ROSS PHILO EXECUTIVE VICE PRESIDENT AND CHIEF INFORMATION OFFICER
|
|
|
- Dora Robertson
- 10 years ago
- Views:
Transcription
1 March 24, 2010 ROSS PHILO EXECUTIVE VICE PRESIDENT AND CHIEF INFORMATION OFFICER CHARLES L. MCGANN MANAGER, CORPORATE INFORMATION SECURITY SUBJECT: Audit Report Windows Access Controls at the Information Technology and Accounting Service Centers (Report Number ) This report presents the results of our audit of Windows access controls xxxxxxxxxx, xxxxxxxxxxxxxxxxxx Information Technology and Accounting Service Centers (IT/ASCs) and the Information Technology Service Center (ITSC) xxxxxxxxxxxx (Project Number 09RD001IS005). Our objective was to determine whether the U.S. Postal Service established adequate logical controls to limit or detect inappropriate access to its Windows operating environment. We performed this self-initiated review as part of the fiscal year (FY) 2009 information systems audit of general controls. See Appendix A for additional information about this audit. Conclusion The Postal Service established adequate logical controls to limit or detect inappropriate access to its Windows operating environment xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxx. However, management can improve access controls by regularly maintaining Active Directory 1 objects and complying with Windows security standards. Active Directory Management System administrators were not updating the Active Directory Organizational Units (OUs), groups, and accounts xxxxxxxxxxxxxxxxxxxxxxxxxxxxx as required by Windows security standards and Postal Service policy. 2 This occurred because administrators do not have clearly defined responsibilities for maintaining and regularly updating Active Directory objects. By properly maintaining and updating Active Directory objects, management can reduce the risk of unauthorized access to Postal Service information resources, access authority exceeding job responsibilities, and operational disruptions. See Appendix B for our detailed analysis of this topic. 1 A hierarchical database that stores information about two broad categories of computer objects: resources (e.g., printers, workstations, and servers) and security principals (e.g., user or computer accounts and groups, such as organizational units). Each object has a uniquely assigned security identifier, which controls access and sets security. 2 Security Standards for Windows 2003 Servers, Section 1.2, Purpose, revised March 1, Handbook AS-805, Information Security, Section , Periodic Review of Access Authorization.
2 We recommend the manager, Corporate Information Security, work with the manager, Information Technology Engineering and Architecture, to: 1. Revise the Security Standards for Windows 2003 Servers to clearly define system administrator responsibilities for maintaining and regularly updating Active Directory objects. Security Standards Compliance Domain controllers 3 running on Windows operating systems did not comply with requirements documented in the Postal Service Windows security standards. This occurred because management did not perform a comprehensive review of server configurations against the Windows security standards and properly maintain the security standards document. By ensuring that server configuration settings comply with Postal Service policy, 4 management can strengthen security over information resources to protect against accidental or intentional unauthorized use, modification, disclosure, or destruction. See Appendix B for our detailed analysis of this topic. We recommend the manager, Corporate Information Security, in coordination with the manager, Information Technology Engineering and Architecture, perform: 2. A review of the Security Standards for Windows 2003 and update the standards as appropriate. 3. A comprehensive review of the domain controller configurations to ensure compliance with applicable Windows security standards. Management s Comments Management agreed with our recommendations. In response to recommendation 1, management accepts the recommendation to review the Security Standards for Windows 2003 servers, but believes the roles and responsibilities assignment does not belong in the Security Standards for Windows 2003 Server s documents. They believe the roles and responsibilities belong in operational roles and responsibility guidelines because the system administrator s responsibilities are consistent across the Windows platform. The targeted completion date is April 30, To address recommendation 2, management will review the current hardening Security Standards for Windows 2003 Servers to determine if any changes are required. Management is currently testing Security Standards for Windows 2008 and servers under Security Standards for Windows 2003 will be migrated to that environment. 3 A server that responds to security authentication requests (including logging in and checking permissions) within the Windows server domain. A domain controller physically stores Active Directory information. Large domains require more than one domain controller, where each holds a copy of Active Directory. Active Directory synchronizes any computer changes between all domain controllers, called multi-master replication. 4 Security Standards for Windows 2003 Servers, Section 3.10, Operating System Security Settings. 2
