ow to use CobiT to assess the security & reliability of Digital Preservation



Similar documents
IT Audit in the Cloud

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Certified Information Systems Auditor (CISA)

INFORMATION TECHNOLOGY SECURITY STANDARDS

ISO27001 Controls and Objectives

Information Security Governance:

CISM ITEM DEVELOPMENT GUIDE

Newcastle University Information Security Procedures Version 3

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Information Security Policies. Version 6.1

for Information Security

IS AUDITING GUIDELINE BUSINESS-TO-CONSUMER (B2C) E-COMMERCE REVIEWS DOCUMENT G22

Application for CISA Certification

Information Security Management Systems

Enabling Information PREVIEW VERSION

Spillemyndigheden s Certification Programme Information Security Management System

ISO Controls and Objectives

Information security controls. Briefing for clients on Experian information security controls

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Domain 1 The Process of Auditing Information Systems

University of Sunderland Business Assurance Information Security Policy

Governance and Management of Information Security

State of West Virginia Office of Technology Policy: Information Security Audit Program Issued by the CTO

G11 EFFECT OF PERVASIVE IS CONTROLS

CobiT Strategy and Long Term Vision

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Specific observations and recommendations that were discussed with campus management are presented in detail below.

Practical Guidance for Auditing IT General Controls. September 2, 2009

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Records and Document Management

A FRAMEWORK FOR INTEGRATING SARBANES-OXLEY COMPLIANCE INTO THE SOFTWARE DEVELOPMENT PROCESS

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Spillemyndigheden s Certification Programme Information Security Management System

INFORMATION SECURITY PROCEDURES

An Approach to Records Management Audit

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Roles, Activities and Relationships

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

INFORMATION SECURITY California Maritime Academy

IT Governance Dr. Michael Shaw Term Project

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Information Security Specialist Training on the Basis of ISO/IEC 27002

The Information Systems Audit

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

Auditors Need to Know June 13th, ISACA COBIT 5 for Assurance

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

INFORMATION SECURITY Humboldt State University

Information Security Policy

(Instructor-led; 3 Days)

Domain 5 Information Security Governance and Risk Management

How To Protect Decd Information From Harm

Hengtian Information Security White Paper

ITAG RESEARCH INSTITUTE

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

IT Compliance After Hours Seminar September 2007 Zurich. Improving IT Risk & Compliance Management (RCM)

ITIL AND COBIT EXPLAINED

ITAG RESEARCH INSTITUTE

Application for CISM Certification

Gobierno de TI Enfrentando al Reto. IT Governance Facing the Challenge. Everett C. Johnson, CPA International President ISACA and ITGI

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

I. EXECUTIVE SUMMARY. Date: June 30, Sabina Sitaru, Chief Innovation Officer, Metro Hartford Innovation Services

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

Altius IT Policy Collection Compliance and Standards Matrix

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Information Management and Security Policy

Top Ten Technology Risks Facing Colleges and Universities

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Strategic IT audit. Develop an IT Strategic IT Assurance Plan

FINAL May Guideline on Security Systems for Safeguarding Customer Information

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

Revised October 2013

Information Security Program CHARTER

April 20, Integrating COBIT into the IT Audit Process (Planning, Scope Development, Practices)

Electronic Payment Schemes Guidelines

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Manual of Information Technology Audit

Third Party Security Requirements Policy

Information security policy

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

Draft Information Technology Policy

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

Payment Card Industry Compliance

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

CTR System Report FISMA

Technology Risk Management

Transcription:

ow to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14-16 April 2004 Greet Volders Managing Consultant - VOQUALS N.V. Vice President & in charge of Education - ISACA Belux

Content of this Presentation Agenda ISACA & CobiT Introduction ISACA Organisation IT Audit Process CobiT Framework Focus on some CobiT-processes Relevant to digital preservation With a focus on reliability, confidentiality and security Practical guidelines to audit these processes and domains Slide 2

Mission & Strategy of Voquals Voquals offers advice on quality management to organisations or more specifically to Information Technology departments. In addition Voquals provides assistance during the implementation of methods for application development and project management. Voquals was founded in 1996 by Greet Volders & Eddy Volckaerts and indicates Volders quality services or Volckaerts quality services A pragmatic and contextual approach is at the heart of every project we carry out. Slide 3

Our Core Business We are specialised in : Quality Management Project Management Consultancy, Coordination, Implementation Quality Audits (ISO, EFQM, TickIT,...) IT-Audits (CobiT, CMM) EFQM - Self Assessment Process Analysis and Development Transitions to a Project-Based Approach to Work Electronic Document Management (in general or focused on Quality) Slide 4

Content of this Presentation Agenda ISACA & CobiT Introduction ISACA Organisation IT Audit Process CobiT Framework Slide 5

