- PUBLIC REPORT - CITY OF SAN ANTONIO INTERNAL AUDIT DEPARTMENT
|
|
|
- Rolf Ramsey
- 10 years ago
- Views:
Transcription
1
2
3 - PUBLIC REPORT - CITY OF SAN ANTONIO INTERNAL AUDIT DEPARTMENT Audit of Aviation Network and Systems Security Project No. AU Release Date: October 24, 2005 Patricia Major CPA, CIA, CTP, CGFM Mark Bigler CPA, CFE, CISA Mark Swann CPA, CIA, CISA Cynthia Munoz
4 EXECUTIVE SUMMARY Overview An audit of Aviation s network and system security has been completed. The objective of the audit was to review the adequacy of the internal control environment and risk management process related to network and systems security. Fieldwork for this audit was conducted primarily from May 2005 through June The audit was limited to a review of the Aviation Department s information technology (Aviation IT) delivery and support processes for ensuring network and systems security. This audit was designed to provide reasonable, but not absolute, assurance that Aviation IT is effectively managing information and related technology, following best practices, and ensuring that internal controls are established and effective. This audit included a study of internal controls considered relevant mainly by the IT Governance Institute in assessing risks and the control environment. The audit was based on discussions, review of select documentation, and site visits. However, the procedures performed may not necessarily have revealed all internal control weaknesses. The audit report includes background information to assist readers in understanding Aviation s organizational, staffing, technological, and operating environment. Results In Brief Aviation IT consists of three individuals who share responsibility with various contractors for all the technology needs of the Aviation Department, its tenants and customers. Currently, Aviation IT provides varying levels of support for the Department network and systems including finance, parking, flight information, operations, engineering, human resources, noise monitoring, and airport security. Aviation IT is currently involved with upgrading its network infrastructure and associated hardware, software, processes, procedures, and controls to support these various systems. This audit identified certain security and control risks that should be addressed. The organizational reporting structure for Aviation IT should be changed such that it reports to the City s IT Services Department. Security plans should be developed and formalized for the Aviation network infrastructure. These security plans should also include provisions for the implementation of security testing standards. Aviation IT resource availability should be enhanced by implementing continuity plans, formalizing backup procedures, and installing failover mechanisms. Also, incident management procedures should be developed and firewall logging activated. Service level agreements should be developed with Aviation system users to avoid misunderstandings and to set expectations for appropriate levels of service. Finally, environmental safeguards for fire prevention and suppression in computer rooms need to be implemented. Prior Audit Follow-up The Internal Audit Department performed certain audit procedures which resulted in an audit report being issued in January 2004 titled Audit of Airport Parking Operations, Landing and Fuel Flowage Fees. Follow-up procedures were performed during fieldwork for this audit to determine if Aviation Management had implemented actions it promised in its responses to that audit. Based on follow-up work, Aviation Management should ensure that Parking personnel are precluded from performing security administrator functions within the Facility Management System (FMS) and that Aviation IT is assigned responsibility for all FMS operational aspects. Additionally, surveillance devices need to be installed in all cashier booths in the Economy Parking Lot and recording devices procured and installed to record cashier activity. City of San Antonio Internal Audit Department October 24, 2005 Page 2 of 7
5 Background San Antonio s Aviation facilities include the International Airport and the Stinson Municipal Airport. General and commercial aviation services are provided through an enterprise fund. The Aviation Department is directed by an acting Aviation Director who is an Assistant to the City Manager. Departmental responsibilities include airport operations, financial and property administration, economic development, vehicle and facility maintenance, airport security, fire protection, and public relations. The San Antonio Airport is expected to facilitate about seven million passengers during 2005, and a daily average of about 250 international and domestic arrivals and departures. A 1995 Economic Impact Study performed by Ricondo and Associates in conjunction with the Airport Master Plan process showed that tenant activity at the Airport accounts for more than 11,000 jobs, over $300 million in annual payroll, and over $1 billion in additional economic sales and expenditures. Total funding from all sources for the Aviation Department for fiscal year 2005 was estimated to be $263.2 million. This