3 Subsequent discussions with management revealed that the target date for completion of the Security Standards for Windows 2008 is September 30, In response to recommendation 3, management will review the domain controller configurations to ensure compliance with applicable Windows security standards for domain controller. The targeted completion date is April 30, See Appendix C for management s comments in their entirety. Evaluation of Management s Comments The U.S. Postal Service, Office of Inspector General (OIG) considers management s comments responsive to the recommendations, and their corrective actions should resolve the issues identified in the report. The OIG considers recommendation 3 significant, and therefore requires OIG concurrence before closure. Consequently, the OIG requests written confirmation when corrective actions are completed. This recommendation should not be closed in the Postal Service s follow-up tracking system until the OIG provides written confirmation that the recommendation can be closed. We appreciate the cooperation and courtesies provided by your staff. If you have any questions or need additional information, please contact Frances E. Cain, director, Information Technology, or me at (703) E-Signed by Darrell E. Benjamin, Jr VERIFY authenticity with ApproveIt Darrell E. Benjamin, Jr. Deputy Assistant Inspector General for Revenue and Systems Attachments cc: Deborah J. Judy Gregory Dean Larrabee Cliff M. Biram Sally K. Haring 3
4 APPENDIX A: ADDITIONAL INFORMATION BACKGROUND Logical access controls include the use of computer hardware and software to prevent or detect unauthorized access. For example, a system or information resource may require users to authenticate with a logon identification, user name, password, or other identifier that conforms to the concepts of least privilege and need-to-know. Inadequate access controls diminish the reliability of computerized data and increase the risk of destruction or inappropriate disclosure of data. The xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx is the enterprise directory for the Postal Service. It is the authoritative source for all centrally supported and managed Windows-based systems. The Postal Services bases access to all infrastructure platforms, remote access methods, and national applications on user and machine credentials in the xxx Active Directory. Microsoft Windows Active Directory 5 enables single-point administration to organize, manage, authenticate, and control information within the Windows environment. Information Technology Engineering and Architecture staff located at the xxxxxxxxxxxx supports the Active Directory. OBJECTIVE, SCOPE, AND METHODOLOGY The objective of this audit was to determine whether the Postal Service established adequate logical controls to limit or detect inappropriate access to its Windows operating environment. Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxx. To accomplish the objective, we reviewed Postal Service documentation and available policies and procedures, interviewed key officials, and examined other material deemed necessary to accomplish our objective. xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx. xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx 6 5 The latest version of Microsoft Windows Server 2008 R2 renamed Active Directory to Active Directory Domain Services. 6 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx. 4
5 We conducted this performance audit from June 2009 through March 2010 in accordance with generally accepted government auditing standards and included such tests of internal controls as we considered necessary under the circumstances. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objective. We believe the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objective. We discussed our observations and conclusions with management on February 22, 2010, and included their comments where appropriate. We used manual and automated techniques to analyze the data obtained from the domain controllers. Based on the results of these tests and assessments, we concluded the data were sufficient and reliable to use in meeting the objective. PRIOR AUDIT COVERAGE Report Title Access Controls xxxx Xxxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxx xxxx System Software Controls xxxxxxxxxx, xxxxxxxxxxxxxxx xxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxx Report Number Final Report Date Report Results IS-AR /15/2008 We reviewed the following two applications operating in a Windows environment: xxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxx. Our review verified that management implemented proper access controls, providing reasonable assurance that data files and application programs are protected against unauthorized modification, disclosure, loss or impairment. We found no issues associated with the applications reviewed. IS-AR /3/2008 We reviewed three application servers covering xxxxxxxxx in the Windows environment. Our review verified that management implemented proper access controls, procedures for monitoring software infrastructure, and controls for change and configuration management. We found no issues associated with the specific applications reviewed. 5
