Server Room Security, Data Control, and Sarbanes-Oxley Compliance July 15, 2008
|
|
|
- Meryl Taylor
- 10 years ago
- Views:
Transcription
1 3625 Alleghany Drive Salem, VA Server Room Security, Data Control, and Sarbanes-Oxley Compliance July 15, 2008 By Jennifer Riley Medeco High Security Locks 1
2
3 Server Room Security, Data Theft and Sarbanes-Oxley Compliance Abstract The Sarbanes-Oxley Act of 2002 (SarbOx) was established specifically to address financial reporting for public companies. The accounting data that is the foundation for this financial reporting is invariably electronic-based, and as a result, needs to be adequately protected and controlled, both for the corporation s benefit as well as to comply with SarbOx. Individuals responsible for their organization s electronic data need to understand the level of protection their current security system provides, or doesn t provide, particularly in the area of server room access. This paper will examine SarbOx requirements for controlling data, discuss the risks inherent in traditional server room security, and outline specific solutions to protect electronic data and maintain SarbOx compliance by controlling and tracking access to the organization s server room, and consequently, its data. Introduction Security systems that do not both restrict server room access and track who is physically accessing or attempting to access company server rooms place public corporations in potential violation of the Sarbanes-Oxley Act of 2002 and expose all corporations public and private to unnecessary data security risks and liabilities. A recurring and central theme in both SarbOx and The Public Company Accounting (PCAOB) Oversight Board it established is that of internal controls as they relate to financial data. Since financial data in today s organizations is primarily electronic based, any discussion of internal controls has to include controlling access to electronic data. Security systems that purport to protect electronic data by controlling server room access through a traditional lock and key system or type of electronic access do not adequately protect access to electronic data indisputably one of an organization s most valuable assets. Fortunately, new security product innovations are available that specifically control and track server room access. SarbOx and PCAOB A Brief Explanation The Sarbanes-Oxley Act of 2002 was adopted To improve quality and transparency in financial reporting and independent audits and accounting services for public companies, to increase corporate responsibility and the usefulness of corporate financial disclosure.and for other purposes. 1 Section 302 of SarbOx addresses internal controls and specifically, outlines several responsibilities for the company s signing officers related to establishing, evaluating and maintaining internal controls. 1 while Section 404 addresses Management Assessment of Internal Controls 1 The PCAOB is a private sector, non-profit corporation established by SarbOx to oversee the auditors of public companies in order to protect the interests of investors and further protect the public interest in the preparation of informative, fair and independent audit reports. 2 PCAOB s Accounting Standard No. 5 places requirements that center on control on external auditors, including: 2
4 Assess both the design and operating effectiveness of selected internal controls related to significant accounts and relevant assertions, in the context of material misstatement risks; Evaluate company-level (entity-level) controls; Evaluate controls designed to prevent or detect fraud, including management override of controls; Evaluate controls over the period-end financial reporting process; Evaluate controls over the safeguarding of assets; and Conclude on the adequacy of internal control over financial reporting. Both SarbOx and PCAOB place significant emphasis on controlling and safeguarding data, and place the responsibility for ensuring that effective internal controls exist squarely on the shoulders of an organization s leadership. These controls apply to corporation s processes and procedures for ensuring the validity of its financial reporting and most certainly to the physical control of and access to the data that serves as the foundation for that financial reporting. Data Theft A Real and Recurring Problem Data is valuable, both to its owner as well as to individuals and organizations seeking to gain unauthorized access to the data through theft and manipulation, and needs to be protected. The primary focus of data protection is often an electronic solution firewalls, passwords, encryption, etc. but just as important and sometimes overlooked is the physical protection of data and the equipment on which it is maintained, both from theft and unauthorized access. The corporate landscape is littered with painful and costly instances of data that was inadequately controlled or protected in server rooms, and as a result, exploited. At the Midwest office of American Insurance Group (AIG), a thief broke in and stole a camcorder, and a computer server. 