COMPREHENSIVE SECURITY AUDIT COMMERCIAL TAXES DEPARTMENT, KARNATAKA. Ashish Kirtikar

Size: px
Start display at page:

Download "COMPREHENSIVE SECURITY AUDIT COMMERCIAL TAXES DEPARTMENT, KARNATAKA. Ashish Kirtikar"

Transcription

1 COMPREHENSIVE SECURITY AUDIT COMMERCIAL TAXES DEPARTMENT, KARNATAKA Ashish Kirtikar

2 Agenda Scope IS Audit High-level Strengths Weaknesses Recommendations. Network Architecture Review Weaknesses Recommendations. Vulnerability Assessment & Penetration Testing Q&A Findings Recommendations.

3 Scope

4 Scope Activities Assessment Activities: The Comprehensive Security Assessment Program was divided into three groups: Information Security Audit Internal Vulnerability Assessment & Penetration Testing Network Architecture Review Assessment Duration 6 th July 2011 to 14 th July 2011 Assessment Team Mr. Pramod Deshmane Senior Consultant, Project Manager Mr. Ashish Kirtikar Consultant, Team Leader Mr. Amit Gautam IS Consultant Mr. Vaibhav Mahadik IS Consultant

5 Scope Locations Locations in scope for the activity were taken on sampling basis, following were the sample locations advised by CTD to be assessed as a part of the audit: VTK-I, Gandhinagar Head Office State Data Centre (SDC) **, Computer Centre, VTK-I, Reliance Communications NOC, VTK-I DCCT(Audit)-13, Bangalore LVO-10, Bangalore NIC Data Center, Kormangla ** VTK-II, Kormangala

6 Scope Locations ADCOM (ENF), SZ, Bangalore JCCT(VIG), Bangalore JCCT(Appeals)5&6, Bangalore DCCT(Recovery)-2, Bangalore ACCT(LT)-2, Bangalore ETO-2, Bangalore PTO-1, Bangalore DCCT(Audit)-3, Mysore LVO-190, Mysore VSO-152, Ramanagara STCP(IN), Hosur Road, Attibele, Bangalore

7 Scope Locations STCP, Hosur Road (OUT),Attibele, Bangalore JCCT, DVO, Belgaum DCCT(ENF), Belgaum LVO-380, Belgaum PTO, Belgaum VSO-381, Sankeswara STCP(IN), Nippani ** - SDC & NIC Datacenters were assessed only for physical security w.r.t the CTD Devices as they are third party vendors and their entire infrastructure is out of scope and control of CTD.

8 IS Audit High Level Gaps

9 IS Audit - Introduction This activity was conducted to analyze the current composure of the Information Security Infrastructure in the Commercial Taxes Department office locations. Information Security Audit Checklist for the Commercial Taxes Department is based on the industry accepted security standards from SANS, ISO 27001, PCI DSS. The following areas have been covered in this audit: Information security policy Organization of information security Asset management Human resources security Physical Security Communications and operations management Access control Information systems acquisition, development and maintenance Information security incident management Business Continuity Management Compliance

10 IS Audit Compliance Levels Compliance Level Marks (%ge) Explanation of Level Non Existence 0 Process Non Existent Informal 20 The process/activity exists without relevant documentation Ownership not defined, roles and responsibility not documented No records exist. No reports exist. Limited 40 The process/activity exists with some relevant documentation Ownership defined, roles and responsibility not documented Few records created, maintained Few reports created Partial 60 The process/activity exists with some additional relevant documentation Ownership defined, roles and responsibility not documented Records created, maintained, archived Few reports created Major 80 The process/activity exists with relevant documentation Ownership defined, roles and responsibility documented Relevant records created, maintained, archived Relevant reports created Full 100 All criteria satisfied.

11 Information security policy Organization of information security Asset management Human resources security Physical Security Communications and operations management Access control Information systems acquisition, development and maintenance Information security incident management Business Continuity Management Compliance Compliance (%) IS Audit Compliance Summary (%age)

12 IS Audit - Strengths Management willingness and commitment to optimize the current IT Infrastructure and ensure its security. Policies & Procedures for Information Security Management System have been defined. Centralized Anti-Virus Management is implemented. Contact with Authorities like NIC. Monitoring of the uptime and SLAs for the Third Parties like Reliance. Access Control & User Management followed for the web based applications. Privilege Management implemented for web-based applications.