6 Report Title Information Systems Access Controls at Selected Information Technology Facilities for Fiscal Year 2007 System Software Controls xxxxxxxxxx, xxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxx Xxxxxxxxxxxxxxxxxxxx xxxx Information System Access Controls xxxx Eagan, nesota and San Mateo, California, Info mation Technology and Accountixxxxxxxice Cnters Report Number Final Report Date Report Results IS-AR /6/2007 We evaluated Active Directory security settings and found Windows default password settings did not comply with Postal Service Policy. 7 Management agreed and implemented the recommendation to change the default password settings according to policy requirements. IS-AR /3/2007 We reviewed Windows systems controls over auditing, domain controllers, and global settings. We verified that management appropriately configured the Windows operating system at the domain level and that the domain global settings record all accesses to system files. We verified that management used system utilities such as Active Directory, BMC Patrol, Microsoft Operations Manager, Systems Management Server 2003, and Symantec Anti-Virus 8 to enhance security. We did not make any recommendations in this report. IS-AR /27/2006 We found Windows access controls were adequate to protect computer and information resources at the data centers against unauthorized modification, loss, and disclosure. We found no issues associated with the specific applications. 7 Handbook AS BMC Patrol monitors the performance and availability of servers, applications, and storage and network devices. Microsoft Operations Manager is a performance and event-monitoring product from Microsoft targeting Windows systems. Systems Management Server 2003 validates software loaded on workstations and servers. Symantec Anti- Virus detects and prevents virus attacks. 6
7 Active Directory Management APPENDIX B: DETAILED ANALYSIS System administrators were not updating the Active Directory OUs, groups, and accounts xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx. For example, administrators did not: Group distribution lists for xxxxxxxxxxxxxxxxxx with the distribution lists for the xxxxxxxxxxxxxxxxxxxxxxxxxxx. Remove an xxx backup account assigned to a terminated employee. Remove unused Active Directory objects such as test accounts and a printer OU. Delete unused OUs, xxxxxxxxxxxxxxxxxx. Move an Active Directory group from an incorrect OU to the correct OU. This occurred because administrators do not have clearly defined responsibilities for maintaining and updating Active Directory objects regularly. Postal Service policies require the periodic review and update of accounts to restrict access according to the least-privilege and need-to-know principles. 9 By properly maintaining Active Directory objects, management can reduce the risk of unauthorized access to Postal Service information resources, access authority that exceeds job responsibilities, and operational disruptions. Prompted by our review, management began corrective action to update and remove obsolete objects. Additionally, an initiative within eaccess 10 has a new automated feature that will facilitate the reconciliation on certain types of accounts to enhance security over Active Directory. Security Standards Compliance Domain controllers running on the Windows operating systems did not comply with the requirements documented in the latest Postal Service Windows security standards. These standards contain approximately 150 required security settings. On the three servers reviewed, we found 32 of the 150 settings xxxxxxxxxxxxxxxxxxxxxxxxxxx that did not comply with the Windows security standards. This occurred because management was not performing a comprehensive review of server configurations against the Windows security standards and maintaining the security standards document. Management periodically runs a script to review server configurations. The script retrieves the results of approximately 80 security settings that address Sarbanes- 9 Security Standards for Windows 2003 Servers, Section 1.2 and Handbook AS-805, Section eaccess provides automated access management capabilities to Postal Service information resources, including xxx accounts, applications, and databases. 7
8 Oxley requirements. Postal Service policy 11 requires management to adhere to the security standards and review operating system configurations periodically. Management can strengthen security over information resources to protect against accidental or intentional unauthorized use, modification, disclosure, or destruction by ensuring server configuration settings comply with Postal Service policy Handbook AS-805, Section , Harden Information Resources; Section , Hardening Servers. 12 Security Standards for Windows 2003 Servers, Section 3.10, Operating System Security Settings. 8