3 The value of the stolen hardware pales in comparison to the data contained on the server personal information on nearly one million Americans. In Chicago, police reported that thieves assualted a company security guard and stole 20 data servers worth $15, Verizon s Business Data Center in London lost more than $4 million in computer hardware when thieves impersonating policemen entered the facility and removed the equipment. 5 In Indiana, 700,000 residents have their personal data at risk after a server and eight PCs were stolen from a debt collection company. 6 We live in a time where the information contained on a server is often more valuable than the server itself, says Martin McKeay in his column Security Matters at ComputerWorld.com. A server can be easily replaced, the information not so much. 7 The Need to Control Access What the Experts Say One of the first steps in protecting data, and controlling it per SarbOx, is to control the access to where said data is stored server rooms. Because once unauthorized individuals gain access to the server room, the theft of data usually isn t far behind and oftentimes is easier to access than was entry to the server room itself. My point is that any savvy system wizard who can gain physical access to a computer can take that machine over in less than half an hour under most circumstances, says Ed Tittel, an expert contributor at SearchSecurity.com. This helps to explain why physical security -- or 3
5 managing control over the space where systems and other key aspects of IT infrastructure reside in the real world -- is such an important component of a well-designed and well-executed security policy. If you don't maintain physical security in the real world, any and all safeguards you erect in the virtual world may be meaningless. 8 Pete Sacco, a contributor at DataCenterDesign, a blog dedicated to the open exchange of ideas relating to the design of data centers and computer rooms, echoes other experts recommendations for server room security. Server room security begins with controlling access to your facility, 9 Sacco says. Bernie Klinder, a consultant with SearchWinComputing.com, echoed other experts opinions in his post. The final piece of the puzzle is securing your Windows server room, Klinder writes. At a minimum, you must control and log access to the room via security cards, biometrics or other auditable methods. 10 Controlling physical access to data and identifying attempts to gain unauthorized physical access to data should be a primary focus on any security plan whose goal is to protect an organization s assets and maintain compliance with specific SarbOx mandates. Traditional Security Systems and Why They Are Inadequate Tittel adds that for most small to mid-sized companies, security means things like locked server rooms, additional authentication or access controls to operate administrator consoles and, possibly, some kind of monitoring system to track access and use of sensitive systems. 8 Mechanical locks are often the first line of defense for companies attempting to protect their data and control access to server rooms, and understandably so. They re quick, easy, and inexpensive to install. There s a certain comfort level associated with this familiar security system used countless times daily to protect homes, vehicles, offices and other valuables. They don t require users to memorize access codes or carry electronic access cards, and traditional locks are, cosmetically, unobtrusive. Unfortunately, most locks are also woefully inadequate when it comes to protecting one of a corporation s most valuable assets. The traditional lock and key system is a good solution in situations where there is only one person using the key, where tracking access isn t important, and where the need to add or delete keys from a system isn t a concern. But even this one user, one key situation, while fairly uncommon in today s business environment, is fraught with risk. What happens if the key is lost or stolen, or worse yet, copied without the owner s knowledge? This risk, however, can be mitigated to a degree by using a high-security mechanical system. Often employing patented or otherwise restricted keys and locks that are extremely difficult to bypass, these high-security mechanical systems do offer a significant level of protection and control as compared to standard systems, albeit without an audit and tracking feature. A traditional mechanical masterkey system, particularly one that isn t defined as highsecurity, simply doesn t offer enough protection, flexibility and data needed to control access to data and to provide tracking features that enable management to assess and evaluate internal controls, per SarbOx. When compared with other security options, traditional, non-high security mechanical masterkey systems come with other inherent risks and weaknesses, including: No ability to track who is accessing or attempting to access a door, how often, and when. No ability to quickly add or delete keys from a system when a key is lost, stolen, or an employee is no longer part of the organization. 4