13 IS Audit - Weaknesses Awareness about the policies & procedures at the user level. Implementation of the policies & procedures defined at the user level. Periodic Review meets of the management to review the status and composure of the implementation of Information Security in the organization. Asset Registry / Inventory not maintained. Asset Management Process not followed as per the defined policies and procedures. Lack of specific Information Security Awareness Trainings or programs. Improper equipment siting and placement in some of the locations

14 IS Audit - Weaknesses Patch Management is not centralized, hence patches are not updated on many systems. Anti-Virus Logs / Alerts are not monitored. Hardening standards or baselines for desktop systems or servers not implemented. User management non-existent for local desktop systems, network devices, servers and databases. Password Policy / Account Lockout Policy is not present on any systems. Change Control not followed for all the systems as per the defined policies & procedures Data transferred from the NIC datacenter to CTD and from CTD to State Data Center is on removable media, without any specific measures to protect the integrity / confidentiality of the data.

15 IS Audit - Weaknesses There is no IDS / IPS in the network to monitor all the traffic transmitted across the CTD environment. Network Devices configuration reviews are not done to ensure access is restricted only as per business requirements. Logging for any of the systems is not present. Use of public accounts for business mails. Business Continuity & Disaster Recovery implementation / testing procedures are not documented. Incident Response Procedures / Trainings are not followed as per the defined policies. Risk Assessment Activity has not been carried out for the assets in CTD.

16 IS Audit - Recommendations Information Security Awareness trainings should be conducted for all the employees of CTD. It should be ensured that all employees read and understand the critical Information Security policies. Management should ensure and monitor on periodic basis that the policies defined are followed and implemented all across CTD. User Management should be centralized, CTD can consider use of technology like Domain based setup. Change Control Should be followed as defined and documented in policies. Patch Management should be centralized, CTD can consider the use of technologies like WSUS for centralized Patch Management. Anti Virus logs / alerts should be regularly monitored, follow ups should be done till closure of issue and Incident management procedures should be followed for the same if required.

17 IS Audit - Recommendations CTD should host its own internal mail server and provide CTD access for all it employees for CTD business mails. Transfer of data from any location over removable media should be protected by methods like encryption, checksum to ensure its integrity and confidentiality is maintained. Also it should be ensured that transit is tracked. Asset Inventory and Register should be maintained for all the assets present in the CTD Network. Asset Management procedures should be followed. Hardening documents and baseline standards for all the assets should be maintained. It should be ensured that all the assets are configured based on this documentation.

18 IS Audit - Recommendations Password Policy & Account Lockout Policy as per industry best practices requirements should be followed for Windows, Linux Systems, Databases, Applications, Network devices. a. Set first-time passwords to a unique value for each user and change immediately after the first use b. Change user passwords at least every 90 days c. Require a minimum password length of at least seven characters d. Use passwords containing both numeric and alphabetic characters e. Do not allow an individual to submit a new password that is the same as any of the last four passwords he or she has used f. Limit repeated access attempts by locking out the user ID after not more than six attempts g. Set the lockout duration to thirty minutes or until administrator enables the user ID h. Session-time out must be set to 15 mins.

19 IS Audit - Recommendations Logging should be enabled on all the critical devices. These logs should be forwarded to central locations and regular log monitoring and analysis should be conducted and recorded. File Integrity Monitoring solutions can also be implemented for ensuring that the log files at central location are not tampered. Business Continuity/ Disaster Recovery procedures should be documented. Testing for the same should be conducted on periodic basis Incident Response procedures should be followed as per the defined policies. Incident Response procedures training to the designated members needs to be conducted. Risk Assessment for atleast all the critical assets should be conducted based on industry accepted standards like, ISO 27005, NIST or OCTAVE

20 Network Security Architecture Review High Level Gaps

21 Network Security Architecture Review - Introduction The Network Architecture Review was focused on assessing the Network Infrastructure in terms of design and configuration to assist in further optimization of the CTD Network. For this exercise, a detailed understanding of the network based on the network diagram was obtained. Then configuration from following sample network devices were analyzed for gaps: ASA 5510 Firewall - 1 Hub Routers (Primary & Secondary) - 2 Fibre Link Connectivity Location Routers 3 RF Link Connectivity Location Routers - 5

22 Network Security Architecture Review Weaknesses It was observed that no specific hardening process / document defined for any of the systems in the network. There is no backup connectivity for the ASA 5520 Firewall, in case of any failure or downtime for the firewall the entire network will not be able to communicate with internet which will stop their connectivity to the applications hosted at the NIC Data Center. It was observed that on some of the devices logging is not enabled for some of the network devices. Logging is not configured on any of the routers. It was observed that there is no Intrusion Prevention or Detection system to monitor the internal & external critical traffic.

