within each agency that were well defined and effective as well as several controls that posed extreme security risks and exposed the agency to possible internal or external attack. Control weaknesses were classified in relation to the level of risk as High, Medium, or Low. Based on the number and severity of the control weakness identified, the overall risk that the agency or state network could be compromised is High. 1
7 [ This Page Left Blank Intentionally ] 2
8 OBJECTIVES AND SCOPE PHASE I - PRELIMINARY STATE-WIDE ASSESSMENT The Office of the State Auditor (OSA) contracted with Affiliated Computer Services, Inc. (ACS) to conduct an External Network Penetration Test on the State of North Carolina s (State) networks from May 3, 2001 to May 11, The purpose of this assessment was to determine the vulnerability of the State s systems from a peripheral attack-acs Engineers established that the State Network was at a high risk for Internet-based attacks. OSA identified the following agencies as critical components of the State s information processing system and subject to the external penetration test. These agencies process the critical information systems for the Executive, Legislative, and Judicial branches of state government. Office of the State Auditor Administrative Office of the Courts Department of Administration Department of Agriculture Office of Budget and Management Department of Commerce/Employment Security Commission Office of the State Controller Department of Corrections Department of Crime Control and Public Safety/Highway Patrol Department of Environment and Natural Resources Department of Health and Human Services North Carolina General Assembly Office of Information Technology Services Department of Insurance Department of Justice Department of Labor Department of Public Instruction Department of Revenue Office of the Secretary of State Office of State Personnel Department of Transportation Department of State Treasurer 3
9 OBJECTIVES AND SCOPE (CONTINUED) The External Network Penetration Test was broken into four separate, relative, phases-they are as follows: PHASE 1 - INTELLIGENCE GATHERING In Phase 1 ACS Security Engineers attempted to gather as much data as possible about each Agency in the North Carolina government. The contractors used common communications protocols and applications to determine what information was available to the general public regarding the State s network. This information was reviewed to determine whether it offered potential intruders an adequate view of the network infrastructure from which the intruder could develop a blueprint of the network. PHASE 2 - ACTIVE RECONNAISSANCE ACS Security Engineers began Phase 2 by identifying specific hosts and services accessible from the Internet. This was accomplished using a combination of hacker utilities, along with ACS s internally developed audit tools. The end state of Phase 2 generated a partial list of accessible hosts, and a list of possible services offered by the hosts. PHASE 3 - ATTACK AND TOEHOLD In Phase 3, ACS Security Engineers tested vulnerabilities of popular services offered on various hosts that allow undetected, unauthorized, access to the State s network. The engineers accomplished this task by activating a combination of hacker utilities and ACS internally developed auditing tools. In cases where automated scanners did not determine the nature of a specific service, security engineers connected directly to the service verifying security issues on any host. The overall goal of this phase was to gain, using all possible attack methods, user level access to (at least) one host in each state agency. PHASE 4 - PRIVILEGE ESCALATION Upon the request of the Auditor s Office, Phase 4 of the External Network Penetration Test was modified allowing for a more controlled approach. The ACS team manually demonstrated their ability to increase their privileges on host sites managed by each Agency in the presence of the Agency Head (or Chief Deputy) and the Information Systems Director. This technique provided a real-time perspective for agency representatives regarding the amount of time required to 4
10 OBJECTIVES AND SCOPE (CONTINUED) penetrate the networks and gain control of proprietary agency information. This approach provided an additional buffer (if target machines broke down during the attack-responsible individuals could be notified immediately) for service restoration. In almost every case, the contractor had full control of an agency computer or device in 30 minutes or less. In some cases, the contractor was able to monitor work being done on the agency computer, while having complete control over that computer. After taking control of the computer, the contractor could monitor network traffic, capture other user ids and passwords, and launch other attacks. These attacks were never detected by either the agency or Information Technology Services. The contractor was successful in penetrating 21 of the 22 agencies identified