PRIVY COUNCIL OFFICE. Audit of Information Technology (IT) Security. Final Report
|
|
|
- Mervin Turner
- 10 years ago
- Views:
Transcription
1 An asterisk appears where sensitive information has been removed in accordance with the Access to Information Act and Privacy Act. PRIVY COUNCIL OFFICE Audit of Information Technology (IT) Security Audit and Evaluation Division Final Report November 16, 2009
2
3 Table of Contents Executive Summary 1.0 Introduction 1.1 Background 1.2 Objective 1.3 Scope 1.4 Approach and Methodology 2.0 Audit Findings, Conclusions and Recommendations 2.1 Immediate Security Improvements 2.2 IT Security Program 2.3 Formal IT Security Procedures 3.0 Management Response and Action Plan Appendix A: Audit Criteria Appendix B: List of Acronyms Used
4 Executive Summary Audit Objective The objective of this internal audit was to assess the adequacy of information technology (IT) security in order to safeguard the s (PCO's) information assets. Scope The audit scope involved an assessment of the IT security function at PCO, including its governance and policy framework; management and business procedures dealing with risk and vulnerability management; processes for handling incidents, business continuity, systems development, security assessments, operational controls over network access and protection, and physical security; and resources and overall staff awareness. The audit scope did not include the conduct of technical evaluations of controls such as the monitoring of network traffic, the attempted penetration of network protection, or the validation of firewall settings. Audit Conclusion Recent years have seen rapid advances in information technology which have facilitated greater levels of interconnectedness in support of improved service delivery. At the same time there have been similar increases in the number and potential severity of threats to information and IT security. Within this dynamic environment, PCO has an evolving IT security infrastructure that is currently safeguarding the department s information assets. However, audit results have identified several areas where action is required by management to improve role clarity, security planning, security procedures and resource prioritization in order for PCO to continue to effectively safeguard its information assets. Statement of Assurance In my professional judgment as Chief Audit Executive, sufficient and appropriate audit procedures have been conducted and evidence gathered to support the accuracy of the conclusion provided and contained in this report. The conclusion is based on a comparison of the conditions, as they existed at the time, against pre-established audit criteria that were agreed with management. The conclusion is applicable only to the entity examined. The evidence was gathered in compliance with Treasury Board policy, directives, and standards on internal audit.
5 Summary of Findings and Recommendations Related to the overall IT security regime, the audit found areas where improvements are needed with respect to Business Continuity Planning (BCP). A Business Continuity Management (BCM) framework has been developed at PCO and is moving towards implementation. At the departmental level, the need to strengthen business continuity planning has been identified in the Corporate Risk Profile and in a business case brought forward by Security Operations Division. A challenging yet collaborative IT environment at PCO points to the achievability of medium-term improvements in IT security that would enhance existing relationships among all security stakeholders. The current management framework for IT security is highly dependent on A sustainable IT security program involving all key stakeholders should be implemented to better assure management that priorities are being addressed. Furthermore the audit found that capturing procedures and processes in a documented form is an attainable and desirable objective for the longer-term transfer of IT security knowledge. Our detailed recommendations are included in the body of this report. Management has indicated their agreement with all recommendations and has prepared a plan to implement corrective actions. The action plan prepared by management is presented in Section 3.0 of this report. (Original signed by the Chief Audit Executive) SIGNATURE OF CHIEF AUDIT EXECUTIVE JIM HAMER
6 1.0 Introduction 1.1 Background The Audit of Information Technology (IT) Security was approved as part of the Multi-Year Internal Audit Plan for the (PCO) to The current audit was led by the PCO Audit and Evaluation Division and contracted through Hallux Consulting Inc. An initial planning phase was undertaken during February and March 2009, the audit examination was done in April and May This audit follows on work conducted by auditors from Finance Canada who were working under a shared services agreement to provide internal audit services to PCO prior to the establishment of PCO s Audit and Evaluation Division. In May 2007, Finance Canada tabled a Preliminary Survey Report with the PCO Audit and Evaluation Committee. The PCO is governed by federal government policies, such as the Government Security Policy (GSP) 1. The GSP defines the basic requirements to safeguard employees and assets, and to assure the continued delivery of services. In 2005, the Treasury Board Secretariat (TBS) requested that all departments including PCO - implement by December 2006 the 144 standards from the Management of Information Technology Security (MITS) Operational Security Standard. MITS standards form the baseline requirements for departmental IT security programs so that federal departments, like PCO, can ensure the security of information and IT assets under their control. It also provides direction as to how departmental IT security programs should be organized; identifies roles, responsibilities and accountabilities for IT security; and identifies technical and operational safeguards in line with the GSP that focus on prevention, detection, response, and recovery safeguards. TBS requires departments and agencies to carry out periodic internal audits to assess their compliance with the GSP and the effectiveness of its implementation. 1.2 Objective The objective of this internal audit was to assess the adequacy of IT security in order to safeguard PCO's information assets. 1 On July 1, 2009 the Treasury Board Policy on Government Security replaced the Government Security Policy.