CobiT Framework Why the need for CobiT Changing IT Emphasis Ten years ago we were afraid of rockets destroying computing centres. right now, we should be aware of software errors destroying rockets Slide 6

CobiT Framework Control Objectives Linking management s IT expectations With management s IT responsibilities What you get Business Processes What you need IT Resources Information Criteria Data Application systems Technology Facilities People Information Do they match Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability Slide 7

CobiT Framework Navigation Aids Linking Process, Resource & Criteria to 34 control objectives with 318 DETAILED control objectives effectiveness efficiency confidentiality integrity availability compliance reliability The control of Planning & organisation Acquisition & Implementation Delivery & Support Monitoring IT Processes Which statisfy Business Requirements Is enabled by Control Statements And considers Control Practices people applications technology facilities data Slide 8

Content of this Presentation Agenda ISACA & CobiT Introduction ISACA Organisation IT Audit Process CobiT Framework Focus on some CobiT-processes Relevant to digital preservation With a focus on reliability, confidentiality and security Practical guidelines to audit these processes and domains Slide 9

CobiT Framework relevant to digital preservation PO1 Define a strategic IT Plan 1 Monitor the process 2 Assess internal control adequacy 3 Obtain independent assurance 4 Provide for independent audit 1 Define service levels 2 Manage third-party services 3 Manage perform. and capacity 4 Ensure continuous service 5 Ensure systems security 6 Identify and attribute costs 7 Educate and train users 8 Assist and advise IT customers 9 Manage the configuration 10 Manage problems and incidents 11 Manage data 12 Manage facilities 13 Manage operations Criteria effectiveness efficiency confidentiality integrity availability compliance reliability MONITORING Business Objectives IT RESOURCES data application systems technology facilities people DELIVERY AND SUPPORT ACQUISITION AND IMPLEMENTATION PO2 Define the information architecture PO3 Determine the technological direction PO4 Define the IT org. and relationships PO5 Manage the IT investment PO6 Communicate mngt aims and direction PO7 Manage human resources PO8 Ensure compliance with ext. req. PO9 Assess risks PO10 Manage Projects PO11 Manage Quality PLANNING AND ORGANISATION AI1 Identify automated solutions AI2 Acquire and maintain application S AI3 Acquire and maintain techn. Infrastr. AI4 Develop and maintain IT procedure AI5 Install and accredit systems AI6 Manage changes Slide 10

PO8 Ensure Compliance with External Requirements Control over the IT process of ensuring compliance with external requirements that satisfies the business requirement to meet legal, regulatory and contractual obligations Is enabled by identifying and analysing requirements for their IT impact, and taking appropriate measures to comply with them Slide 11

PO8 Ensure Compliance with External Requirements Develop Audit Plan Interviewing: Legal counsel Human Resources Officer Senior Management of the IT function Obtaining: Relevant government and/or external requirements Standards, policies and procedures concerning» External requirements reviews» Safety and health (including ergonomics)» Privacy» Security» Sensitivity rating of data being input, processed, stored, outputted and transmitted» Electronic commerce» Insurance Copies of all IT function related insurance contracts Audit reports from» External auditors» Third-party service providers» Governmental agencies Slide 12

PO8 Ensure Compliance with External Requirements Evaluating Policies and procedures for: Coordinating the external requirements review Addressing appropriate safeguards Appropriate safety and health training and education is provided to all employees Monitoring compliance with applicable safety and health laws and regulations Providing adequate direction/focus on privacy in order that all legal requirements fall within its scope Informing the insurers of all material changes to the IT environment Ensuring compliance with the requirements of the insurance contracts Ensuring updates are made when applicable Security procedures are in accordance with all legal requirements and are being adequately addressed, including: Password protection and software to limit access Authorisation procedures Terminal security measures Data encryption measures Firewall controls Virus protection Timely follow-up of violation reports Slide 13

PO8 Ensure Compliance with External Requirements Substantiate the risk of C.O. s not being met by: Performing : Benchmarking of external requirements compliance A detailed review of the external requirements review files to ensure corrective actions have been undertaken or are being implemented A detailed review of security reports to assess whether sensitive/private information is being afforded appropriate security and privacy protections Identifying Privacy and security weaknesses related to data flow and/or transborder data flow Weaknesses in contracts with trading partners related to communications processes, transaction messages, security and/or data storage Weaknesses in trust relationships of trading partners Non-compliances with insurance contract terms Slide 14

AI3 Acquire and Maintain Technology Infrastructure Control over the IT process of acquiring and maintaining technology infrastructure that satisfies the business requirement to provide the appropriate platforms for supporting business applications Is enabled by judicious hardware and software acquisition, standardising of software, assessment of hardware and software performance and consistent system administration Slide 15

