Introduction to Change



Similar documents
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Change Management Best Practices

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

How To Ensure The C.E.A.S.A

IT Sr. Systems Administrator

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

INFORMATION TECHNOLOGY ENGINEER V

Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Network and Security Controls

Change Management. Why Change Management? CHAPTER

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

Basics of Internet Security

Network and Host-based Vulnerability Assessment

BKDconnect Security Overview

Specific observations and recommendations that were discussed with campus management are presented in detail below.

05.0 Application Development

Statement of Service Enterprise Services - AID Microsoft IIS

GE Measurement & Control. Cyber Security for NEI 08-09

Columbia College Process for Change Management Page 1 of 7

SRA International Managed Information Systems Internal Audit Report

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

State of Oregon. State of Oregon 1

Statement of Service Enterprise Services - MANAGE Microsoft IIS

RL Solutions Hosting Service Level Agreement

Enforcing IT Change Management Policy

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

AUDIT REPORT WEB PORTAL SECURITY REVIEW FEBRUARY R. D. MacLEAN CITY AUDITOR

PCI DSS Requirements - Security Controls and Processes

FINAL May Guideline on Security Systems for Safeguarding Customer Information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

IT Operations Management: A Service Delivery Primer

How To Audit The Mint'S Information Technology

Standard: Event Monitoring

Data Center Colocation - SLA

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Best Practices Report

Service Automation to implement and operate your Cloud initiatives

Information Security Policy

Verve Security Center

The remedies set forth in this SLA are your sole and exclusive remedies for any failure of the service.

Version 1.0. IT Service Management & IT Asset Management Services (ITSM & ITAM Services) Governance Process

SUPPLIER SECURITY STANDARD

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP

How To Manage Security On A Networked Computer System

PCI Requirements Coverage Summary Table

Virginia Commonwealth University School of Medicine Information Security Standard

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Computer Security: Principles and Practice

THE TOP 4 CONTROLS.

Services Providers. Ivan Soto

Central Agency for Information Technology

Retention & Destruction

Appendix A-2 Generic Job Titles for respective categories

How To Create A Help Desk For A System Center System Manager

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Service Level Agreement

Infrastructure Technical Support Services. Request for Proposal

BSM for IT Governance, Risk and Compliance: NERC CIP

Risk Management Guide for Information Technology Systems. NIST SP Overview

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

Data Management Policies. Sage ERP Online

Office of Inspector General

Windows Least Privilege Management and Beyond

the limits of your infrastructure. How to get the most out of virtualization

Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint

CITY UNIVERSITY OF HONG KONG. Information System Acquisition, PUBLIC Development and Maintenance Standard

Enterprise UNIX Services - Systems Support - Extended

Obtaining Enterprise Cybersituational

SIEM Implementation Approach Discussion. April 2012

Systems Support - Standard

DIVISION OF INFORMATION SECURITY (DIS)

Data Security Incident Response Plan. [Insert Organization Name]

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Network Configuration Management

SonicWALL PCI 1.1 Implementation Guide

Final Audit Report. Audit of Data Integrity MCCS Feeder System Interfacing with SAP

Miami University. Payment Card Data Security Policy

March

Patch Management Policy

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Cisco Change Management: Best Practices White Paper

Transcription:

Introduction to Management and SDLC Steve Owyoung Sr. Manager KPMG LLP, IT Advisory Doug Mohrland Audit Manager Oracle Corporation

Discussiontopics o significance o o s o o o o Software (SDLC)

s Organization

s Total fraud losses in the United States estimated to be $99 billion in 008 Of all the computer crimes reported: Computer fraud % 8% % % % Others Application Programmers Clerical Users Occupation Students Manager s 7% -90% computer crime committed by former or current employees (knowledgeable insiders)

s Why Management it is significant because it helps an organization to be efficient Adapting to Controlling Effecting change change change

s changes s in Physical Control Network Equipment Internet

s Planned/routine maintenance changes procedure and s s 7

s Emergency/System Recovery change procedure and s s CHANGE REQUESTOR Request a change (complete an Emergency Request Form) EMERGENCY CHANGES The change requestor solicits approval (verbal is acceptable) SYSTEM RECOVERY The support staff immediately respond and start resolving the issue Approved by or by the staff managing the systems? No The staff managing the systems perform professional judjment and make a decision whether to proceed or cancel the emergency change Yes Test required? Yes Perform testing (test ) No Yes No Yes Test passed? Notify all the constituents before implementation Implement change into The changes and the back out plans should be documented in the Request Form for later review Perform post implementation monitoring 8