7 1.3 Scope The audit scope involved an assessment of the IT security function at PCO, including its governance and policy framework; management and business procedures dealing with risk and vulnerability management; processes for handling incidents, business continuity, systems development, security assessments, operational controls over network access and protection, and physical security; and resources and overall staff awareness. The audit scope did not include the conduct of technical evaluations of controls such as the monitoring of network traffic, the attempted penetration of network protection, or the validation of firewall settings. 1.4 Approach and Methodology The audit followed a generic approach to MITS compliance developed by the audit team. MITS components were aligned with four TBS Management Accountability Framework (MAF) components, those being Accountability, Risk Management, Stewardship, and People. Audit criteria are presented in Appendix A.
8 2.0 Audit Findings, Conclusions and Recommendations For the purposes of this internal audit, the report is formed around three main themes of findings surrounding IT Security at PCO: 1) Immediate Security Improvements, 2) IT Security Program and 3) Formal IT Security Procedures. Since IT security encompasses many elements, the audit produced several findings, some positive and some requiring management attention. The following sections detail the audit team s resultant findings, conclusions and recommendations. 2.1 Immediate Security Improvements Related to the overall IT security regime, the audit found areas where improvements were necessary and reasonable in the short-term. The audit expected to see: a standard program of best practices in use around physical and media protection; an effective, well documented, well-operated program of network security and protection; and, a Business Continuity Management (BCM) framework that included a governance structure, a fully documented, up-to-date and tested IT Business Continuity Plan (BCP) and Information Technology Disaster Recovery Plan (ITDRP). Physical Security and IT Media The audit found. In addition security personnel are positioned at strategic entrances. Procedures and processes that are in place to secure, mark, transport and retire backup media are in line with MITS and best practices. however, access to the server room is appropriately controlled. Within the server room, equipment is appropriately labeled. The Informatics and Technical Services Division (ITSD) of the Corporate Services Branch (CSB) is currently involved in rationalizing their equipment in the effort to improve efficiency and reduce costs. Network Security While physical security is a key security feature and represents the first line of defence for the IT security environment, network safeguards are a combination of hardware components, software tools and necessary functions carried out by expert staff. Business Continuity The protection of the IT network through physical security and network safeguards helps to ensure that IT services can be delivered on an on-going basis. Furthermore,. A valid (i.e. up-to-date and tested) ITDRP is a key management tool to mitigate the risk of outright IT systems failure and comprises an essential element of an organization s business continuity strategy.
