DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, CHICO. Audit Report 12-35 October 19, 2012



Similar documents
Data Center Operations and Security Requirements

DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, EAST BAY. Audit Report September 4, 2012

IDENTITY MANAGEMENT AND COMMON SYSTEM ACCESS HUMBOLDT STATE UNIVERSITY. Audit Report December 21, 2012

SENSITIVE DATA SECURITY AND PROTECTION CALIFORNIA STATE UNIVERSITY, LOS ANGELES. Audit Report January 3, 2012

IT DISASTER RECOVERY CALIFORNIA STATE UNIVERSITY, CHANNEL ISLANDS. Audit Report August 12, 2011

CREDIT CARDS CALIFORNIA STATE UNIVERSITY, EAST BAY. Audit Report June 28, 2013

INFORMATION SECURITY Humboldt State University

IT DISASTER RECOVERY SAN FRANCISCO STATE UNIVERSITY. Audit Report August 25, 2011

IT DISASTER RECOVERY CALIFORNIA STATE UNIVERSITY, EAST BAY. Audit Report October 13, 2010

INFORMATION SECURITY California Maritime Academy

HIPAA COMPLIANCE CALIFORNIA STATE UNIVERSITY, EAST BAY. Audit Report October 25, 2010

PAYMENT CARD PROCESSING

HIPAA COMPLIANCE CALIFORNIA STATE UNIVERSITY, CHANNEL ISLANDS. Audit Report October 26, 2010

PAYMENT CARD PROCESSING

Specific observations and recommendations that were discussed with campus management are presented in detail below.

The California State University Office of Audit and Advisory Services CSU COLLEGE REVIEWS. Systemwide

The California State University Office of Audit and Advisory Services CSU CONSTRUCTION. San José State University. Student Wellness Center

CONSTRUCTION SAN FRANCISCO STATE UNIVERSITY J. PAUL LEONARD/SUTRO LIBRARY. Audit Report November 1, 2012

STUDENT HEALTH SERVICES CALIFORNIA STATE UNIVERSITY, SACRAMENTO. Audit Report February 26, 2014

The California State University Office of Audit and Advisory Services CSU CLERY ACT. Humboldt State University

FUND-RAISING AND GIFT PROCESSING HUMBOLDT STATE UNIVERSITY. Audit Report March 29, 2011

FISMA CALIFORNIA STATE UNIVERSITY, LONG BEACH. Report Number December 6, 1995

FISMA CALIFORNIA STATE UNIVERSITY, LOS ANGELES. Report Number September 13, 2002

Standard: Data Center Security

Application Development within University. Security Checklist

Information Security Program

Audit Report. Management and Security of Office of Budget and Program Analysis Information Technology Resources. U.S. Department of Agriculture

Information Technology Services Guidelines

Approved by President Mohammed Qayoumi. Reviews: IT Management Advisory Committee

Cal Poly Information Security Program

Utica College. Information Security Plan

Business Continuity Management Review

Information Security Series: Security Practices. Integrated Contract Management System

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

California State University, Sacramento INFORMATION SECURITY PROGRAM

TABLE OF CONTENTS Information Systems Security Handbook Information Systems Security program elements. 7

Does it state the management commitment and set out the organizational approach to managing information security?

Wright State University Information Security

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire

Missouri Student Information System Data Governance

RISK MANAGEMENT & INSURANCE SAN DIEGO STATE UNIVERSITY. Report Number August 24, 1998

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

Information Resources Security Guidelines

ISO Controls and Objectives

Continuity Planning and Disaster Recovery

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

HIPAA Security COMPLIANCE Checklist For Employers

Marist College. Information Security Policy

Computer Security Roles and Responsibilities and Training Should Remain Part of the Computer Security Material Weakness.

CITY UNIVERSITY OF NEW YORK EMPLOYEE ACCESS TO THE STUDENT INFORMATION MANAGEMENT SYSTEM AT SELECTED CAMPUSES. Report 2007-S-23

Standard: Information Security Incident Management

UF IT Risk Assessment Standard

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

10-13 MEMORIAL HEALTH SYSTEM IT BACKUP PROCESS PUBLIC REPORT CITY OF COLORADO SPRINGS OFFICE OF THE CITY AUDITOR JULY 22, 2010

Office of Inspector General

Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline Information Security Incident Response

Administrative Procedure

University Information Technology Security Program Standard

University of Oregon Information Technology Risk Assessment. December 2, 2015

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN

How To Check If Nasa Can Protect Itself From Hackers

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

Mecklenburg County Department of Internal Audit. PeopleSoft Application Security Audit Report 1452

I. EXECUTIVE SUMMARY. Date: June 30, Sabina Sitaru, Chief Innovation Officer, Metro Hartford Innovation Services

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

Why should the CSU have a records/information retention and disposition policy?