as part of this test. One agency was not successfully attacked because the vulnerability that was identified and exploited was actually on a device owned by a different agency. The contractor was only given an hour and 30 minutes to successfully attack an agency and was unable to complete a second attack in the remaining time. Conclusion At the time of our testing, the State of North Carolina was at a high risk of having their network compromised by unauthorized users via the Internet. The security posture of the State s network offered little protection from hacker attacks via the Internet. ACS Engineers identified serious vulnerabilities that ultimately may compromise the internal State network. Detailed reports describing the weaknesses identified and recommendations for corrective action were provided to each agency and to Information Technology Services. These security enhancements have been acted upon. PHASE II - COMPREHENSIVE VULNERA BILITY ASSESSMENT At the conclusion of the Preliminary Statewide Assessment, several agencies volunteered to have a more comprehensive assessment performed on their agency. Among those agencies were the Department of Revenue, Department of State Treasurer, Office of the State Controller, and Department of Health and Human Services. The consulting firm Inc. was selected to perform the assessments at the Department of Revenue, Department of State Treasurer, and Office of the State Controller. The assessment for the Department of Health and Human Services was performed by Affiliated Computer Services, Inc. (ACS). 5
11 OBJECTIVES AND SCOPE (CONTINUED) The comprehensive assessment of the production networks at these agencies included five key areas: Security Policy Assessment, Network Architecture Assessment, Network Vulnerability Assessment, Host Vulnerability Assessment, and Secure Build Review (DOR only). The table below shows the test work that was done at each agency. AGENCY Security Policy Assessment Network Architecture Assessment Network Vulnerability Assessment Host Vulnerability Assessment Secure Build Review Department of Revenue X X X X X Department of State Treasurer X X X X Office of the State Controller X X X X Department of Health and Human Services X X Security Policy Assessment The Security Policy Assessment had the following key objectives: Evaluate current security policies and practices - This involved a review of the security policy and its associated procedures for completeness, accuracy, and appropriateness. In addition, current incident response policies and procedures were reviewed. Provide recommendations based on best practices and knowledge of client s business objectives and organizational infrastructure. Network Architecture Assessment The Network Architecture Assessment focused on the internal network infrastructure, Wide Area Network (WAN) connections to remote locations, and Internet connectivity through the North Carolina Integrated Information Network. During the engagement, the business and technical requirements of the current network infrastructure were examined in order to conduct an analysis to ensure the proper balance among functionality, cost, and security. The engagement had the following key objectives: Interview business and technical representatives to gain a solid understanding of business objectives and requirements Review technical requirements for the network Review required data flows 6
12 OBJECTIVES AND SCOPE (CONTINUED) Assess security zones and access controls High-level review of the host and network management strategy High-level review of the enterprise backup strategy High-level review of the enterprise virus strategy Identify applicable industry best practices Identify and validate security issues of immediate consequence Develop long-term recommendations to enhance security Transfer knowledge The assessment was divided into the following key areas: Network Overview Segmentation Model IP Routing Redundancy Encryption Remote Access Network Management Anti-Virus Intrusion Detection Systems Backups Firewalls Network Vulnerability Assessment After obtaining an understanding of the network architecture, an assessment of the network vulnerabilities was performed. This part of the engagement examined the configuration of network devices, firewalls, and public web servers to provide a current view of vulnerabilities and threats. The engagement had the following key objectives: Perform reconnaissance to develop a picture of the network, including topology, devices and hosts, and services for correlation against provided information and documentation Assess network device configuration for vulnerabilities or insecure configurations 7