9 Conclusion Recommendation 1. The Assistant Deputy Minister, Corporate Services Branch: 2.2 IT Security Program A challenging yet collaborative IT environment at PCO points to the achievability of medium-term improvements in IT security. The audit expected to see a comprehensive IT Security Program led by an experienced and qualified IT Security professional as the IT Security Coordinator (ITSC). The audit also looked for evidence that the intent and direction of GSP/MITS was evident in key roles, including the Departmental Security Officer (DSO), the Chief Information Officer (CIO), the BCP Coordinator and the ITSC, as well as in the security management structure. Governance The audit found that a good working relationship exists among key players in security, a fact acknowledged by all participants. An appropriate discussion about roles and responsibilities for security is underway within PCO. The role of ITSC is assigned to the Chief IT Security, who reports to the Executive Director ITSD, CSB. The incumbent ITSC has to facilitate an effective IT security program at PCO. The management of IT security requires collaboration between the DSO, the ITSC and the CIO. The Executive Director of ITSD assumes the role of CIO as referenced in the position description of the Executive Director, although the CIO role is not formally described in PCO Security Policy. The Corporate Information Services Division (CISD) of CSB provides leadership for information management (IM) for PCO. ITSD has made progress in documenting IT project management requirements, and, as a consequence, IT security implications. For example, IT project management controls have been improved through the recent creation of the Business Solutions Management Group (BSMG) within ITSD and subsequent development of project management and delivery documentation. The audit acknowledges that the at present. Policy Every federal department must have a departmental IT security policy to meet GSP and MITS requirements. PCO has a security policy that is a mixture of policy, procedures and guidelines.
10 Security Program Planning The ongoing funding for security is established within the annual budgetary cycle at PCO and consequently addressed for IT security at the operational level, including funding for IT security requirements in major projects. Furthermore, Managers and staff in PCO are generally aware of information sensitivity and day-today conventions for minimizing the risk to information security. A rule-based approach to security awareness is in place in the department. Training should continue to be made available to PCO employees to help them maintain a high understanding of the requirements of security policies and to help them understand how to work within existing security protocols. Conclusion Recommendation 2. The Assistant Deputy Minister, Corporate Services Branch in collaboration with the Deputy Secretary to the Cabinet, Foreign and Defence Policy, 3. The Deputy Secretary to the Cabinet, Foreign and Defence Policy, continue to make available security training to PCO employees to help them maintain a high understanding of the requirements of security policies and to help them understand how to work within existing security protocols. 2.3 Formal IT Security Procedures Capturing procedures and processes in a documented form is an attainable and desirable objective for the longer-term transfer of IT knowledge. The audit expected to see a formal set of related IT and IT Security procedures consistent with MITS expectations, including: a formal risk management and vulnerability assessment program; a formal process for incident management; a standard set of best practices for use in the system development life cycle with associated management and techniques; a program of audit and assessment of IT security and a standard and functioning access management process; and, best practices in the management of cryptographic keys and equipment. Risk Management Risk management is performed as one of the functions associated with project management and budget review. The IT operational budget provision is analyzed, as part of the projects and security initiatives cycle, annually (as a minimum) or on an as
11 required basis. A set of risk management practices exist: on an annual or bi-annual basis. PCO IT and security personnel are aware of security issues associated with the uniqueness of the PCO environment, nevertheless Incident Management Incidents are managed on an Certification and Accreditation The IT security process is an integral part of a system development life cycle to certify and accredit software for operation on PCO networks. ITSD documentation identifies their role in the support and maintenance of software packages. Access and Encryption The nature of access control and encryption make them vital elements associated with confidentiality and integrity of the IT environment. Both elements must perform at expected levels in order for protection to be assured. accounts no longer required are deleted or de-activated based on change requests. Encryption and related activities Audit and Assessment Self-assessments are performed as per MITS and are properly documented, Conclusion Recommendation 4. The Assistant Deputy Minister, Corporate Services Branch ensure
12 3.0 Management Response and Action Plan Audit of IT Security The Assistant Deputy Minister, Corporate Services Branch and the Deputy Secretary to the Cabinet, Foreign and Defence Policy have overall accountability for the Action Plan. Recommendation Actions to be Taken Responsibility Target Date Management agrees with the Nov 2009 recommendation. 1. The Assistant Deputy Minister, Corporate Services Branch: Management agrees with the recommendation. Assistant Deputy Minister, Corporate Services Branch CIO January The Assistant Deputy Minister, Corporate Services Branch in collaboration with the Deputy Secretary to the Cabinet, Foreign and Defense Policy, Management agrees with the recommendation. Management will ensure that: DSO a) May 2010 Management agrees with the recommendation. CIO b) January 2010 DSO & CIO Aug 2009 Management agrees with the recommendation. Assistant Secretary to Cabinet, Security and Intelligence May 2010
