Summary of Information Technology General Control Environment Findings for the year ended 30 June 2015



Similar documents
FINAL. Internal Audit Report. Data Centre Operations and Security

San Francisco Chapter. Information Systems Operations

Rotherham CCG Network Security Policy V2.0

INFORMATION GOVERNANCE POLICY: DATA BACKUP, RESTORE & FILE STORAGE HANDLING

Policy Document. Communications and Operation Management Policy

JOB DESCRIPTION CONTRACTUAL POSITION

Supplier Security Assessment Questionnaire

Call: Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Information Technology General Controls And Best Practices

SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT IT Backup, Recovery and Disaster Recovery Planning

IT REVIEW OF THE DISASTER RECOVERY ARRANGEMENTS

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

Service Children s Education

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

Information security controls. Briefing for clients on Experian information security controls

General IT Controls Audit Program

INFORMATION TECHNOLOGY SECURITY STANDARDS

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

IT Assurance - Business Continuity and Disaster Recovery

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

How To Protect Decd Information From Harm

POLICY. 1) Business Continuity Management 2) Disaster Recovery 3) Critical Incident Management 4) Risk Management

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

Support & Field Services

Master Document Audit Program

Balancing and Settlement Code BSC PROCEDURE BSCP537. QUALIFICATION PROCESS FOR SVA PARTIES, SVA PARTY AGENTS AND CVA MOAs

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

How To Audit Health And Care Professions Council Security Arrangements

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

15 Organisation/ICT/02/01/15 Back- up

Information System Audit Guide

COMMERCIALISM INTEGRITY STEWARDSHIP. Back-up Policy & Guidance

Operational Risk Publication Date: May Operational Risk... 3

SUBJECT: REPLACEMENT OF CORPORATE ELECTRONIC DATA STORAGE, BACKUP AND DISASTER RECOVERY SOLUTIONS

Senior Manager Information Technology (India) Duration of job

Dacorum Borough Council Final Internal Audit Report. IT Business Continuity and Disaster Recovery

FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference

Service Definition Document

Information Shield Solution Matrix for CIP Security Standards

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Information Security Policies. Version 6.1

University of Sunderland Business Assurance Information Security Policy

2.1 To define the backup strategy for systems and data within the Cape Winelands District Municipality (CWDM).

Protecting Official Records as Evidence in the Cloud Environment. Anne Thurston

HIPAA Security Matrix

Version: Page 1 of 5

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

ICT Strategy

Computer Visions Course Outline

ULH-IM&T-ISP06. Information Governance Board

Lauren Hamill, Information Governance Officer. Version Release Author/Reviewer Date Changes (Please identify page no.) 1.0 L.

Oadby and Wigston Borough Council. Information and Communications Technology (I.C.T.) Section

U06 IT Infrastructure Policy

RS Official Gazette, No 23/2013 and 113/2013

Auditing in an Automated Environment: Appendix C: Computer Operations

Mike Casey Director of IT

Job Description. Job Title: Department: ICT Service Support Manager Responsible to:

1 What does the 'Service V model' represent? a) A strategy for the successful completion of all service management projects

July 12, 2013 Page 1 of 5 BellHawk Systems Corporation

Cloud Computing and Records Management

Gatekeeper PKI Framework. February Registration Authority Operations Manual Review Criteria

BSBCCO501B Develop business continuity strategy

Practical Guidance for Auditing IT General Controls. September 2, 2009

Network Security Policy

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

How To Ensure Network Security

N e t w o r k E n g i n e e r Position Description

Decision on adequate information system management. (Official Gazette 37/2010)

Hong Kong Baptist University

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Audit of Policy on Internal Control Information Technology General Controls (ITGCs) Audit

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Service Specification. ICT Support 2014/2015

<cloud> Secure Hosting Services

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Security from a customer s perspective. Halogen s approach to security

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction Policy Statement Purpose...