13 OBJECTIVES AND SCOPE (CONTINUED) Use active probing to assess network security features such as firewall configuration, intrusion detection systems (IDS), and virtual private networks for vulnerabilities or insecure configuration Analyze rule set on the perimeter firewall Assess the configuration and architecture of directory services Assess security configuration of the mainframe environment Identify and validate vulnerabilities in network components, and overall architecture Identify quick fixes for vulnerabilities Develop long-term recommendations to enhance security The assessment consisted of a review of devices owned and maintained by each agency and devices owned and maintained by Information Technology Services. Host Vulnerability Assessment A Host Vulnerability Assessment of the agency s client services and supporting infrastructure was performed to provide a current view of vulnerabilities and threats. The engagement had the following key objectives: Assess server configuration (domain controllers, web servers, application servers, database servers) for vulnerabilities or insecure configurations Identify and validate vulnerabilities in network and server components, and overall architecture Identify quick fixes for vulnerabilities Develop long-term recommendations to enhance security The assessment consisted of a review of a number of hosts owned and maintained by the agency. Secure Build Review (Department of Revenue Only) The Secure Build Review examined the build process created by the Information Technology group (within the Department of Revenue) for building desktop client computers. The engagement had the following key objectives: Interview technical and business representatives to gain a solid understanding of the demands placed upon the system and how they impact the host Review the intended use of the platform to understand requirements and tailor recommendations 8
14 OBJECTIVES AND SCOPE (CONTINUED) Establish secure build methodology for evaluating the build Examine existing hosts in the production environment for the application of patches and upgrades Assess operating system configuration, including: insecure services, permissions, and registry settings as well as unnecessary services and packages Identify and validate security issues of immediate consequence Develop recommendations to enhance security Findings A number of conditions were found at each of the agencies that could be strengthened to improve network security. Some of these weaknesses were significant enough to allow unauthorized access, data manipulation, or data destruction. Each weakness was classified according to its relative risk using the following definitions. High-level Risk: Defined as a vulnerability that could cause grave consequences if not addressed and remedied immediately. This type of vulnerability is evident within the most sensitive portions of the network, as identified by the data owner. This vulnerability could cause network functionality to cease or control of the network could be gained by an intruder. Medium-level Risk: Defined as a vulnerability that should be addressed within the near future. There is urgency in correcting this type of vulnerability, however; this may be either a more difficult exploit to perform, or of lesser concern to the data owner. Low-level Risk: Defined as a vulnerability that should be fixed; however, it is unlikely that this vulnerability alone would allow the network to be exploited and/or it is of little consequence to the data owner. Department of Revenue Vulnerabilities identified at the Department of Revenue were summarized into the following categories. The overall risk level was moderate based on the controls identified at the Department and the following number of network vulnerabilities: High-level Risks: 7 found Medium-level Risks: 7 found Low-level Risks: 5 found 9
15 OBJECTIVES AND SCOPE (CONTINUED) Department of State Treasurer Vulnerabilities identified at the Department of State Treasurer were summarized into the following categories. The overall risk level was high based on the controls identified at the Department and the following number of network vulnerabilities: High-level Risks: 5 found Medium-level Risks: 6 found Low-level Risks: 2 found Office of the State Controller Vulnerabilities identified at the Department of the State Controller were summarized into the following categories. The overall risk level was moderate based on the controls identified at the Office and the following number of network vulnerabilities: High-level Risks: 4 found Medium-level Risks: 2 found Low-level Risks: 1 found Department of Health and Human Services The vulnerability assessment performed at the Department of Health and Human Services took place at nine divisions within the Department. Each division was evaluated and reported on separately however the results have been consolidated for this report. The overall risk level is high based on the controls identified at the Department and the following number of network vulnerabilities: High-level Risks: 23 found Medium-level Risks: 6 found Low-level Risks: 3 found Each agency was provided with a detailed report that provided the specifics for the vulnerabilities identified along with specific recommendations for corrective action. In addition, vulnerabilities that effected devices under the control of Information Technology Services were identified in each of the four agency assessments. These vulnerabilities and the details related to each issue were disclosed to ITS for corrective action. 10
