EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH
|
|
|
- Neil Craig
- 10 years ago
- Views:
Transcription
1
2 EXECUTIVE SUMMARY Audit of information and communications technology governance and security management in MINUSTAH OIOS conducted an audit of information and communications technology (ICT) governance and security management in MINUSTAH. The overall objective of the audit was to assess the adequacy and effectiveness of ICT governance and security management within MINUSTAH. The audit was conducted in accordance with the International Standards for the Professional Practice of Internal Auditing. The audit found that MINUSTAH had already designed and implemented several controls for strengthening of its ICT operations. However, there were several controls that require adequate attention by Management. These include: a) Completion of the business continuity plan with defined procedures for all processes; b) Improvement to the physical security of the disaster recovery site in Santo Domingo; c) Formalizing and implementing incident and change management processes; d) Mitigating the risks identified in the security of data and network with the implementation of controls for the review of access rights, password management, and wireless and laptop security; and e) Increasing staff awareness for the protection of information resources.
3 I. INTRODUCTION 1. The Office of Internal Oversight Services (OIOS) conducted an audit of information and communications technology (ICT) and security management in MINUSTAH. The audit was conducted in accordance with the International Standards for the Professional Practice of Internal Auditing. 2. The Communications and Technology Section provides the following support services in MINUSTAH: technology: (a) Provision of support to and maintenance of 106 servers, 2,416 desktop computers, 874 laptop computers, 618 printers and 181 digital senders; (b) Provision of support to and maintenance of local-area networks (LAN) and wide-area networks (WAN) for an average of 3,700 users. Communications: (c) Provision of support to and maintenance of a satellite network consisting of 2 Earth station hubs and 23 very small aperture terminal (VSAT) systems (9 in Portau-Prince and 14 in remote locations) to provide voice, fax, video, data communications, disaster recovery and business continuity services; (d) Provision of support to and maintenance of 31 telephone exchanges and 138 microwave links; (e) Provision of support to and maintenance of the ultra-high frequency (UHF) repeater network consisting of 3,469 hand-held radios, 1,239 mobile radios, 115 base station radios, 2,129 hand-held radios trunking, 650 mobile radios trunking and 80 trunking base station radios; (f) Provision of support to and maintenance of the high frequency (HF) network consisting of 1,121 mobile radios with a global positioning system option and 107 data-capable base stations; (g) Provision of support to and maintenance of 13 communications centres; and (h) Provision of support to and maintenance of 25 communications sites to enhance microwave and ultra-high frequency network coverage throughout Haiti. 3. The financial resources for information and communications in the recent budget cycles are as follows:
4 (Thousands of United States dollars. Budget year is 1 July to 30 June) Expenditures (2007/08) (1) Apportionment (2008/09) (2) Cost estimates (2009/2010) (3) technology Amount (4)=(3)-(2) 5, , , Communications 23, , , , Comments made by MINUSTAH are shown in italics. Percentage (5)=(4)/(2) II. AUDIT OBJECTIVES 5. The main objectives of the audit were to determine whether controls in the areas of ICT governance and security were adequate. In particular, the audit assessed whether: (a) An organizational structure was in place to govern, manage, and protect ICT resources and data; (b) Processes existed for ICT strategic planning, monitoring, reporting, and continuous improvement; (c) (d) place; (e) Adequate mechanisms were in place to identify and manage ICT risks; Mission specific ICT policies, and standard operating procedures were in ICT assets were adequately managed; (f) ICT projects and initiatives were based on defined and standard management methodologies; and (g) ICT security was managed on the basis of defined policies and procedures, including risk assessments and systematic vulnerability testing. III. AUDIT SCOPE AND METHODOLOGY 6. Interviews were held with representatives from the Communications and Technology Section (CITS), support and substantive offices in Port-au-Prince. Documentation, including responses to audit questionnaires, was obtained and reviewed to ascertain the ICT governance structure and security environment. Tests, including network vulnerability tests, were undertaken to confirm the adequacy of controls and to identify threats, risks and vulnerabilities that may affect the ICT control environment. A site visit was conducted to the disaster recovery and business continuity location in Santo Domingo. 4