23 Network Security Architecture Review Weaknesses As there is no VLAN configuration and a HUB based network is implemented, there is threat of Network ARP or MAC poisoning in the network. This has also been identified in the Vulnerability Assessment activity carried out in the internal network. Updated Network diagram is not present; the diagram provided still mentions the Fortinet Firewall which is not present in the network. Access-lists on the routers and firewalls should be optimized and access should be provided only on specific required ports. Inactive and unassigned access-lists are present on the firewall. It is strongly recommended to review all the ACL s on the firewall, routers and remove the legacy and unwanted rules. NTP configuration is missing on all the server machines, this needs to be configured to a centralized NTP server. The configuration of the Network Device NTP should be changed from the Reliance NTP servers to internal NTP servers. Unique users have not been created on any of the network devices

24 Network Security Architecture Review Recommendations There should be a backup firewall for the ASA 5520, the organization already has a firewall which is procured, the same firewall can be used as a hot standby or in HA mode. So, in case one firewall fails traffic can be routed through the other. CTD can consider implementing a centralized user management system like TACACS or Radius authentication for unique user ids on the network devices. Logging should be configured on all the devices and the logs should be forwarded to a centralized log server, and logs should be regularly monitored. The spoke location machines can directly access the HUB location and vice versa, this should be removed if not required and whatever access is necessary to be provided should be restricted on specific ports. Access-lists on the routers and firewalls should be optimized and access should be provided only on specific required ports.

25 Network Security Architecture Review Recommendations Inactive and unassigned access-lists are present on the firewall. It is strongly recommended to review all the ACL s on the firewall, routers and remove the legacy and unwanted rules.

26 Internal Vulnerability Assessment & Penetration Testing

27 Internal Vulnerability Assessment & Penetration Testing - Introduction All network vulnerability assessment was conducted from various locations of Commercial Taxes Department, Karnataka. The locations included Head Office, Field Offices, Check Posts, Divisions, and Datacenter. All testing was performed using a variety of industry leading security scanning tools and applications. The Internal network included hosts network IP list provided to ControlCase by Commercial Taxes Department, Karnataka. A firewall or other network traffic-filtering device restricted access to these hosts. ControlCase discovered seventeen high-risk and seventeen mediumrisk vulnerabilities associated with the Commercial Taxes Department, Karnataka s provided internal network segment.

28 Internal Vulnerability Assessment & Penetration Testing Test Gradings Grading Level Description Excellent A rating of excellent indicates that no high or medium-risk vulnerabilities were discovered, though low-risk vulnerabilities may be present. The implemented security measures match the very best of those implemented by other companies or organizations. Good A rating of good indicates that no high-risk vulnerabilities were discovered, though some medium and low-risk vulnerabilities may exist. The implemented security measures exceed those implemented bytypical companies or organizations. Average A rating of average indicates that few high-risk vulnerabilities were found, with a majority of findings being medium and low-risk vulnerabilities. The implemented security is comparable to that of the typical company or organization. Marginal A rating of marginal indicates that many high, medium, and low-risk vulnerabilities were discovered, and system compromise may be possible. The implemented security falls below that of the typical company or organization. Poor A rating of poor indicated that numerous high-risk vulnerabilities were found and/or direct system compromise is possible. These high-risk vulnerabilities may be accompanied by multiple medium and low-risk vulnerabilities as well. The implemented security is significantly below the industry standards followed by a majority of companies or organizations.

29 Internal Vulnerability Assessment & Penetration Testing Result Following expert analysis of data gathered during the assessment, which accounts for the actual findings, the restrictions on service accessibility, and the results of verification testing on vulnerabilities discovered, a rating of Poor has been assigned to the network security of the Internal network managed by Commercial Taxes Department, Karnataka. Testing Phase Notes Rating Internal VA and Network Penetration Test Seventeen high-risk and seventeen medium-risk vulnerabilities have been discovered Poor

30 Internal Vulnerability Assessment & Penetration Testing Summary The risks noted in Commercial Taxes Department, Karnataka s internal infrastructure are categorized into High, Medium and low depending upon the severity levels. Risk Severity Level No. of Findings High 17 Medium 17 Low 13 Total 47

31 Internal Vulnerability Assessment & Penetration Testing Findings The following generic categories of Vulnerabilities were found in the machines which were tested: Operating System/Patch Management/Password Policies - 13 Lack of Patch Management System (MS Conficker Patch Missing) Windows Service Pack Out of Date Insecure Password Policy Network Misconfiguration 17 OpenSSL < 0.9.6j / 0.9.7b Multiple Vulnerabilities Anonymous FTP Enabled SNMP Default Community String Disclosure

