Auditing Application User Account Security and Identity Management with Data Analytics



Similar documents
Auditing Application User Account Security and Identity Management with Data Analytics

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

PeopleSoft IT General Controls

Managing Approvals in Expenses. Understanding Approvals

OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT

AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS

Big Data, Data Analytics, and Data Visualization building your knowledge and expertise. September 15, 2015

Larry Laine, Deputy Land Commissioner and Chief Clerk. Annual Report on the Internal Audit Quality Assurance and Improvement Program

Microsoft Project Server Integration with SharePoint 2010

Directory of. Advertising Supplement

AHIA HCCA Auditing & Monitoring Focus Group Defining the Key Roles and Responsibilities Corporate Compliance and Internal Audit.

The Evolution of Assurance Software & Methodology

TPSC Cloud, Collaborative Governance, Risk & Compliance Software

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution

White Paper. Support for the HIPAA Security Rule PowerScribe 360

per concurrent user - OnDemand per managed server per named user - OnDemand

Basic Office Management

A Universal Approach to Integration Using UNIVERSAL DATA MODELS. Proprietary information of Universal Data Models, LLC 1

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Quick Reference Guide

Audit & Inspection Management. Enterprise Cloud Audit & Inspection Management Solution

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Using CAAT in Compliance

Testing for Duplicate Payments

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Mecklenburg County Department of Internal Audit. PeopleSoft Application Security Audit Report 1452

University of California Online Payroll / Personnel System. WEB PAN Application

- Identity & Access Management

Se i o Pricing Document

Software Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

KAREN E. RUSHING. Ghost Employee Audit

University of Waterloo Financial Online Reporting Environment (FORE) Training Manual

Public Key Infrastructure for a Higher Education Environment

MS 20246C Monitoring and Operating a Private Cloud

TECHNICAL HIGHLIGHTS. September 16 th,2015 Oglethorpe D. oneusg

Stellar Active Directory Manager

Oracle Business Intelligence (OBI) User s Guide October 2011

OCR HIPAA Audits. Disclaimer. Message. I am here for your benefit. If you have questions, please ask. 1. Background 2. The Audit 3.

CA Technologies Solutions for Criminal Justice Information Security Compliance

SUMMARY OF Proactive Monitoring Procedures

Foundation ACTIVE DIRECTORY AND MICROSOFT EXCHANGE PROVISIONING FOR HEALTHCARE PROVIDERS HEALTHCARE: A UNIQUELY COMPLEX ENVIRONMENT

21 CFR Part 11 Electronic Records & Signatures

Document Hierarchy of Information Security. Corporate Security Policy. Information Security Standard. General Directive(s) Specific Directive(s)

Achieving HIPAA Compliance with Identity and Access Management

Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples

Drupal 6 to Drupal 7 Migration Worksheet

OFFICE OF AUDITS & ADVISORY SERVICES SUNGARD TREASURY MANAGEMENT SYSTEM CONTRACT COMPLIANCE FINAL AUDIT REPORT

Precisely Target the Right Audience

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

Blue Coat Cloud Data Protection Server Administration Guide

How Private Industry Protects Our Country's Secrets. James Kirk

HP Service Manager. Service Request Catalog (SRC) Tips & Tricks Document

Nonprofit Data Management Checklist

Our Data Analytics Journey, Methodology, and More. September 15, 2015

Time Attendance Management System TAMS

Automate PCI Compliance Monitoring, Investigation & Reporting

Leveraging Data Analytics and Continuous Auditing. Internal Audit. January 9, 2014

The Netskope Active Platform

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Risk & Hazard Management

ASSESSMENT REPORT Federal PKI Compliance Report September 6, 2013

Feature. Multiagent Model for System User Access Rights Audit

Roles and Responsibilities Corporate Compliance and Internal Audit

Innovative Projects: Big Data Revisited (An ACHE Qualified Education (Cat II), 1.0 Hour CEU)

MS-10750: Monitoring and Operating a Private Cloud with System Center Required Exam(s) Course Objectives. Price. Duration. Methods of Delivery

Audit of Employee Self-Service Payroll System Access

Information Systems Access Policy

CareConnect Onboarding

MEDITECH CUSTOMERS & THE OIG QUESTIONNAIRE

Privacy & Security Requirements: from EHRs to PHRs

Windows Server 2012 / Windows 8 Audit Fundamentals

SEO: How to Use Everyday Techniques to Increase Website Traffic. Robin The University of Texas at Tyler

UOFL SHAREPOINT ADMINISTRATORS GUIDE

NetSuite OpenAir. The World s #1 Cloud Professional Services Automation Solution. Why NetSuite OpenAir? NETSUITE BENEFITS.

