What is a Security Audit?

Similar documents
Four Top Emagined Security Services

Security Controls What Works. Southside Virginia Community College: Security Awareness

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Chapter 1 The Principles of Auditing 1

The Protection Mission a constant endeavor

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

State of Oregon. State of Oregon 1

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

ISO 27002:2013 Version Change Summary

INFORMATION SYSTEMS. Revised: August 2013

IT Networking and Security

Enterprise Security Tactical Plan

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CLOUD SERVICES FOR EMS

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

Network and Security Controls

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

U.S. SECURITIES & EXCHANGE COMMISSION

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

How To Secure Your System From Cyber Attacks

FTP is Free, but Can You Really Afford It?

IBX Business Network Platform Information Security Controls Document Classification [Public]

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

GoodData Corporation Security White Paper

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

CYBER SECURITY POLICY For Managers of Drinking Water Systems

Cisco Security Optimization Service

INFORMATION S ECURI T Y

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

Security Controls in Service Management

March

How To Ensure The C.E.A.S.A

Payment Card Industry Data Security Standard

HIPAA: Compliance Essentials

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Host-based Protection for ATM's

Vendor Audit Questionnaire

Bellevue University Cybersecurity Programs & Courses

Network Security Administrator

Domain 1 The Process of Auditing Information Systems

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Cisco Advanced Services for Network Security

Test du CISM. Attention, les questions, comme l'examen, ne sont disponibles qu'en anglais.

Feedback Ferret. Security Incident Response Plan

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

SECURITY RISK MANAGEMENT

SANS Top 20 Critical Controls for Effective Cyber Defense

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Security in the smart grid

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Audit Report. Management and Security of Office of Budget and Program Analysis Information Technology Resources. U.S. Department of Agriculture

HIPAA Compliance Evaluation Report

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Information Security: A Perspective for Higher Education

Information security controls. Briefing for clients on Experian information security controls

The Value of Vulnerability Management*

How to implement an ISO/IEC information security management system

PCI Requirements Coverage Summary Table

IT Security and Compliance Program Plan for Maxistar Medical Supplies Company

Introduction to Cyber Security / Information Security

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

External Supplier Control Requirements

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Information Security Services

IT Networking and Security

Securing the Service Desk in the Cloud

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

FREQUENTLY ASKED QUESTIONS

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Security Policy JUNE 1, SalesNOW. Security Policy v v

Maruleng Local Municipality

THE TOP 4 CONTROLS.

Information Security Program CHARTER

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

FINAL May Guideline on Security Systems for Safeguarding Customer Information

IT Architecture FOR DUMHIE5* by Kalani Kirk Hausman. and Susan L. Cook WILEY. Wiley Publishing/ Inc.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Information Blue Valley Schools FEBRUARY 2015

Intel Enhanced Data Security Assessment Form

The Security Scenario 2005: The Future of Information Security

Supplier Security Assessment Questionnaire

Transcription:

What is a Security Audit? A security audit is a specified process designed to assess the security risks facing a business and the controls or countermeasures adopted by the business to mitigate those risks. It is typically a human process, managed by a team of auditors with technical and business knowledge of the company s information technology assets and business processes. As part of any audit, these teams will interview key personnel, conduct vulnerability assessments, catalog existing security policies and controls, and examine IT assets covered by the scope of the audit. In most cases, they rely heavily on technology tools to perform the audit. Often, security audits are best understood by focusing on the specific questions they are designed to answer. For example: How difficult are passwords to crack? Do network assets have access control lists? Do access logs exist that record who accesses what data? Are personal computers regularly scanned for adware or malware? Who has access to backed-up media in the organization? These are just a small sample of the questions that any security audit should attempt to answer. It is important to understand that a security audit is a continuous process that should deliver continuous improvement to any business. Some commentators have argued that audits should only focus on assessing compliance with existing security policies. Insead, an audit should not only assess compliance, but also assess the very nature and quality of the policies and controls themselves. In many cases, security policies become rapidly obsolete with the release of new technologies or process overhauls. Security audits are the most effective tool for determining the validity of those policies. The Security Audit Process While there are certainly planning and consensus building steps that any team would be wise to take before beginning an audit (for example, making sure that senior management supports the project), the following steps are essential to the audit itself: 1. Define the physical scope of the audit: The audit team should define the security perimeter within which the audit will take place. The perimeter may be physically organized around logical asset groups such as a datacenter specific LAN or around business processes such as financial reporting. Either way, the physical scope of the audit allows the auditors to focus on assets, processes, and policies in a manageable fashion.