s s o Financial loss Brand/reputational damage Losing a customer/ business o Legal exposure (sensitive data disclosure) o Unplanned, unauthorized and undocumented changes o Prone to system attack / outages (DoS) o Misuse of resources (unplanned work) 9

s o Prevention Restrict logical access Firewall, IDS, OS and Application Unnecessary services Disable at the servers Block by the firewalls Restrict physical access Restrict physical access that houses critical systems to ONLY authorized employees Perform periodic physical access reviews 0

s o Detection Monitor metadata and look for changes Create, store and monitor baseline metadata values Metadata values: modification time, file size and cryptographic checksum Management Software Reads files or directories to monitor critical network configuration, data files, customer database files, documents and spreadsheets Takes action when a violation (change) occurs Intrusion detection (IDS)

s o Recovery Maintain a backup copy of the data Identify changes based on the Management Software report Determine whether a change is authorized or not Restore a file if the change is deemed unauthorized or malicious

s o policy, procedure and standards o request o Approval process o Deployment o result o Monitor application and networks

s policy, procedure and standards o Prioritize/categorize changes based on downtime, lead time, type of services and severity of the change (Low, Medium, High Urgent) o Roles and responsibilities Define and designate qualified personnel s roles Segregation of duties (SOD) Communication Enforce change- process

s Request Management o Request Analysis Business Analysis The likelihood of success Significance to business Resources required and business justification Technical Analysis System dependencies Technical requirement Project estimate o Request Reporting Make the change requests visible to Retain status of the change request when it is analyzed, prioritized, tested and deployed

s Approval Process o Appropriate approval should be obtained between the different phases of change process o Management approval should be documented

s Deployment Management o Logical (separate), Test/QA and Production o Deployment process High category changes Low/Medium category changes Emergency changes o Leverage Technology To provide auditabilityand versioning throughout the deployment process 7

s Result o Key Performance Indicators (KPI) about the entire Management Process Process bottlenecks, successful techniques, etc. o Use the KPIs (by ) to make adjustments to the change procedure and o Post change implementation monitoring 8

s Monitor application and networks o checks using automated monitoring tools Incident response Escalation process o Periodic reviews User access OS, apps, network, etc. System configuration servers, network equipment, etc. 9

s Software Relationship between change and SDLC o Managing change is a critical component of any SDLC model Management and SLDC are not mutually exclusive o occurs throughout the development life cycle o Cost of changes is higher once out of development 7 Software 0

s Software Relationship between change and SDLC o Waterfall model 7 Software

s Software Relationship between change and SDLC o Iterative model Agile Methodology Rational Unified Process (RUP) Rapid Application (RAD) Joint Application (JAD) 7 Software

Software Relationship between change and SDLC s o Prototyping Mange 7 Software

7 s Software Software Relationship between change and SDLC o V Model

s Software Tools to better manage change o Requirements Management o Visual Modeling o Automated Testing o Management 7 Software

Course Review o significance o o s o o o o Software (SDLC)

Questions? 7

Contact Information Steve Owyoung sowyoung@kpmg.com -9-70 Doug Mohrland doug.mohrland@oracle.com 0-0-77 8

Appendix s 9

changes OS changes (Host) o Applying OS patches s OS vendor recommendation Opening/closing OS services o Re-imaging As a backup plan when an OS update didn t go as planned As part of major/minor/emergency application changes 0

s changes Network changes o Software changes Deploying OS Patching OS o Configuration s Updating firewall, router, switch configuration o Hardware changes Adding/removing of network equipment

changes Application changes o Company specific application change s Major, minor and emergency changes New releases Bug fixes o Application configuration changes o Database changes Schema changes Database upgrades (version upgrade)

changes Physical access change o Physical access to data center s Preventing root level access through a system console Deactivating terminated employee s physical access Deactivating temporary physical access

changes Logical access change o OS Access s privileged access to /mission- critical server o Application Access privileged access to /mission- critical application o Network Access privileged access to network equipment