5 IV. AUDIT FINDINGS AND RECOMMENDATIONS A. Business continuity planning 7. A business continuity plan should identify potential threats to the Mission, the potential impact that those threats, if realized, might cause, and formulate a response to safeguard assets and ensure continuity of operations. 8. OIOS reviewed the latest version (ver. 2.2) of the business continuity and disaster recovery plan developed in MINUSTAH in September The plan included the following provisions and scenarios: (a) (b) (c) (d) (e) (f) Supported locations; Operational tiers; Technical infrastructure and ICT services; Roles; Impact analysis and scenarios; and Testing. 9. While the plan contained adequate information and provisions with regard to the technical aspects of the business continuity and disaster recovery, no details were provided on the critical business processes to be followed by each office to ensure prompt recovery of data and continuity of operations. MINUSTAH also needs to document the lessons learned during the recent earthquake in Haiti, in regard to business continuity and disaster recovery. 10. Additionally, MINUSTAH established a business continuity and disaster recovery plan in the building of the United Nations International Research and Training Institute for the Advancement of Women (INSTRAW) in Santo Domingo. OIOS visit to this location showed that the server room hosting all the replicated data presented major physical controls weaknesses, such as inadequate protective door, fire and water protection, and alarms. Recommendations 1 to 3 (3) The MINUSTAH Communications and Technology Section should document the lessons learned during the recent earthquake to ensure continuity of communications and the availability of information resources. (2) The MINUSTAH Division of Mission Support should document a business impact analysis and continuity plan in line with the guidelines established by the United Nations Secretariat. (3) The MINUSTAH Division of Mission Support should implement measures to address the physical security weaknesses of the server room in the INSTRAW building in Santo Domingo. 5
6 11. MINUSTAH concurred with recommendation 1 and indicated that the Best Practices Unit organized several meetings with representatives of all MINUSTAH Sections, including CITS. in order to gather information pertaining to lessons learnt. While the Mission awaits the finalization of that report, the CITS has been instructed to prepare a report of lessons learned. Once completed it will be shared with OIOS. Recommendation 1 remains open pending receipt of the documented lessons learned in the Mission with regard to the continuity of communications and availability of information resources. 12. MINUSTAH concurred with recommendation 2 and indicated that the Mission Support Division will endeavor to implement a business continuity plan. The Mission further noted that an exercise was held where key personnel from various sections were physically brought to Santo Domingo to test systems in the event business has to be relocated there. Recommendation 2 remains open pending receipt of the documented business impact analysis and continuity plan. 13. MINUSTAH accepted recommendation 3 and indicated that the Mission has installed CCTV cameras in the INSTRAW office. In addition, the implementation of an access cards system will start the first week of May and its expected completion date is 10 May Access will only be granted to CITS staff. Recommendation 3 remains open pending receipt of the documented evidence that the CCTV system and access cards reader in the INSTRAW office was implemented. B. Incident and change management procedures 14. Incident and change management procedures should define reporting and escalation procedures that staff, contractors, and third party users must follow to ensure adequate and timely communication and follow-up of events (including changes) that could have an impact on the security of organizational assets and operations. 15. MINUSTAH developed standard operating procedures for both incident and change management, as follows: (a) The incident management procedure (draft version, dated February 2010) detailed a workflow of the process, the prioritization criteria, and the steps to be followed for initiation, classification, initial support, investigation and analysis, and resolution. For these procedures, however, OIOS was not able to identify clear evidence confirming their implementation; and (b) The change management procedure (version dated August 2007) documented roles, workflow, and types of requests, including details of the automated system (Lotus Notes database) used for managing the process. While the procedure provided detailed stepby-step instructions for processing changes, OIOS noted that there were no provisions indicating who would handle emergency changes, and how. Given that the nature of threats to which the Mission is exposed often has an emergency connotation, the unavailability of ad-hoc provisions for processing these changes could prevent the Mission from adequately resolving time-sensitive tasks. 6
