A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER



Similar documents
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Supplier Security Assessment Questionnaire

Client Security Risk Assessment Questionnaire

Security Whitepaper: ivvy Products

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Network and Security Controls

Security Controls for the Autodesk 360 Managed Services

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

University of Pittsburgh Security Assessment Questionnaire (v1.5)

BKDconnect Security Overview

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Small Business IT Risk Assessment

PCI Requirements Coverage Summary Table

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Security from a customer s perspective. Halogen s approach to security

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Supplier Information Security Addendum for GE Restricted Data

F G F O A A N N U A L C O N F E R E N C E

Security and Data Protection for Online Document Management Software

Retention & Destruction

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

1 Introduction 2. 2 Document Disclaimer 2

IT - General Controls Questionnaire

System Security Plan University of Texas Health Science Center School of Public Health

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Security Policy for External Customers

Projectplace: A Secure Project Collaboration Solution

Birst Security and Reliability

Autodesk PLM 360 Security Whitepaper

Information Technology Security Procedures

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Securing the Service Desk in the Cloud

FormFire Application and IT Security. White Paper

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

SNAP WEBHOST SECURITY POLICY

External Supplier Control Requirements

CONTENTS. Security Policy

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Security Overview. BlackBerry Corporate Infrastructure

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

IaaS Request for Proposal Template

INCIDENT RESPONSE CHECKLIST

Central Agency for Information Technology

How To Write A Health Care Security Rule For A University

GE Measurement & Control. Cyber Security for NEI 08-09

Risk Assessment Guide

Vendor Audit Questionnaire

CompTIA Security+ (Exam SY0-410)

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Hosted Testing and Grading

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Secure, Scalable and Reliable Cloud Analytics from FusionOps

PCI Requirements Coverage Summary Table

Cybersecurity Health Check At A Glance

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

KeyLock Solutions Security and Privacy Protection Practices

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

BMC s Security Strategy for ITSM in the SaaS Environment

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

HIPAA Privacy and Security Risk Assessment and Action Planning

Security Policy JUNE 1, SalesNOW. Security Policy v v

1B1 SECURITY RESPONSIBILITY

Logging In: Auditing Cybersecurity in an Unsecure World

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Best Practices For Department Server and Enterprise System Checklist

Security Controls What Works. Southside Virginia Community College: Security Awareness

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Critical Controls for Cyber Security.

How To Protect Yourself From A Hacker Attack

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

A Decision Maker s Guide to Securing an IT Infrastructure

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

StratusLIVE for Fundraisers Cloud Operations

State of Texas. TEX-AN Next Generation. NNI Plan

CHIS, Inc. Privacy General Guidelines

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

INFORMATION SECURITY FOR YOUR AGENCY

External Supplier Control Requirements

SRA International Managed Information Systems Internal Audit Report

Guide to Vulnerability Management for Small Companies

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

UCS Level 2 Report Issued to

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Transcription:

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER 1

Agenda Audits Articles/Examples Classify Your Data IT Control Objectives (Best Practices) Organization & Administrative Controls Data Backup and Business Continuity Physical Security Network & Internet Security Environmental Controls Segregation of Functions Summary & Take Away 2

Here Come the Auditors.. Statement on Auditing Standards (SAS) 94, The Effect of Information Technology on the Auditor s Consideration of Internal Control in a Financial Audit, requires the auditor to consider the importance of IT processes and controls in the preparation of financial statements. A report from the Public Oversight Board s Panel on Audit Effectiveness recommended that:... audit firms place a high priority on enhancing the overall effectiveness of auditors work on internal control, particularly with respect to the depth and substance of their knowledge about the entity's information technology. 3

Here Come the Auditors.. Audits that Impact the Clerk of Courts: Annual Financial Statement Audit Internal Control Audits of Service Organizations (SOC 1 Audits) Florida Courts E-Filing Portal: Court Filings and Electronic Commerce MyFloridaCounty.com Traffic Citations, Child Support, Ordering Official Records and Other 4

MyFloridaCounty.com and Florida Courts E-Filing Portal SOC 1 Workflow 5

Understanding Controls over Technology Source: Journal of Accountancy 6

Agenda Audits Articles/Examples Classify Your Data IT Control Objectives (Best Practices) Organization & Administrative Controls Data Backup and Business Continuity Physical Security Network & Internet Security Environmental Controls Segregation of Functions Summary & Take Away 7

Threat/Damage Examples Data Theft Political Competitive Advantage Monetary Gain Data Loss (Permanently removed or destroyed) External hacker Ransomware DoS (Denial of Service) Employee Disgruntled Hired or motivated by outside source 8

Breach Examples Stay out of the News! 9

Agenda Audits Articles/Examples Classify Your Data IT Control Objectives (Best Practices) Organization & Administrative Controls Data Backup and Business Continuity Physical Security Network & Internet Security Environmental Controls Segregation of Functions Summary & Take Away 10