13 Recommendation Actions to be Taken Responsibility Target Date Management agrees with the recommendation. DSO & CIO Aug The Deputy Secretary to the Cabinet, Foreign and Defence Policy, continue to make available security training to PCO employees to help them maintain a high understanding of the requirements of security policies and to help them understand how to work within existing security protocols. 4. The Assistant Deputy Minister, Corporate Services Branch ensure Management agrees with this recommendation. - Training and awareness sessions have been developed to assist employees in properly marking classified documents and in the proper transmission and destruction of classified documents. Management agrees with this recommendation. DSO Deputy Director, IT Security On-going Mar 2010 Management agrees with this recommendation. Deputy Director, IT Security Mar 2010 Management agrees with this recommendation. Deputy Director, IT Security & Deputy Director, Business Solutions Management Deputy Director, IT Security June 2011 June 2011
14 Appendix A: Audit Criteria TBS Management Accountability Framework (MAF) Element Accountability. Accountabilities for results are clearly assigned consistent with resources, and delegations are appropriate to capabilities. Key words: clear delegations, responsibilities, cascading commitments, Performance Management Agreement MITS Component Organization (Governance). A well-defined security organization outlines the roles, responsibilities, and interaction of senior management, risk managers, program owners, security experts, and employees for IT security. An effective IT security program delegates IT security functions among these roles, inculcates a common understanding of security responsibilities, and promotes a high degree of interaction. Policy. Every department must have a departmental IT security policy to apply GSP and MITS requirements within the departmental context and to establish fundamental departmental commitments. Risk Management. The executive team clearly defines the corporate context and practices for managing organizational and strategic risks proactively. Key words: key risks identified, part of decision making culture. Risk Management. Risk management is fundamental to an effective IT security program. IT security experts must manage risk continuously, as threats and operational environments are constantly changing. Senior management, risk managers, program owners, and security experts must be engaged in managing and incorporating IT security risks into the overall corporate risk profile. A strong risk management program takes into account threats, vulnerabilities, impacts, probabilities, and safeguards. Vulnerability Management. Vulnerabilities can emerge at any stage in the development or operation of an IT system. Vulnerability management underlies risk management. Once vulnerabilities are discovered, the corresponding risk must be either mitigated or accepted. ID of IT Assets. Identification of critical IT assets is essential to establishing business priorities to protect the critical and most important services and to mitigating security risks in order of their magnitude. Stewardship. The departmental control regime (assets, money, people, etc) is integrated and effective, and its underlying principles are clear to all staff. Key words: systems provide relevant info, audit function, compliance with policy, regulations, legislation. Incident Management. IT security incidents that access, modify, disrupt, or circumvent a system could have a significant impact on the delivery of programs and services. Like vulnerability management, departments must be vigilant in looking for, detecting, and managing incidents.
15 TBS Management Accountability Framework (MAF) Element Stewardship (continued) People. The department has the people, work environment and focus on building capacity and leadership to assure its success and a confident future for the Public Service of Canada. Key words: renewed sustained capacity, supportive workplace, leadership. MITS Component Continuity Planning. Continuity planning ensures the availability of assets necessary to maintain government operations. Information management (IM) and IT continuity planning are integral elements of business continuity planning (BCP). System Development Life Cycle (SDLC). It is easier, more cost efficient, and more secure to implement IT security safeguards during the design and implementation of a program or service rather than after it is established. Assessment and Audit. Annual security review programs are essential for senior managers who require an overview of problem areas that affect departmental business lines to have the information they need to take appropriate action. Review programs will consist of appropriate performance measurement tools, including self-assessment tools, and independent audits. Operational Controls. Physical Security and IT Media Access Control and Encryption Network Safeguards Resources. New and expanding programs and services must allocate adequate resources to ensure IT security requirements are met. IT security resources should be identified in the business planning process; insufficient availability of adequate human resources and funding is among the biggest risks facing MITS implementation. Awareness. Departments must regularly inform all personnel of their IT security roles and responsibilities. Awareness is an essential requirement to improve understanding of IT security risks and to close the gap between business owners and the IT security community.