9 APPENDIX C: MANAGEMENT S COMMENTS 9
10 10
SUBJECT: Audit Report Access Controls in the Enterprise Data Warehouse (Report Number IS-AR-09-004)
February 20, 2009 GEORGE W. WRIGHT VICE PRESIDENT, INFORMATION TECHNOLOGY OPERATIONS SUBJECT: Audit Report Access Controls in the Enterprise Data Warehouse (Report Number ) This report presents the results
for Kimberly F. Benoit Deputy Assistant Inspector General for Information Technology and Data Analysis
August 20, 2014 MEMORANDUM FOR: CHARLES L. MCGANN, JR. MANAGER, CORPORATE INFORMATION SECURITY FROM: for Kimberly F. Benoit Deputy Assistant Inspector General for Information Technology and Data Analysis
THOMAS G. DAY SENIOR VICE PRESIDENT, INTELLIGENT MAIL AND ADDRESS QUALITY PRITHA N. MEHRA VICE PRESIDENT, BUSINESS MAIL ENTRY AND PAYMENT TECHNOLOGIES
March 31, 2009 THOMAS G. DAY SENIOR VICE PRESIDENT, INTELLIGENT MAIL AND ADDRESS QUALITY PRITHA N. MEHRA VICE PRESIDENT, BUSINESS MAIL ENTRY AND PAYMENT TECHNOLOGIES GEORGE W. WRIGHT VICE PRESIDENT, INFORMATION
Capital District Vulnerability Assessment
Capital District Vulnerability Assessment Audit Report Report Number IT-AR-15-1 December 12, 214 These vulnerabilities expose the infrastructure to unauthorized remote access by potential attackers who
Hardware Inventory Management Greater Boston District
Hardware Inventory Management Greater Boston District Audit Report Report Number IT-AR-15-004 March 25, 2015 Highlights Management does not have an accurate inventory of hardware assets connected to the
Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government
Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft
Cloud Computing Contract Clauses
Cloud Computing Contract Clauses Management Advisory Report Report Number SM-MA-14-005-DR April 30, 2014 Highlights The 13 cloud computing contracts did not address information accessibility and data security
7.1 MANAGED FIREWALL SERVICES (MFS) (L.34.1.6; C.2.10.1)
7.1 MANAGED FIREWALL SERVICES (MFS) (L.34.1.6; C.2.10.1) The offeror shall describe the means by which the requirements for Security Services specified in Section C.2 Technical Requirements will be satisfied.
Software Contract and Compliance Review
Audit Report Report Number IT-AR-15-009 September 18, 2015 Software Contract and Compliance Review The software contract did not comply with all applicable standards and management did not ensure the supplier
Software Inventory Management Greater Boston District
Software Inventory Management Greater Boston District Audit Report Report Number IT-AR-15-007 July 13, 2015 Highlights Effective software management practices are not in place to adequately protect and
7.6 VULNERABILITY SCANNING SERVICE (VSS) (L.34.1.6.4; C.2.10.3) 7.6.1 Satisfying the Service Requirements (L.34.1.6.4 (c))
7.6 VULNERABILITY SCANNING SERVICE (VSS) (L.34.1.6.4; C.2.10.3) The offeror shall describe each of the optional Security Services offered. Table L.34.1-8 shows the Security Services that shall be optional
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Parcel Readiness Product Tracking and Reporting System Controls
Parcel Readiness Product Tracking and Reporting System Controls Audit Report Report Number IT-AR-5-002 December 6, 204 The Postal Service needs to improve its process for managing and securing the PTR
FTS NETWORX Enterprise TQC-JTB-05-0002
7 DISASTER RECOVERY The Sprint promise to our customers is to deliver the broadest choice and flexibility of communication products and services so they can do what they want and better. Sprint understands,
Information Security Awareness Training and Phishing
Information Security Awareness Training and Phishing Audit Report Report Number IT-AR-16-001 October 5, 2015 Highlights The Postal Service s information security awareness training related to phishing
INSPECTOR GENERAL UNITED STATES POSTAL SERVICE
OFFICE OF INSPECTOR GENERAL UNITED STATES POSTAL SERVICE Bad Check Prevention and Collection Audit Report January 10, 2012 Report Number January 10, 2012 Bad Check Prevention and Collection Report Number
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Software Development Processes
Software Development Processes Audit Report Report Number IT-AR-15-006 July 13, 2015 Highlights The Postal Service does not consistently manage software development risk. Background Organizations spend
SUBJECT: Audit Report Contract Payment Terms (Report Number CA-AR-10-004)
May 27, 2010 SUSAN M. BROWNELL VICE PRESIDENT, SUPPLY MANAGEMENT SUBJECT: Audit Report Contract Payment Terms (Report Number ) This report presents the results of our audit of contract payment terms (Project
5.2.2 Voice Over Internet Protocol Transport Services (VOIPTS) (L.34.1.4; C.2.7.8)
5.2.2 Voice Over Internet Protocol Transport Services (VOIPTS) (L.34.1.4; C.2.7.8) The offeror shall describe the means by which the requirements for Transport/IP/Optical Services specified in Section
