COMPUTER OPERATIONS AUDIT
|
|
|
- Opal Brittney Edwards
- 10 years ago
- Views:
Transcription
1 County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES COMPUTER OPERATIONS AUDIT FINAL AUDIT REPORT Chief of Audits: James L. Pelletier, CIA, CICA IT Audit Manager: Lynne Prizzia, CISA Senior Auditor: Mady Cheng, CPA, CISA Auditor II: Evans Owala, CISA Report No. A October 2010
2 Intentionally Left Blank
3
4 INTRODUCTION Audit Objective Background The objective of the audit was to evaluate the design and operating effectiveness of the internal controls surrounding the County s computer operations. Computer operations is concerned with the actual delivery of required services, which includes service delivery, management of security and continuity, service support for users, and management of data and operational facilities. Data Centers and Server Rooms As of November 2009, the Northrop Grumman Team (NGT) supported the County s 602 computer servers and 455 active applications. There were 169 servers in various sites throughout San Diego County, and the remaining servers resided in two primary Hewlett-Packard (HP) data centers in Tulsa, Oklahoma and Plano, Texas. NGT is responsible for the physical and environmental security of its facilities, including the AT&T Data Center in San Diego and the two primary HP data centers. Similarly, the County is responsible for the security of its own facilities. The Electronic Security Division of the Office of Security Services of the Department of General Services (DGS) uses the Card Access System to manage photo identification/access cards (Access Cards) which grant cardholders access to enter County facilities, including server rooms. In addition, the Sheriff s and the Probation Departments manage the Access Cards for their own staff. Within the Card Access System, physical access is assigned by Access Group. In particular, various Access Groups are set up in the Card Access System, each Access Group is granted physical access to specific County facilities, and each Access Card is assigned up to six Access Groups. Job Scheduling The NGT Application Service framework team schedules and manages IT jobs using job scheduler software. Job schedulers are a major component of the County s IT infrastructure and manage the County s production workload on mainframe, Windows, Unix, AS400, and VAX platforms. Incident and Problem Management The NGT Help Desk Service framework team manages trouble tickets and service requests from inception to closure (i.e., recording, troubleshooting, escalating, coordinating, reporting, and closing). Incidents reported are tracked in the Peregrine ticketing application. According to the Deputy Infrastructure Operations Manager of Northrop Grumman (NG), upon closing high-priority incident tickets (i.e., Severity 1 and 2), NGT performs root cause analysis to prevent recurring problems. Audit Scope & Limitations Audit fieldwork was conducted between June 2009 and February The audit focused on the following areas of computer operations: 1
5 Physical and environmental security of the County s server rooms in San Diego; Job scheduling and controls in Windows and Unix platforms; Incident and problem management; Deliverables and reports as specified in the IT Contract; and Backup and restoration. The Office of Audits & Advisory Services (OAAS) ability to audit backup and restoration was limited due to the contractor s inability to provide requested documentation. OAAS plans to revisit these areas in a future audit. This review was conducted in accordance with auditing standards prescribed by the Institute of Internal Auditors, Inc., as required by California Government Code, Section OAAS also based the evaluation on standards related to information technology security controls from the IT Governance Institute s Control Objectives for Information and Related Technology (COBIT) and National Institute of Standards and Technology s (NIST) Recommended Security Controls for Federal Information Systems. Methodology Key components of OAAS approach to conducting the audit are highlighted below: Interviewed selected NGT and County personnel, including Group IT Managers (GITM s), on policies, processes, and procedures relevant to the areas being reviewed. Obtained and evaluated related documents; Researched and reviewed the IT and Telecommunications Service Agreement between the County and NG (IT Contract); Conducted site visits in three sample server rooms (the AT&T Data Center, County Administration Center [CAC], and Mills Building) to observe and verify existence and appropriateness of physical access and environmental controls (e.g., existence of fire suppression system); Inquired the DGS staff about the process of managing Access Cards. Obtained and reviewed the list of individuals with access to the CAC server room to evaluate appropriateness (e.g., to identify users with duplicate Access Card accounts and/or any terminated County or NGT employees); Identified key job scheduling controls and performed detailed testing; Walked through the incident and problem management process with NG personnel and tested key controls; and 2
