The Challenges and Myths of Sarbanes-Oxley Compliance



Similar documents
White Paper. Sarbanes Oxley and iseries Security, Audit and Compliance

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Someone may be manipulating information in your organization. - and you may never know about it!

Achieving SOX Compliance with Masergy Security Professional Services

FairWarning Mapping to PCI DSS 3.0, Requirement 10

Data Management Policies. Sage ERP Online

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

SUPPLIER SECURITY STANDARD

Sarbanes-Oxley Compliance for Cloud Applications

Newcastle University Information Security Procedures Version 3

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

March

WHITEPAPER Complying with HIPAA LogRhythm and HIPAA Compliance

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Sarbanes-Oxley Control Transformation Through Automation

Managing Special Authorities. for PCI Compliance. on the. System i

Practical Guidance for Auditing IT General Controls. September 2, 2009

USM IT Security Council Guide for Security Event Logging. Version 1.1

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

HIPAA Information Security Overview

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance and Industry Regulations

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

PCI 3.0 Compliance for Power Systems Running IBM i

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

Teleran PCI Customer Case Study

Security Controls What Works. Southside Virginia Community College: Security Awareness

Enforcive / Enterprise Security

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

GFI White Paper PCI-DSS compliance and GFI Software products

LogRhythm and NERC CIP Compliance

LogRhythm and HIPAA Compliance

Department of Public Utilities Customer Information System (BANNER)

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Secure Configuration Guide

FINAL May Guideline on Security Systems for Safeguarding Customer Information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Standard CIP 007 3a Cyber Security Systems Security Management

Implementing Sarbanes-Oxley Audit Requirements WHITE PAPER

Network Incident Report

SECURELINK.COM COMPLIANCE AND INDUSTRY REGULATIONS

Standard CIP Cyber Security Systems Security Management

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Data Security Incident Response Plan. [Insert Organization Name]

Auditor s Checklist. A XYPRO Solution Paper. MAY, 2009 XYPRO Technology Corporation

SRA International Managed Information Systems Internal Audit Report

University of Wisconsin-Madison Policy and Procedure

LogRhythm and PCI Compliance

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Information Security: A Perspective for Higher Education

Patch and Vulnerability Management Program

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Network Security Policy

HIPAA Security Alert

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Data Processing Agreement for Oracle Cloud Services

Using QUalysgUard to Meet sox CoMplianCe & it Control objectives

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

User Guide Online Backup

Regulations on Information Systems Security. I. General Provisions

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

Self-Service SOX Auditing With S3 Control

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Contracts Management Software as a Tool for SOX Compliance

INFORMATION TECHNOLOGY SECURITY STANDARDS

General IT Controls Audit Program

Department of Information Technology Remote Access Audit Final Report. January promoting efficient & effective local government

VMware vcloud Air HIPAA Matrix

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA Security COMPLIANCE Checklist For Employers

Procedure Title: TennDent HIPAA Security Awareness and Training

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9

Standard: Information Security Incident Management

How IT Can Aid Sarbanes Oxley Compliance

Feature. Log Management: A Pragmatic Approach to PCI DSS

Incident Reporting Guidelines for Constituents (Public)

Transcription:

W H I T E P A P E R The Challenges and Myths of Sarbanes-Oxley Compliance Meeting the requirements of regulatory legislation on the iseries. SOX-001 REV1b FEBRUARY 2005 Bytware, Inc. All Rights Reserved.