16 OBJECTIVES AND SCOPE (CONCLUDED) NEXT STEPS The four agencies that volunteered to participate in this vulnerability assessment should be commended for their concern for information systems security. The results of these tests will assist both the agency and ITS in strengthening network security, however every agency in state government should be subject to the same level of assessment. A thorough vulnerability assessment should be performed at each state agency with follow-up assessments performed on a regular basis. By participating in these assessments, the Office of the State Auditor s Information Systems Audit Division is developing the skills and testing expertise to perform these tests in the future. To be successful in these efforts, OSA must acquire the testing software necessary to analyze networks for vulnerabilities, establish testing facilities, and continue to receive specialized training in the latest advances in networks and the related vulnerabilities. 11
17 [ This Page Left Blank Intentionally ] 12
18 12
19
20 18
21
22
23 [ This Page Left Blank Intentionally ] 18
24 DISTRIBUTION OF AUDIT REPORT In accordance with G.S and G.S (c)(14), copies of this report have been distributed to the public officials listed below. Additional copies are provided to other legislators, state officials, the press, and the general public upon request. EXECUTIVE BRANCH The Honorable Michael F. Easley The Honorable Beverly M. Perdue The Honorable Richard H. Moore The Honorable Roy A. Cooper, III Mr. David T. McCoy Mr. Robert L. Powell Secretary Carmen Hooker Odom Secretary E. Norris Tolson Mr. George Bakolia Governor of North Carolina Lieutenant Governor of North Carolina State Treasurer Attorney General State Budget Officer State Controller Department of Health and Human Services Department of Revenue State Chief Information Officer LEGISLATIVE BRANCH Appointees to the Joint Legislative Commission on Governmental Operations Senator Marc Basnight, Co-Chairman Senator Charlie Albertson Senator Frank W. Ballance, Jr. Senator Charles Carter Senator Kever Clark Senator Daniel G. Clodfelter Senator Walter H. Dalton Senator James Forrester Senator Linda Garrou Senator Wilbur P. Gulley Senator Kay R. Hogan Senator David W. Hoyle Senator Ellie Kinnaird Senator Howard N. Lee Senator Jeanne H. Lucas Senator R. L. Martin Senator William N. Martin Senator Stephen M. Metcalf Senator Fountain Odom Senator Aaron W. Plyler Senator Eric Miller Reeves Senator Dan Robinson Senator Larry Shaw Senator Robert G. Shaw Senator R. C. Soles, Jr. Senator Ed N. Warren Senator David F. Weinstein Senator Allen H. Wellons Representative James B. Black, Co-Chairman Representative Martha B. Alexander Representative Flossie Boyd-McIntyre Representative E. Nelson Cole Representative James W. Crawford, Jr. Representative William T. Culpepper, III Representative W. Pete Cunningham Representative Beverly M. Earle Representative Ruth M. Easterling Representative Stanley H. Fox Representative R. Phillip Haire Representative Dewey L. Hill Representative Mary L. Jarrell Representative Maggie Jeffus Representative Carolyn Justus Representative Edd Nye Representative Warren C. Oldham Representative William C. Owens, Jr. Representative E. David Redwine Representative R. Eugene Rogers Representative Drew P. Saunders Representative Wilma M. Sherrill Representative Ronald L. Smith Representative Gregg Thompson Representative Joe P. Tolson Representative Russell E. Tucker Representative Thomas E. Wright Representative Douglas Y. Yongue 19
25 DISTRIBUTION OF AUDIT REPORT (CONCLUDED) Other Legislative Officials Representative Philip A. Baddour, Jr. Senator Anthony E. Rand Senator Patrick J. Ballantine Representative N. Leo Daughtry Representative Joe Hackney Mr. James D. Johnson Majority Leader of the N.C. House of Representatives Majority Leader of the N.C. Senate Minority Leader of the N.C. Senate Minority Leader of the N.C. House of Representatives N.C. House Speaker Pro-Tem Director, Fiscal Research Division Other Officials Chairman and Members of the Information Resource Management Commission December 13,
26 ORDERING INFORMATION Copies of this report may be obtained by contacting the: Office of the State Auditor State of North Carolina 2 South Salisbury Street Mail Service Center Raleigh, North Carolina Internet: Telephone: 919/ Facsimile: 919/
STATE OF NORTH CAROLINA
STATE OF NORTH CAROLINA FINANCIAL RELATED AUDIT REPORT OF ORANGE COUNTY CLERK OF SUPERIOR COURT HILLSBOROUGH, NORTH CAROLINA FOR THE YEAR ENDED JUNE 30, 2000 THE HONORABLE JOAN TERRY, CLERK OF SUPERIOR
STATE OF NORTH CAROLINA
STATE OF NORTH CAROLINA AUDIT OF THE INFORMATION SYSTEM GENERAL CONTROLS AT VANCE-GRANVILLE COMMUNITY COLLEGE HENDERSON, NORTH CAROLINA JUNE 2004 OFFICE OF THE STATE AUDITOR RALPH CAMPBELL, JR. STATE AUDITOR