Supplier Information Security Addendum for GE Restricted Data

The University of Texas at Tyler. Audit of Compliance with Texas Administrative Code 202

Transcription:

Auditing Application User Account Security and Identity Management with Data Analytics James Kidwell, JD, CISA Senior Information Systems Auditor Audit Services Tom Valiquette, MBA, CIA Director, Corporate Compliance Compliance Data Solutions

What is your end game? 1. Evaluate for key risks (one-time audit) Active user accounts of terminated employees/contractors 2. Continuous Monitor Audit Services tool 3. Build case for corporate identity management solution What else happened: Continuous Audit business unit tool

Key Considerations Decide your end-game What is your corporate standard Source of truth Data normalization Known data exceptions Error validation & process improvement Continuous auditing & monitoring

Example #1 User Accounts Individual system installations Individual systems do not communicate with each other. Hospital 1 Hospital 2 Hospital 3 Not integrated with Windows Active Directory Hospital 4 Manual user account administration managed at each hospital Hospital 5 Hospital 6 Hospital 8 Hospital 7

Example #2 User Accounts Primary applications for Enterprise Some not integrated with Windows Active Directory Manual user account administration managed within Information Services External service providers Accounts Receivable System A Accounts Receivable System C Accounts Receivable System B Electronic Medical Record

Key Risks Risks External Regulator sanctions due to active user account for terminated teammate; (JCAHO Joint Commission on Accreditation of Healthcare Organizations) System access using terminated teammate account; Transitioning to central Accounts Receivable system.

Source of Truth Central list used to identify personnel Maintained to some standard Contains unique identifier Customer and Audit agree Employee Roster Active Directory Contractor Roster

Analytic Process Flow Continuous analytic cycle agreed to by Audit and Customer Every application account receives a result code for each testing cycle Pass/Fail If Fail High/Low risk

Data Preparation Provision data on same schedule Remove application-specific known user ID modifications Target and isolate approved administrative accounts Only ACTIVE target system user accounts TargetSystem User ID ComputedID (used for matching) TargetSystem User Last Name TargetSystem User First Name 5309 5309 JOHNSON ELLIOT EJOHNS01 EJOHNS01 JOHNSON ELLIOT EJOHNS01W EJOHNS01 JOHNSON TIM ID Modification

Layered Testing Algorithm Target System Identify inactive, template, system, and deleted accounts

Error Validation UserID ErrorReason ErrorValidation ValidationReason 5309 EJOHNS01 Application userid not found in PeopleSoft EC99 - Valid Error RC99 - Remediation Plan Application userid first name does not RC02 - False Positive - match first name in PeopleSoft EC01 - Not Error Positive Teammate ID Allows customer opportunity to participate in audit process Demonstrates to senior leadership the customers willingness to correct problems Approved false-positives accounted for in continuous auditing program Remediation plans confirmed by continuous auditing program

Audited Results Client-Audited Results Test if client provided acceptable responses to previous analytic cycle results

Teammate Identification - PS Compare active accounts to Human Resources Match Enterprise ID - Network ID or Employee ID; Match Name First name characters, or Levenshtein first name or Levenshtein last name Teammate active in HR data yes/no

Teammate Identification - AD Compare active accounts to Active Directory Match Enterprise ID - Network ID or Employee ID; Match Name First name characters, or Levenshtein first name or Levenshtein last name Teammate active in AD data yes/no

Teammate Identification - itim Compare active accounts to itim Match Enterprise ID - Network ID or Employee ID; Match Name First name characters, or Levenshtein first name or Levenshtein last name Teammate active in itim data yes/no

Analytic Results

Report Results Audit finding detail Dashboards

Reports Identify primary audience (audit management, customer?) Summary vs. Detail Facilitate exception management process Continuous Auditing Continuous Monitoring

Continuous Monitoring Single Application with Multiple Installations

Continuous Monitoring Tier 1 Applications

Continuous Monitoring Tier 1 Applications Drill Down

Continuous Auditing/Monitoring Provides evidence for end-game Identify root cause(s) Monitor process improvement Need for central Identity Management System Transition auditing to business unit Monitor process improvement gains Monitoring provides re-audit signals Allows for key system comparison

Questions?

Tom Valiquette, Director Compliance Data Solutions Corporate Compliance Tom.Valiquette@CarolinasHealthCare.org O: 704-512-5903