IS AUDITING GUIDELINE REVIEW OF VIRTUAL PRIVATE NETWORKS DOCUMENT #

Size: px
Start display at page:

Download "IS AUDITING GUIDELINE REVIEW OF VIRTUAL PRIVATE NETWORKS DOCUMENT #060.020.120"

Transcription

1 IS AUDITING GUIDELINE REVIEW OF VIRTUAL PRIVATE NETWORKS DOCUMENT # The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically to IS auditing. One of the goals of the Information Systems Audit and Control Association (ISACA ) is to advance globally applicable standards to meet its vision. The development and dissemination of the IS Auditing Standards are a cornerstone of the ISACA professional contribution to the audit community. The framework for the IS Auditing Standards provides multiple levels of guidance. Standards define mandatory requirements for IS auditing and reporting. They inform: IS auditors of the minimum level of acceptable performance required to meet the professional responsibilities set out in the ISACA Code of Professional Ethics for IS auditors Management and other interested parties of the profession s expectations concerning the work of practitioners Holders of the Certified Information Systems Auditor (CISA ) designation of requirements. Failure to comply with these standards may result in an investigation into the CISA holder's conduct by the ISACA Board of Directors or appropriate ISACA committee and, ultimately, in disciplinary action. Guidelines provide guidance in applying IS Auditing Standards. The IS auditor should consider them in determining how to achieve implementation of the standards, use professional judgment in their application and be prepared to justify any departure. The objective of the IS Auditing Guidelines is to provide further information on how to comply with the IS Auditing Standards. Procedures provide examples of procedures an IS auditor might follow in an audit engagement. The procedure documents provide information on how to meet the standards when performing IS auditing work, but do not set requirements. The objective of the IS Auditing Procedures is to provide further information on how to comply with the IS Auditing Standards. COBIT resources should be used as a source of best practice guidance. Each of the following is organised by IT management process, as defined in the COBIT Framework. COBIT is intended for use by business and IT management as well as IS auditors; therefore, its usage enables the understanding of business objectives, and communication of best practices and recommendations, to be made around a commonly understood and well-respected standard reference. COBIT includes: Control Objectives High-level and detailed generic statements of minimum good control Control Practices Practical rationales and guidance on how to implement the control objectives Audit Guidelines Guidance for each control area on how to obtain an understanding, evaluate each control, assess compliance, and substantiate the risk of controls not being met Management Guidelines Guidance on how to assess and improve IT process performance, using maturity models, metrics and critical success factors Glossary of terms can be found on the ISACA web site at The words audit and review are used interchangeably. Disclaimer: ISACA has designed this guidance as the minimum level of acceptable performance required to meet the professional responsibilities set out in the ISACA Code of Professional Ethics for IS auditors. ISACA makes no claim that use of this product will assure a successful outcome. The publication should not be considered inclusive of any proper procedures and tests or exclusive of other procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific procedure or test, the controls professional should apply his/her own professional judgment to the specific control circumstances presented by the particular systems or information technology environment. The ISACA Standards Board is committed to wide consultation in the preparation of the IS Auditing Standards, Guidelines and Procedures. Prior to issuing any documents, the Standards Board issues exposure drafts internationally for general public comment. The Standards Board also seeks out those with a special expertise or interest in the topic under consideration for consultation where necessary. The Standards Board has an ongoing development programme and welcomes the input of ISACA members and other interested parties to identify emerging issues requiring new standards. Any suggestions should be ed ([email protected]), faxed ( ) or mailed (address at the end of document) to ISACA International Headquarters, for the attention of the director of research standards and academic relations. This material was issued on 1 April Information Systems Audit and Control Association Standards Board Chair, Claudio Cilli, Ph.D., CISA, CISM, CIA, CISSP Value Partners, Italy Svein Aldal Scandinavian Business Security AS, Norway John W. Beveridge, CISA, CFE, CGFM, CQA Commonwealth of Massachusetts, USA