includes $166.8 million earmarked for capital projects. Staffing expenses for over 400 full-time positions are also included in this estimate. In alignment with the Airport Master Plan and Terminal Renovations Program which was approved by the Federal Aviation Administration (FAA) in 1998, Aviation Management adopted a number of initiatives to expand and upgrade general facilities at the City s Airports. These improvements include adding new terminals, extending runways, building new parking facilities, developing surrounding roadway systems, modernizing existing facilities, and upgrading the airport infrastructure among others. Aviation IT Function Aviation IT consists of three individuals who share responsibility with various contractors for all the technology needs of the Aviation Department, its tenants and customers. Aviation IT, to varying degrees, supports many vital systems including Airport Police Security (Fingerprint/Badge/ No-Fly Data), Accounts Receivable, Mutual Usage Flight Information Display System (MUFIDS), Facility Management System (FMS) for airport parking, Automated Vehicle Identification System (AVIS), Noise Monitoring System (NOMS), Airfield Lighting Control, Engineering Computer Aided Design (CAD) System, Airport Operations Databank, Security Access Control (MATRIX), and others. Aviation IT also supports the network connecting all of these systems including links to the City of San Antonio (COSA) Systems (for using the SAP ERM System for example), the Internet, and the Stinson Municipal Airport (see Exhibit 1 following). Aviation IT plays an important role in providing network and system support to facilitate heightened security measures required by the United States Department of Homeland Security as a result of the 9/11 terrorist attacks. Homeland security measures are vital in protecting the millions of passengers who pass through the San Antonio International Airport every year in addition to the thousands of people who work at the airport and a half-billion dollars in airport assets. Aviation Management s plans to upgrade the airport infrastructure included making improvements to certain components of the aging network infrastructure. These plans were documented in the COSA IT Plan for FY 2001 FY Actual work on the Aviation IT network infrastructure did not begin until late It is not expected to be completed until later this summer, although many network components have been installed and are currently in use. The network infrastructure improvement includes upgrading network wiring and associated components, and installing a wireless network to support operations, airport security, and potentially airport passengers. Page 3 of 7
6 Exhibit 1 - Aviation Network Aviation Network Environment The new network infrastructure being installed consists of the following components acquired from a sole vendor: Switches (simple network devices that select a path or circuit for sending data packets toward their destinations) Routers (more sophisticated than switches, routers are network devices that forward data packets toward their destinations using intelligence and routing tables) Firewall (a collection of specialized hardware, software, and network mechanisms designed to secure a computer or network from unauthorized access) Wireless Access Points (a communication device that allows the user of a wireless device such as a laptop or hand-held computer to connect to a wired network) Intrusion Detection System (IDS) (hardware and/or software used to detect unauthorized access to a computer system or network) These network components facilitate access to various Aviation and COSA resources. The new Aviation network also includes wireless connectivity more generically known as WiFi or wireless fidelity. WiFi is a means of connecting to networks (e.g. Internet, COSA network, and the Aviation network) without the need of a physical cable. Installation of the wireless network had not been completed as of the end of fieldwork for this audit. Security functions and responsibilities are shared between COSA IT and Aviation IT. Aviation users are authenticated at login time to the COSA network via the Microsoft active directory (AD) function which is maintained by the City s Information Technology Services Department (ITSD). After successful authentication, access to specific Aviation IT resources is governed by security and availability measures implemented solely by Aviation personnel for Aviation Systems (e.g. servers, databases, firewalls, et cetera). Page 4 of 7