7 Recommendations 4 to 5 (4) The MINUSTAH Communications and Technology Section should implement the incident management procedure and document any lessons learned from the tasks performed after the earthquake. (5) The MINUSTAH Communications and Technology Section should complete the change management procedure with ad-hoc instructions documenting the handling of emergency changes. 16. MINUSTAH accepted recommendation 4 and indicated that CITS is governed by the ICTD issued policy on this matter. In this regard, the Mission provided copy of the working draft policy directive developed by DPKO/DFS on incident management. Recommendation 4 remains open pending receipt of the formally approved policy directive developed by DPKO/DFS for incident management. 17. MINUSTAH accepted recommendation 5 and indicated that ad-hoc emergency situations do not in any case affect change management procedures. Even in emergency situations, change management is always planned and has to be performed in accordance with the clear guidelines issued by ICTD. OIOS was provided a copy of the approved SOP since August 2007, which shows the relevant work already done by the Mission in preparing its change management (SOP 3/14). However, OIOS noted that this SOP addressed changes only for normal operations. ICTD has adopted the information security management standard ISO 27001, defining the following requirements (14.1.4) for change management procedures: Procedures should be included within the Organization s change management programme to ensure that business continuity matters are always addressed appropriately..including emergency procedures, manual fallback plans, and resumptions plans. Recommendation 5 remains open pending receipt of an updated change management procedure containing instructions for emergency changes. Network security C. Security 18. Best practices in the field of information security require the segregation of internal and external local area networks. 19. OIOS identified that the wireless network ( Wi-Fi Access Points) located around the MINUSTAH Log Base site (including the data centers) were not segmented from the internal local area network, thereby increasing the risk of compromise of the internal network in the event any of the wireless access points is breached. This weakness could result in unauthorized access to MINUSTAH information systems and information resources resulting in loss of confidentiality, integrity and availability of information assets. Recommendation 6 (6) The MINUSTAH Communications and Technology Section should configure the wireless (Wi-Fi) access points 7
8 in a separate network segment (i.e. virtual local area network) outside of the internal network, and filter traffic between this network segment and the internal network. 20. MINUSTAH accepted recommendation 6 and indicated that wireless access points are segmented onto the separate VLAN and access is controlled (by WPA-PSK) as an additional security measure. MINUSTAH domain authentication is implemented for the wireless access. Traffic filtering implementation is pending the arrival of the NeiFlow software, which is still under procurement process. Recommendation 6 remains open pending receipt of documentation confirming that traffic filtering between network segments and the internal network has been implemented. Mobile security 21. The use of mobile computing devices offers advantages in terms of flexibility and convenience of use. However, the risks of loss and theft of these devices is statistically significant. Therefore, best practices require that mobile computers (i.e. laptops) are protected - in addition to access controls with data encryption mechanisms that would prevent breaches to the confidentiality of data in case of loss or stolen devices. 22. The policy established in MINUSTAH stipulated that each portable device is owned by its respective division/office and the responsibillity for maintaining such devices, including their security, rests with each division/office. OIOS found that the laptops used in the Mission, containing sensitive information, were not encrypted. Therefore, the sensitive information stored in these mobile devices was exposed to a significant risk in case of loss or theft. Recommendation 7 (7) The MINUSTAH Communications and Technology Section should implement more stringent security measures for laptops by configuring them with hard-drive and removable media encryption. 23. MINUSTAH concurred with recommendation 5 and indicated CITS has already identified the acceptable product that could support encryption of hard drives and removable medias on laptops, however the cost of this software exceeds` $200,000, which is more that the total annual budget allotment for the acquisition and renewal of software packages ($ ). Given the seriousness of the situation, the Mission will approach ICTD for advice and further action. Recommendation 7 remains open pending receipt of the mitigating measures implemented by CITS in coordination with ICTD for the encryption of mobile computing devices. Access security 24. Access to systems and networks should be protected with policies and mechanisms to ensure that only authorized staff can access data and resources on a need-to-know basis. 25. OIOS conducted a review of the user accounts and access control mechanisms configured in the Mission for managing servers, network, and applications. The results of this review indicated that: 8
