LeRoy Budnik, Knowledge Transfer



Similar documents
Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Domain 1 The Process of Auditing Information Systems

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives

Certified Information Systems Auditor (CISA)

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

FINAL May Guideline on Security Systems for Safeguarding Customer Information

ISO Controls and Objectives

Altius IT Policy Collection Compliance and Standards Matrix

University of Pittsburgh Security Assessment Questionnaire (v1.5)

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Information security controls. Briefing for clients on Experian information security controls

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Newcastle University Information Security Procedures Version 3

ISO27001 Controls and Objectives

(Instructor-led; 3 Days)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Teleran PCI Customer Case Study

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Main Reference : Hall, James A Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

Vendor Audit Questionnaire

Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

How To Manage Security On A Networked Computer System

Security Controls in Service Management

Client Security Risk Assessment Questionnaire

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS

An ITIL Perspective for Storage Resource Management

Security Controls What Works. Southside Virginia Community College: Security Awareness

Securing the Service Desk in the Cloud

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

SUMMARY OF AUDIT FINDINGS

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Ensuring Cloud Security Using Cloud Control Matrix

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Practical Guidance for Auditing IT General Controls. September 2, 2009

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Autodesk PLM 360 Security Whitepaper

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

plantemoran.com What School Personnel Administrators Need to know

INFORMATION TECHNOLOGY SECURITY STANDARDS

Managing Cloud Computing Risk

Risk Management of Outsourced Technology Services. November 28, 2000

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

ISMS Implementation Guide

Supplier Information Security Addendum for GE Restricted Data

Big Data, Big Risk, Big Rewards. Hussein Syed

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric

State of Oregon. State of Oregon 1

Projectplace: A Secure Project Collaboration Solution

Information Security Management Systems

SIEM Implementation Approach Discussion. April 2012

White Paper. Regulatory Compliance and Database Management

Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance

TABLE OF CONTENTS INTRODUCTION... 1

Network Segmentation

Information Security Program Management Standard

Internal Audit Report on. IT Security Access. January January - English - Information Technology - Security Access - FINAL.

Information Security Program CHARTER

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev Seite 1 von d Seite 1 von 11

March

Governance and Management of Information Security

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PCI Compliance for Cloud Applications

Music Recording Studio Security Program Security Assessment Version 1.1

Supplier Security Assessment Questionnaire

Central Agency for Information Technology

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

BITS FRAMEWORK FOR MANAGING TECHNOLOGY RISK FOR SERVICE PROVIDER RELATIONSHIPS

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Services Providers. Ivan Soto

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Transcription:

Preparing for a Storage Security Audit LeRoy Budnik, Knowledge Transfer

SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA and is subject to other copyrights 1. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee and the Storage Security Industry Forum. Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 1 2000-2006 Knowledge Transfer 2

Abstract Storage Security Audit The thought of being audited often evokes fear. Actions taken on stored information, storage infrastructure security and the practices of storage professionals are all subject to internal and external audit. Recently, the specialized nature of IS auditing has extended to include the storage infrastructure, however, auditors with specialized storage skills and knowledge are a limited resource. Auditors are required to be technically competent in the storage area while being aware of the many standards and legal requirements, in addition to security guidelines. That makes them a great asset to our work! As a result, a storage security auditor can provide great benefit to the storage professional and their organization. Storage professionals maintain information security policies within and around the storage infrastructure; some establish policies and practices, independently, or in concert with others. When we set a security or storage policy, we do so based on our understanding of the requirements, our personal experience and budget constraints. However, is our due diligence enough? This is where the auditor can provide external validation and recommendations (authentication, control, encryption, etc.) in midst of their role as professional skeptic and risk manager. Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 3

Objectives In this session, we present a client case scenario, review the Storage Security Audit Process and then follow the process in a micro case study. Our goal is to prepare you for a storage security audit. In addition, we believe that your perspective will change from implementing storage security to designing for secure storage. After completing this tutorial, you should be able to: Describe the Storage Security Audit Process Secure Information Assets in the Storage Systems Integrate security and governance practices into storage systems and storage infrastructure life cycle and management, including business continuity and disaster recovery Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 4