16 Appendix B: List of Acronyms Used Business Continuity Management Business Continuity Plan Business Solutions Management Group Chief Information Officer Corporate Information Services Division Communications Security Communications Security Establishment Departmental Security Officer Government Security Policy Informatics and Technical Services Division Information Management Information Technology Disaster Recovery Plan Information Technology Security Coordinator Management Accountability Framework Management of Information Technology Security Risk Management Threat and Risk Assessment Vulnerability Assessment BCM BCP BSMG CIO CISD COMSEC CSE DSO GSP ITSD IM ITDRP ITSC MAF MITS RM TRA VA
NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division
AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate
Management of Information Technology Security Standards Audit
Management of Information Technology Security Standards Audit February 2008 Paper ISBN: SG5-20/2008E Cat. No.: 978-0-662-48337-3 PDF ISBN: SG5-20/2008E-PDF Cat. No.: 978-0-662-48338-0 Management of Information
Audit of Physical Security Management
Audit of Physical Security Management Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council Approved by the President on March 18, 2015 1 Her Majesty
Internal Audit Report on. IT Security Access. January 2010. 2010 January - English - Information Technology - Security Access - FINAL.
Internal Audit Report on January 2010 2010 January - English - Information Technology - Security Access - FINAL.doc Contents Background...3 Introduction...3 IT Security Architecture,Diagram 1...4 Terms
IT Security Risk Management: A Lifecycle Approach
Information Technology Security Guidance IT Security Risk Management: A Lifecycle Approach ITSG-33 November 2012 Foreword The of is an unclassified publication issued under the authority of the Chief,
Audit of Business Continuity Audit of Business Planning Continuity Planning
Reviewed by CRS in accordance with the Access to Information Act (AIA). Information UNCLASSIFIED Audit of Business Continuity Audit of Business Planning Continuity Planning October 2013 7050-61 (CRS) SECRET
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy
Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy Presentation to The Institute of Internal Auditors Breakfast Session February 6, 2014 Outline of
Audit of Information Technology Security: Certification and Accreditation
Draft August 2007 Reviewed by CRS in accordance with the Access to Information Act (AIA). Information withheld in accordance with the AIA under section 15(1)(c) International affairs and defence of the
Audit of the Test of Design of Entity-Level Controls
Audit of the Test of Design of Entity-Level Controls Canadian Grain Commission Audit & Evaluation Services Final Report March 2012 Canadian Grain Commission 0 Entity Level Controls 2011 Table of Contents
Audit of Financial Reporting Controls
Audit of Financial Reporting Controls WESTERN ECONOMIC DIVERSIFICATION CANADA Audit & Evaluation Branch February 2012 Table of Contents 1.0 Executive Summary 1 2.0 Statement of Assurance 1 3.0 Introduction
Audit of Business Continuity Planning
INDIAN AFFAIRS AND NORTHERN DEVELOPMENT CANADA Audit of Business Continuity Planning Prepared by: Audit and Assurance Services Branch Project #10-12 June 2011 Table of Contents INITIALISMS AND ABBREVIATIONS...
IT Infrastructure Audit
IT Infrastructure Audit Office of the Chief Audit and Evaluation Executive Audit and Assurance Services Directorate June 2011 Cette publication est également disponible en français. This publication is
Audit of Financial Management Governance. Audit Report
Audit of Financial Management Governance Audit Report March 2015 TABLE OF CONTENTS Executive Summary... 2 What we examined... 2 Why it is important... 2 What we found... 2 Background... 4 Objective...
