Information Technology General Controls And Best Practices



Similar documents
Network and Security Controls

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Retention & Destruction

Client Security Risk Assessment Questionnaire

Four Top Emagined Security Services

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

Circular to All Licensed Corporations on Information Technology Management

Cybersecurity Health Check At A Glance

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

SUMMARY OF AUDIT FINDINGS

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

IT Security Standard: Computing Devices

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

University of Pittsburgh Security Assessment Questionnaire (v1.5)

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Securing the Service Desk in the Cloud

INCIDENT RESPONSE CHECKLIST

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

CHIS, Inc. Privacy General Guidelines

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Attachment A. Identification of Risks/Cybersecurity Governance

How To Protect Your Data From Being Stolen

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

State of South Carolina Policy Guidance and Training

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Summary of Information Technology General Control Environment Findings for the year ended 30 June 2015

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Supplier Information Security Addendum for GE Restricted Data

BMC s Security Strategy for ITSM in the SaaS Environment

F G F O A A N N U A L C O N F E R E N C E

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

HIPAA Security & Compliance

Security from a customer s perspective. Halogen s approach to security

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

MUSC Information Security Policy Compliance Checklist for System Owners Instructions

HIPAA Compliance Evaluation Report

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Tailored Technologies LLC

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Internal Controls over Financial Reporting. Integrating in Business Processes & Key Lessons learned

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Critical Controls for Cyber Security.

Top Ten Technology Risks Facing Colleges and Universities

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

Corporate Account Takeover (CATO) Risk Assessment

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

INFORMATION TECHNOLOGY CONTROLS

BSM for IT Governance, Risk and Compliance: NERC CIP

KEY STEPS FOLLOWING A DATA BREACH

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Click to edit Master title style

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

PCI DSS Requirements - Security Controls and Processes

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Cyber Self Assessment

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Data Processing Agreement for Oracle Cloud Services

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

Altius IT Policy Collection Compliance and Standards Matrix

AUDIT REPORT WEB PORTAL SECURITY REVIEW FEBRUARY R. D. MacLEAN CITY AUDITOR

INFORMATION TECHNOLOGY OFFICER S QUESTIONNAIRE. Instructions for Completing the Information Technology Examination Officer s Questionnaire

Security Standard: Servers, Server-based Applications and Databases

Internet Banking Internal Control Questionnaire

Information Security Services

SANS Top 20 Critical Controls for Effective Cyber Defense

Transcription:

Paul M. Perry, FHFMA, CITP, CPA Alabama CyberNow Conference April 5, 2016 Information Technology General Controls And Best Practices 1. IT General Controls - Why? 2. IT General Control Objectives 3. Documentation Practices 4. IT General Controls 5. Top 10 Common Deficiencies

Presenter Paul Perry, FHFMA, CITP, CPA Paul Perry has been with Warren Averett since 2004 and is a Senior Manager in the Security and Risk Consulting Division of Warren Averett Technology Group focusing on internal control and information technology related projects. Paul is also a member of the Firm s Data Analysis Group, a team of individuals within the Firm who provide data analysis solutions to both internal and external clients. For a number of years, he has specialized in accounting advisory and review assurance services, as well as external and employee benefit plan audits. Paul has extensive experience serving clients in the nonprofit, governmental, financial, insurance and healthcare facilities/hospital industries.

Warren Averett Firm Facts

IT General Controls Why? Key Risk Areas Financial Operations Information Systems Sample Risk Assessment Types Financial Risk Assessment Compliance Risk Assessment Fraud Risk Assessment Cyber Risk Assessment Customer and Credit Risk Assessment Supply Chain Risk Assessment Product Risk Assessment Strategic Risk Assessment

COSO Model of Controls

IT General Control Objectives 1. STRUCTURE AND STRATEGY Evaluate if reasonable controls over the Company s Information Technology structure are in place to determine if the IT Department is organized to properly meet the Company s business objectives. 2. CHANGE MANAGEMENT Evaluate if reasonable controls are in place over change management relative to the operating systems and network environment to determine if standard maintenance changes (e.g. patches, fixes, upgrades, etc.) are identified, approved, and tested prior to installation. 3. VENDOR MANAGEMENT Evaluate if reasonable controls are in place over third party services to determine if third party services are secure, accurate and available, support processing integrity, and are defined in performance contracts.

IT General Control Objectives (Continued) 4. SYSTEM & APPLICATION SECURITY Evaluate if reasonable controls are in place over system security, both logical and physical, to determine if software applications and the general network environment are reasonably secured to prevent unauthorized access and appropriate environmental controls are in place. 5. INCIDENT MANAGEMENT Evaluate if reasonable controls are in place over incident management to record, investigate, and resolve any user or system incidents and management monitoring of system incidents exists. 6. DATA MANAGEMENT Evaluate if reasonable controls are in place over the data management and storage process (backups and disaster recovery) ad are being tested on a regular basis.

