Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy



Similar documents
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

SSC Operations IT Transformation in Motion

Looking at the SANS 20 Critical Security Controls

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Digital government toolkit

IT Infrastructure Audit

Critical Controls for Cyber Security.

Building a More Secure and Prosperous Texas through Expanded Cybersecurity

THE TOP 4 CONTROLS.

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Plan for Data Centres and Networks: Status Update

PRIVY COUNCIL OFFICE. Audit of Information Technology (IT) Security. Final Report

AUDIT OF READINESS FOR THE IMPLEMENTATION OF THE POLICY ON INTERNAL CONTROL

Security Management. Keeping the IT Security Administrator Busy

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

FDA STAFF MANUAL GUIDES, VOLUME I - ORGANIZATIONS AND FUNCTIONS FOOD AND DRUG ADMINISTRATION OFFICE OF OPERATIONS

SANS Top 20 Critical Controls for Effective Cyber Defense

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Information Technology Association of Canada (ITAC)

The Protection Mission a constant endeavor

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

SCAC Annual Conference. Cybersecurity Demystified

VA Office of Inspector General

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Jumpstarting Your Security Awareness Program

University System of Maryland University of Maryland, College Park Division of Information Technology

Internal Audit Practice Guide

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Audit of Physical Security Management

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Audit of Financial Management Governance. Audit Report

Bellevue University Cybersecurity Programs & Courses

Internal Audit Report on. IT Security Access. January January - English - Information Technology - Security Access - FINAL.

Speaking Notes for. Liseanne Forand. President, Shared Services Canada. At GTEC

Top 20 Critical Security Controls

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

ICT Category Sub Category Description Architecture and Design

INFORMATION TECHNOLOGY ENGINEER V

Web Version. Information Technology (IT) Security Management Practices

Great Now We Have to Secure an Internet of Things. John Pescatore SANS Director, Emerging Security

VA Office of Inspector General

AUDIT REPORT. The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Office of the Chief Information Officer. Annual Report

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Defending Against Data Beaches: Internal Controls for Cybersecurity

Aboriginal Affairs and Northern Development Canada. Internal Audit Report. Audit of Internal Controls Over Financial Reporting.

Assessing the Effectiveness of a Cybersecurity Program

Statement of Management Responsibility Including Internal Control Over Financial Reporting

IT Security Risk Management: A Lifecycle Approach

Audit of the Policy on Internal Control Implementation

Data Centre Networks Overview

Cybersecurity Awareness. Part 2

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

VA Office of Inspector General

ICT budget and staffing trends in Healthcare

State of Oregon. State of Oregon 1

Auditor General of Canada to the House of Commons

Domain 1 The Process of Auditing Information Systems

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Connect with Addressing Intelligence to Automate IPv6 Planning, Transition & Cyber Security

JOE MOROLONG LOCAL MUNICIPALITY IT GOVERNANCE FRAMEWORK

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Information Technology Risk Management

FFIEC Cybersecurity Assessment Tool

Financial Statements of the. Office of the Secretary to the Governor General

Federal IPv6 Working Group Innovative IPv6 Implementation with Least Cost Funding

COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE

Action Plan for Canada s Cyber Security Strategy

EVALUATION REPORT. The Department of Energy's Unclassified Cybersecurity Program 2014

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

NERC CIP Compliance with Security Professional Services

1. FPO. Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Second Edition

Administrative Guidelines on the Internal Control Framework and Internal Audit Standards

Services Providers. Ivan Soto

PCI DSS AND THE TOP 20 CRITICAL SECURITY CONTROLS COMPARING SECURITY FRAMEWORKS SERIES

ICT budget and staffing trends in the UK

IT Networking and Security

Phase II of Compliance to the Policy on Internal Control: Audit of Entity-Level Controls

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Protecting Organizations from Cyber Attack

Office of Inspector General

Sarbanes-Oxley Compliance for Cloud Applications

Enterprise Architecture at the Government of Canada

IT Outsourced Services. Preliminary Survey

Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA

Audit of Policy on Internal Control Information Technology General Controls (ITGCs) Audit

Technology Risk Management

VENDOR MANAGEMENT. General Overview

Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Frequently Asked Questions

Better secure IT equipment and systems

Terms of Reference for an IT Audit of

Reducing the Cyber Risk in 10 Critical Areas

Transcription:

Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy Presentation to The Institute of Internal Auditors Breakfast Session February 6, 2014

Outline of Presentation Overview of Shared Services Canada (SSC) Information Technology (IT) Controls Theory and Practice Considerations for an Audit Strategy of an IT Control Framework 2