2 The Challenges and Myths of Sarbanes-Oxley Compliance Enron. WorldCom. Tyco. These are all names that immediately bring to mind corruption, and following the accounting scandals that ushered in this decade the Government and Congress set out to do something about the problem. The solution was the passing in 2002 of the Public Company Accounting Reform and Investor Act better known as Sarbanes-Oxley (SOX). The goal of the Act is to hold publicly traded companies accountable for corporate financial reporting and governance. With deadlines to begin certification of the adequacy of internal accounting controls starting as early as November 15, 2004, companies are scrambling to comply with a rather lengthy and vague set of regulations. Meanwhile, software vendors are rushing to the table with promises of simple compliance through technology. The Myth of One-Click Compliance There s a lot being thrown around about how specific software applications can make a company SOX-compliant. In reality, the majority of the Act deals with procedural and cultural practices that ensure the integrity, accuracy, and security of corporate records. Most of the buzz centers on Section 404: Management Assessment of Internal Controls. It is this section that large publicly traded companies ($75 million+ cap) must comply with before the November 15 deadline (extended from the original June 15 deadline). Smaller companies those with a cap below $75 million have until June 15, 2005 to comply. equipped with tools for securing, monitoring, and logging built right into the operating system. (The exception is virus protection, though enablement for this has been built into the new i5/os V5R3, allowing easy tie-in to the third-party anti-virus tool.) While third-party software packages can build upon OS/400 s standard toolkit, and can certainly enhance an operator s capabilities, none of these packages are critical for compliance with SOX. Vendors who claim otherwise are not being straightforward with customers. Built-in Security The iseries provides excellent object level security features to control access to resources who can read a particular file, for example. These security features are built into every iseries system, whether you use them or not. Contrary to some vendor claims, the iseries can provide field-level security as well. You may need tools to supplement the iseries security, such as restricting access during certain time periods, or allowing users to read a particular file but not to download it. Take the time to learn what you have, and how it can be used for your organization before investing in tools that provide little value to what is already available to you. Built-in Logging Also provided with the iseries are excellent logging facilities to track the activity occurring on the system the System History Log, Message Queues, and Journals, just to The overall spirit of the Act is one of increased security and integrity, placing the interests of stockholders ahead of executives. Despite the fact that much of the Act is vague, promises of one-click compliance abound. The fact of the matter is that the needs of each organization are different and there is no one solution to ensure compliance. Regardless of the claims of some vendors, software solutions are merely tools to assist with the implementation of sound internal procedures arrived at through planning, scoping, documenting, and analyzing. Software solutions cannot provide take-two-and-call-mein-the-morning cures for inadequate processes and a lax corporate atmosphere. Already have the Basic Tools? For companies who rely on the iseries for operations, it may come as a surprise that most of what is needed to comply technologically is already sitting in their computer rooms. IBM s OS/400 comes Executives and managers who fail to ensure that adequate measures are in place to meet the requirements of SOX could be held legally responsible.

The Challenges and Myths of Sarbanes-Oxley Compliance 3 name a few. Many activities are automatically logged, such as when particular users sign on and off, and you can enable additional logging for many other types of activities as well. These logs provide a detailed accountability to what is occurring on the iseries. These logs can be monitored proactively to identify potential problems, or post-mortem to trace a particular problem. Five Steps to Compliance An article entitled Sarbanes-Oxley: Road to Compliance that ran on the eweek website (www.eweek.com) on February 16, 2004, breaks down compliance with SOX into five steps: 1. Planning Form a compliance committee and select software to assist in compliance process. 2. Scoping Determine what information needs to be documented and is material to company. 3. Documentation Document business processes and controls in place to ensure accurate information. 4. Gap Analysis Identify and remediate inadequate controls. 5. Implementation, Evaluation, & Monitoring Controls Document and update controls as needed, then turn them over to the audit team which evaluates the depth and effectiveness of the controls. Develop ongoing process for monitoring controls. Built-in Monitoring Lastly, in the area of monitoring, the iseries provides good tools for keeping tabs on the health and status of your system including security related events. iseries Navigator can monitor messages and logs for specific events and notify an administrator when a particular condition occurs. Depending on your needs, you may want to supplement the iseries monitoring tools to provide additional features, such as problem escalation, or scheduling of specific types of alerts to different groups of people. Following the five steps can create an atmosphere that is suited to SOX compliance. Pulling in the technology that is built into your iseries can build the foundation and then third-party applications can take that infrastructure to the next level. How Can Bytware Solutions Help? First of all, it is important again to understand that software solutions are tools, not cures. Bytware offers several applications that can assist in compliance with SOX once a company has put a framework into place. Independent auditing firms have been relying upon a set of guidelines from 1992 called The Control Objectives for Information and Related Technology, better known simply as COBIT. On the following pages is a list of specific objectives and the Bytware product(s) that can assist.