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

Transcription:

Summary of Inmation Technology General Control Environment Findings the year ended 30 June 2015 1 Change management Complete Revisiting the Change Management control process documentation and updating it with current Council practices. Encing the use of the Change Management Policy to ensure that all changes are appropriately authorised, tested, approved, monitored and evidence documented. Optimising use of existing change management tools to ensure that all changes are adequately captured. Using a version management tool to ensure that Council controls and monitors all changes in the production Reviewing of system generated list of changes within the existing Change Advisory Board process. recommendation and notes the significance of the implications outlined. Council is actively working on the practical implementation of sound change management processes across the organisation with the objective of mitigating the risks identified. Implement standard process utilising a specific Change Management tool (ManageEngine Service Desk) and rollout to key users. Regular Change Control Meetings, to be reported back to the Group Manager, Corporate Services. Specific change management tool implemented and rolled out to users. Regular change control meetings taking place.

2 User access management process Dec 2015 Document a user access management process which includes the access request, modification, removal, and review procedures. Ensure appropriate notification is provided from HR terminated employees to ensure that access to systems is removed. Formalise a user access review process so that it is managed through a centralised location to ensure all reviews are completed. Implement regular review of user accounts to ensure that access is only granted to users with a need to access a system. Ensure that individuals that monitor and review these accounts are not administrators within these systems. recommendations. Council is currently engaged in a review of the user management processes in place with the objective of developing and implementing suitable processes to ensure optimal management of the IT infrastructure system. User Register to be maintained with a process the addition and removal of users based on employee and contractor recruitment and termination. User Review team (responsible the audit and review of User access) to be created, with representatives from all key business units within the organisation. User register implemented. A policy user access management will be considered by SLT in December.

3 Segregation of duties Dec 2015 (On Track) Ensure different individuals / system resources perm access requests, access approval, access provisioning, monitoring access violations both IT privileged and Business end users. Ensure different individuals perm privileged user access reviews, monitoring of privileged accounts and monitoring system generated list of changes in production Different individuals / system resources perm change requests, change approval, move programmes in and out of production and monitor changes and restrict developer access to the production Apply a version management tool to ensure that Council controls and monitors all changes in production recommendation. The process identifying and authorising duties is currently being reviewed as part of the overall ITGC systems review and appropriate implementation will be actioned as a priority. Process addition and removal of user duties to be identified and implemented. Audit and review of administration access to be undertaken with role segregation to be created via access specific logins (i.e. removal of generic admin users). Process and Policies addition and removal of user duties are being documented as part of the development of Council s ICT strategy. Monitoring of administration access is underway. The ICT team has completed initial project scoping to achieve role segregation via specific access logins.

4 General system security settings (Moderate) March 2016 The New Zealand Inmation Security Manual (NZISM), updated in November 2014 to be considered as a baseline IT security practices. These policies should be reviewed and approved at least annually to make any necessary adjustments as a result of IT environment changes. recommendations and plans are underway to engage an external consultant to conduct a wide ranging audit including a general IT architecture review. The recommendations arising from these audits will provide detailed inmation on both ICT Strategy and general IT security and will m the basis of the implementation improvements as a priority item. Process and policies based on the NZISM will be regularly reviewed. Processes and policies are being documented in conjunction with the Council s ICT strategy.

Council s Response Action Plan Progress to date 5 Back-up operations (Low) Sept 2016 Review current backup operations and approving back-up retention periods as part of the backup policy that is being developed. Business and system owners, in consultation with IT, should authorise and define the retention periods to ensure that these are practical and appropriate. Retain backup logs all applications and recording corrective actions using the centralised incident management procedures. Implementing activities designed to perm regular testing of DLT tapes stored offsite at EOC, ensuring that critical data can be restored as and when it is required. Perm Disaster Recovery testing offsite. Council agrees with the observation. Current back up operations are in place, however these processes are being reviewed along with the wide ranging audit and general IT architecture review. Review existing back-up hardware and software to ensure adequacy and implement changes when required. Detailed back-up processes and procedures to be reviewed regularly. Replacement Back-up tool in place with processes and policies to be documented.