9 (a) A mechanism to force selection of strong passwords was not currently in place on all production servers; (b) There were no mechanisms in place for enforcing the selection of strong passwords by users; (c) Certain accounts (i.e. Microsoft SQL accounts) had blank passwords on the Blackberry enterprise and billing servers; (d) There was no consistency in enforcing regular password changes for users (42 days) and administrators (30 days), with the following statistics: - Accounts found = 8,421 - Accounts with password not changed in past 42 days = 3,018 (35%) - Accounts with password not changed in past 90 days = 2,614 (30%) - Accounts with password not changed over 1 year ago = 1,278 (15%) - Accounts with password not changed over 2 years ago = 378 (0.04%) - Accounts with password not changed over 3 years ago = 174 (0.02%) - Accounts with password not changed over 4 years ago = 20 (0.002%) - AD Accounts with password not changed over 5 years ago = 8 (0.0009%). Recommendation 8 (8) The MINUSTAH Communications and Technology Section should implement mechanisms to enforce selection of strong passwords on all operating systems and applications and then develop and implement an adequate awareness programme to make users aware of this requirement. In particular, it should be ensured that: (a) Users change passwords every 42 days on all servers; (b) Administrators change passwords every 30 days on all servers; and (c) Users and administrators select strong passwords consisting of numbers, different case characters and symbols. 26. MINUSTAH accepted recommendation 8 and indicated that the mechanism for the implementation of these observations is in place, and that a policy document on password management was created and distributed to all MINUSTAH staff on the 13 October 2009 via Bulletin Board (Annex-Il). All network accounts are currently prompted to change passwords every 42 days. Administrator passwords are prompted to be changed every 30 days. Based on the actions taken by the Mission and the documentation provided, OIOS will close recommendation 8. 9
10 V. ACKNOWLEDGEMENT 27. We wish to express our appreciation to the Management and staff of MINUSTAH for the assistance and cooperation extended to the auditors during this assignment. cc: Mr. Swatantra Goolsarran, Executive Secretary, UN Board of Auditors Ms. Susanne Frueh, Executive Secretary, Joint Inspection Unit Mr. Moses Bamuwamye, Chief, Oversight Support Unit, Department of Management Mr. Byung-Kun Min, Special Assistant to the USG-OIOS Ms. Eleanor T. Burns, Chief, Peacekeeping Audit Service, OIOS CONTACT INFORMATION: DIRECTOR: Fatoumata Ndiaye: Tel: , Fax: , DEPUTY DIRECTOR: Gurpur Kumar: Tel: , Fax: , CHIEF, PEACEKEEPING AUDIT SERVICE: Eleanor T. Burns: Tel: , Fax: , 10
11 ANNEX 1 STATUS OF AUDIT RECOMMENDATIONS Recom. Recommendation no. 1 The MINUSTAH Communications and Technology Section should document the lessons learned during the recent earthquake to ensure continuity of communications and the availability of information resources. Risk category Risk C/ rating O 1 Actions needed to close recommendation High O Document lessons learned in the Mission with regard to the continuity of communications and availability of information resources Implementation date 2 2 quarter The MINUSTAH Division of Mission Support should document a business impact analysis and continuity plan in line with the guidelines established by the United Nations Secretariat. High O Document business impact analysis and continuity plan. Not provided 3 The MINUSTAH Division of Mission Support should implement measures to address the physical security weaknesses of the server room in the INSTRAW building in Santo Domingo. Medium O Implement the CCTV system and access cards reader in the INSTRAW office was implemented. 2 quarter The MINUSTAH Communications and Technology Section should implement the incident management procedure and document any lessons learned from the tasks performed after the earthquake. Medium O Formal issuance of the policy directive developed by DPKO/DFS for incident management. Not provided 5 The MINUSTAH Communications and Technology Section should complete the change management procedure with ad-hoc instructions documenting the handling of emergency changes. Medium O Update the change management procedure containing ad-hoc instructions for emergency changes. Not provided