Storage Security Audit The Storage Security Audit is a systematic, professional examination and verification of security and information management controls as applied in the storage infrastructure. It is performed by an independent party or internal audit function. As a systematic test, the audit is performed against defined criteria, including, but not limited to ISO, ISACA 2, ITIL 3 and SNIA Storage Security Best Practices to determine adequacy and effectiveness of data security and data integrity procedures and whether activities and implementations conform to planned arrangements and whether these arrangements are implemented effectively to achieve the organizations security policy and objectives. Upon completion, the auditor renders an opinion as to the effectiveness, consistency and conformity, based on evidence, and recommends necessary changes to storage activities and infrastructure. 2 Information Systems Audit and Control Association 3 IT Infrastructure Library Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 5

Storage Security Audit Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 6

Why audit storage security? To analyze storage configuration and controls to: Identify security risks Determine compliance with organization policy Measure consistency with industry best practices To ensure configuration within IT security practices which: Decrease costs Improve efficiency Reduce unscheduled business interruption To protect internal controls and reporting procedures Sarbanes-Oxley, Section 404 European Union Data Protection Directive Australia Communications Security Instructions Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 7

Special Challenges Auditing Storage Security poses special challenges: To gather and evaluate evidence requires: Time and effort Special skills and knowledge about storage and objects stored Manual collection from multiple sources and diligence to ensure consistency of collected information Organization and storage systems structure respond to diverse requirements and models: For profit vs. non-profit Centralized vs. Decentralized Law, regulation, jurisdiction (Locale, International) Limited or repurposed tools Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 8

Introducing the Client Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 9

Insurance Company Actuarial Underwriting Commercial Personal Property and Casualty Customer Service A/R Agency Claims Commercial Audit Imaging Policy Assembly Legal Loss Control Marketing Corporate Accounting Commercial Services A/R Agency Services A/R Claims Services Payroll Taxes Portfolio (Investment) H/R Training Facilities Pension Office Services Email Shared Services (file, print, network) Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 10

Claims Processing Given an application workflow: Data Parameters Medical Billing Image File Size 7-18k Image Metadata 512 or less 5 TB of images = 3 years Total Usable = 6 TB Growth rate = 5%/mo. Backup = 22 hours SLA Parameters Avail = M-F 7:00-19:00 RTO = 72 hours to hot site Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 2000-2006 Knowledge Transfer 11

Storage Security Audit Process Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 12

Process Overview Initiate the Audit Process Charter Staffing Storage Audit Planning Select the type of Storage Audit Detailed scoping Set priorities by audit area Gather, test and review data by Subject area Audit area Communicate/Report Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 13

Initiate the Process Create an Audit Charter Define Scope (including the storage subject area) Set Objectives Assign Responsibility Delegate Authority to perform the audit Reporting Select auditors who have: Independence and adhere to professional ethics and standards Knowledge about general audit techniques and storage specific audit techniques, demonstrating competence in: Storing technologies and applications Business continuance and disaster recovery Legal and regulatory requirements Skill with highly specialized tools Scanners, Intrusion tests, Penetration tests Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 14

Storage Audit Planning 10% Business Environment Mission, Objectives, Purpose, and Processes Business/IT Requirements Availability, Integrity, Security, and Technology Contents to Review Policy, Standards, Guidelines and Procedures Organization Risk assessment Review internal controls Set audit scope Select Audit Templates Operational Storage Components By vendor By infrastructure component/type Specialized FFIEC (Federal Financial Institutions Examination) ISO 17799/27001 PCI (Payment Card Industry) SAS 70 (Statement of Auditing Standards) Service organization description and test of control objectives and activities (outsource) SAS 94 (Computer Assisted Auditing Techniques) SEC17 Forensic Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 10% reflects relative importance in audit process 15

Audit Type and Phases 2 Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 2 General Sources: ISACA and ITIL 16