4 The Challenges and Myths of Sarbanes-Oxley Compliance COBIT Objectives for SOX Compliance Many of these objectives have been paraphrased. The complete COBIT objectives are available for free online from the IT Governance Institute at: www.usmd.edu/leadership/usmoffice/ AdminFinance/IAO/is/cobit-control-guidelines.pdf. PO9: PLANNING AND ORGANIZATION Assess Risk PO9.2: Risk Assessment Approach This objective calls upon Management to establish a general risk assessment approach, defining boundaries and methodologies with regard to security risk and vulnerabilities. It directs Management and security specialists to identify vulnerabilities and IT specialists to identify tools with which to control the vulnerabilities. StandGuard can help. You can use StandGuard s ability to identify and log access to sensitive files and libraries through unusual means or during unusual times. Once you have identified these sources, you can create rules and filters to allow or reject these types of activity. AI3: ACQUISITION AND IMPLEMENTATION Acquire and Maintain Technology Infrastructure AI3.7: Use and Monitoring of System Utilities This objective calls for policies and techniques to be implemented for using, monitoring, and evaluating the use of system utilities. Responsibilities for using sensitive software utilities should be clearly defined and understood by developers, and the use of the utilities should be monitored and logged. Messenger and StandGuard can help. You can use either MessengerConsole or MessengerPlus to monitor the OS/400 and iseries security audit journals for usage of software utilities and commands and log these events to a message queue or e-mail log. You can use StandGuard to monitor and log the use of certain OS/400 and iseries commands and values, such as PWRDWN- SYS RESTART(*NO), for example. DS5: DELIVERY AND SUPPORT Ensure Systems Security DS5.1: Manage Security Measures This objective states that IT security should be managed such that security measures are in line with business requirements including: Implementing the IT security plan. Monitoring the implementation of the IT security plan. StandGuard and Messenger can help. You can use StandGuard to define rules that log and control access to company data through network services such as FTP and ODBC. You can use Messenger to monitor StandGuard s rules and notify IT personnel of exceptions. Messenger s Audit Journal Monitor can look for possible intrusions and notify IT personnel. DS5.2: Identification, Authentication, and Access This objective specifies that the logical access to and use of IT computing resources should be restricted by the implementation of adequate identification, authentication, and authorization mechanisms, linking users and resources with access rules. Such mechanisms should prevent unauthorized personnel, dialup connections, and other system (network) entry ports from accessing computer resources and minimize the need for authorized users to use multiple logins. Procedures should also be in place to keep authentication and access mechanisms effective (e.g. regular password changes.) StandGuard can help. You can use StandGuard to create access rules and filters to log and prevent access to company data through unauthorized entry points. For example, do not allow Telnet access if IP address is outside defined range or time period. DS5.3: Security of Online Access to Data This objective states that, in an online IT environment, IT management should implement procedures in line with the security policy that provides access security control based on the individual s demonstrated need to view, add, change, and delete data. StandGuard can help. You can use StandGuard to define rules and filters to log and control access to company data via network services such as FTP and ODBC, and further define the types of allowed access Add, Change, or Delete, for example. DS5.5: Management Review of User Accounts This objective specifies that Management should have a control process in place to review and confirm access rights periodically. Periodic comparison of resources with recorded accountability should be made to help reduce risk of errors, fraud, misuse, or unauthorized alteration. StandGuard s User List can help. You can use StandGuard s rules and filters reports to show the resources users can access through network services. StandGuard s usage information can show the usage frequency of these filters to determine policy effectiveness. Review the public usage information to verify that you are within compliance standards. DS5.7: Security Surveillance This objective states that IT security administration should ensure that security activity is logged and any indication of imminent security violation is reported immediately to all who may be concerned, internally and externally, and is acted upon in a timely manner. StandGuard and Messenger can help. You can use StandGuard to log access to critical system files via network services, and Messenger can be used to alert personnel