Judiciary Judicial Information Systems
Audit Report Judiciary Judicial Information Systems November 2008 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report and any related follow-up correspondence
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Department of Education. Network Security Controls. Information Technology Audit
O L A OFFICE OF THE LEGISLATIVE AUDITOR STATE OF MINNESOTA FINANCIAL AUDIT DIVISION REPORT Department of Education Network Security Controls Information Technology Audit May 5, 2010 Report 10-17 FINANCIAL
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
INADEQUATE SECURITY PRACTICES EXPOSE KEY NASA NETWORK TO CYBER ATTACK
MARCH 28, 2011 AUDIT REPORT OFFICE OF AUDITS INADEQUATE SECURITY PRACTICES EXPOSE KEY NASA NETWORK TO CYBER ATTACK OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration REPORT NO. IG-11-017
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
STATE OF NORTH CAROLINA
STATE OF NORTH CAROLINA PERFORMANCE AUDIT OFFICE OF INFORMATION TECHNOLOGY SERVICES STATE TERM CONTRACT FOR MICROCOMPUTERS AND PERIPHERALS JULY 2013 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing
IBM Global Technology Services Statement of Work for IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing The information in this Statement of Work may not be disclosed
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls
Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint
University System of Maryland University of Maryland, College Park Division of Information Technology
Audit Report University System of Maryland University of Maryland, College Park Division of Information Technology December 2014 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education
Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division
AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS
SEPTEMBER 14, 2010 AUDIT REPORT OFFICE OF AUDITS AUDIT OF NASA S EFFORTS TO CONTINUOUSLY MONITOR CRITICAL INFORMATION TECHNOLOGY SECURITY CONTROLS OFFICE OF INSPECTOR GENERAL National Aeronautics and Space
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
Oregon Employment Department: Computer Programs for Unemployment Tax Returns and Claims Need Attention
Secretary of State Audit Report Jeanne P. Atkins, Secretary of State Gary Blackmer, Director, Audits Division Oregon Employment Department: Computer Programs for Unemployment Tax Returns and Claims Need
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear Security Administration Information System DOE/IG-0938
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Enhanced Configuration Controls and Management Policies Can Improve USCG Network Security (Redacted) Notice: The Department of Homeland Security,
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:
The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations
Department of Transportation Office of Transportation Technology Services
Audit Report Department of Transportation Office of Transportation Technology Services October 2005 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report
Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update
Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report
WHITE PAPER. An Introduction to Network- Vulnerability Testing
An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...
NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
CAPE FEAR COMMUNITY COLLEGE
STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA CAPE FEAR COMMUNITY COLLEGE WILMINGTON, NC INVESTIGATIVE REPORT JULY 2015 EXECUTIVE SUMMARY PURPOSE The Office of the State Auditor
Understanding SCADA System Security Vulnerabilities
Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
May 2012 Report No. 12-030
John Keel, CPA State Auditor Incentive Compensation at the Teacher Retirement System, the Employees Retirement System, and the Permanent School Fund Report No. 12-030 Incentive Compensation at the Teacher
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
Department of Homeland Security
for the Immigration and Customs Enforcement Component of the FY 2013 Department of Homeland Security s Financial Statement Audit OIG-14-85 April 2014 OFFICE OF INSPECTOR GENERAL Department of Homeland
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
In Brief. Smithsonian Institution Office of the Inspector General
In Brief Smithsonian Institution Office of the Inspector General Smithsonian Institution Network Infrastructure (SINet) Report Number A-09-01, September 30, 2009 Why We Did This Audit Under the Federal
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2013 May 29, 2014 13-01391-72 ACRONYMS AND
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
State Web Server Security Audit
A Report to the Montana Legisl ature I nform ation Systems Audit State Web Server Security Audit Department of Administration January 2008 Legislative Audit Division 0708DP-02 Legislative Audit Committee
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