Server Service Level Agreement

IM-93-1 ADP System Security Requirements and Review Process - Federal Guidelines

The ADT Corporation. Audit Committee Charter. December 2014

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

ISO27001 Controls and Objectives

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Responsible Access and Use of Information Technology Resources and Services Policy

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

Guide for the Role and Responsibilities of an Information Security Officer Within State Government

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,

GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS

General Computer Controls

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

VA Office of Inspector General

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Audit of Security Controls for DHS Information Technology Systems at San Francisco International Airport

HIPAA Information Security Overview

SAFEGUARDS FOR PROTECTING PRIVATE DATA - SERVICE PROVIDERS AND CONTRACTORS

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) Fax: (718)

MANAGEMENT AUDIT REPORT SECURING CRITICAL DATA CITYWIDE REPORT NO City of Albuquerque Office of Internal Audit and Investigations

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Federal Information Security Management Act: Fiscal Year 2014 Evaluation

Rockwell Financial Group Business Continuity Plan. Emergency Contact Persons Rockwell Financial Group has two emergency contact persons:

OCC 98-3 OCC BULLETIN

Transcription:

DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, CHICO Audit Report 12-35 October 19, 2012 Henry Mendoza, Chair William Hauck, Vice Chair Lupe C. Garcia Steven M. Glazer Hugo N. Morales Glen O. Toney Members, Committee on Audit University Auditor: Larry Mandel Senior Director: Michael Caldera IT Audit Manager: Greg Dove Senior Auditor: Gordon Eng Staff BOARD OF TRUSTEES THE CALIFORNIA STATE UNIVERSITY

CONTENTS Executive Summary... 1 Introduction... 2 Background... 2 Purpose... 4 Scope and Methodology... 5 OBSERVATIONS, RECOMMENDATIONS, AND CAMPUS RESPONSES Physical Security... 6 Fire Protection and Environmental Controls... 7 ii

CONTENTS APPENDICES APPENDIX A: APPENDIX B: APPENDIX C: Personnel Contacted Campus Response Chancellor s Acceptance ABBREVIATIONS CSU FISMA ICSUAM OUA SAM California State University Financial Integrity and State Manager s Accountability Act Integrated California State University Administrative Manual Office of the University Auditor State Administrative Manual iii

EXECUTIVE SUMMARY As a result of a systemwide risk assessment conducted by the Office of the University Auditor (OUA) during the last quarter of 2011, the Board of Trustees, at its January 2012 meeting, directed that Data Center Operations be reviewed. The OUA had previously reviewed some aspects of Data Center Operations in the 2008 and 2009 audits of Information Security and the 2010 and 2011 audits of IT Disaster Recovery Planning. The OUA also reviewed Data Center Operations in the biennial Financial Integrity and State Manager s Accountability Act (FISMA) audits, the last of which was performed on campus in 2008. We visited the California State University, Chico campus from July 9, 2012, through August 2, 2012, and audited the procedures in effect at that time. Our study and evaluation did not reveal any significant internal control problems or weaknesses that would be considered pervasive in their effects on controls over data center operations. However, we did identify other reportable weaknesses that are described in the executive summary and body of this report. In our opinion, the operational and administrative controls over data center operations in effect as of August 2, 2012, taken as a whole, were sufficient to meet the objectives stated in the Purpose section of this report. As a result of changing conditions and the degree of compliance with procedures, the effectiveness of controls changes over time. Specific limitations that may hinder the effectiveness of an otherwise adequate system of controls include, but are not limited to, resource constraints, faulty judgments, unintentional errors, circumvention by collusion, and management overrides. Establishing controls that would prevent all these limitations would not be cost-effective; moreover, an audit may not always detect these limitations. Our audit did not examine all controls over data center operations but was designed to assess management controls, increase awareness of the topic, and assess regulatory compliance for significant data center operations categories that are prevalent in the California State University environment. The following summary provides management with an overview of conditions requiring attention. Areas of review not mentioned in this section were found to be satisfactory. Numbers in brackets [ ] refer to page numbers in the report. PHYSICAL SECURITY [6] The list of personnel with authorized access to the data center rooms was not limited to those whose responsibilities required that they have access. FIRE PROTECTION AND ENVIRONMENTAL CONTROLS [7] Campus data center rooms did not have smoke detection systems or automatic fire suppression systems. Data Center Operations/California State University, Chico/Audit Report 12-35 Page 1