2 Sergio Fleginsky, CISA PricewaterhouseCoopers, Uruguay Christina Ledesma, CISA, CISM Citibank NA Sucursal, Uruguay Andrew MacLeod, CISA, FCPA, MACS, PCP, CIA Brisbane City Council, Australia Ravi Muthukrishnan, CISA, CISM, FCA, ISCA NextLinx India Private Ltd., India Peter Niblett, CISA, CA, CIA, FCPA WHK Day Neilson, Australia John G. Ott, CISA, CPA Aetna Inc., USA 1. BACKGROUND 1.1 Linkage to Standards Standard (Evidence) states, "During the course of the audit, the information systems auditor is to obtain sufficient, reliable, relevant and useful evidence to achieve the audit objectives effectively. The audit findings and conclusions are to be supported by appropriate analysis and interpretation of this evidence." Refer to IS Auditing Guideline Effect of Third Parties on the Organisation s IT Controls Refer to IS Auditing Guideline Effect of Nonaudit Roles on the IS Auditor s Independence 1.2 Linkage to COBIT COBITFramework states, "It is management's responsibility to safeguard all the assets of the enterprise. To discharge this responsibility, as well as to achieve its expectations, management must establish an adequate system of internal control." COBIT Management Guidelines provides a management-oriented framework for continuous and proactive control selfassessment specifically focused on: Performance measurement How well is the IT function supporting business requirements? IT control profiling What IT processes are important? What are the critical success factors for control? Awareness What are the risks of not achieving the objectives? Benchmarking What do others do? How can results be measured and compared? Management Guidelines provides example metrics enabling assessment of IT performance in business terms. The key goal indicators identify and measure outcomes of IT processes, and the key performance indicators assess how well the processes are performing by measuring the enablers of the process. Maturity models and maturity attributes provide for capability assessments and benchmarking, helping management to measure control capability and identify control gaps and strategies for improvement Management Guidelines can be used to support self-assessment workshops and can also be used to support the implementation by management of continuous monitoring and improvement procedures as part of an IT governance scheme COBIT provides a detailed set of controls and control techniques for the information systems management environment. Selection of the most relevant material in COBIT applicable to the scope of the particular audit is based on the choice of specific COBIT IT processes and consideration of COBIT s information criteria The COBIT references located in the appendix of this document offer the specific objectives or processes of COBIT to consider when reviewing the area addressed by this guidance. 1.3 Need for Guideline The purpose of this guideline is to describe the recommended practices in carrying out the review of virtual private network (VPN) implementations so that the relevant IS Auditing Standards are complied with during the course of the review. 2. VIRTUAL PRIVATE NETWORK (VPN) 2.1 Definition Virtual Private Networking New Issues for Network Security, published by the IT Governance Institute, defines VPN as a: network of virtual circuits that carries private traffic through public or shared networks such as the Internet or those provided by network service providers (NSPs). For the purpose of this guideline, this definition of VPN is used In the context of VPN, the terms tunnel and tunneling are often used. The process of encapsulating one type of packet in another packet type so the data can be transferred across paths that otherwise would not transmit the data is called tunneling. The paths the encapsulated packets follow in an Internet VPN are called tunnels. 2.2 VPN Models There are three common VPN models for deployment. The major differences among the models are in the location of their service end points or tunnel end points, the level of management required, quality of service, and the reliance on direct service provider involvement. The three most common models are: Pure provider model Hybrid provider model End-to-end model Page 2 Review of Virtual Private Networks Guideline

3 2.2.2 In the pure provider model, most of the VPN functionality is built into the service provider infrastructure and not in the network of the organisation. This model is often deployed over one service provider s network. There is a clear line of distinction between the organisation s network and the service provider s network. Remote access to the organisation s network is typically provided by a dedicated circuit (such as, T1, T3), ATM connections or dedicated frame relay connections. The customer owns and operates the remote access VPN-related equipment and software in the network, while equipment and software inside the service provider s network, from the physical circuit out, is owned and operated by the service provider. The service provider initiates VPN tunnels from edge-to-edge of the network and relies on the private circuits on either end for security. In this model, the provider has a high level of control over the network and is responsible for capacity planning, design, configuration, diagnostics and troubleshooting The hybrid provider model involves the networks of both the service provider and the organisation. A VPN tunnel is initiated from inside the provider s network, and the tunnel is terminated at the organisation s network. In this model, the service provider is responsible for the initiation of the VPN tunnels for the remote users after the users are authenticated. When the remote user reaches the organisation s network, a second authentication may be required before being granted access permission to the private network. Users can access the network facilities as if they are directly connected to the enterprise LAN, once they are authenticated In the end-to-end model, the service provider serves only as a transport for the VPN data. The service end points or tunneling could be the desktop or a VPN device that serves as a proxy for multiple desktops. Both service end points are outside the service provider s network. This model can be used for remote access or to connect multiple sites. 2.3 VPN Usage There are various ways to use a VPN, depending upon the model used. The most common are: Site-to-site connectivity Remote access connectivity Extended enterprise extranet connectivity The site-to-site connectivity provides separate intranets to connect securely, effectively creating one large intranet. Site-to-site VPNs are often used by geographically distributed organisations to create a single logical network The remote access connectivity permits mobile employees to access the organisation s intranet, via the Internet, using a secure network communications. This is used in combination with global dial-up, wireless and broadband ISPs. Many organisations use remote access VPNs to provide low -cost network accessibility to their employees Extended enterprise extranet connectivity provides connections to networks outside the enterprise. Business, research or marketing partners often use these to speed communications through secured connections. Generally, extranets have stronger controls in place to allow, manage and monitor network-to-network traffic, and the internal network may be protected from the extranet via firewalls. 2.4 VPN Architecture There are many possible options for installing VPNs. A VPN supplied by a network service provider is one of the most common approaches to connect an organisation to the Internet. The VPN architecture in any organisation could be one or combinations of the following: Firewall-based VPNs Router-based VPNs Remote access-based VPNs Hardware (black box)-based VPNs Software-based VPNs Review of Virtual Private Networks Guideline Page 3

