Network and Security Controls



Similar documents
Client Security Risk Assessment Questionnaire

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Information Technology General Controls And Best Practices

HIPAA Compliance Evaluation Report

1B1 SECURITY RESPONSIBILITY

Network Security Guidelines. e-governance

How To Protect Your School From A Breach Of Security

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

GE Measurement & Control. Cyber Security for NEI 08-09

Retention & Destruction

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

IT Networking and Security

Altius IT Policy Collection Compliance and Standards Matrix

Supplier Security Assessment Questionnaire

March

Research Information Security Guideline

Guide to Vulnerability Management for Small Companies

Small Business IT Risk Assessment

Payment Card Industry Self-Assessment Questionnaire

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

University of Pittsburgh Security Assessment Questionnaire (v1.5)

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Information Technology Branch Access Control Technical Standard

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Corporate Account Takeover (CATO) Risk Assessment

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Network & Information Security Policy

HIPAA Privacy and Security Risk Assessment and Action Planning

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Developing Network Security Strategies

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Security Management. Keeping the IT Security Administrator Busy

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

External Supplier Control Requirements

Central Agency for Information Technology

Chapter 84. Information Security Rules for Street Hail Livery Technology System Providers. Table of Contents

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

INCIDENT RESPONSE CHECKLIST

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

University System of Maryland University of Maryland, College Park Division of Information Technology

Critical Controls for Cyber Security.

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Hang Seng HSBCnet Security. May 2016

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

HIPAA RISK ASSESSMENT

State of Oregon. State of Oregon 1

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Connecticut Justice Information System Security Compliance Assessment Form

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

SonicWALL PCI 1.1 Implementation Guide

Security Standard: Servers, Server-based Applications and Databases

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

Network Access Security. Lesson 10

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Security Controls for the Autodesk 360 Managed Services

Policy Document. Communications and Operation Management Policy

F G F O A A N N U A L C O N F E R E N C E

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Network/Cyber Security

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

PCI DSS Requirements - Security Controls and Processes

Guideline on Auditing and Log Management

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Best Practices For Department Server and Enterprise System Checklist

CompTIA Security+ (Exam SY0-410)

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Industrial Security for Process Automation

Estate Agents Authority

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

HIPAA Security COMPLIANCE Checklist For Employers

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Ovation Security Center Data Sheet

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Transcription:

Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting Access Part III Network Controls Part IV Disaster Recovery Planning 1

IT Control Issues Covered in this Webinar Firewalls Security Software and Appliances Administrative Privilege Restrictions Software Controls VPN and Remote Access Encryption File Share Controls Login Banners Vulnerability Management Patch Management Configuration Management Logging and Monitoring Web Content Monitoring Wireless Access Points End-of-Life Systems Hardware Disposal Email Security Vendor / Cloud Services Incident Response Bring Your Own Device (BYOD) What are IT Controls? Well-defined measures taken to minimize risk and ensure business objectives are being met. Theft or Fraud Unauthorized Access Loss of Data and Hardware 2

Resources (Appendices) IT Standards and Best Practices No One Size Fits All Solution Advanced Presentation on our Web site Appendix of resources by slide 3

GM64 US Department of Education privacy resources PTAC Mission Improve privacy, security, confidentiality of student data systems Provide tools, resources, opportunities States to share best practices Focus points for queries and responses to privacy needs Resources to promote compliance with FERPA and other best practices Layered Security 4

Firewalls Security Software and Appliances Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS) Antivirus / Anti-malware Email Spam Filters 5

Administrative Privilege Restrictions Restrict Admin Privileges for System Administrators Separate accounts Standard User Account -- Everyday Duties Administrative Account - Only used for specific administrative tasks Tied to specific user Ex: phanus (Standard) and phanus-admin (Admin) Monitor activity Software Controls Managing Software Monitoring Application whitelisting 6

Remote Access Virtual Private Networks (VPN) Remote System Control Remote Desktop (RDP) Secure Shell ( SSH) VPN Use of personal devices Same security configurations and applications present Security Single or Dual Authentication Password Token (Soft or Hard) Network Access Control Check system security prior to approving final connections 7