Chief Review Services REVIEW OF DND/CF INFORMATION SECURITY. October 2002 7050-7 (CRS) Canada
REVIEW OF DND/CF INFORMATION SECURITY October 2002 7050-7 (CRS) Canada TABLE OF CONTENTS OVERVIEW... 1 INTRODUCTION... 1 Comparative Assessment of the DND/CF Information Security Program... 1 RECOMMENDATIONS...
Internal Audit Practice Guide
Internal Audit Practice Guide Continuous Auditing Office of the Comptroller General, Internal Audit Sector May 2010 Table of Contents Purpose...1 Background...1 Definitions...2 Continuous Auditing Professional
PRIVY COUNCIL OFFICE. Audit of Compensation (Pay and Benefits) Final Report
PRIVY COUNCIL OFFICE Audit of Compensation (Pay and Benefits) Audit and Evaluation Division Final Report February 4, 2011 Table of Contents Executive Summary... i Statement of Assurance...iii 1.0 Introduction...
Final Audit Report. Audit of the Human Resources Management Information System. December 2013. Canada
Final Audit Report Audit of the Human Resources Management Information System December 2013 Canada Table of Contents Executive summary... i A - Introduction... 1 1. Background... 1 2. Audit objective...
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
AUDIT OF READINESS FOR THE IMPLEMENTATION OF THE POLICY ON INTERNAL CONTROL
AUDIT OF READINESS FOR THE IMPLEMENTATION OF THE POLICY ON INTERNAL CONTROL AUDIT REPORT JUNE 2010 TABLE OF CONTENTS EXCUTIVE SUMMARY... 3 1 INTRODUCTION... 5 1.1 AUDIT OBJECTIVE. 5 1.2 SCOPE...5 1.3 SUMMARY
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 1.0 Date: November 2012 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 CORE REQUIREMENTS...
BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04
BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Aboriginal Affairs and Northern Development Canada. Internal Audit Report
Aboriginal Affairs and Northern Development Canada Internal Audit Report Management Practices Audit of the Human Resources and Workplace Services Branch Prepared by: Audit and Assurance Services Branch
Internal Audit Manual
Internal Audit Manual Version 1.0 AUDIT AND EVALUATION SECTOR AUDIT AND ASSURANCE SERVICES BRANCH INDIAN AND NORTHERN AFFAIRS CANADA April 25, 2008 #933907 Acknowledgements The Institute of Internal Auditors
Office of the Auditor General AUDIT OF IT GOVERNANCE. Tabled at Audit Committee March 12, 2015
Office of the Auditor General AUDIT OF IT GOVERNANCE Tabled at Audit Committee March 12, 2015 This page has intentionally been left blank Table of Contents Executive Summary... 1 Introduction... 1 Background...
Business Continuity Management Policy
Governance 1 Purpose The purpose of this policy is to communicate Business Continuity Management (BCM) framework, responsibilities and guiding principles for Victoria to effectively prepare for and achieve
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Aboriginal Affairs and Northern Development Canada. Internal Audit Report. Prepared by: Audit and Assurance Services Branch.
Aboriginal Affairs and Northern Development Canada Internal Audit Report Audit of Water and Wastewater Infrastructure Prepared by: Audit and Assurance Services Branch Project # 12-10 February 2013 TABLE
Best Value toolkit: Information management
Best Value toolkit: Information management Prepared by Audit Scotland July 2010 Contents Introduction 2 The Audit of Best Value 2 The Best Value toolkits 4 Using the toolkits 4 Auditors evaluations 5 Best
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Auditor General of Canada to the House of Commons
2002 Report of the Auditor General of Canada to the House of Commons APRIL Chapter 3 Information Technology Security The April 2002 Report of the Auditor General of Canada comprises eight chapters, a Foreword
Status Report of the Auditor General of Canada to the House of Commons
2011 Status Report of the Auditor General of Canada to the House of Commons Chapter 1 Financial Management and Control and Risk Management Office of the Auditor General of Canada The 2011 Status Report
Strategy for Email Management in Canadian Jurisdictions
Strategy for Email Management in Canadian Jurisdictions Email is a fundamental part of doing business today, and the management of email has become a critical issue across all jurisdictions. All governments
J u n e 2 0 1 0. N a t i o n a l R e s e a r c h C o u n c i l C a n a d a. I n t e r n a l A u d i t, N R C. Audit of Risk Management.