12 Recom. Recommendation no. 6 The MINUSTAH Communications and Technology Section should configure the wireless (Wi-Fi) access points in a separate network segment (i.e. virtual local area network) outside of the internal network, and filter traffic between this network segment and the internal network. Risk category Risk C/ rating O 1 Actions needed to close recommendation Medium O Implement the traffic filtering between network segments and the internal network has been implemented. Implementation date 2 Not provided 7 The MINUSTAH Communications and Technology Section should implement more stringent security measures for laptops by configuring them with harddrive and removable media encryption. Medium O Implement mitigating measures in coordination with ICTD for the encryption of mobile computing devices. Not provided 8 The MINUSTAH Communications and Technology Section should implement mechanisms to enforce selection of strong passwords on all operating systems and applications and then develop and implement an adequate awareness programme to make users aware of this requirement. In particular, it should be ensured that: (a) Users change passwords every 42 days on all servers; (b) Administrators change passwords every 30 days on all servers; and (d) Users and administrators select strong passwords consisting of numbers, different case characters and symbols. Medium C Implemented 1. C = closed, O = open 2. Date provided by MINUSTAH in response to recommendations. ii
EXECUTIVE SUMMARY Horizontal audit of data privacy in the United Nations Secretariat
EXECUTIVE SUMMARY Horizontal audit of data privacy in the United Nations Secretariat OIOS conducted an audit of data privacy across the United Nations Secretariat. The overall objective of the audit was
EXECUTIVE SUMMARY Audit of vendor database management in UNOG
EXECUTIVE SUMMARY Audit of vendor database management in UNOG OIOS conducted an audit of vendor database management in the United Nations Office at Geneva (UNOG). The overall objective of the audit was
AUDIT REPORT. Services provided by the United Nations International Computing Centre to the UN Secretariat - Department of Field Support
INTERNAL AUDIT DIVISION AUDIT REPORT Services provided by the United Nations International Computing Centre to the UN Secretariat - Department of Field Support DFS should implement additional controls
REPORT 2016/035 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2016/035 Audit of the use of consultants and individual contractors in the United Nations Stabilization Mission in Haiti Overall results relating to the effective hiring
REPORT 2014/001 INTERNAL AUDIT DIVISION. Audit of information and communications technology help desk operations at United Nations Headquarters
INTERNAL AUDIT DIVISION REPORT 2014/001 Audit of information and communications technology help desk operations at United Nations Headquarters Overall results relating to the adequacy and effectiveness
AUDIT REPORT INTERNAL AUDIT DIVISION. Vendor payment process in MONUSCO
INTERNAL AUDIT DIVISION AUDIT REPORT Vendor payment process in MONUSCO Monitoring controls over the vendor payment process should be strengthened to mitigate risks of financial loss 6 June 2011 Assignment
AUDIT REPORT INTERNAL AUDIT DIVISION. Invoice Processing in UNAMID. Internal controls over invoice processing were inadequate and ineffective
INTERNAL AUDIT DIVISION AUDIT REPORT Invoice Processing in UNAMID Internal controls over invoice processing were inadequate and ineffective 1 June 2010 Assignment No. AP2009/634/18 INTERNAL AUDIT DIVISION
AUDIT REPORT INTERNAL AUDIT DIVISION. ICT governance, security, business continuity and disaster recovery in UNIFIL
INTERNAL AUDIT DIVISION AUDIT REPORT ICT governance, security, business continuity and disaster recovery in UNIFIL UNIFIL needs to strengthen its ICT governance framework with policies and procedures for
FINAL AUDIT REPORT. Audit of the information and communications technology (ICT) governance and security management in peacekeeping missions
FINAL AUDIT REPORT Audit of the information and communications technology (ICT) governance and security management in peacekeeping missions BACKGROUND The Information and Communications Technology Division
AUDIT REPORT INTERNAL AUDIT DIVISION. Audit of business continuity and disaster recovery planning at UNON
INTERNAL AUDIT DIVISION AUDIT REPORT Audit of business continuity and disaster recovery planning at UNON Overall results relating to business continuity and disaster recovery planning at UNON were initially
REPORT 2016/066 INTERNAL AUDIT DIVISION. Audit of management of technical cooperation projects in the Economic Commission for Africa
INTERNAL AUDIT DIVISION REPORT 2016/066 Audit of management of technical cooperation projects in the Economic Commission for Africa Overall results relating to the effective management of technical cooperation
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)
Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland
Audit Report Effectiveness of IT Controls at the Global Fund Follow-up report GF-OIG-15-20b Geneva, Switzerland Table of Contents I. Background and scope... 3 II. Executive Summary... 4 III. Status of
REPORT 2016/061 INTERNAL AUDIT DIVISION. Audit of inventory management in the United Nations Interim Force in Lebanon
INTERNAL AUDIT DIVISION REPORT 2016/061 Audit of inventory management in the United Nations Interim Force in Lebanon Overall results relating to the effective management of inventory were initially assessed
Specific observations and recommendations that were discussed with campus management are presented in detail below.
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.