7 Objectives The objectives of this audit were to determine the adequacy and propriety of the internal control environment and risk management process related to the Aviation IT infrastructure including network and systems security. Ensuring the delivery of IT services requires a reliable and maintainable network infrastructure. This infrastructure should be designed for appropriate levels of availability based on service and security levels agreed upon by management. Furthermore, network and system availability is largely dependent on controls which should be designed to safeguard information (and related technology assets) against the effects of unauthorized use, disclosure, modification, or loss. Scope The scope of this audit included reviewing certain Aviation IT delivery and support processes for ensuring network and systems security including: Managing Security Measures Identification, Authentication and Access (for Remote Access Methods only) Network Security Surveillance and Violation Activity Reports Incident Handling Periodic Reaccreditation of Security Trusted Paths (i.e. a secure network) Firewall Architectures and Connections with Public Networks Malicious Software (a.k.a. malware) Prevention, Detection, and Correction Continuity Planning, Back-up Procedures, and Fault Tolerance Mechanisms Managing Facilities (Physical and Environmental Security) All work was performed either at the office of the City Internal Audit Department or the San Antonio International Airport (Aviation Department). During this audit, no fieldwork occurred at the Stinson Airfield which has minimal IT resources, or the COSA ITSD. Criteria To measure performance, audit staff generally used criteria based on Control Objectives for Information and related Technology (CobiT), the Information Technology Infrastructure Library (ITIL), and the Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control Integrated Framework. The IT Governance Institute ( developed CobiT as an open standard using non-technical language to help focus information technology in support of overall business goals. CobiT was selected as criteria for measurement because it is aimed at addressing business objectives and is easy to understand. CobiT continues to gain acceptance internationally and is evolving due to support from the IT Governance Institute. ITIL ( is an integrated set of best-practice recommendations drawn from public and private sectors internationally with common definitions and terminology covering IT service management areas such as incident, problem, change, capacity, availability, continuity, and service level agreement management. The COSO Internal Control Integrated Framework has been widely adopted as a best practice for documenting business process risks and internal controls for all publicly traded stock companies. This is mainly attributed to the federally mandated Sarbanes-Oxley Act of 2002 (SOX). This legislation was passed in response to corporate scandals such as Enron, WorldCom, Tyco and Global Crossing. Page 5 of 7
8 In addition to CobiT, ITIL, and COSO Internal Control Integrated Framework, there are other industry based or technology specific practices that could be used to measure an organization s control performance. The Center for Internet Security (CIS) and the SANS (SysAdmin, Audit, Network, Security) Institute both provide guidance on baselines to be used for enhancing control at a more detailed level. The Capability Maturity Model for Software (SW-CMM) could be used to judge the maturity of the software process and for identifying key practices that are required to advance the maturity of these processes. It is important to note in reviewing the results of this audit that neither Aviation IT nor COSA ITSD has historically used these or any other standards to measure control performance related to IT service processes. Methodology The review was performed in compliance with generally accepted government auditing standards (GAGAS) issued by the U.S. Government Accountability Office (GAO) and other criteria to conform with the Institute of Internal Auditors International Standards for the Professional Practice of Internal Auditing. Government Auditing Standards require a peer review of auditing practices at least once every three years by reviewers independent of the audit organization. The City Internal Audit Department (CIAD) had its last external peer review in July CIAD is scheduled for the next peer review in the summer of In order to perform the work required, the audit staff used the following techniques: Conducted analyses to identify key internal controls encompassed within the Aviation network Made inquiries to Aviation IT staff and external subject matter experts Toured Aviation IT facilities Reviewed documentation provided by Aviation IT personnel Observed hardware components and their surrounding environments Researched IT technologies Conclusion After the completion of audit procedures, a conclusion was drawn on the completeness and viability of internal controls for ensuring Aviation network and systems security. The conclusion was formed through performing generally accepted audit procedures and was based on a Risk Management Capability Matrix. The risk matrix provides information on characteristics of development stages for strategy capabilities, process capabilities, people capabilities, technology capabilities, and information capabilities. For this project, the assessment was based specifically on process capabilities. A more detailed description of the process capability stages has been included as Exhibit 2. While some Aviation IT processes exhibit higher levels of capability maturity, it was determined that the process capability maturity for ensuring Aviation network and systems security for the issues noted in this report are at the Ad Hoc stage. This was based mainly on the observation that formal policies and procedures for many IT functions have not been developed. Aviation Management s goal should be to strengthen IT service and security processes to the point where they are Managed. At the Managed stage, procedures and controls are well documented and kept current. Both preventive and detective controls are employed throughout the process. Many metrics are used, with a blend of automated and manual monitoring of performance. Page 6 of 7