INTRODUCTION BACKGROUND Integrated California State University Administrative Manual (ICSUAM) 8000.0, Information Security Policy, dated April 19, 2010, represents the most recent and specific guidance to campuses regarding the security and protection of data center operations. It provides direction for managing and protecting the confidentiality, integrity, and availability of California State University (CSU) information assets and defines the organizational scope of information security throughout the system. Specifically, the policy states that the Board of Trustees is responsible for protecting the confidentiality, integrity, and availability of CSU information assets. Unauthorized modification, deletion, or disclosure of information assets can compromise the mission of the CSU, violate individual privacy rights, and possibly constitute a criminal act. ICSUAM 8000.0 further states that it is the collective responsibility of all users to ensure the confidentiality of information that the CSU must protect from unauthorized access; the integrity and availability of information stored on or processed by CSU information systems; and compliance with applicable laws, regulations, and CSU or campus policies governing information security and privacy protection. The policy applies to all campuses; central and departmentally managed campus information assets; all users employed by campuses or any other person with access to campus information assets; all categories of information, regardless of the medium in which the information asset is held or transmitted (e.g., physical or electronic); and information technology facilities, applications, hardware systems, and network resources owned or managed by the CSU. ICSUAM 8080 states that each campus must identify physical areas that must be protected from unauthorized physical access. Such areas include data centers and other locations on the campus where information assets containing protected data are stored. Campuses must protect these limited-access areas from unauthorized physical access while ensuring that authorized users have appropriate access. Campus information assets that access protected data located in public and non-public access areas must be physically secured to prevent theft, tampering, or damage. The level of protection provided must be commensurate with that of identifiable risks. Campuses must review and document physical access rights to campus limited-access areas annually. State Administrative Manual (SAM) 5330 states that physical security practices prevent unauthorized physical access, damage, and interruption to an agency s assets. Physical security practices for each facility must be adequate to protect the most sensitive information technology application housed in that facility. Agencies must take the appropriate physical security measures to provide for: management control of physical access to information assets (including personal computer systems, computer terminals, and mobile devices) by agency staff and outsiders; prevention, detection, and suppression of fires; and prevention, detection, and minimization of water damage and loss or disruption of operational capabilities due to electrical power fluctuations or failure. SAM 5335 states that agencies are responsible for the management and operation of their information processing facilities. The security program should identify and document the appropriate practices to Data Center Operations/California State University, Chico/Audit Report 12-35 Page 2

INTRODUCTION ensure the integrity and security of the agency s information assets. SAM 5335 references International Standards Organization 17799 Section 9, Physical and Environmental Security, and National Institute of Standards and Technology Special Publication 800-12 (Chapter 15), along with other standards and guidance criteria. Historically, data center operations were reviewed by the CSU Office of the University Auditor (OUA) as part of cyclical audits based on the Financial Integrity and State Manager s Accountability Act (FISMA) of 1983, passed by the California Legislature and detailed in Government Code 13400 through 13407. Beginning in calendar year 2010, cyclical FISMA audits were reevaluated and discontinued due to a change in the OUA audit risk assessment methodology. Using the new procedure, the OUA worked with CSU campus executive management to identify high-risk areas on each campus. Data Center Operations was selected as a high-risk area to review in 2012. Data Center Operations/California State University, Chico/Audit Report 12-35 Page 3

INTRODUCTION PURPOSE Our overall audit objective was to ascertain the effectiveness of existing policies and procedures related to the administration and control of data center operations; determine the adequacy of controls over the related processes; and ensure compliance with relevant governmental regulations, Trustee policy, Office of the Chancellor directives, and campus procedures. Within the overall audit objective, specific goals included determining whether: Certain essential administrative and managerial internal controls are in place, including delegations of authority and responsibility, management committees, and documented policies and procedures. Data processing facilities employ physical security safeguards for achieving and maintaining appropriate protection of organizational assets. Data processing facilities contain adequate fire supression provisions and employ controls that help maintain a proper operating environment. Handling procedures for backup media ensure that the movement and storage of tapes is controlled and accountable. Formal event reporting and escalation procedures are in place for job scheduling. Change management procedures are sufficient to ensure that modifications to the systems or network are authorized. Management review of help desk activities ensures a proactive approach toward determining whether there is a systemic cause to problems reported. Data Center Operations/California State University, Chico/Audit Report 12-35 Page 4

INTRODUCTION SCOPE AND METHODOLOGY The proposed scope of the audit as presented in Attachment A, Audit Agenda Item 2 of the January 24 and 25, 2012, meeting of the Committee on Audit stated that Data Center Operations would include review and compliance with Trustee policy, federal and state directives, and campus policies and procedures; physical security provisions; environmental controls; processing and scheduling controls; backup and recovery processes; and emergency preparations. Our study and evaluation were conducted in accordance with the International Standards for the Professional Practice of Internal Auditing issued by the Institute of Internal Auditors and included the audit tests we considered necessary in determining that operational and administrative controls are in place and operative. This review emphasized, but was not limited to, compliance with state and federal laws, Board of Trustee policies, and Office of the Chancellor and campus policies, letters, and directives. The audit review focused on procedures currently in effect. We focused primarily upon the administrative, compliance, operational, and technical controls over the campus data center, network rooms, and personnel operations. Specifically, we reviewed and tested: Data center policies and procedures. Computer operations organizational structure and management framework. Physical security over data processing facilities. Fire prevention and environmental controls. Emergency preparedness and training. Storage and handling of backup media. Job scheduling. Change management. Help desk support. Our testing and methodology was designed to provide a managerial-level review of key data processing practices over data center operations. Our review did not examine all categories of computer operations; selected IT processes not related to the data center or related data processing facilities were excluded from the scope of the review. Our testing approach was designed to provide a view of the security and controls used to protect only key computing and business processes. Data Center Operations/California State University, Chico/Audit Report 12-35 Page 5