4 2.4.2 The firewall-based VPNs are the most common form of implementation. Since most organisations already use a firewall to connect to the Internet, they need to add encryption software and some kind of authorisation software There are two types of router-based VPNs. In one, software is added to the router to allow encryption to occur. With the second type, a third-party vendor-supplied external card must be inserted into the same chassis as the router to off-load the encryption process from the router s CPU to the card With remote access-based VPNs, someone from a remote location can create an encrypted packet stream or tunnel to a network device in the organisation With hardware (black box)-based VPNs, the vendor offers a black box, or a device with encryption software, to create a VPN tunnel. The black box VPN device is ordinarily behind the firewall or on the side of the firewall to secure the data, but in fact the VPN system may be wholly independent of the firewall In software-based VPNs, the software handles the tunneling to another client or encryption of packets. Software is loaded on the client and the server. Traffic starts from a specific client within the organisation and makes a connection to a server located at the remote site. Traffic leaving the client is encrypted or encapsulated, and routed to its destination. The same applies for someone trying to connect to the internal network. 2.5 VPN Configuration/Topology When configuring the VPN, parameters must be set for key length, authentication servers, connection and idle timeouts, certificate generation and key generation, and distribution mechanisms. There are numerous ways to configure and implement VPN architecture and to place the architecture in a VPN topology. Organisations could use one or combinations of the following most commonly used topologies in a VPN configuration: Firewall-to-client LAN-to-LAN Firewall-to-intranet/extranet Hardware and software VPN Firewall-to-client is the most commonly used topology, and it applies to remote users who dial into an internal network LAN-to-LAN is the second most commonly used topology. It extends the firewall-to-client topology to different remote offices and among offices, business partners and suppliers when a VPN tunnel has been created between two sites In firewall-to-intranet/extranet topology, intranets are used by employees and extranets are used externally by customers, business partners and suppliers. When remote users try to access servers on the extranet or intranet, a decision must be made as to which server they may access Hardware and software VPNs are stand-alone devices designed to implement VPN technology algorithms. A VPN device is ordinarily behind the firewall on the internal network. Data packets flow through the firewall and the VPN device. As the packets pass through these devices, they can be encrypted. Generally in software encryption models like the SSL protocol, the special devices (authentication) are not required and the packet flow is encrypted by the software VPN technologies and protocols include: PPTP (point to point tunneling protocol) L2TP (layer 2 tunneling protocol) IPSec (Internet protocol security) SSL (secure socket layer) 3. RISKS ASSOCIATED WITH VPNs 3.1 Types of Risks Since VPN is a communication infrastructure for the business that uses third-party services, the risks associated with it could be categorised as: Security risk Third-party risk Business risk Implementation risk Operating risk 3.2 Security and Legal Risk The security risks relating to VPNs include: Inadequate assessment of security and legal risks arising out of using VPNs Insufficient security programs to mitigate risks to information assets arising out of VPNs Inadequate protection of data while they are at the point before entering the VPN, or once they arrive at the point on leaving the VPN Failure to secure information while unencrypted over a given network path (internal networks before encryption device or external networks after decryption device) Page 4 Review of Virtual Private Networks Guideline