6 Unpatened or otherwise restricted keys can be copied and locks easily bypassed without leaving physical evidence to serve as an indicator of a security breach. Users need multiple keys to access different locks. Electronic security systems that employ security cards, alpha-numeric codes or biometrics, provide heightened levels of protection when compared to a traditional mechanical masterkey systems but also bring with them a set of drawbacks separate from mechanical keys and locks, inluding: Expense to install, both from a time and materials standpoint. Installation locations dependent on the availability of power and network lines. Installation requires significant modifications to the door or frame, or both. Security cards, biometrics and other auditable methods are commonly used to limit who is able to gain entry into the server room, but these methods can only do so much, Tittel adds. Security cards, keys or passwords can fall into the wrong hands, while biometrics devices are expensive and may accidentally keep out people who should have access. 8 In certain environments, either a mechanical- or an electronic-based security system can be the appropriate solution to asset protection. Neither system by itself, however, is the right solution for securing and controlling data assests in today s complex environment of complying with SarbOx requirements. Solutions A viable, cost-effective solution to protecting data and fullfilling the control requirements outlined in SarbOx Sections 302 and 404 and PCAOB s Accounting Standard No. 5 lies in combining the best attributes and features of mechanical and electronic door locking systems. Medeco High Security Locks designed and introduced Logic a new electromechanical product line that consists of digital lock cylinders and digital keys as an answer to security and access tracking needs by using the most desirable characteristics that both mechanical and electronic sytems offer. Logic offers functionality similar to that of sophisticated electronic security systems, including audit trails, scheduling and the ability to add and delete users easily, but installs without any wiring, door or frame modifications or additional hardware. Logic s digital cylinder and digital key look much like a traditional lock and key. The key is virtually indistinguishable from most car keys, with the exception of a small display screen, as is the cylinder. The difference lies in the digital technology contained in both the self-powered key and the cylinder, which is powered by the key. Logic s digital cylinder retrofits into existing hardware, enabling the replacement of an existing cylinder and mechanical key with the electro-mechanical Logic cylinder in less than five minutes. This upgrade results in a stronger mechanical system, and the ability to both electronically audit access and change accessibility features, such as times and authorized users, quickly. With Logic, any key can be programmed to work or not work on any cylinder, without being limited by a mechanical hierarchy like on a mechanical masterkeying system. Knowing who is accessing or attempting to access data is a key element is demonstrating data control and in protecting data from theft. Logic systems allow up to 1,000 audit trails to be pulled from both the key and the cylinder, showing who is entering the protected area, how often, and when, thanks to time and date stamps. This data enables administrators to regularly evaluate and assert that the internal controls are operating efficiently, and helps companies comply with key SarbOx requirements related to internal controls and effectiveness. 5