7.5.1 Satisfying the Service Requirements (L.34.1.6.4 (c))
7.5 MANAGED E-AUTHENTICATION SERVICE (MEAS) (L.34.1.6.4; C.2.10.6) The offeror shall describe each of the optional Security Services offered. Table L.34.1-8 shows the Security Services that shall be optional
RESTRICTED POLICY. 1. SoS From: Martin Bellamy Pensions IS Director. Use of the Customer Information System as a shared, cross-government asset
1. SoS From: Martin Bellamy Pensions IS Director Date: 16 February 2007 Copy:Janet Grossman Acting Chief Executive Permanent Secretary Ministers Special Advisors ET PSMT See attached list Use of the Customer
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
SUBJECT: Audit Report Workplace Safety and Injury Reduction Goals in Selected Capital Metro Area Facilities (Report Number HM-AR-09-001)
February 27, 2009 DEBORAH M. GIANNONI-JACKSON VICE PRESIDENT, EMPLOYEE RESOURCE MANAGEMENT JERRY D. LANE VICE PRESIDENT, CAPITAL METRO AREA OPERATIONS SUBJECT: Audit Report Workplace Safety and Injury
Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12
Evaluation Report Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review April 30, 2014 Report Number 14-12 U.S. Small Business Administration Office of Inspector General
How to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
Solution for Enterprise Asset. Management. System Vehicle Maintenance Facility Data. Management. Advisory Report. Report Number DR-MA-15-004
Solution for Enterprise Asset Management System Vehicle Maintenance Facility Data Management Advisory Report Report Number DR-MA-15-004 September 18, 2015 Highlights This management advisory discusses
INSPECTOR GENERAL. Fiscal Year 2013 Postal Service Financial Statements Audit St. Louis Accounting Services. Audit Report.
OFFICE OF INSPECTOR GENERAL UNITED STATES POSTAL SERVICE Fiscal Year 2013 Postal Service Financial Statements Audit Audit Report March 20, 2014 Report Number March 20, 2014 Fiscal Year 2013 Postal Service
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02
Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02 BACKGROUND OBJECTIVES, SCOPE, AND METHODOLOGY FINDINGS INFORMATION SECURITY PROGRAM AUDIT FOLLOW-UP CATS SECURITY PROGRAM PLANNING
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Monitoring of Government Travel Card Transactions
Monitoring of Government Travel Card Transactions Management Advisory Report Report Number DP-MA-14-002 June 25, 2014 Highlights The Postal Service has eliminated use of the travel card for cash advances
ACTING VICE PRESIDENT, INFORMATION TECHNOLOGY. Michael L. Thompson Acting Deputy Assistant Inspector General for Technology, Investment and Cost
July 14, 2015 MEMORANDUM FOR: JUDITH A. ADAMS ACTING VICE PRESIDENT, INFORMATION TECHNOLOGY FROM: SUBJECT: Michael L. Thompson Acting Deputy Assistant Inspector General for Technology, Investment and Cost
Managing and Maintaining a Windows Server 2003 Network Environment
Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.
Account Management Standards
Account Management Standards Overview These standards are intended to guide the establishment of effective account management procedures that promote the security and integrity of University information
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Stellar Active Directory Manager
Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly
Evaluation Report. Office of Inspector General
Evaluation Report OIG-08-035 INFORMATION TECHNOLOGY: Network Security at the Office of the Comptroller of the Currency Needs Improvement June 03, 2008 Office of Inspector General Department of the Treasury
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Oversight of Expense Purchase Cards
Oversight of Expense Purchase Cards Audit Report Report Number SM-AR-15-006 August 7, 2015 Background The expense purchase card is the most commonly used purchase card in the U.S. Postal Service. Postal
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS AND EVALUATIONS Department of Veterans Affairs Review of Alleged Lack of Access Controls for the Project Management Accountability System Dashboard May 9,
Data Stored on a Windows Server Connected to a Network
Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Server Connected to
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
Misclassified Training Expenses
Misclassified Training Expenses Management Advisory Report Report Number DP-MA-14-003 September 16, 2014 Highlights The Postal Service overstated the general ledger expense account balances for "Training
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
Portland State University Office of Information Technologies Active Directory Standards and Guidelines for Campus Administrators
Portland State University Office of Information Technologies Active Directory Standards and Guidelines for Campus Administrators Introduced with Windows 2000 Server, Active Directory (AD) is Microsoft
Standard: Event Monitoring
Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information
Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.