5 Lack of implementation that could result in confidentiality, integrity, nonrepudiation and/or availability issues. 3.3 Third-party Risk The reliance on third-party service providers could result in risks such as: Choice of an inappropriate provider Inadequate relationship management Inadequacies in service level agreements (SLA) and metrics Inappropriate governance and management process Inadequate measuring and monitoring of SLAs and metrics Inadequate backup/redundancy strategy Insufficient benchmarking of the relationship and services Abuse of access to data on the VPN 3.4 Business Risk Risks such as the following could lead to nonfulfillment of the management or business expectations: Inadequate alignment to business strategy Inadequate cost savings Failure to achieve security requirements Insufficient ease of use Failure to address scope and span of user needs Loss/degradation of service in other areas of the organisation or process 3.5 Implementation Risk Risks such as the following could lead to the implementation of an ineffective and inefficient solution: Inadequate attention to and investment in up-front design Inappropriate selection of the VPN model for organisation Inadequate use of the third parties where appropriate Insufficient attention to security in design Inappropriate recovery processes Failure to design service level expectations and measurements Inappropriate integration strategy Ineffective change, project or implementation management processes VPN client risk (same interface accept Internet and VPN traffic) 3.6 Operating Risk Risks such as the following result in ineffective and inefficient utilisation/operation of the VPN: Inadequate resources to operate effectively Lack of reliability Impairment of quality of service Lack of interoperability Failure to encapsulate Inadequate capacity Failure to provide redundancy or back up Use of personal devices (home computing) for business purpose (lack of security configurations, antivirus software, personal firewalls) Lack of confidentiality on operation parameters or data 4. CHARTER 4.1 Mandate Before commencing a review of a VPN, the IS auditor should provide reasonable assurance of the requisite mandate by virtue of the IS auditor s position or the required written mandate provided by the organisation, to carry out the envisaged review. In case the review is initiated by the organisation, the IS auditor also should obtain reasonable assurance that the organisation has the appropriate authority to commission the review. 5. INDEPENDENCE 5.1 Professional Objectivity Before accepting the assignment, the IS auditor should provide reasonable assurance that the IS auditor s interests, if any, in the VPN solution being reviewed would not in any manner impair the objectivity of the review. In the event of any possible Review of Virtual Private Networks Guideline Page 5

6 conflict of interests, the same should be communicated explicitly to the organisation, and a written statement of the organisation s awareness of the conflict should be obtained before accepting the assignment In case the IS auditor has/had any nonaudit roles in the VPN being reviewed, the IS auditor should consider guideline Effect of Nonaudit Roles on the IS Auditor s Independence. 6. COMPETENCE 6.1 Skills and Knowledge The IS auditor should provide reasonable assurance of the necessary technical knowledge to review the VPN. A clear understanding of the business requirements and the technical aspects of the VPN is necessary while reviewing the VPN implementation in an organisation The IS auditor also should provide reasonable assurance of access to the relevant technical skill and knowledge to carry out the review of the VPN. Review of VPN would call for good technical knowledge to evaluate aspects such as the encryption technologies used, network security architecture and security technologies. The IS auditor should have adequate knowledge to review these aspects. Where expert inputs are necessary, appropriate inputs should be obtained from external professional resources. The fact that external expert resources would be used should be communicated to the organisation in writing. 7. PLANNING 7.1 High-level Risk Assessment The IS auditor should gather information regarding the business and its requirements for the VPN to carry out a high-level risk assessment The VPN-related risks referred to in section 3 should be considered depending on the stage at which the review is being carried out, such as during design (pre-implementation), implementation or post-implementation The relevant COBIT information criteria effectiveness, efficiency, confidentiality, integrity, availability, compliance and reliability that need to be reviewed and confirmed should also be identified The relevant aspects of Control Objectives for Net Centric Technology (CONCT) should also be considered in this context, since these are extensions of COBIT criteria to network-centric environments such as those supported by VPNs This high-level risk assessment will help determine the scope and coverage of the review. 7.2 Scope and Objectives of the Review The IS auditor, in consultation with the organisation where appropriate, should clearly define the scope and objective of the review of the VPN. The aspects to be covered by the review should be explicitly stated as part of the scope. The high-level risk assessment referred to in section would dictate which aspects need to be reviewed and the extent and depth of the review For the purpose of the review, the stakeholders in the solution also should be identified and agreed upon with the organisation Any key concerns of the stakeholders should also be included, as appropriate, in the scope and objectives of the review In case the review scope includes third-party providers, the IS auditor must assure the audit clause was included in the contract. 7.3 Approach The IS auditor should formulate the approach in such a way that the scope and objectives of the review could be fulfilled in an objective and professional manner. The approach followed should depend on whether the review is pre-implementation, at the implementation stage or post-implementation. The approach should be appropriately documented. When and where external expert inputs would be used also should be specified as part of the approach. Any planned use of testing/monitoring tools should also be stated as part of the approach. 7.4 Sign-off for the Plan Depending on the organisational practices, the IS auditor may obtain the concurrence of the organisation for the plan and approach. 8. PERFORMANCE OF THE VPN REVIEW 8.1 General This section addresses the wide spectrum of aspects to be addressed during the execution of a VPN review. For a specific VPN review, aspects relevant to the review should be identified from this wide spectrum of aspects depending on the envisaged scope and objectives of the review The VPN review should be carried out per the defined approach (with refinements as appropriate), so the envisaged objectives of the review are fulfilled. Page 6 Review of Virtual Private Networks Guideline