9 Exhibit 2 Process Capability Maturity Stages Stage Procedures Controls and Process Improvements Metrics* Ad Hoc No formal procedures exist. Controls are either non-existent, or are primarily reactionary after a surprise within the company. There are no metrics or monitoring of performance. Repeatable Some standard procedures exist. Defined Procedures are well documented, but are not regularly updated to reflect changing business needs. Managed Procedures and controls are well documented and kept current. Optimized Processes and controls are continuously reviewed and improved. Detective controls are relied upon throughout the company. Both preventive and detective controls are employed throughout the company. Best practices and benchmarking are used to improve process in certain areas of the company. Extensive use of best practices and benchmarking throughout the company helps to continuously improve processes. Few performance metrics exist, thus there is infrequent monitoring of performance. Some metrics are used, but monitoring of performance is primarily manual. Many metrics are used, with a blend of automated and manual monitoring of performance. Comprehensive, defined performance metrics exist, with extensive automated monitoring of performance employed. *Metrics provide a means for measuring how well a control or process is performing. *Source: 2004 Auditor s Risk Management Guide, CCH Incorporated, Paul J. Sobel, CPA, CIA Page 7 of 7
CITY OF SAN ANTONIO INTERNAL AUDIT DEPARTMENT
CITY OF SAN ANTONIO INTERNAL AUDIT DEPARTMENT Review of the 9-1-1 Communications Center Project No. AU05-017 Release Date: April 27, 2006 Patricia Major CPA, CIA, CTP, CGFM Mark Swann CPA, CIA, CISA Frank
University System of Maryland University of Maryland, College Park Division of Information Technology
Audit Report University System of Maryland University of Maryland, College Park Division of Information Technology December 2014 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance
WHITE PAPER Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance The objective of this white paper is to
Department of Information Technology Software Change Control Audit - Mainframe Systems Final Report
Department of Information Technology Software Change Control Audit - Mainframe Systems Final Report March 2007 promoting efficient & effective local government Introduction Software change involves modifications
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Department of Transportation Office of Transportation Technology Services
Audit Report Department of Transportation Office of Transportation Technology Services October 2005 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls
Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Sarbanes-Oxley Control Transformation Through Automation
Sarbanes-Oxley Control Transformation Through Automation An Executive White Paper By BLUE LANCE, Inc. Where have we been? Where are we going? BLUE LANCE INC. www.bluelance.com 713.255.4800 [email protected]
Eastern Illinois University information technology services. strategic plan. January,
Eastern Illinois University information technology services strategic plan January, 2014 Introduction With the selection of emerging technologies as one of the six themes of the university s recent strategic
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Internal Audit Report on. IT Security Access. January 2010. 2010 January - English - Information Technology - Security Access - FINAL.
Internal Audit Report on January 2010 2010 January - English - Information Technology - Security Access - FINAL.doc Contents Background...3 Introduction...3 IT Security Architecture,Diagram 1...4 Terms
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
KAREN E. RUSHING. AUDIT OF Human Capital Management System (HCMS) Application Controls
KAREN E. RUSHING Clerk of the Circuit Court and County Comptroller AUDIT OF Human Capital Management System (HCMS) Application Controls Audit Services Karen E. Rushing Clerk of the Circuit Court and County
CITY OF SAN ANTONIO OFFICE OF THE CITY AUDITOR. Follow-Up Audit of San Antonio Metropolitan Health District Laboratory Operations
CITY OF SAN ANTONIO OFFICE OF THE CITY AUDITOR Follow-Up Audit of San Antonio Metropolitan Health District Laboratory Operations Project No. AU14-F07 January 8, 2015 Kevin W. Barthold, CPA, CIA, CISA City
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
AV Parking System Review
Exhibit 1 AV Parking System Review May 6, 2011 Report No. 11-01 Office of the County Auditor Evan A. Lukic, CPA County Auditor Table of Contents Contents EXECUTIVE SUMMARY... 3 OBJECTIVES, SCOPE AND PROCEDURES...