7 Lost keys can simply be electronically deleted from the system to maintain security. And, any time a new user key is needed, it can be quickly and easily added. Additionally, unauthorized key copying is removed from the equation because replacement keys are cut and issued only by the Medeco factory and because of the patented electronic technology in Medeco keys two features that, combined, offer superior protection against unauthorized key copying. Instant rekeying is another Logic benefit as keys and cylinders can be instantly and easily deactivated or reprogrammed with different access permissions or schedules, either by Medeco dealers or by end-users who choose to self manage their systems with an optional programming device and software. While Logic s auditing and tracking features that show who is accessing or attempting to access a server room and its technology that prevents unauthorized access are compelling by themselves, the installation benefits shouldn t be overlooked. Traditional electronic security systems, including card readers, biometric systems, or keypads, usually require electricity in order to operate, and if the system is being installed as a retrofit, significant installation expense in both time and materials. Logic cylinders simply retrofit existing mechanical cylinders and leverage the use of existing door hardware without any door or hardware modifications. No electricity, hardwiring, phone, or Internet connection is necessary. And, unlike many stand-alone systems, Logic cylinders blend discretely into existing hardware and architectural designs and are available in most common architectural finishes. Logic provides a straightforward, cost-effective security solution where a mechanical masterkey system simply doesn t offer enough flexibility to keep up with businesses everincreasing demands, and the ever-changing methods individuals are employing to gain unauthorized access to data. Logic offers strong physical security with the flexibility of schedules, audit trails, the ability to easily add and delete user keys, and unlike electronic systems, a retrofit cylinder that blends unobtrusively into existing hardware. Conclusion In today s business environment, data security isn t a question of whether protection is needed but rather what type of protection is the best choice. The added complexities of ensuring compliance with SarbOx, specifically sections 302 and 404 addressing control, make that security decision even murkier. Industry experts agree that any data protection plan has to begin with securing, controlling, and evaluating access to the data s home the server room. Both mechanical and electronics-only locking systems have their limitations when it comes to securing server rooms and providing the data and control needed to comply with SarbOx. A viable, cost-effect solution to server room protection and SarbOx data control requirments is a security system that combines the best attributes of both the mechanical and electronic systems For more information, please contact Joseph Kingma, Director of Business Development at Medeco High Security Locks: ext or [email protected] 6
8
9 References 1. Sarbanes-Oxley Act of 2002, November 2, 2002, 2. Public Company Accounting Oversight Board , 3. MSNBC, Stolen Computer Server Sparks ID Theft Fears, By Jim Pompkin and Tim Sandler, June 14, 2006, 4. Data Center Knowledge, Armed Robbery at Chicago Data Center, November 4, 2007, a_center.html 5. Data Center Knowledge, Ocean s 11 Data Center Robbery in London, December 8, 2007, robbery_in_london.html 6. Dark Reading, Server Theft Exposes Data on 700,000 Consumers, By Tim Wilson, Site Editor, April 21,2008, 7. Computerworld Magazine, Targeting the Servers, By Martin McKeay, June 20, 2006, 8. Searchsecurity.com, Policy for the Real World: Physical Security, By Ed Tittel, April 1, 2003, 9. Data Center Design, Server Room Security Measures, By Pete Sacco, January 26, 2007, Searchwincomputing.com, How to Secure Your Windows Server Room, By Bernie Klinder, February 8, 2005, 0,289142,sid68_gci ,00.html 7
Medeco XT. Electronic Control, Accountability, Security
Medeco XT Electronic Control, Accountability, Security Medeco Security Locks A History of High Security and Innovation WHY CHOOSE MEDECO? Since its inception in 1968, Medeco has been a pioneer in the locking
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Drawbacks to Traditional Approaches When Securing Cloud Environments
WHITE PAPER Drawbacks to Traditional Approaches When Securing Cloud Environments Drawbacks to Traditional Approaches When Securing Cloud Environments Exec Summary Exec Summary Securing the VMware vsphere
LOCKS AND HIGH INSECURITY: PROTECTING CRITICAL INFRASTRUCTURE
LOCKS AND HIGH INSECURITY: PROTECTING CRITICAL INFRASTRUCTURE SECURITY VULNERABILITIES FOR MECHANICAL AND ELECTRONIC LOCKING SYSTEMS THAT ARE USED FOR PROTECTING CRITICAL ASSETS CRITICAL FACILITIES TRANSPORTATION
SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES
SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES 2 On June 3, 2009, Plante & Moran attended the Midwest Technology Leaders (MTL) Conference, an event that brings together
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
HIPAA SECURITY RULES FOR IT: WHAT ARE THEY?