7 8.1.3 In general, study of available documentation (such as, business case, system documentation, contracts, service level agreements and logs), discussions with the stakeholders and service providers, and observation should be used appropriately in gathering, analysing and interpreting the data. Where appropriate, the IS auditor should test the significant processes/functions in the VPN environment to verify that the processes/functions are performing as intended Where necessary and agreed upon with the organisation, external expert inputs could be used suitably in the collection, analysis and interpretation of the data The inferences and recommendations should be based on an objective analysis and interpretation of the data Appropriate audit trails should be maintained for the data gathered, analysis made, inferences arrived at and corrective actions recommended. 8.2 Pre-implementation Review The pre-implementation review, carried out before the VPN solution is implemented (during design stage), should address the appropriateness of the: Requirements for a VPN solution Cost-benefits of the proposed solution Proposed VPN technology, such as VPN model, VPN architecture, VPN configuration/topology and VPN usage Proposed security architecture and features, including the proposed encryption technologies Redundancy and backup facilities planned Management approvals Proposed project management structures and monitoring mechanisms Selection process for the choice of the service provider Proposed contract, SLAs and metrics Statutory requirements, if any, that need to be fulfilled To address these aspects, the IS auditor should: Study the VPN requirements business as well as technical Study the business case (costs and benefits) and the approvals for the same Review the VPN design document outlining the technology aspects Review whether the proposed solution would conform to one of PPTP, L2TP and IPSec protocols Review the proposed security architecture and encryption technology Review the tender process, including the technical and commercial evaluation of the alternate proposals and the ultimate choice of the service provider Study the proposed project management structure Study the proposed contracts, SLA and metrics Study the statutory requirements to be fulfilled Evaluate the redundancy and backups proposed Review the strategy proposed for integrating the VPN w ith the applications Use external experts, where necessary, to evaluate the appropriateness of the technology and security aspects Study the proposed training plans Study any related audit/review reports Evaluate the results of the above with reference to their appropriateness as well as their adequacy to mitigate the risks security risk, third-party risk, business risk, implementation risk and operating risk Evaluate how COBIT and CONCT criteria are being fulfilled Highlight the risks and issues arising out of the review for necessary corrective action. 8.3 Implementation Review The implementation review happens during the implementation, and accordingly, it should address whether the: Implementation is progressing per the approved plans and within agreed time frames and costs VPN technology VPN model, VPN architecture, VPN configuration/topology and VPN usage is implemented as intended Security scheme and the encryption technologies used are robust and are as designed The planned redundancy and backup facilities are implemented The actual contracts, SLAs and metrics address the organisation s requirements The statutory requirements, if any, are addressed To address the above referred aspects the IS auditor should: Study the project progress reports and minutes of meetings Evaluate the actual implementation of the technologies against the plans and identify the deviations, if any Confirm whether the solution is certified to conform to one of PPTP, L2TP and IPSec protocols Evaluate the actual security architecture and encryption technology implemented for conformance with the approved design Study the actual contracts, SLA and metrics that were agreed upon Evaluate the redundancy and backups established Review of Virtual Private Networks Guideline Page 7

8 Review the actual integration of the VPN w ith the applications Use external experts, where necessary, to evaluate the appropriateness of the technology and security aspects actually implemented Evaluate the adequacy of the testing and migration processes to assess whether they address all kinds of users and cover such things as capacity, bandwidth, access control and encryption in an appropriate manner Evaluate the billing mechanisms being built Assess whether the legacy connections are being retired, their billings discontinued and equipments disposed of progressively with the implementation of the VPN Study the earlier pre-implementation audit report, if any, and any other related review reports to assess whether the risk mitigation actions recommended earlier are being implemented Evaluate the results of the above with reference to their appropriateness as well as their adequacy to mitigate the risks security risk, third-party risk, business risk, implementation risk and operating risk Evaluate how COBIT and CONCT criteria are fulfilled Highlight the risks and issues arising out of the review for necessary corrective action 8.4 Post-implementation Review The post-implementation review occurs after the implementation of the VPN, and hence, it should address whether the: Envisaged benefits are being achieved One-time costs are as planned and reasonable Ongoing billings are reasonable and as agreed VPN technology is being used as intended VPN and its usage are in conformance with the security policies and procedures including data classification Third parties accessing the VPN via extranets have signed the relevant security and confidentiality agreements and are complying with the same The users accessing through remote connection and using laptops use necessary security features including personal firewalls, where appropriate There are appropriate processes for the management of digital certificates The SLAs and metrics, including quality of service (QoS), are measured, monitored and escalated on a regular basis for timely actions The data are sufficiently protected at entry and exit points as well as over unencrypted links using appropriate procedures Appropriate security tools and processes are in place for such things as virus checking and intrusion detection The services and costs are comparable and competitive The redundancy and backup facilities are functioning appropriately The statutory requirements, if any, are addressed To address the above referred aspects the IS auditor should: Study the project completion report Review the VPN technology in actual use for its conformance with the approved design Confirm whether the solution is certified to conform to one of PPTP, L2TP and IPSec protocols Review the ongoing billings on a sample basis Carry out sample checking of compliance with security policies and procedures Check third-party access as well as the agreements signed by third parties regarding extranet access Check the remote and laptop access processes as well the laptops for appropriate security settings Review the actual SLAs and metrics including QoS and the actual process of monitoring them Check the security implementation across the network Test the backup and redundant facilities Carry out periodic benchmarking to provide reasonable assurance of continued reasonableness of charges and quality of services Use external experts, where necessary, to evaluate the appropriateness of the technology and security aspects in place Use appropriate tools to test relevant aspects of the VPN solution Review the help desk process supporting the VPN Evaluate the results of the above with reference to their appropriateness as well as their adequacy to mitigate risks security risk, third-party risk, business risk, implementation risk and operating risk Evaluate how COBIT and CONCT criteria are fulfilled Highlight the risks and issues arising out of the review for necessary corrective action 9. REPORTING 9.1 Report Content The report on the VPN review should address the following aspects depending on the scope of its coverage: The scope, objective, methodology followed and assumptions Page 8 Review of Virtual Private Networks Guideline