Audit Areas The audit captures requirements, expected behavior and implementation as a series of perspectives. Governance (15%) What are the limits, laws and requirements? Infrastructure Lifecycle (16%) Is storage security embedded in the systems development process? Service Delivery and Support (14%) Is storage security part of the way people do their work? Information Asset Protection (31%) Does current storage design properly protect assets? BC/DR (14%) Is storage security built into BC/DR? Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. % reflects relative importance in audit process 17

Areas focusing on their storage security aspects Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 18

Governance 15% Governance is both internal and external. Directors or others charged with the creation of wealth for all stakeholders must behave ethically in accordance with corporate governance. IT governance encompasses all stakeholders and seeks alignment of IT and enterprise objectives. An audit seeks evidence of IT alignment and governance in the internal control systems that monitor risk. For the storage subject area: it seeks the evidence in policies, procedures, risk management and control. Strategic Alignment Information Security Policy Balance Control / Productivity Administration / Management Procedures include: Segregation of duties Storage security controls Risk Management Embedding Accountability Access control, rights Content Configuration Classification (sensitivity) Compensating Controls Audit trail Logging Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 15% reflects relative importance in audit process 19

Infrastructure Life Cycle 16% Infrastructure Life Cycle provides assurance that the management practices for development through disposal of systems and infrastructure will meet the organization s objectives. Within the portfolio, the storage class of components has become a stable, shared service with separate ownership and life cycle. The storage class has higher strategic importance than other classes. However, it has unique complexity and cost that is more visible. Poor storage security weakens the overall system. For the storage subject area: it seeks evidence that the storage components, policies and procedures will meet security requirements through their life cycle. Is security designed in? Are controls in place? Is level of protection sufficient? What are the test plans? Re-evaluation of exposures during operational life? At change points? Interesting areas CIA, authentication, non-repudiation Certificate/registration authorities Encryption, key management Email security Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 16% reflects relative importance in audit process 20

Service Delivery and Support 14% Service delivery and support provide assurance that the services will meet the organizations objectives. Practices enable services. People perform the practices, which include storage security tasks. If the tasks are performed, the storage should be secure. Secure storage ensures stability of the information assets. Stable assets enhance value. For the storage subject area: an audit seeks evidence that the storage professional(s) follows the security policies and procedures in the course of their daily work. Segregation of duties Passwords Access accounting, Logging No evidence that data was altered in an unauthorized manner Vulnerabilities identified and resolved in a timely manner Detection of intrusion Regular security assessments Encryption Key management Media management Trans-border data flow Minimize data loss due to theft or maintenance Secure storage testing Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 14% reflects relative importance in audit process 21

Information Asset Protection 31% Information Asset Protection provides assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets. Evaluation of the current infrastructure design against models of control adequacy provides assurance. The model includes controls, processes used to store, retrieve, transport and dispose of information. For the storage subject area, the audit seeks to ensure that proper policies, procedures, controls (e.g. authentication, encryption, logging) have been engineered into the infrastructure. Applicable Standards ISO17799/27001 CobiT 4.0 Legislation PCI DSS A few areas Implementation Data Classification, Value Access, Controls, Risk Penetration testing Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 31% reflects relative importance in audit process 22

BC/DR 14% Business Continuity and Disaster provides assurance that in the event of a business disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, minimizing the business impact. Using an ISO 27001/24762 approach, risk to availability is also a security risk. The process identifies risk scenarios, crisis levels and action plans. It also includes responses to non-storage threats that require storage services. For the storage subject area, the auditor will seek evidence that the storage infrastructure is able to provide an appropriate response to a variety of risk scenarios. Data protection (RAID) B/R (RTO/RPO) Depth of Retention Storage Maintenance Business Impact Analysis Security in Contractual agreements Channel extension Classification of systems Recovery strategies/alternatives Salvage Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 14% reflects relative importance in audit process 23

SSIF A word from our Sponsor Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 24

Storage Security Practices SSIF To help organizations address storage networking risks and compliance issues, the SNIA storage security activities (Security TWG and SSIG) have developed the Storage Security Best Current Practices found at: www.snia.org/ssif/documents 1. Secure storage management 2. Identify and assess all storage interfaces 3. Create risk domains 4. Monitor and control physical access 5. Avoid failures due to common mistakes 6. Address data security compliance 7. Protect externalized data 8. Understand the exposures 9. Implement appropriate service continuity 10. Utilize event logging Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 25