HIPAA SECURITY RULES FOR IT: WHAT ARE THEY? HIPAA is a huge piece of legislation. Only a small portion of it applies to IT providers in healthcare; mostly the Security Rule. The HIPAA Security Rule outlines
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
Login Register. IDG Network:
IDG Network: Login Register Data Detectives Finding that network and application security isn't enough, companies are turning to software that monitors database activity and provides an audit trail. News
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Implementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Answer: TRUE Diff: 1 Page Ref: 268
Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 10 Global, Ethics, and Security Management 1) Outsourcing ERP systems helps to lower the cost of software ownership and maintenance. Diff:
Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls
Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint
Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper
Access Control in Commercial Applications Is the future of commercial building security built in, or bolted on? A discussion paper Author: Damian Marsh, Managing Director UK, ASSA ABLOY Access Control
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
An Oracle White Paper December 2010. Implementing Enterprise Single Sign-On in an Identity Management System
An Oracle White Paper December 2010 Implementing Enterprise Single Sign-On in an Identity Management System Introduction Most users need a unique password for every enterprise application, causing an exponential
AlienVault for Regulatory Compliance
AlienVault for Regulatory Compliance Overview of Regulatory Compliance in Information Security As computers and networks have become more important in society they and the information they contain have
Log Management How to Develop the Right Strategy for Business and Compliance. Log Management
Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
Solitaire Electronic Access Control Systems Access Control with a Magnetic Card
Solitaire Electronic Access Control Systems Access Control with a Magnetic Card Discover the Latest in Kaba Technology Meet all your needs with the 5000 SERIES Information is available at www.e-plexlock.com,
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
WHITE PAPER. Understanding Transporter Concepts
WHITE PAPER Understanding Transporter Concepts Contents Introduction... 3 Definition of Terms... 4 Organization... 4 Administrator... 4 Organization User... 4 Guest User... 4 Folder Hierarchies... 5 Traditional
Chapter 1: Information Security Fundamentals. Security+ Guide to Network Security Fundamentals Second Edition
Chapter 1: Information Security Fundamentals Fundamentals Second Edition Objectives Identify the challenges for information security Define information security Explain the importance of information security
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
Modern two-factor authentication: Easy. Affordable. Secure.
Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks
The True Story of Data-At-Rest Encryption & the Cloud
The True Story of Data-At-Rest Encryption & the Cloud by Karen Scarfone Principal Consultant Scarfone Cybersecurity Sponsored by www.firehost.com (US) +1 844 682 2859 (UK) +44 800 500 3167 twitter.com/firehost
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data Printer Security Challenges Executive Summary Security breaches can damage both your operations
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners
SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners The Institute of Internal Auditors
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:
The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS
PCI General Policy. Effective Date: August 2008. Approval: December 17, 2015. Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS:
Effective Date: August 2008 Approval: December 17, 2015 PCI General Policy Maintenance of Policy: Office of Student Accounts PURPOSE: To protect against the exposure and possible theft of account and personal
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
Top 5 Reasons to Choose User-Friendly Strong Authentication
SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts
The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development
The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment Card Industry Data Security Standards
INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
Compliance and Security Challenges with Remote Administration
Sponsored by Netop Compliance and Security Challenges with Remote Administration A SANS Whitepaper January 2011 Written by Dave Shackleford Compliance Control Points Encryption Access Roles and Privileges
TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business
TAKING OUR CUSTOMERS BUSINESS FORWARD The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing
Keep Your Data Secure: Fighting Back With Flash
Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009
University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009 Effective Date of this Policy: August 1, 2008 Last Revision: September 1, 2009 Contact for More Information: UDit Internal Auditor
VENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
Privileged User Monitoring for SOX Compliance
White Paper Privileged User Monitoring for SOX Compliance Failed login, 6:45 a.m. Privilege escalation, 12:28 p.m. Financial data breach, 11:32 p.m. Financial data access, 5:48 p.m. 1 Privileged User Monitoring
Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy
Usher Mobile Identity for Higher Education Institutions Rebecca Parks Associate Product Manager, MicroStrategy Agenda Overview of Mobile Identity Verify Personal ID Login to University Systems Unlock Doors
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Easily Managing User Accounts on Your Cloud Servers. How modern IT and ops teams leverage their existing LDAP/Active Directory for their IaaS
Easily Managing User Accounts on Your Cloud Servers How modern IT and ops teams leverage their existing LDAP/Active Directory for their IaaS How Did We Get Here? How the move to IaaS has created problems
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs
Learn the Essentials of Virtualization Security
Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
WHITE PAPER. Best Practices for the Use of Data Analysis in Audit. John Verver, CA, CISA, CMC
WHITE PAPER Best Practices for the Use of Data Analysis in Audit John Verver, CA, CISA, CMC CONTENTS Executive Summary...1 The Evolving Role of Audit Analytics...3 Applications of Audit Analytics...3 Approaches
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