2. Define the process scope of the audit: This is often where the rubber hits the road on security audits, as overly broad process scoping can stall audits. At the same time, overly narrow scoping can result in an inconclusive assessment of security risks and controls. This document describes how to effectively scope the security processes or areas that should be included in an audit. It is critical that any business, regardless of size, put limits on the security processes or areas that will be the focus of the audit. 3. Conduct historical due diligence: An oft-forgotten step in security audits is pre-audit due diligence. This due diligence should focus on historical events such as known vulnerabilities, damage-causing security incidents, as well as recent changes to IT infrastructure and business processes. It should include an assessment of past audits. Furthermore, auditors should compile a complete inventory of the assets located within the physical scope of the audit and a complete list of specified security controls relevant to those assets. 4. Develop the audit plan: An effective audit is almost always guided by a detailed audit plan that provides a specific project plan for conducting the audit. This should include a specific description of the scope of the audit, critical dates/milestones, participants, and dependencies. 5. Perform security risk assessment: Once the audit team has an effective plan in place, they can begin the core of the audit the risk assessment. The risk assessment should cover the following steps: A. Identify and locate the exact assets located within the security perimeter and prioritize those assets according to value to the business. For example, a cluster of web servers supporting the order entry application is more important than a web server supporting the IT department s internal blog. B. Identify potential threats against the assets covered by the audit. The definition of a threat is something that has the potential to exploit a vulnerability in an asset. C. Catalog vulnerabilities or deficiencies for each asset class or type. Vulnerabilities exist for specific types of assets and present opportunities for threats to create risk. D. Identify the security controls currently in place for each asset class. These controls must exist and be used on a regular basis. Anything short of this should be noted and not counted towards existing controls. Controls include technologies such as firewalls, processes such as data backup procedures, and personnel such as the systems administrator that manages the relevant assets. E. Determine probabilities of specific risks. Audit teams must make a qualitative assessment of how likely it is that each threat/vulnerability will occur for a specific asset class. The probability calculation should account for the ability of existing controls to mitigate risk. This probability should be articulated on a numerical scale. F. Determine the potential harm or impact of a threat. Auditors must again make a qualitative assessment of the likely extent of the harm for a specific asset class. Again this qualitative assessment should be represented on a numerical scale.

G. Perform the risk calculation. Auditors should use the multiply the two values above (probability x harm) to calculate risk (probability x harm = risk). These calculations should be performed on an asset class by asset class basis and will yield a priority list for risk mitigation efforts and specific security controls that need to be implemented. 6. Document the results of the audit: It should go without saying that the results captured above should be documented in detail and proactively presented to decisionmakers for review. The document should include an executive summary, audit determinations, required updates/corrections, and supporting data in the form of exhibits. The team should also turn the document into a powerpoint presentation. 7. Specify and implement new/updated controls: The ultimate benefit of a security audit is that it should yield specific recommendations for improving business security. These recommendations should take the form of controls that the business can adopt, the deadline for adoption, and the party responsible for adoption. Do not forget to specify deadlines and specific ownership responsibilities. Security Process Scoping Many businesses have an easy time defining the physical security perimeter that encloses the audit. It is relatively easy for an audit team to limit an audit to a physical location (like a datacenter) or logical grouping of assets (all production storage devices). What is more difficult, and frankly more valuable, is scoping the audit around security processes or areas. To do this effectively, it is imperative that businesses prioritize security processes by the amount of risk that they pose to the organization. For example, the process of business continuity may pose a minimal security risk to the business, whereas the process of identity management poses a severe risk. Under this sample scenario, the identity management process would be included in the audit, while business continuity would not. Many industry consultants and analysts have strong opinions on where the majority of security threats will come from in the coming years. Gartner Group estimates that businesses will be able to prevent 80% of all damaging security events by adopting effective policies in four key areas: Network access controls: This process checks the security of a user or system that is attempting to connect to the network. It is the first security process that any user or system encounters when trying to connect to any IT asset within the business network. Network access controls should also track the security of users and systems that are already connected to the network. In some cases, this process will also look to correct or mitigate risk based on detected threats and user or system profiles or identities. Intrusion prevention: As a process, intrusion prevention covers much more than traditional intrusion detection. In fact, it is more closely in line with access control as it is the first security layer that blocks users and systems from attempting to exploit known vulnerabilities. This process should also enforce policies and controls to minimize the scope of an attack across the network. While intrusion detection systems are an obvious, nonnegotiable component of this process so are other technologies such as firewalls.