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA
Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT
Enhancing IT Governance, Risk and Compliance Management (IT GRC)
Enhancing IT Governance, Risk and Compliance Management (IT GRC) Enabling Reliable eservices Tawfiq F. Alrushaid Saudi Aramco Agenda GRC Overview IT GRC Introduction IT Governance IT Risk Management IT
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Information and Communication Technology. Firewall Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
The Challenges and Myths of Sarbanes-Oxley Compliance
W H I T E P A P E R The Challenges and Myths of Sarbanes-Oxley Compliance Meeting the requirements of regulatory legislation on the iseries. SOX-001 REV1b FEBRUARY 2005 Bytware, Inc. All Rights Reserved.
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
SECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
Practical Guidance for Auditing IT General Controls. September 2, 2009
Practical Guidance for Auditing IT General Controls Chase Whitaker, CPA, CIA September 2, 2009 About Hospital Corporation of America $28B annual revenue $24B total assets $4.6B EBDITA $673M Net Income
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Information Technology Internal Controls Part 2
IT Controls Webinar Series Information Technology Internal Controls Part 2 Presented by the Arizona Office of the Auditor General October 23, 2014 Part I Overview of IT Controls and Best Practices Part
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
AUDIT OF READINESS FOR THE IMPLEMENTATION OF THE POLICY ON INTERNAL CONTROL
AUDIT OF READINESS FOR THE IMPLEMENTATION OF THE POLICY ON INTERNAL CONTROL AUDIT REPORT JUNE 2010 TABLE OF CONTENTS EXCUTIVE SUMMARY... 3 1 INTRODUCTION... 5 1.1 AUDIT OBJECTIVE. 5 1.2 SCOPE...5 1.3 SUMMARY
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Strategic IT audit. Develop an IT Strategic IT Assurance Plan
Strategic IT audit Develop an IT Strategic IT Assurance Plan Speaker Biography Hans Henrik Berthing is Partner at Verifica and Senior Advisor & Associated Professor at Aalborg University. He is specialized
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE ENTERPRISE DATA WAREHOUSE DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET August 2014 Doug A. Ringler, C.P.A., C.I.A. AUDITOR
General Computer Controls
1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Comptroller of Maryland Information Technology Division Annapolis Data Center Operations
Audit Report Comptroller of Maryland Information Technology Division Annapolis Data Center Operations March 2015 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Achieving Business Imperatives through IT Governance and Risk
IBM Global Technology Services Achieving Business Imperatives through IT Governance and Risk Peter Stremus Internet Security Systems, an IBM Company Introduction : Compliance Value Over the past 15 years
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH
Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework
Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform
Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
2 0 1 4 F G F O A A N N U A L C O N F E R E N C E
I T G OV E R NANCE 2 0 1 4 F G F O A A N N U A L C O N F E R E N C E RAJ PATEL Plante Moran 248.223.3428 [email protected] This presentation will discuss current threats faced by public institutions,
Version 1.0. IT Service Management & IT Asset Management Services (ITSM & ITAM Services) Governance Process
Version 1.0 IT Service Management & IT Asset Management Services (ITSM & ITAM Services) Governance Process Table of Contents 1 Planning and Organization... 6 1.1 Executive Overview... 6 1.1.1 ITSM & ITAM
The Navajo Nation. A Foliow-Up Review. Department of Information Technology. Corrective Action Plan Implementation. Report No. 14-16.
OFFICE OF THE AUDITOR GENERAL The Navajo Nation A Foliow-Up Review ofthe Department of Information Technology Corrective Action Plan Implementation I Report No. 14-16 June 2014 Performed by: Terry Becenti,
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Financial Management Information System Centralized Operations
Audit Report Financial Management Information System Centralized Operations March 2003 This report and any related follow-up correspondence are available to the public. Alternate formats may also be requested
Log Management for the University of California: Issues and Recommendations
Log Management for the University of California: Issues and Recommendations Table of Contents 1 Introduction...2 2 Candidate Sources of Logged Information...3 3 Recommended Log Management Practices...4
What Should IS Majors Know About Regulatory Compliance?
What Should IS Majors Know About Regulatory Compliance? Working Paper Series 08-12 August 2008 Craig A. VanLengen Professor of Computer Information Systems/Accounting Northern Arizona University The W.
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy
Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy Presentation to The Institute of Internal Auditors Breakfast Session February 6, 2014 Outline of
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