U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
How To Check For Errors In International Mail Volume Data
Office of Inspector General March 22, 2006 AYODEJI O. SANYAOLU PLANT MANAGER - J.T. WEEKER (CHICAGO) INTERNATIONAL SERVICE CENTER SUBJECT: Audit Report J.T. Weeker (Chicago) International Service Center
PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.
PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements
Configuring Windows Server 2008 Active Directory
Configuring Windows Server 2008 Active Directory Course Number: 70-640 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-640: TS: Windows Server 2008
Retail Systems Software Deployment and Functionality
Retail Systems Software Deployment and Functionality Audit Report Report Number MI-AR-15-002 March 13, 2015 Highlights Background The U.S. Postal Service Office of Inspector General (OIG) conducted a self-initiated
INSPECTOR GENERAL UNITED STATES POSTAL SERVICE
OFFICE OF INSPECTOR GENERAL UNITED STATES POSTAL SERVICE Corporate Succession Planning Program Management Advisory Report April 23, 2014 Report Number April 23, 2014 Corporate Succession Planning Program
JOHN P. BERTOLINA SENIOR PLANT MANAGER MARGARET L. SELLERS PROCESSING AND DISTRIBUTION CENTER
August 24, 2007 JOHN P. BERTOLINA SENIOR PLANT MANAGER MARGARET L. SELLERS PROCESSING AND DISTRIBUTION CENTER SUBJECT: Audit Report Internal Controls Over Operation Clock Rings at the Margaret L. Sellers
User Management Tool 1.5
User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.
- 1. Policy Statement All card processing activities and related technologies must comply with the Payment Card Industry Data Security Standard (PCI-DSS) in its entirety. Card processing activities must
70-640 R4: Configuring Windows Server 2008 Active Directory
70-640 R4: Configuring Windows Server 2008 Active Directory Course Introduction Course Introduction Chapter 01 - Installing the Active Directory Role Lesson: What is IDA? What is Active Directory Identity
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
Understand Troubleshooting Methodology
Understand Troubleshooting Methodology Lesson Overview In this lesson, you will learn about: Troubleshooting procedures Event Viewer Logging Resource Monitor Anticipatory Set If the workstation service
ASSESSMENT REPORT 09 14 GPO WORKERS COMPENSATION PROGRAM. September 30, 2009
ASSESSMENT REPORT 09 14 GPO WORKERS COMPENSATION PROGRAM September 30, 2009 Date September 30, 2009 To Chief Management Officer Chief, Office of Workers Compensation From Assistant Inspector General for
(Installation through ADSelfService Plus web portal and Manual Installation)
ADSelfService Plus Client Software Installation Guide (Installation through ADSelfService Plus web portal and Manual Installation) 1 Table of Contents Introduction:... 3 ADSelfService Plus Client software:...
Domain Controller Failover When Using Active Directory
Domain Controller Failover When Using Active Directory Domain Controller Failover When Using Active Directory published January 2002 NSI and Double-Take are registered trademarks of Network Specialists,
Mecklenburg County Department of Internal Audit. PeopleSoft Application Security Audit Report 1452
Mecklenburg County Department of Internal Audit PeopleSoft Application Security Audit Report 1452 February 9, 2015 Internal Audit s Mission Through open communication, professionalism, expertise and trust,
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
Undeliverable as Addressed Mail
Undeliverable as Addressed Mail Audit Report Report Number MS-AR-14-006 July 14, 2014 Highlights The Postal Service has taken action to reduce and recover UAA mail costs by testing whether business mailers
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
PeopleSoft IT General Controls
PeopleSoft IT General Controls Performance Audit December 2009 Office of the Auditor Audit Services Division City and County of Denver Dennis J. Gallagher Auditor The Auditor of the City and County of
Data Stored on a Windows Computer Connected to a Network
Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Computer Connected to
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
ThinManager and Active Directory
ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION,
Management Reporter Integration Guide for Microsoft Dynamics AX
Microsoft Dynamics Management Reporter Integration Guide for Microsoft Dynamics AX July 2013 Find updates to this documentation at the following location: http://go.microsoft.com/fwlink/?linkid=162565