6 Tested sample deliverables/reports from the IT Contract to verify whether the NGT provided the reports to the County. AUDIT RESULTS Summary Finding I: Within the scope of the audit, OAAS concluded that controls over computer operations were generally adequate, except for the following opportunities for improvement in disaster recovery, server room access management, and job scheduling. AT&T Data Center Needs an Approved Disaster Recovery Plan As of the end of audit fieldwork, there was no approved disaster recovery plan for the AT&T Data Center. CTO management stated that while NGT has a plan for the site, the plan does not meet the County s requirements and therefore has not been approved by the CTO. As of November 2009, the AT&T Data Center housed 35 County servers, including critical infrastructure and application servers. An alternate processing site or telecommunication services to support the recovery of County information systems and network infrastructure in the event of a disaster had not been identified. If a disaster (e.g., firestorm, earthquake, or terrorist attack) occurs, the computer equipment and systems housed in the AT&T Data Center may be destroyed or severely damaged. Without an alternate processing site or a backup telecommunication service, the County would be unable to restore certain critical IT systems and the County s primary network, and could not resume related business functions in a timely manner. A comprehensive disaster recovery plan is required to ensure that business functions can be timely resumed in the event of a critical system or network failure. Recommendation: Finding II: The County Technology Office (CTO) should work with the NGT management to develop and implement a disaster recovery plan for the AT&T Data Center. As this could result in significant costs to the County, the disaster recovery plan should be based on a business impact analysis conducted to assess potential impact to County operations in the event of a disaster. Access Management to CAC Server Room Needs Improvement In November 2009, the CAC server room housed 12 County servers. OAAS tested the list of personnel with access to the CAC server room as of May The following issues were identified: Inappropriate Access Granted There were 299 active Access Card accounts which provided physical access to the CAC server room. These 299 accounts were composed of 132 Sheriff employee accounts, 94 other County employee accounts, 70 NGT accounts, and three other contractor accounts. Thirty-one of the 299 Access Cards (10%) had never been used. Additionally, 11 County 3
7 executives and two gardeners whose job responsibilities did not require the access had access to the server room. Terminated NGT Employees Five of 64 active accounts sampled represented terminated NGT employees whose 24/7 access to the server room had not been removed from the Card Access System. According to the DGS Electronics Security staff, the five Access Cards had never been returned to DGS. OAAS was able to verify that four of the five cards had not been used after the employee was terminated. The termination date for the fifth employee was not available. According to the County Administrative Policy #0040-6, each department is responsible for collecting Access Cards from contractors who leave County services, and Access Cards will be returned to the DGS Security Office for destruction. However, there was no process to ensure NGT staff s Access Cards were returned to DGS upon termination. Also, there were no formal procedures for communication of NGT staff termination to the DGS Electronics Security Division. In addition, NGT only provided the list of terminated employees upon DGS request and as a result, access removal had been sporadic and delayed. County Employees with Multiple Access Card Accounts Six