Classify Your Data What are you trying to protect? Assign levels to data Critical Sensitive Top 10 threat action within Insider Misuse Low Level Public Restrict access By Department User Groups Higher level doesn t always mean access should be granted Common Issue Verizon 2014 Data Breach Investigations Report Misclassification Storage in wrong location 11

Agenda Audits Articles/Examples Classify your Data IT Control Objectives (Best Practices) Organization & Administrative Controls Data Backup and Business Continuity Physical Security Network & Internet Security Environmental Controls Segregation of Functions Summary & Take Away 12

IT Control Overview Organization & Administrative Controls Physical Security Environmental Controls Network and Internet Security Segregation of Functions Data Backup, Business Continuity and Disaster Recovery 13

Organization & Administrative Control Example Information Security Policy Do you have one? If so, are you following it? Develop the Policy Group effort from multiple departments Months to develop Risk versus cost and operational functionality Implement, Follow, Enforce Test Continuously Revise 14

Example Security Policy Content Client Data and Retention Privacy & Monitoring User Responsibilities Email and Remote Access Internet Security Hardware and Software Virus Protection Software Licensing and Use Mobile Device Policy (BYOD) Personal Use SANS Information Security Policy Templates 15

Organization & Administrative Control Example User Awareness & Education (Training a must!) Present the Security Policy and revisions Signed copy in every staff member s personnel file Vigilance - What to look for Safe browsing techniques (Lookout for Social Engineering attacks) Examples of breaches and attacks (How they happened) Difficult to protect your network with uneducated users Approximately 58% of cyber security incidents in the public sector were caused by employees (34% Accidents & 24% Unapproved or Malicious Data)1 16

Physical Security Building Access Key card or fob access Visitor badges and escorted Data Center Access Restricted access to authorized users Monitoring Security and fire monitoring from third-party vendor Annual Third-Party Security Review If the attacker can gain access to physical workstations or other hardware, you are toast! 17

Environmental Controls Redundant Cooling Systems Fire Suppression System Uninterruptible Power Supply (UPS) Units Backup Power Diesel/Natural Gas Generator Temperature & Humidity Monitoring 18

Network & Internet Security Network Diagram, Documentation and Labeling Security Devices & Firewalls Anti-Virus Protection Password Management Change Management Encryption Patch Management Monitoring (internal logs, IPS) User Roles (IT and Staff) 19

Layered Security Network Platform/OS Application Data Response Firewalls, routers, DMZ, VLAN, VPN Active Directory, Password Management, Antivirus, patching (Windows, Java, Flash, BIOS) Secure coding, change management, database security (i.e. SQL) Encryption, backup, access groups Monitoring (logs), intrusion detection, remediation 20

Layered Security (Good Example) Symantec website: Jan 30 2012 21

User Security Example Password Management Domain/Network Security Examples Minimum 10 characters Password complexity Required change every six months Unsuccessful attempt lockout Two-factor authentication (especially Internet facing) Include in Security Policy and User Education Never use the same password for other logins (i.e. banking, Facebook, third-party email) Never use linkable names and/or dates (i.e. family members, pets, birthdays and anniversaries) 22

Segregation of Functions User/Staff Access groups based on data classification Application Access Roles within applications (i.e. accounting software) IT Staff Access groups based on data classification Operating staff and programmers separated Creating user silos Local Admins and Domain Admins very dangerous! 23

Popular Attack - PtH (Pass-the-Hash) 24

Data Backup, Business Continuity and Disaster Recovery Backup Documentation (Disaster Recovery Policy) Schedule Hourly, Daily, Monthly, Annual (based on classification) Offsite backup and replication (hot-site) Retention Policy Test, Test, Test! (i.e. periodic restores of all areas) Contingency Plans Still have a breach Structured plan of remediation PR Protocol Who s talking to the press? 25

Agenda Audits Articles/Examples Classify Your Data IT Control Objectives (Best Practices) Organization & Administrative Controls Data Backup and Business Continuity Physical Security Network & Internet Security Environmental Controls Segregation of Functions Summary & Take Away 26

Summary and Takeaway Audits What we look at Breach Examples Stay out of the news! IT Control Examples Importance of Information Security Policy and other documentation User Education & Awareness Most important yet least utilized Layered Network Security Approach Contingency Ready if the breach still takes place? 27

Helpful Resources Verizon 2014 Data Breach Investigations Report http://www.verizonenterprise.com/dbir/2014/ AICPA Service Organization Control (SOC) Reports http://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/pages/so RHome.aspx SANS Information Security Policy Templates http://www.sans.org/security-resources/policies/ Microsoft Whitepaper - Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques http://www.microsoft.com/en-us/download/details.aspx?id=36036 28

Questions? John Keillor, CPA, Audit Partner jkeillor@lanigancpa.com Bryan D Miller, IT Director bmiller@lanigancpa.com Lanigan Group Lanigan & Associates, P.C. Lanigan Wealth Management 314 Gordon Avenue Thomasville Tallahassee - Atlanta (229) 226-8320 www.lanigancpa.com 29