Identity and access management: This process controls who can access what when. Authentication and authorization are the usual pillars of this process, but robust policy management and storage are also critical components. Vulnerability management: The vulnerability management process manages baseline security configurations across the full range of asset classes. It also identifies and mitigates risks by performing root cause analysis and taking corrective measures against specific risks. Case Study: Auditing the Network Access Control Process Network access controls are often the first line of defense against security risks. Businesses should focus on the following basic steps when conducting an audit of network access controls: 1. Define and inventory the network, including all devices and protocols used on the network. The most useful tool for doing this is usually an existing network diagram that displays all routes and nodes on the network. Networks often change daily so a security based auto inventory tool can be helpful here. The audit team should also prioritize critical assets or segments of the network and draw a line of demarcation between internal and external network assets if applicable. This step should form the record of truth of any NAC audit and should be referred to continuously during the audit process. 2. Identify which systems and users have access to the network, including internal and external parties. Audit teams should also specify where constituent groups access the network from (e.g. the office only, home, remote location). This is an extension of defining the network from an asset perspective and really represents the objects that interact with and use the network. 3. Identify and catalog specific threats that could pose a risk to the network, as well as deficiencies on the network itself. A virus or intrusion is an example of a threat, while a configuration error on a router is a deficiency. 4. Develop specific controls and policies to mitigate the risks identified in step number three. There are a range of security controls that are directly applicable to the network access control process, including but certainly not limited to: authentication mechanisms for all users and systems; access controls that limit access by specific systems or users; and enforced network routing that ensures only specified network routes are used. While most businesses would do well to focus their security audits on these four specific process areas exclusively, some businesses, particularly large enterprises, may choose to make a more extensive investment in their security audit. A good framework for a more extensive audit is the standard encapsulated in ISO 17799. In a nutshell, ISO 17799 focuses on the following security areas: Security Policy: In a relatively thin portion of the standard, ISO 17799 requires businesses to maintain a written security policy, as well as a process and forum for ongoing review and revision. Organizational Security: This section focuses on the infrastructure supporting information

security; security issues concerning access by third parties; and security issues created by outsourcing of certain tasks. Asset Classification and Control: Asset classification and control helps businesses classify assets into different classes or types that have appropriate security controls associated with them. Personnel Security: This portion of the standard addresses human security issues such as training, how personnel respond to specific security incidents, and treating security requirements as a priority in hiring considerations. Physical and Environmental Security: This section covers the security of physical locations such as datacenters and specifies controls for secure areas, as well as securing equipment. Communications and Operations Management: One of the more useful sections of ISO 17799, this section specifies a range of processes and controls in areas such as system planning/acceptance; malware protection; data backups; network management; and media management. Access Control: The access control portion of the standard includes information on controls for user access and responsibilities, network access control, application access control, and mobile computing control. System Development and Maintenance: This section provides particulars regarding specific security controls that can be used in the following areas: systems; applications; cryptography; file systems; and development/support processes. Business Continuity Management: This portion of the standard specifies specific measures to prevent the disruption of core business processes due to failures or disasters. Compliance: The compliance portion of ISO 17799 is somewhat lacking in specificity, but does offer guidance on how organizations can adopt security policies that comply with legal, regulatory, and business requirements. Regardless of the approach, a security audit will yield significant benefits to most businesses by lowering security risks, increasing operational predictability, and reducing classic IT firefighting.