U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098
A. Khiam Rehabilitation Center for Victims of Torture AUDIT OBJECTIVES
EXECUTIVE SUMMARY Audit of one non-governmental organization in Lebanon that was granted funding from the United Nations Voluntary Fund for Victims of Torture The Office of Internal Oversight Services
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
AUDIT REPORT INTERNAL AUDIT DIVISION. UNJSPF Disability Benefits
INTERNAL AUDIT DIVISION AUDIT REPORT UNJSPF Disability Benefits UNJSPF s administration of disability benefits is efficient and well controlled and promotes compliance with relevant regulations and rules
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
How To Ensure That Non-Peoplesoft Applications Can Withstand Adverse Events
FINAL AUDIT REPORT Audit of the arrangements for business continuity and disaster recovery for non- PeopleSoft applications in UNHCR BACKGROUND The field offices of the United Nations High Commissioner
AUDIT REPORT 2013/024
INTERNAL AUDIT DIVISION AUDIT REPORT 2013/024 Audit of air travel activities and related practices at UNON Overall results relating to efficient and effective management of travel services were assessed
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Department of Education. Network Security Controls. Information Technology Audit
O L A OFFICE OF THE LEGISLATIVE AUDITOR STATE OF MINNESOTA FINANCIAL AUDIT DIVISION REPORT Department of Education Network Security Controls Information Technology Audit May 5, 2010 Report 10-17 FINANCIAL
July 6, 2015. Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263
July 6, 2015 Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263 Re: Security Over Electronic Protected Health Information Report 2014-S-67
NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division
AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION,
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
INTERNAL AUDIT DIVISION AUDIT REPORT 2013/073
INTERNAL AUDIT DIVISION AUDIT REPORT 2013/073 Audit of maintenance and building services provided by the Office of Central Support Services at Headquarters Overall results relating to the Office of Central
REPORT 2016/057 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2016/057 Audit of support services provided by the United Nations Truce Supervision Organization to the United Nations Special Coordinator for the Middle East Peace Process
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
OVERALL RATING: PARTIALLY SATISFACTORY
INTERNAL AUDIT DIVISION REPORT 2016/059 Audit of the use of consultants and individual contractors in the United Nations Support Office in Somalia Overall results relating to the effective management of
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
INFORMATION SECURITY Humboldt State University
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY Humboldt State University Audit Report 14-50 October 30, 2014 EXECUTIVE SUMMARY OBJECTIVE The objectives of
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
AUDIT REPORT INTERNAL AUDIT DIVISION. Asset management at the UNHCR operations in Georgia
INTERNAL AUDIT DIVISION AUDIT REPORT Asset management at the UNHCR operations in Georgia Internal controls over the management of assets and inventory items were inadequate 8 March 2010 Assignment No.
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
INFORMATION SECURITY California Maritime Academy
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority
Internal Audit Progress Report (19 th August 2015) Contents 1. Introduction 2. Key Messages for Committee Attention 3. Work in progress Appendix A: Risk Classification and Assurance Levels Appendix B:
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Audit of the Disaster Recovery Plan
Audit of the Disaster Recovery Plan Report # 11-05 Prepared by Office of Inspector General J. Timothy Beirnes, CPA, Inspector General Kit Robbins, CISA, CISM, CRISC, Lead Information Systems Auditor TABLE
Draft Information Technology Policy
Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
AUDIT REPORT Audit of contracts management in UNMIS
AUDIT REPORT Audit of contracts management in UNMIS BACKGROUND The Contracts Management Section (CMS) of the United Nations Mission in Sudan (UNMIS) is responsible to oversee and manage some of the Mission
Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant
Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM
GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups
Network and Security Controls
Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
INADEQUATE SECURITY PRACTICES EXPOSE KEY NASA NETWORK TO CYBER ATTACK
MARCH 28, 2011 AUDIT REPORT OFFICE OF AUDITS INADEQUATE SECURITY PRACTICES EXPOSE KEY NASA NETWORK TO CYBER ATTACK OFFICE OF INSPECTOR GENERAL National Aeronautics and Space Administration REPORT NO. IG-11-017
Hengtian Information Security White Paper
Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...
OIG. Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center. Audit Report OFFICE OF INSPECTOR GENERAL
OIG OFFICE OF INSPECTOR GENERAL Catalyst for Improving the Environment Audit Report Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center Report No. 2003-P-00011 May
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
AUDIT REPORT INTERNAL AUDIT DIVISION. Audit of the Riskmetrics system in the Investment Management Division of UNJSPF
INTERNAL AUDIT DIVISION AUDIT REPORT Audit of the Riskmetrics system in the Investment Management Division of UNJSPF Overall results relating to the effective implementation of the Riskmetrics system were
Management Standards for Information Security Measures for the Central Government Computer Systems
Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...
SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD
SECURITY GUIDELINES INFORMATION SECURITY MANAGEMENT SYSTEM FOR COMPUTERISATION OF LAND RECORD 1. PURPOSE & SCOPE: The purpose of security initiative is to enlist the procedures and guidelines, which are
NOS for Network Support (903)
NOS for Network Support (903) November 2014 V1.1 NOS Reference ESKITP903301 ESKITP903401 ESKITP903501 ESKITP903601 NOS Title Assist with Installation, Implementation and Handover of Network Infrastructure
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Ohio Supercomputer Center
Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original
How To Protect Your School From A Breach Of Security
SECURITY MANAGEMENT IT Security Policy (ITSP- 1) 1A Policy Statement District management and IT staff will plan, deploy, and monitor IT security mechanisms, policies, procedures, and technologies necessary
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