AI3 Acquire and Maintain Technology Infrastructure Develop Audit Plan Interviewing: IT planning/steering committee Chief information officer IT senior management Obtaining: Policies and procedures relating to hardware and software acquisition, implementation and maintenance Senior management steering roles and responsibilities IT objectives and long- and short-range plans Status reports and minutes of meetings Vendor hardware and software documentation Hardware and software rental contracts or lease agreement Slide 16

AI3 Acquire and Maintain Technology Infrastructure Evaluating Policies and procedure to cover Evaluation plan Is prepared to assess new hardware and software for any impact on the overall performance of the system System software Ability to access without interruption Set up, installation and maintenance does not jeopardise the security of the data and programmes being stored on the system Parameters are selected in order to ensure the integrity of the data and programmes Installed and maintained in accordance with the acquisition and maintenance framework for the technology infrastructure Vendors provide integrity assurance statements with their software and all modifications to their software Slide 17

DS5 Ensure System Security Control over the IT process of ensuring systems security that satisfies the business requirement to safeguard information against unauthorised use, disclosure or modification, damage or loss Is enabled by logical access controls which ensure that access to systems, data and programmes is restricted to authorised users Slide 18

DS5 Ensure System Security Develop Audit Plan Interviewing: Senior security officer of the organisation IT senior and security management IT data base administrator IT security administrator IT application development management Obtaining: Organisation-wide policies and procedures IT policies and procedures Relevant policies and procedures, and legal and regulatory body information systems security requirements including» User account management procedures» User security or information protection policy» Data classification schema» Inventory of access control software» Floor pan & schematic of physical access points to IT resources» Security software change control procedures» Security violation reports and management review procedures» Copies of contracts with service providers for data transmission Slide 19

DS5 Ensure System Security Evaluating Strategic security plan Cryptographic modules and key maintenance procedures Password policy includes Change initial password Minimum password length Allowed values (list of not-) Location control methods are used to apply additional restrictions at specific locations Security related hardware and software, such as cryptographic modules, are protected against tampering or disclosure, and access is limited to a need to know basis Trusted paths are used to transmit non-encrypted sensitive information Slide 20

DS12 Manage Facilities Control over the IT process of managing facilities that satisfies the business requirement to provide a suitable physical surrounding which protects the IT equipment and people against man-made and natural hazards Is enabled by the installation of suitable environmental and physical controls which are regularly reviewed for their proper functioning Slide 21

DS12 Manage Facilities Develop Audit Plan Interviewing: Facility manager Security officer Risk manager IT operations manager IT security manager Obtaining: Organisational policies and procedures relating to facility management, layout, security, safety, fixed asset inventory and capital acquisition/leasing List of individuals who have access to the facility and floor layout of facility List of performance, capacity and service level agreements Slide 22

DS12 Manage Facilities Evaluating Facility location Is not obvious externally Is in least accessible area or organisation Access is limited to least number of people Logical and physical access procedures are sufficient, including security access profiles Key and card reader management procedures and practices are adequate Organisation is responsible for physical access within the IT function that includes Security policies and procedures Relationships with security-oriented vendors Security awareness Logical access control Penetration test procedures and results Slide 23

More Information Coordinates ISACA & ISACF 3701 Algonquin Road, suite 1010 Rolling Meadows, Illinois 60008 USA Phone +1 708 253 1445 Education@isaca.org http://www.isaca.org ISACA Belux Education@isaca.be http://www.isaca.be Voquals N.V. Greet Volders Diestsebaan 1 3290 Diest - Belgium Phone +32 13 326464 Mobile +32 475 63 45 06 Gvolders@voquals.be www.voquals.be Slide 24

Information Systems Audit and Control Association Information Systems Audit and Control Foundation The recognized global leaders in IT governance, control and assurance.

Mission: To support enterprise objectives through the development, provision and promotion of research, standards, competencies and practices for the effective governance, control and assurance of information, systems and technology. Information Systems Audit and Control Association (ISACA TM ) Information Systems Audit and Control Foundation (ISACF TM )

o: CCESS Leading-edge research K-NET, an internet-based global knowledge network for IT governance, control and assurance information hrough: Local chapters DISCOUNTS On: ISACA Membership Benefits CISA exam registration fee and study materials CISM exam registration fee and study materials ISACA-sponsored conferences and Training Weeks COBIT and other publications ETWORKING AND LEADERSHIP OPPORTUNITIES

Do you want to know ore? Information Systems Audit and Control Association/ Foundation 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL, USA 60008 Phone: +1.847.253.1545 Fax: +1.847.253.1443 E-mail: info@isaca.org Web site: www.isaca.org

Chapter Organization ISACA BeLux Chapter ISACA Belux Board ISACA Belux Education Committee ISACA Belux Luxembourg Development

Core activities CISA preparation CISM preparation Round Table Meetings Board meetings Educational Committee meetings Annual General Meeting Miscellaneous events (social) New Year drink Gala Dinner For more information: www.isaca.be ISACA BeLux Chapter