N a t i o n a l R e s e a r c h C o u n c i l C a n a d a Audit of Risk Management I n t e r n a l A u d i t, N R C J u n e 2 0 1 0 June 2010 i 1.0 Executive Summary and Conclusion Background This audit
INFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
Internal Audit. Audit of HRIS: A Human Resources Management Enabler
Internal Audit Audit of HRIS: A Human Resources Management Enabler November 2010 Table of Contents EXECUTIVE SUMMARY... 5 1. INTRODUCTION... 8 1.1 BACKGROUND... 8 1.2 OBJECTIVES... 9 1.3 SCOPE... 9 1.4
Business Continuity Policy
Business Continuity Policy Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain its essential business functions during
Audit of the Policy on Internal Control Implementation
Audit of the Policy on Internal Control Implementation Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada February 18, 2013 1 TABLE OF
Business Continuity Management Group Policy
THE WAREHOUSE GROUP LIMITED ( the Company ) 1. Purpose of Policy This policy is to communicate The Warehouse Group Limited ( TWG ) governance requirements and arrangements for developing and sustaining
Final Report. Audit of the Project Management Framework. December 2014
Final Report Audit of the Project Management Framework December 2014 Audit of the Project Management Framework Table of Contents Executive summary... i A - Introduction... 1 1. Background... 1 2. Audit
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
Final Report. 2013-709 Audit of Vendor Performance and Corrective Measures. September 18, 2014. Office of Audit and Evaluation
2013-709 Audit of Vendor Performance and Corrective Measures September 18, 2014 Office of Audit and Evaluation TABLE OF CONTENTS MAIN POINTS... i INTRODUCTION... 1 FOCUS OF THE AUDIT... 7 STATEMENT OF
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
Indian and Northern Affairs Canada. Internal Audit Report. Audit of the Security Program. Prepared by: Audit and Assurance Services Branch
Indian and Northern Affairs Canada Internal Audit Report Audit of the Security Program Prepared by: Audit and Assurance Services Branch Project #09-79 May 2010 #3002822v1 Table of Contents INITIALISMS
Audit of Policy on Internal Controls: Selected Business Processes
D.2.1D Audit of Policy on Internal Controls: Selected Business Processes Office of the Chief Audit and Evaluation Executive Audit and Assurance Services Directorate April 2014 Cette publication est également
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Enhanced Configuration Controls and Management Policies Can Improve USCG Network Security (Redacted) Notice: The Department of Homeland Security,
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Audit of Canada Pension Plan Disability Program Benefits authorization and payment
Unclassified Internal Audit Services Branch Audit of Canada Pension Plan Disability Program Benefits authorization and payment December 2015 SP-1120-03-16E You can download this publication by going online:
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.
GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers
Information Security Classification
i Information Management Information Security Classification February 2005 Produced by Information Management Branch Government and Program Support Services Division Alberta Government Services 3 rd Floor,
Guide for the Role and Responsibilities of an Information Security Officer Within State Government
Guide for the Role and Responsibilities of an Information Security Officer Within State Government Table of Contents Introduction 3 The ISO in State Government 4 Successful ISOs Necessary Skills and Abilities
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
Management Standards for Information Security Measures for the Central Government Computer Systems
Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...