OBSERVATIONS, RECOMMENDATIONS, AND CAMPUS RESPONSES PHYSICAL SECURITY The list of personnel with authorized access to the data center rooms was not limited to those whose responsibilities required that they have access. We found that 38 campus police officers, 23 information resources employees, and six facilities management employees had access cards or master keys to the data center rooms, including the primary, secondary, and co-location data rooms. Integrated California State University Administrative Manual (ICSUAM) 8030, Personnel Information Security, dated April 19, 2010, states that each campus must identify physical areas that must be protected from unauthorized physical access. Such areas would include data centers and other locations on the campus where information assets containing protected data are stored. Campuses must protect these limited-access areas from unauthorized physical access while ensuring that authorized users have appropriate access. State Administrative Manual (SAM) 5330, Physical and Environmental Security, states that physical security practices for each facility must be adequate to protect the most sensitive information technology application housed in that facility. Agencies must take appropriate physical security measures to provide for control of physical access to information assets by agency staff and outsiders. The director of communication services stated that the campus had determined that the authorization and distribution of key card access was reasonable because the network and telecommunications infrastructure, which requires additional access for network and telecommunications personnel, was located in the primary and secondary data rooms. He further stated that police department access appeared excessive, and they will consider reducing access. Failure to provide adequate physical security over information technology assets and sensitive data information increases the risk that unauthorized personnel will have access to information assets. Recommendation 1 We recommend that the campus evaluate the list of employees with authorized access to the data center rooms to ensure that it is limited to only those whose responsibilities require access. Campus Response We concur with the recommendation and have already taken action to evaluate and reduce the amount of personnel with access rights to the data center. Corrective action on this item is complete. Data Center Operations/California State University, Chico/Audit Report 12-35 Page 6

OBSERVATIONS, RECOMMENDATIONS, AND CAMPUS RESPONSES FIRE PROTECTION AND ENVIRONMENTAL CONTROLS Campus data center rooms did not have smoke detection systems or automatic fire suppression systems. SAM 5330, Physical and Environmental Security, states that physical security practices for each facility must be adequate to protect the most sensitive information technology application housed in that facility. Agencies must take appropriate physical security measures to provide for prevention, detection, and suppression of fires. The director of communication services stated that the campus had decommissioned an outdated Halon fire suppression system in the primary data center due to environmental reasons and had not installed a replacement system, and that the secondary and co-location data center rooms have never had a fire suppression system. Failure to provide smoke detection systems and automatic fire suppression systems in data center rooms increases the risk that computing equipment will be damaged during a fire. Recommendation 2 We recommend that the campus install smoke detection systems and automatic fire suppression systems in the data center rooms. Campus Response We concur with the recommendation to install fire suppression systems in the primary data center. The campus has begun the process to mitigate the issue. The fire suppression system on the fourth floor of Butte Hall is a component of a life safety project, new elevators, due to be complete by August 31, 2013. We concur with the recommendation to install smoke detection systems in the primary and secondary data centers. Installation of smoke detectors for both locations will be complete by August 31, 2013. The campus will accept the risk associated with lack of a fire suppression system in the Meriam Library, the secondary data center. Since this is a redundant system and the primary system will be adequately protected, the campus will not proceed with the recommended building upgrade at this time. Data Center Operations/California State University, Chico/Audit Report 12-35 Page 7

APPENDIX A: PERSONNEL CONTACTED Name Paul J. Zingg Sharyn Abernatha Scott Claverie Lee Cummings Amy Gremore Lorraine Hoffman Ed Hudson Jeni Kitchell Andrea Mox Mike Murray Dennis Partington Ray Quinto Ryan Richter Jerry Ringel Tom Rosenow Michael Schilling Kevin Weherly Title President Assistant Vice President for Staff Human Resources Director of Communications Services Supervisor, Telecommunication Services Manager of Employment Services Vice President for Business and Finance Information Security Officer Interim Director of University Budget and Resource Management Manager, IT Support Services Administrative Desktop Management Network Manager Manager, Enterprise Systems Labs and Academic Desktop Management Director, Computing and Technology Support Director, Application Development and Technical Support, Enrollment Management Vice Provost for Information Resources and Chief Information Officer Desktop Support Services