9 Overall assessment of the solution in terms of key strengths and weaknesses as well as the likely effects of the weaknesses Recommendations to overcome the significant weaknesses and improve the solution The extent of compliance with COBIT s information criteria and CONCT criteria, and the effect of any noncompliance Recommendations regarding how the experience could be used to improve similar future solutions or initiatives The observations and recommendations should be validated with the stakeholders and organisation, as appropriate, before finalising the report. 10. FOLLOW-UP 10.1 Tracking Actions Agreed The actions agreed at the end of the VPN review should be assigned due dates and tracked for completion. Outstanding issues should be escalated to appropriate management for necessary action. 11. EFFECTIVE DATE 11.1 This guideline is effective for all information systems audits beginning on or after 1 July A full glossary of terms can be found on the ISACA web site at APPENDIX COBIT Reference Selection of the most relevant material in COBIT applicable to the scope of the particular audit is based on the choice of specific COBIT IT processes and consideration of COBIT information criteria. In a VPN, a communication infrastructure, the following aspects are more relevant: PO1 Define a Strategic IT Plan PO3 Determine Technological Direction PO5 Manage the IT Investment PO8 Ensure Compliance With External Requirements PO9 Assess Risks PO10 Manage Projects AI3 Acquire and Maintain Technology Infrastructure AI4 Develop and Maintain Procedures AI5 Install and Accredit Systems AI6 Manage Changes DS1 Define and Manage Service Levels DS2 Manage third-party services DS3 Manage Performance and Capacity DS4 Ensure Continuous Service DS5 Ensure Systems Security DS9 Manage the Configuration DS12 Manage Facilities DS13 Manage Operations M1 Monitor the Processes The information criteria most relevant to a VPN review are: Primary: availability, confidentiality, effectiveness and integrity Secondary: efficiency, compliance and reliability References Virtual Private Networking New Issues for Network Security, IT Governance Institute, USA, 2001 Control Objectives for Netcentric Technology (CONCT), IT Governance Institute, USA, 1999 Copyright 2004 Information Systems Audit and Control Association 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL USA Telephone: Fax: [email protected] Web site: Review of Virtual Private Networks Guideline Page 9

G11 EFFECT OF PERVASIVE IS CONTROLS

G11 EFFECT OF PERVASIVE IS CONTROLS IS AUDITING GUIDELINE G11 EFFECT OF PERVASIVE IS CONTROLS The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically

More information

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply

More information

IS AUDITING GUIDELINE BUSINESS-TO-CONSUMER (B2C) E-COMMERCE REVIEWS DOCUMENT G22

IS AUDITING GUIDELINE BUSINESS-TO-CONSUMER (B2C) E-COMMERCE REVIEWS DOCUMENT G22 IS AUDITING GUIDELINE BUSINESS-TO-CONSUMER (B2C) E-COMMERCE REVIEWS DOCUMENT G22 Introduction The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits

More information

IS AUDITING PROCEDURE CONTROL RISK SELF-ASSESSMENT (CRSA) DOCUMENT P5

IS AUDITING PROCEDURE CONTROL RISK SELF-ASSESSMENT (CRSA) DOCUMENT P5 IS AUDITING PROCEDURE CONTROL RISK SELF-ASSESSMENT (CRSA) DOCUMENT P5 Introduction The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards

More information

IS AUDITING PROCEDURE

IS AUDITING PROCEDURE IS AUDITING PROCEDURE VIRUSES AND OTHER MALICIOUS LOGIC DOCUMENT P4 Introduction The specialised nature of information systems (IS) auditing, and the skills necessary to perform such audits, require standards

More information

IS AUDITING GUIDELINE ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS REVIEW DOCUMENT G21

IS AUDITING GUIDELINE ENTERPRISE RESOURCE PLANNING (ERP) SYSTEMS REVIEW DOCUMENT G21 Introduction The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically to IS auditing. One of the goals of the

More information

IS Audit and Assurance Guideline 2402 Follow-up Activities

IS Audit and Assurance Guideline 2402 Follow-up Activities IS Audit and Assurance Guideline 2402 Activities The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply

More information

IS Audit and Assurance Guideline 2202 Risk Assessment in Planning

IS Audit and Assurance Guideline 2202 Risk Assessment in Planning IS Audit and Assurance Guideline 2202 Risk Assessment in Planning The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards

More information

IS AUDITING PROCEDURE INTRUSION DETECTION SYSTEM (IDS) REVIEW DOCUMENT P3

IS AUDITING PROCEDURE INTRUSION DETECTION SYSTEM (IDS) REVIEW DOCUMENT P3 Introduction The specialised nature of information systems (IS) auditing, and the skills necessary to perform such audits, require standards that apply specifically to IS auditing. One of the goals of

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

IS Standards, Guidelines and Procedures for Auditing and Control Professionals

IS Standards, Guidelines and Procedures for Auditing and Control Professionals IS Standards, Guidelines and Procedures for Auditing and Control Professionals Code of Professional Ethics IS Auditing Standards, Guidelines and Procedures IS Control Professionals Standards Current as

More information

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information

More information

Virtual Private Networks (VPN) Connectivity and Management Policy

Virtual Private Networks (VPN) Connectivity and Management Policy Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

IS AUDITING PROCEDURE FIREWALLS DOCUMENT P6

IS AUDITING PROCEDURE FIREWALLS DOCUMENT P6 Introduction The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically to IS auditing. One of the goals of the

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region

VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Virtual Private Networks Solutions for Secure Remote Access. White Paper Virtual Private Networks Solutions for Secure Remote Access White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information

More information

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great Multi Protocol Label Switching (MPLS) Migration SingTel MPLS The Great MPLS Migration There are now a variety of alternatives when it comes to connecting multiple sites with WAN

More information

Intranet Security Solution

Intranet Security Solution Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their

More information

Introduction. Technology background

Introduction. Technology background White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course

More information

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

GPRS and 3G Services: Connectivity Options

GPRS and 3G Services: Connectivity Options GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

Creating a VPN Using Windows 2003 Server and XP Professional

Creating a VPN Using Windows 2003 Server and XP Professional Creating a VPN Using Windows 2003 Server and XP Professional Recommended Instructor Preparation for Learning Activity Instructor Notes: There are two main types of VPNs: User-to-Network This type of VPN

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

ow to use CobiT to assess the security & reliability of Digital Preservation

ow to use CobiT to assess the security & reliability of Digital Preservation ow to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14-16 April 2004 Greet Volders Managing Consultant - VOQUALS N.V. Vice President & in charge of Education

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing

More information

System Audit Framework

System Audit Framework System Audit Framework Audit Process Following steps would be repeated annually to ensure that the process is comprehensive & effective: 1. The Audit shall be conducted according to the Norms, Terms of

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks The Ohio State University Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security

More information

Combine ITIL and COBIT to Meet Business Challenges

Combine ITIL and COBIT to Meet Business Challenges Combine ITIL and COBIT to Meet Business Challenges By Peter Hill, Director, IT Governance Network, and Ken Turbitt, Best Practices Director, BMC Software BEST PRACTICES WHITE PAPER Table of Contents ABSTRACT...

More information

The Information Assurance Process: Charting a Path Towards Compliance

The Information Assurance Process: Charting a Path Towards Compliance The Information Assurance Process: Charting a Path Towards Compliance A white paper on a collaborative approach to the process and activities necessary to attain compliance with information assurance standards.