IT Security Risk Management: A Lifecycle Approach
Information Technology Security Guidance IT Security Risk Management: A Lifecycle Approach Departmental IT Security Risk Management Activities ITSG-33 Annex 1 November 2012 Foreword Annex 1 (Departmental
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
Audit of Project Management Governance. Audit Report
Audit of Project Management Governance Audit Report March 2015 TABLE OF CONTENTS Executive Summary... 3 What we examined... 3 Why it is important... 3 What we found... 3 Background... 5 Objective... 6
Guideline for Roles & Responsibilities in Information Asset Management
ISO 27001 Implementer s Forum Guideline for Roles & Responsibilities in Information Asset Management Document ID ISMS/GL/ 003 Classification Internal Use Only Version Number Initial Owner Issue Date 07-08-2009
Passenger Protect Program Transport Canada
AUDIT REPORT OF THE PRIVACY COMMISSIONER OF CANADA Passenger Protect Program Transport Canada Section 37 of the Privacy Act 2009 AUDIT OF PASSENGER PROTECT PROGRAM, TRANSPORT CANADA The audit work reported
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
TABLE OF CONTENTS. 2006.1259 Information Systems Security Handbook. 7 2006.1260 Information Systems Security program elements. 7
PART 2006 - MANAGEMENT Subpart Z - Information Systems Security TABLE OF CONTENTS Sec. 2006.1251 Purpose. 2006.1252 Policy. 2006.1253 Definitions. 2006.1254 Authority. (a) National. (b) Departmental. 2006.1255
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
Information Security Program Guide For State Agencies
Information Security Program Guide For State Agencies April 2008 Table of Contents INTRODUCTION...3 A SUGGESTED IMPLEMENTATION STRATEGY...5 SECURITY COMPONENTS...12 RISK MANAGEMENT...12 POLICY MANAGEMENT...14
Subject: Internal Audit of Information Technology Disaster Recovery Plan
RIVERSIDE: AUDIT & ADVISORY SERVICES June 30, 2009 To: Charles Rowley, Associate Vice Chancellor Computing & Communications Subject: Internal Audit of Information Technology Disaster Recovery Plan Ref:
Spillemyndigheden s Certification Programme Information Security Management System
SCP.03.00.EN.1.0 Table of contents Table of contents... 2 1 Objectives of the... 3 1.1 Scope of this document... 3 1.2 Version... 3 2 Certification... 3 2.1 Certification frequency... 3 2.1.1 Initial certification...
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Risk Management Policy
Risk Management Policy Responsible Officer Author Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date effective from December 2008 Date last amended December 2012
GOVERNMENT HOSTING. Cloud Service Security Principles Memset Statement. www.memset.com
GOVERNMENT HOSTING Cloud Service Security Principles Memset Statement Summary - March 2014 The Cabinet Office has produced a set of fourteen Cloud Service Security Principles to be considered when purchasers
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Phase II of Compliance to the Policy on Internal Control: Audit of Entity-Level Controls
Phase II of Compliance to the Policy on Internal Control: Audit of Entity-Level Controls Office of the Chief Audit and Evaluation Executive Audit and Assurance Services Directorate November 2013 Cette
Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)
Appendix 10 IT Security Implementation Guide For Information Management and Communication Support (IMCS) 10.1 Security Awareness Training As defined in NPR 2810.1A, all contractor personnel with access
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Prepared for Public Service Staff Relations Board. Prepared by Consulting and Audit Canada Project No.: 330-0998
Security Audit Report Prepared for Public Service Staff Relations Board Prepared by Consulting and Audit Canada Project No.: 330-0998 Table of Contents 1. Executive Summary... ii 2. About the Audit...1
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Aboriginal Affairs and Northern Development Canada. Internal Audit Report. Audit of Internal Controls Over Financial Reporting.
Aboriginal Affairs and Northern Development Canada Internal Audit Report Audit of Internal Controls Over Financial Reporting Prepared by: Audit and Assurance Services Branch Project #: 14-05 November 2014
SUPERVISORY AND REGULATORY GUIDELINES: PU19-0406 BUSINESS CONTINUITY GUIDELINES
SUPERVISORY AND REGULATORY GUIDELINES: PU19-0406 Business Continuity Issued: 1 st May, 2007 Revised: 14 th October 2008 BUSINESS CONTINUITY GUIDELINES I. INTRODUCTION The Central Bank of The Bahamas (
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems
U.S. Office of Personnel Management Actions to Strengthen Cybersecurity and Protect Critical IT Systems June 2015 1 I. Introduction The recent intrusions into U.S. Office of Personnel Management (OPM)
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