Remote System Control Other methods of remote access provided through: Terminal Services / Remote Desktop Protocol (RDP) Virtual Network Computing (VNC) Secure Shell ( SSH) Deprecated Protocols Telnet Remote Shell ( rsh) Remote Process Execution ( rexec) Encryption Protects the confidentiality of data Levels of encryption File-level Block-level encryption Device/Hardware-levels Key items Backups Workstations Flash Drives Mobile Devices 8

File Share Controls File sharing results in: Large data stores Key risk area for controlling access Controls are needed to: Strictly manage need based access Secure sensitive or confidential data Monitor for unauthorized access Login Banners Help with legal issues in case of breaches or unauthorized use Display regardless of connection type attempted: Interactive Logon (Windows Desktop) Remote Desktop Protocol 9

***WARNING!****Restricted Access****WARNING!*** **************** Restricted Access**************** *********State of Arizona Information System******** **************** Restricted Access**************** =============================================== WARNING! THIS SYSTEM IS FOR AUTHORIZED USE ONLY! =============================================== By continuing to use this system, you represent that you are an authorized user. =============================================== ********************NOTICE********************* =============================================== All System activity is logged. This system contains State of Arizona information that is strictly confidential and is to be protected against unauthorized inspection, unauthorized disclosure and unauthorized use. Vulnerability Management Assess the security risks in: Software Hardware Internally-hosted websites Identify Vulnerability Assess Risk Plan to Mitigate Determine & document: Known vulnerabilities Possible risks Action plan to mitigate Repeat the process! 10

PH38 Patch Management Keep software / hardware updated IT asset list with versions Automated system scanning Strategies to update Configuration Management Define and control settings Central repository of latest configurations Tracking log Used for device/software recovery Common Configurations Stored Firewall Group Policy Objects Router Network Diagrams 11

Logging and Monitoring Logging activity Critical and sensitive systems Rules based Automatically created/stored Monitoring logs Regular log monitoring (Proactive) Reviewed when things go wrong (Reactive) Web Content Monitoring ARS 34-502 Other Entities Technology protection measures to prevent access to visual depictions that are: Obscene content Child Pornography Content Harmful to Minors Monitor Internet Activity for: Illegal activities Gambling Adult Material Malicious Content 12

Wireless Access Points Convenient but can increase security issues Properly secured and segmented WEP WPA WPA2 PSK Weak WPA2 Enterprise Strong Guests/non-work functions should not connect directly to the internal network End-Of-Life Systems Unsupported products = risk of failure & compromise Plan ahead Know: When its coming How to replace hardware/software What tests new products need Operations won t be adversely affected 13

Hardware Disposal Hardware may include: Printers/ Copiers Servers Switches Desktops Laptops Removable Media Secure Wipe: Cryptographic Erase Overwrite Degauss PH40 Email Security Why is Email security important? Sensitive content Different needs (internal vs. external) Securing Email - Train employees: Appropriate content Encryption In some cases, replace email with secure file transfer! 14

Vendor / Cloud Services Controls with a third-party services Contracts should specifically describe: Services to be provided Security Vendor s and District s responsibilities Audit reports on vendors Review for assurance of vendor controls Incident Response Designed to: Detect incidents rapidly Minimize damage Mitigate vulnerability / restoring services 15

CC37 EA57 CC39 EA60 Bring Your Own Device (BYOD) Separating Business vs. Personal data Limiting access Securing/removing data Requiring device controls Anti-Virus Encryption screen locks separate boot VPN software CC40 GM66 Advanced Class Topics Network Segregation Secure Baseline Configurations Server Hardening Active Directory Security Considerations Website Security Data Loss Prevention 16

Conclusion Layered, defense-in-depth strategy Many aspects to consider Understand your environment Next Webinar Disaster Recovery: Data Backup and Recovery Developing a comprehensive backup plan Developing a Disaster Recovery Plan Testing Backups Plan 17

Resources IT FAQs on www.azauditor.gov Appendix citing IT standards Contact Us: By phone: 602-553-0333 By email: asd@azauditor.gov 18