County employees had multiple active accounts in the Card Access System and each related Access Card allowed the cardholder to access the CAC server room. The six employees accounted for 18 of the 165 accounts sampled (11%). If Access Cards are not properly managed, physical security at County facilities could be compromised. Unauthorized personnel could gain physical access to restricted areas such as server rooms and damage computer equipment or data, resulting in breach of confidential information, misappropriation of assets, and/or identity theft. Recommendation: The CTO management should work with the DGS to strengthen physical access controls to County server rooms, including the CAC server room. This should include, but not be limited to: Establishing a new Access Group in the Card Access System so that only this new Group is allowed to access the CAC server room. Access to the CAC server room should be removed from all other Access Groups. Requests to join this new Group should be approved by the CTO; Working with the NGT management to develop and implement procedures to ensure that the access of NGT staff no longer working on the County contract is removed and related Access Cards are collected and returned to DGS in a timely manner; and 4
8 Working with the NGT and County departments to review the list of personnel with access to County server rooms at least semiannually to identify: - Terminated employees/contractors; - Personnel with multiple Access Card accounts; and - Personnel whose job responsibilities do not involve accessing the server rooms on a regular basis. Any inappropriate access identified should be immediately removed. Finding III: Job Scheduling Process Needs Improvement Job scheduling procedures were incomplete, not formally documented, and/or not properly reviewed and approved. As a result, all nine samples of new jobs added to the production environment lacked evidence of County management approval. Also, the NGT had never produced or provided the County with the Servers Job Scheduling Requirements Report, as required by the IT Contract. The COBIT framework states that complete and accurate data processing requires effective management of data processing procedures, including defining operating policies and procedures for effective management of scheduled processes. Effective operations management helps maintain data integrity and reduces business delays and IT operating costs. Unauthorized jobs could potentially be added to the production environment, resulting in unauthorized changes to the application and/or data. Consequently, data integrity could be compromised, resulting in a potential breach of confidential information, misappropriation of assets, and/or identity theft. Recommendation: The CTO and the NGT management should develop, update, review, approve, and implement the job scheduling procedures for all platforms processing County jobs. New or changed jobs should be properly approved and supporting documents should be retained in compliance with the County s records retention policies. COMMENDATION The Office of Audits & Advisory Services commends and sincerely appreciates the courteousness and cooperation extended by the officers and staff of the County Technology Office, the Department of General Services, and the Northrop Grumman team throughout this audit. Office of Audits & Advisory Services Compliance Reliability Effectiveness Accountability Transparency Efficiency V A L U E 5
9 DEPARTMENT S RESPONSE 6
10 7
11 8
12 9
COMPUTER OPERATIONS - BACKUP AND RESTORATION
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES COMPUTER OPERATIONS - BACKUP AND RESTORATION FINAL AUDIT REPORT Chief of Audits: Julie Nieminski, CPA, CIA, CFE, CISA, MPA
OFFICE OF AUDITS & ADVISORY SERVICES IT DISASTER RECOVERY AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES IT DISASTER RECOVERY AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT Chief of Audits: Juan R. Perez Senior Audit Manager:
OFFICE OF AUDITS & ADVISORY SERVICES SHAREPOINT SECURITY AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES SHAREPOINT SECURITY AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia, CISA, CRISC Senior
OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia,
OFFICE OF AUDITS & ADVISORY SERVICES BEHAVIORAL HEALTH SERVICES CONTRACT MONITORING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES BEHAVIORAL HEALTH SERVICES CONTRACT MONITORING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Laura R.
OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT. County of San Diego Auditor and Controller
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA,
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Information Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
Missouri Student Information System Data Governance
Nicole R. Galloway, CPA Missouri State Auditor ELEMENTARY AND SECONDARY EDUCATION Missouri Student Information System Data Governance October 2015 http://auditor.mo.gov Report No. 2015-093 Nicole R. Galloway,
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Oregon Employment Department: Computer Programs for Unemployment Tax Returns and Claims Need Attention
Secretary of State Audit Report Jeanne P. Atkins, Secretary of State Gary Blackmer, Director, Audits Division Oregon Employment Department: Computer Programs for Unemployment Tax Returns and Claims Need
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
San Francisco Chapter. Information Systems Operations
Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with
December 2014 Report No. 15-017. An Audit Report on The Telecommunications Managed Services Contract at the Health and Human Services Commission
John Keel, CPA State Auditor An Audit Report on The Telecommunications Managed Services Contract at the Health and Human Services Commission Report No. 15-017 An Audit Report on The Telecommunications
AUDITOR GENERAL WILLIAM O. MONROE, CPA
AUDITOR GENERAL WILLIAM O. MONROE, CPA HILLSBOROUGH COUNTY DISTRICT SCHOOL BOARD LAWSON FINANCIALS MODULE Information Technology Audit SUMMARY To support its financial management needs, the Hillsborough
Department of Public Utilities Customer Information System (BANNER)
REPORT # 2010-06 AUDIT of the Customer Information System (BANNER) January 2010 TABLE OF CONTENTS Executive Summary..... i Comprehensive List of Recommendations. iii Introduction, Objective, Methodology
911 Data Center Operations Performance Audit
911 Data Center Operations Performance Audit June 2010 Office of the Auditor Audit Services Division City and County of Denver Dennis J. Gallagher Auditor The Auditor of the City and County of Denver is
Internal Audit Information Technology Equipment
Internal Audit Information Technology Equipment June 2012 Bernalillo County Internal Audit Information Technology Equipment Executive Summary SUMMARY OF PROCEDURES REDW performed an internal audit of the
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES
APPENDIX 1 DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES March 2008 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS EXECUTIVE SUMMARY...1
Office of the City Auditor. Audit Report. AUDIT OF THE SERVICE LEVEL AGREEMENT OF THE at&t MANAGED SERVICES AGREEMENT (Report No.
CITY OF DALLAS Dallas City Council Office of the City Auditor Audit Report Mayor Tom Leppert Mayor Pro Tem Dr. Elba Garcia Deputy Mayor Pro Tem Dwaine Caraway AUDIT OF THE SERVICE LEVEL AGREEMENT OF THE
OFFICE OF THE STATE AUDITOR TWO COMMODORE PLAZA 206 EAST NINTH STREET, SUITE 1900 LAWRENCE F. ALWIN, CPA
OFFICE OF THE STATE AUDITOR TWO COMMODORE PLAZA 206 EAST NINTH STREET, SUITE 1900 LAWRENCE F. ALWIN, CPA AUSTIN, TEXAS 78701 State Auditor July 22, 1998 RE: A Review of General Automation Controls at Selected
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Information Technology Operational Audit DEPARTMENT OF STATE. Florida Voter Registration System (FVRS) Report No. 2016-002 July 2015
July 2015 Information Technology Operational Audit DEPARTMENT OF STATE Florida Voter Registration System (FVRS) Sherrill F. Norman, CPA Auditor General Secretary of State Section 20.10, Florida Statutes,
PeopleSoft IT General Controls
PeopleSoft IT General Controls Performance Audit December 2009 Office of the Auditor Audit Services Division City and County of Denver Dennis J. Gallagher Auditor The Auditor of the City and County of
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.
- 1. Policy Statement All card processing activities and related technologies must comply with the Payment Card Industry Data Security Standard (PCI-DSS) in its entirety. Card processing activities must
for Kimberly F. Benoit Deputy Assistant Inspector General for Information Technology and Data Analysis
August 20, 2014 MEMORANDUM FOR: CHARLES L. MCGANN, JR. MANAGER, CORPORATE INFORMATION SECURITY FROM: for Kimberly F. Benoit Deputy Assistant Inspector General for Information Technology and Data Analysis
FINAL. Internal Audit Report. Data Centre Operations and Security
FINAL Internal Audit Report Data Centre Operations and Security Document Details: Reference: Report nos from monitoring spreadsheet/2013.14 Senior Manager, Internal Audit & Assurance: ext. 6567 Engagement
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
September 2011 Report No. 12-002