More information

Consensus Policy Resource Community. Lab Security Policy

Consensus Policy Resource Community. Lab Security Policy Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: [email protected]

More information

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

Electronic Service Agent TM. Network and Transmission Security And Information Privacy Electronic Service Agent TM and Transmission Security And Information Privacy Electronic Services January 2006 Introduction IBM Electronic Service Agent TM is a software application responsible for collecting

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Secure Network Design: Designing a DMZ & VPN

Secure Network Design: Designing a DMZ & VPN Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

PRODUCTIVITY NETWORK, INC. Information Technology. VPN Overview

PRODUCTIVITY NETWORK, INC. Information Technology. VPN Overview Information Technology VPN Overview Productivity Network, Inc. 1031 Revere Court Lombard, IL 60148 Phone 800.828.6826 Fax 630.495.2427 9051 Park Avenue Houma, LA 70363 Phone 800.828.6826 Fax 504.876.0299

More information

Application for CISA Certification

Application for CISA Certification Application for CISA Certification 4/2015 Requirements to Become a Certified Information Systems Auditor become a Certified Information Systems Auditor (CISA), an applicant must: 1. Score a passing grade

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6 Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6 Ahmed A. Joha, Fathi Ben Shatwan, Majdi Ashibani The Higher Institute of Industry Misurata, Libya [email protected]

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Cisco and VMware Virtualization Planning and Design Service

Cisco and VMware Virtualization Planning and Design Service Cisco and VMware Virtualization Planning and Design Service Create an End-to-End Virtualization Strategy with Combined Services from Cisco and VMware Service Overview A Collaborative Approach to Virtualization

More information

Table of Contents. Introduction

Table of Contents. Introduction viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

GPRS / 3G Services: VPN solutions supported

GPRS / 3G Services: VPN solutions supported GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

ICT Category Sub Category Description Architecture and Design

ICT Category Sub Category Description Architecture and Design A A01 Architecture and Design Architecture and Design Enterprise & Business Architecture A02 Architecture and Design Information Architecture A03 Architecture and Design Solution Architecture B Benchmarking

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

How Virtual Private Networks Work

How Virtual Private Networks Work How Virtual Private Networks Work by Jeff Tyson This article has been reprinted from http://computer.howstuffworks.com/ Please note that the web site includes two animated diagrams which explain in greater

More information

ehealth Ontario EMR Connectivity Guidelines

ehealth Ontario EMR Connectivity Guidelines ehealth Ontario EMR Connectivity Guidelines Version 1.3 Revised March 3, 2010 Introduction Ontario s new ehealth strategy includes the use of commercially-available high-speed Internet to meet Electronic

More information

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited Firewall Audit Techniques K.S.Narayanan HCL Technologies Limited Firewall Management Technology Network Security Architecture Firewall Placement Firewall Appliance Rule base compliance with security policy

More information

Enabling Information PREVIEW VERSION

Enabling Information PREVIEW VERSION Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a

More information

Security Assessment Report

Security Assessment Report Security Assessment Report Prepared for California State Lottery By: Gaming Laboratories International, LLC. 600 Airport Road, Lakewood, NJ 08701 Phone: (732) 942-3999 Fax: (732) 942-0043 www.gaminglabs.com

More information

Frame Relay vs. IP VPNs

Frame Relay vs. IP VPNs Contents: The Case for Frame Relay The Case for IP VPNs Conclusion Frame Relay vs. IP VPNs 2002 Contents: Table of Contents Introduction 2 Definition of Terms 2 Virtual Privacy and 3 the Value of Shared

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

MANAGED SECURITY SERVICES

MANAGED SECURITY SERVICES MANAGED SECURITY SERVICES Security first Safety first! Security is becoming increasingly important for companies, especially for the extension of networking to mission-critical environments, with new intranet

More information

Service Descriptions

Service Descriptions Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application

More information

Reaping the Full Benefits of a Hybrid Network

Reaping the Full Benefits of a Hybrid Network Singtel Business Product Factsheet Managed Hybrid Network Reaping the Full Benefits of a Hybrid Network Singtel Managed Hybrid Network is an innovative offering that extends the enterprise s network coverage

More information

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Achieve Pca Compliance With Redhat Enterprise Linux Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Secure Use of the New NHS Network (N3): Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version

More information

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION DR. P. RAJAMOHAN SENIOR LECTURER, SCHOOL OF INFORMATION TECHNOLOGY, SEGi UNIVERSITY, TAMAN SAINS SELANGOR, KOTA DAMANSARA, PJU

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Service Assurance Tools

Service Assurance Tools Managing MPLS with Service Assurance Tools Whitepaper Prepared by www.infosim.net August 2006 Abstract MPLS provides the foundation for the offering of next-generation services and applications such as

More information

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection: Table of Content I. What is VPN?... 2 II. Types of VPN connection... 2 III. Types of VPN Protocol... 3 IV. Remote Access VPN configuration... 4 a. PPTP protocol configuration... 4 Network Topology... 4

More information