Summary Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 26

Conclusion The process of moving to an operational approach that accepts security audits as an inevitable part of daily storage management will enable actions that mirror continuous self assessment of current security levels. It will also provide justification for new and validation of existing storage management practices. Admittedly, in the absence of automated tools to address the needs of storage security auditors, at first, this will be difficult. However, it is yet another opportunity to improve storage security as we progress toward a model of secure storage. Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 27

Case Study Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 28

Claims Processing Given an application workflow: Data Parameters Medical Billing Image File Size 7-18k Image Metadata 512 or less 5 TB of images = 3 years Total Usable = 6 TB Growth rate = 5%/mo. Backup = 22 hours SLA Parameters Avail = M-F 7:00-19:00 RTO = 72 hours to hot site Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 2000-2006 Knowledge Transfer 29

Subject Areas to be audited: Databases Network Servers Storage Applications to be audited: All Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 30

Objectives Develop an storage security audit plan, reviewed annually, using risk assessment techniques, which identifies audits to be conducted each year; such audit plan shall be approved by BOD Conduct audits in the annual audit plan each year with documented deviations. Ascertain the adequacy of controls for safeguarding information assets at rest and in transit and, when appropriate, verifying the existence of information assets. Reduce cost Detect potential for fraud Reduce risks to availability Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 31

Scope Specific systems, function or unit of organization included in the review: Disk arrays Fabrics Fibre Channel, IP File (NAS) IP networks carrying storage traffic Backup, Archive and D/R Tape Workflows Management infrastructure Servers associated with storage infrastructure Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 32

Pre-audit Planning Technical Resources: O/S (Windows, Unix) Database (DB2, Oracle, SQL Server) Network (LAN, WAN) Storage (Array, Fabric, Backup, D/R) Application specific Locations: Home office Scanning site (if not covered by SAS 70) D/R site Sources: Input/Decision Matrix People Decision Style Documents Design Policy Operations Applicable Law Regulation Systems, general and specific infrastructure Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 33

Gather Data - Policy General documents Applicable law Workflow Scan/Input Modification/Revision Retention At scan site At production site Access Controls Process for gaining access Audit logging Infrastructure tasks Volume Management File system management LUN Fabric Storage infrastructure Process for gaining access Current access documents Current rights assignment Change control Compensating controls Replacement Disk Tape Fabric components Server HBA B/R, D/R Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 34

Gather Data - Technical Location of hosts relative to firewall and fabric Configuration data Hosts Fabrics Arrays Libraries Networks Firewalls ACLs Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 35

Gather Data Secure Storage Management 3-1 Misc. Is SSL/SSH in place at all management interfaces? Telnet bypass? Off? Status of Telnet access? In-band storage management command? Inhibition in-band commands? Method of authentication? Timeout? Management Station Admin/password Hidden passwords for management application Vendor Underpinning database If tied to RADIUS? Roles Users assigned Degree of administrative rights Administrative chain-of custody for original media Access to commands Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 3-1 SNIA Storage Security Best Practices 36

Communicate Exit interview: Use FC-SP switch authentication to reduce risks to availability caused by inappropriate fabric merge Use content level encryption when transmitting medical records from scan to production site Use link level encryption between production and D/R site Inhibit access for USB devices Activate and centralize logging Place active data destruction policy at scan side Modify backup and remote replication procedures Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 37

Report Follow-up review procedures: Verify change of encryption pattern Test of controls: Verify capture of log events, including security events Soundness of documents, policies and procedures: Document if this criteria is met or areas for improvement Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 38

Q&A / Feedback Please send any questions or comments on this presentation to SNIA: tracksecurity@snia.org Many thanks to the following individuals for their contributions to this tutorial. SNIA Education Committee Richard Austin Eric Hibbard Larry Hofer Phil Huml Preparing for a Storage Security Audit 2007 Storage Networking Industry Association. All Rights Reserved. 39