The Challenges and Myths of Sarbanes-Oxley Compliance 5 to StandGuard s warnings about unauthorized or unexpected access. DS5.10: Violation and Security Activity Reports This objective states that IT security administration should ensure that violation and security activity is logged, reported, reviewed, and appropriately escalated on a regular basis to identify and resolve incidents involving unauthorized activity. The logical access to the computer resources accountability information (security and other logs) should be granted based upon the principle of least privilege, or need-to-know. StandGuard and MessengerConsole can help. You can use StandGuard to log security violations through network services, and extract data from the system security audit journal. Messenger can in turn monitor these events and notify and escalate security violations to the appropriate personnel. DS5.17: Protection of Security Functions This objective directs that all security related hardware and software should at all times be protected against tampering to maintain their integrity and against disclosure of secret keys. In addition, organizations should keep a low profile about their security design, but should not base their security on the design being secret. StandGuard and StandGuard Anti-Virus can help. You can use StandGuard to secure files from being inappropriately updated or deleted via network services. Additionally, StandGuard Anti-Virus can detect, prevent, and remove viruses and malicious code. DS5.19: Malicious Software Prevention, Detection, and Correction This objective states that, regarding malicious software, such as computer viruses or Trojan horses, management should establish a framework of adequate preventative, detective, and corrective control measures, and occurrence response and reporting. Business and IT management should ensure that procedures are established across the organization to protect information systems and technology from computer viruses. Procedures should incorporate virus protection, detection, occurrence response, and reporting. StandGuard and StandGuard Anti-Virus can help. You can use StandGuard to secure files from being inappropriately updated or deleted via network services. Additionally, StandGuard Anti-Virus can detect, prevent, and remove viruses and malicious code. DS9: DELIVERY AND SUPPORT Manage the Configuration DS9.5: Unauthorized Software This objective specifies that clear policies restricting the user of personal and unlicensed software should be developed and enforced. The organization should use virus detection and remedy software. Business and IT management should periodically check the organization s personal computers for unauthorized software. Compliance with the requirements of software and hardware license agreements should be review on a periodic basis. StandGuard Anti-Virus can help. You can use StandGuard Anti-Virus to detect, prevent, and remove viruses and malicious code. DS10: DELIVERY AND SUPPORT Manage Problems and Incidents DS10.1: Problem Management System This objective calls upon IT management to define and implement a problem management system to ensure that all operational events which are not part of the standard operation (incidents, problems, and errors) are recorded, analyzed and resolved in a timely manner. Emergency program change procedures should be promptly tested, documented, approved, and reported. Incident reports should be established in the case of significant problems. MessengerConsole and MessengerPlus can help. You can use Messenger to monitor for errors and abnormal conditions and alert operations staff automatically. DS10.2: Problem Escalation This objective states that IT management should define and implement a problem escalation to ensure that identified problems are solved in the most efficient way on a timely basis. These procedures should ensure that these priorities are appropriately set. The procedures should also document the escalation process for the activation of the IT continuity plan. MessengerConsole and MessengerPlus can help. You can use Messenger to escalate event notification to backup personnel or management when critical events have exceeded their defined time limit tolerances. DS10.3: Problem Tracking and Audit Trail This objective calls for a problem management system that provides for adequate audit trail facilities that allow tracing from incident to underlying cause (e.g. package release or urgent change implementation) and back. It should work closely with change management, availability management, and configuration management. MessengerConsole and MessengerPlus can help. You can use Messenger s ability to track event history, including time of creation, replies, commands, notifications, escalations, and acknowledgments.

9440 Double R Blvd., Suite B, Reno, NV 89521-5990 775.851.2900 facsimile 775.851.2995 sales: 800.932.5557 2005 Bytware, Inc. All rights reserved.