DOCUMENTATION Who performs what? In what order are the controls performed? How often are they performed? Titles and not specific personnel. Personnel change. Key and Non-Key Controls Need a good mix of both Non-key process controls (how something is done and documented) Key review controls (who reviews what others have done or major controls without this, something cannot be done) Can be manual or automated If it is not documented, you did not do it

Preventive Detective Corrective Preventive prevent problems from occurring (Proactive) Segregation of Duties Monitoring Adequate Documentation Physical safeguards Detective identify problems after occurrence (Reactive) Data Analytics Reviews Monitoring Corrective prevent recurrence of problems Revisit the risk assessment process Change controls as needed to eliminate error in future.

1 - STRUCTURE & STRATEGY Overall IT governance IT Strategy IT Steering Committee Are others involved outside IT (HR, C-Suite, etc.) Business Processes and Owners of Key Systems Structure of IT department Separate Security Department (sole focus on overall security)

2 - PROGRAM CHANGE MANAGEMENT Change management policies and procedures Segregation of duties Separate test environment Testing over change process Authorization Testing Documentation Change management over operating systems and the network Review on periodic basis to baseline Database change management

3 - VENDOR MANAGEMENT Vendor management policies Vendor listing and risk assessment Vendor Questionnaire Reviewing SSAE 16 (Service Organization Control) reports for vendors with access to clients network or holding clients data.

4 - SYSTEM & APPLICATION SECURITY IT risk assessment Organization-wide or IT Specific Security policy and IT policies and procedures Acceptable Use Policy Network and financial application administrators Shared accounts limited Network and financial application password parameters UC/lc and Alphanumeric > 8 Characters Changed every 90 days Remember last 5 logins Failed attempt lockout (3 attempts) monitoring/logging Inactivity logout (15 mins)

4 - SYSTEM & APPLICATION SECURITY - CONTINUED New hire and termination process Requests and approvals for access to different systems Acknowledge IT Acceptable Use Policy Notifications of terminations Termination checklist Local administrator access Logical access review Periodic (quarterly or annually) Who is reviewing IT or department managers Unsupported versions of operating systems and software Firewall policies and administrators Reviewed periodically Updated with current technology

4 - SYSTEM & APPLICATION SECURITY - CONTINUED Intrusion Prevention and Detection Systems Detect, log and analyze Identify incidents or potential incidents Prioritize based on impact Track and status of incidents How often are reports reviewed consistently or weekly? Content and Spam Filtering Systems External penetration test and internal vulnerability scans Periodic (quarterly or annually) All IP addresses should be scanned Anti-virus monitoring and logging Remediation if items slip through

4 - SYSTEM & APPLICATION SECURITY - CONTINUED VPN administrators Shared Accounts? VPN Dual Factor Authentication Password and company owned device or mobile phone Policies and access controls over portable devices Acknowledged by employees? Encryption on portable devices Ability to wipe remotely? Annual IT Security Training for all employees Document who attended and what was communicated Physical access and environmental controls over the Computer Facility/Data Center Does entire organization have access or just IT department

5 - INCIDENT MANAGEMENT System monitoring policies and procedures System monitoring alerts Help Desk policies and procedures Help Desk monitoring reports

6 - DATA MANAGEMENT Data distribution policies Secure File Sharing Back-up policies and procedures Include record retention policies for different types Daily 14 days, Monthly 6 months, Annual 7 years Back-up monitoring logs Restoration of back-up files Tested on regular basis Physical security over back-up tapes Transport log maintained Encryption of data backups Disaster recovery plan Disaster recovery testing all systems vs critical applications

Top 10 Common Deficiencies 1. Terminated employees still active in systems and the network 2. Lack of segregation of duties over the development and production environment 3. Lack of critical application list no knowledge of vulnerabilities 4. Lack of vendor management program and no vendor risk assessments 5. Lack of external penetration testing and internal vulnerability scanning cost or understanding 6. Shared and/or generic administrator accounts without monitoring 7. Weak system password parameters 8. Outdated disaster recovery plan and no testing completed (financial applications and full IT network) 9. Lack of data backup testing 10. Lack of portable device policy and security

IT General Controls and Best Practices QUESTIONS? Paul M. Perry, FHFMA, CITP, CPA paul.perry@warrenaverett.com (205) 769-3251

CPAs AND ADVISORS LET S THRIVE TOGETHER