John Keel, CPA State Auditor An Audit Report on The Criminal Justice Information System at the Department of Public Safety and the Texas Department of Criminal Justice Report No. 12-002 An Audit Report
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Information Technology Internal Audit Report
Information Technology Internal Audit Report Report #2013-03 August 9, 2013 Table of Contents Page Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives... 4 Scope... 5 Testing
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Mecklenburg County Department of Internal Audit. PeopleSoft Application Security Audit Report 1452
Mecklenburg County Department of Internal Audit PeopleSoft Application Security Audit Report 1452 February 9, 2015 Internal Audit s Mission Through open communication, professionalism, expertise and trust,
System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012
System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012 Moss Adams LLP 9665 Granite Ridge Drive, Suite 600 San Diego, CA 92123
MANAGEMENT AUDIT REPORT DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION
MANAGEMENT AUDIT REPORT OF DISASTER RECOVERY PLAN DEPARTMENT OF FINANCE AND ADMINISTRATIVE SERVICES INFORMATION TECHNOLOGY SERVICES DIVISION REPORT NO. 13-101 City of Albuquerque Office of Internal Audit
Western Australian Auditor General s Report. Information Systems Audit Report
Western Australian Auditor General s Report Information Systems Audit Report Report 10 June 2012 Auditor General s Overview The Information Systems Audit Report is tabled each year by my Office. It summarises
ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities
Policy Title: Information Security Roles Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles Approval Date: 05/28/2014 Revised Responsible Office:
Practical Guidance for Auditing IT General Controls. September 2, 2009
Practical Guidance for Auditing IT General Controls Chase Whitaker, CPA, CIA September 2, 2009 About Hospital Corporation of America $28B annual revenue $24B total assets $4.6B EBDITA $673M Net Income
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
MANAGEMENT AUDIT REPORT ACCOUNTS PAYABLE
MANAGEMENT AUDIT REPORT OF ACCOUNTS PAYABLE REPORT NO. 04-108 CITY OF ALBUQUERQUE OFFICE OF INTERNAL AUDIT AND INVESTIGATIONS of Accounts Payable Report No. 04-108 Executive Summary Background The Department
Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
Information System Audit Report Office Of The State Comptroller
STATE OF CONNECTICUT Information System Audit Report Office Of The State Comptroller AUDITORS OF PUBLIC ACCOUNTS KEVIN P. JOHNSTON ROBERT G. JAEKLE TABLE OF CONTENTS EXECUTIVE SUMMARY...1 AUDIT OBJECTIVES,
IT Security Incident Management Policies and Practices
IT Security Incident Management Policies and Practices Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Feb 6, 2015 i Document Control Document
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
Computer Security Roles and Responsibilities and Training Should Remain Part of the Computer Security Material Weakness.
Computer Security Roles and Responsibilities and Training Should Remain Part of the Computer Security Material Weakness September 2004 Reference Number: 2004-20-155 This report has cleared the Treasury
Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government
Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
TECHNOLOGY AND INNOVATION DEPARTMENT BACKUP AND RECOVERY REVIEW AUDIT 14-08 SEPTEMBER 23, 2014
TECHNOLOGY AND INNOVATION DEPARTMENT BACKUP AND RECOVERY REVIEW AUDIT 14-08 SEPTEMBER 23, 2014 CITY OF TAMPA Bob Buckhorn, Mayor Internal Audit Department Christine Glover, Internal Audit Director September
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE ENTERPRISE DATA WAREHOUSE DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET August 2014 Doug A. Ringler, C.P.A., C.I.A. AUDITOR
CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard
CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard (Approved by the Information Strategy and Governance Committee in December 2013; revision 1.1 approved by Chief Information
SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02. IT Backup, Recovery and Disaster Recovery Planning
SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02 IT Backup, Recovery and Disaster Recovery Planning Executive Summary Introduction As part of the 2011/12 Audit Plan and following discussions
The Navajo Nation. A Foliow-Up Review. Department of Information Technology. Corrective Action Plan Implementation. Report No. 14-16.
OFFICE OF THE AUDITOR GENERAL The Navajo Nation A Foliow-Up Review ofthe Department of Information Technology Corrective Action Plan Implementation I Report No. 14-16 June 2014 Performed by: Terry Becenti,
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Disaster Recovery Testing Is Being Adequately Performed, but Problem Reporting and Tracking Can Be Improved May 3, 2012 Reference Number: 2012-20-041 This