32 Internal Vulnerability Assessment & Penetration Testing Findings Web / database Interfaces Discovery 13 Microsoft SQL Server Default Credentials Oracle Database Multiple Remote Vulnerabilities VNC Security Type Enforcement Failure Remote Authentication Bypass Web Server Unconfigured - Default Install Page Present Directory Listing enabled Common ports used by backdoors/viruses/worms/ - 1 Conficker Worm Detection - Conficker.C or lower detected DNS recursion/zone transfer/poisoning 3 MS06-041: Vulnerability in DNS Resolution Could Allow Remote Code Execution DNS Server Processes Unauthoritative Recursive Queries

33 Internal Vulnerability Assessment & Penetration Testing Recommendations All the systems should be updated with the latest patches. Systems should be hardened as per industry recognized baselines, to ensure all unwanted ports, protocols, services are disabled. Use of strong Password Policy & Account Lockout Policy. Hardening of Web Servers & databases as per industry recognized baselines and the defined policies of CTD.

34 Questions & Answers Any Questions??

35 Thank You Thank-You Incase of further queries kindly contact

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance

More information

Network Segmentation

Network Segmentation Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity) PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Goals. Understanding security testing

Goals. Understanding security testing Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3

More information

Fortinet Solutions for Compliance Requirements

Fortinet Solutions for Compliance Requirements s for Compliance Requirements Sarbanes Oxley (SOX / SARBOX) Section / Reference Technical Control Requirement SOX references ISO 17799 for Firewall FortiGate implementation specifics IDS / IPS Centralized

More information

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI WHITEPAPER Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI About PCI DSS Compliance The widespread use of debit and credit cards in retail transactions demands

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

Security aspects of e-tailing. Chapter 7

Security aspects of e-tailing. Chapter 7 Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Vendor Audit Questionnaire

Vendor Audit Questionnaire Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

Network Security Policy: Best Practices White Paper

Network Security Policy: Best Practices White Paper Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security

More information

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP SAQ D Compliance Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP Ground Rules WARNING: Potential Death by PowerPoint Interaction Get clarification Share your institution s questions, challenges,

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements

More information

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts. Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0 Payment Card Industry (PCI) Data Security Standard Summary of s from Version 2.0 to 3.0 November 2013 Introduction This document provides a summary of changes from v2.0 to v3.0. Table 1 provides an overview

More information

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard

More information

Payment Card Industry Self-Assessment Questionnaire

Payment Card Industry Self-Assessment Questionnaire How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

Guide to Vulnerability Management for Small Companies

Guide to Vulnerability Management for Small Companies University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Vendor Questionnaire

Vendor Questionnaire Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining

More information

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging Log Management Standard Effective Date: 7/28/2015 1.0 INTRODUCTION The California State University, Chico system/application log management standard identifies event logging requirements, log review frequency,

More information

System Security Policy Management: Advanced Audit Tasks

System Security Policy Management: Advanced Audit Tasks System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that

More information

Security Standard: Servers, Server-based Applications and Databases

Security Standard: Servers, Server-based Applications and Databases Security Standard: Servers, Server-based Applications and Databases Scope This standard applies to all servers (including production, training, test, and development servers) and the operating system,

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Guidelines for Website Security and Security Counter Measures for e-e Governance Project and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions

More information

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES REQUIREMENT 6.1 TO 6.2 SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES 6.1 TO 6.2 OVERVIEW In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

Security Management. Keeping the IT Security Administrator Busy

Security Management. Keeping the IT Security Administrator Busy Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance

More information

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation The PCI DSS Lifecycle 1 The PCI DSS follows a three-year lifecycle PCI DSS 3.0 will be released in November 2013 Optional (but recommended) in 2014; Required in 2015 PCI SSC Community Meeting Update: PCI

More information

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics About Us Matt Halbleib CISSP, QSA, PA-QSA Manager PCI-DSS assessments With SecurityMetrics for 6+ years SecurityMetrics Security

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600 Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0. Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...

More information

Cyber Security for NERC CIP Version 5 Compliance

Cyber Security for NERC CIP Version 5 Compliance GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...

More information

www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters

www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning

More information

Franchise Data Compromise Trends and Cardholder. December, 2010

Franchise Data Compromise Trends and Cardholder. December, 2010 Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Security and Control Issues within Relational Databases

Security and Control Issues within Relational Databases Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks 4 Best Practices for Building PCI DSS Compliant Networks Cardholder data is a lucrative and tempting target for cyber criminals. Recent highly publicized accounts of hackers breaching trusted retailers

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

Best Practices For Department Server and Enterprise System Checklist

Best Practices For Department Server and Enterprise System Checklist Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)

More information

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/ Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information