Fragmentation in the management of the Government s IT infrastructure has led to high costs, complexity and security risks Mission-critical programs depend on IT infrastructure Departments managed their IT infrastructure DE independently Status quo was complex, costly and less secure 2,100 mission-critical programs that span: Key benefits programs (e.g. employment insurance, Canada Pension Plan, Old Age Security); Security (e.g. Department of National Defence, Royal Canadian Mounted Police s Canadian Police Information Centre systems and provincial police force databases, Canada Border Services Agency border systems, and Public Safety cyber security and emergency response); Safety and health (e.g. Canadian Food Inspection Agency [CFIA] and food monitoring, Health Canada labs, Environment Canada weather systems, Natural Resources Canada seismic systems); Farmers and students (Agriculture and Agri- Food Canada, CFIA, loan programs); and Finance systems (e.g. Canada Revenue Agency federal-provincial tax and benefit systems, Financial Transactions and Reports Analysis Centre of Canada ). In total, the Government of Canada (GC) was spending $1.9B/year on an unstructured and uncoordinated web of IT infrastructure and services: 63 email systems; Nearly 500 data centres of varying sizes, quality, security and energy efficiency; and 50 wide area networks connecting over 3 500 buildings and data centres over 1 000 firewalls. Current state of IT infrastructure is: Vulnerable to cyber attacks, low availability and poor performance; A long-term unfunded liability and a barrier to renewal, modernization and agility; Using procurement practices that limit innovation; Largely in-sourced; and Not service-oriented. 3

Current State of Data Centres and Networks Building Building Building Building LAN 2 Dept. B Dept. A: small data centre LAN 1 Dept. A LAN 2 Dept. B LAN 3 Dept. F LAN 4 Dept H LAN 5 Dept. Q Dept. F: small data centre LAN 6 LAN 7 485 data centres Dept. F: small data centre LAN 3 999 LAN 4 000 50 wide area networks (WAN) WAN 1 WAN 2 WAN 3 WAN 50 Dept. A: large data centre Dept. H: small data centre. LAN 4 Dept. H LAN 5 Dept. Q LAN 6 Dept. Q: small data centre LAN 7 LAN 6 Dept. B: small data centre LAN 7 4 000+ local area networks (LAN) Dept. D: small data centre LAN 6 LAN 7 Building Building Building Building Building 4

Shared Services Canada (SSC) was established to address these problems through an enterprise-wide approach to IT service and renewal In 2011, the Prime Minister created SSC to: improve IT service delivery across the GC; transform the GC s email, data centres and networks; and generate savings for deficit reduction and the longer term. Personnel, financial resources and assets were transferred through Orders-in-Council (OiCs) to SSC from 43 of the largest federal departments. SSC in 2013-14 : 5 895 employees; net expenditures of $1.4B (plus $369M in revenues); new responsibility for workplace technology services August 4, 2011 November 15, 2011 April 1, 2012 June 29, 2012 April 1, 2013 Creation of SSC announced OiC transfer of IT infrastructure services and resources from Public Works and Government Services Canada (PWGSC) OiC transfer of IT infrastructure services and resources from 42 departments SSC becomes a stand-alone department with full financial authorities Royal Assent of Shared Services Canada Act OiCs defining core services of SSC and transferring procurement resources from PWGSC OiCs adding procurement of workplace technology hardware and software to SSC s mandate and transferring related resources from PWGSC 5

Consolidation of personnel, services, assets and contracts has already improved service and value-for-money SSC s initial contribution to deficit reduction was outlined in Economic Action Plan (EAP) 2012: $74.7 million in 2012-2013 (5% of SSC s base); $104.5 million in 2013-2014 (7% of SSC s base); and $150 million on an ongoing basis beginning in 2014-2015 (10% of SSC s base). SSC is generating these immediate savings by: building the leanest internal services organization in the GC; leveraging GC buying power to secure better prices from telecommunications and data centre services suppliers; and migrating outdated desktop telephone services to modern and less costly cellular and Voice over Internet Protocol services. In addition to generating savings, SSC s enterprise-wide approach to service delivery is focussed on: enterprise incident management to keep mission-critical systems up and running and address the root causes of any breakdowns; moving from 9-to-5 IT operations teams to 24/7 for mission-critical systems; and contributing to important government-wide priorities (e.g. Beyond the Border, pay and pension modernization). 6

SSC has developed detailed plans to transform the Government of Canada s IT infrastructure and is moving to implementation Current State Target End State 63 different email systems and no standard for addresses Single email system with a standard naming convention 485 data centre sites that are inefficient and vulnerable Seven data centres that are resilient, secure and energyefficient 50 wide area networks and outdated telecommunications services Single enterprise network and Workplace 2.0 technology Lower costs, increased security, improved service 7

Enterprise Security End State of Data Centres and Networks Canadians Internet Allies (+International) Virtual Private Cloud Businesses Governments Public Servants GC Network Regional and International Carriers (377 000 users; 4 000+ sites) GC Offices Production X Production Y Business Continuity Sensitive Data Enclaves Geographic Diversity Data centres in pairs for high performance and availability Data centres in diverse locations for disaster tolerance Development Development Centre Separate development data centres for best support of application development Leading practice to ensure strong segregation of production environment from non-production 8

Responsibility for IT services across the Government Responsibility Email, Data Centres and Networks Workplace Technology Devices Applications Service Management and Delivery Procurement SSC (mandatory or optional for specific departments as specified in orders in council) Departments Public Works and Government Services Canada Policy and Standard Setting Treasury Board of Canada Secretariat 9

Why do IT Controls Matter? Why should I understand IT risks and controls? Two words: assurance and reliability What is to be protected? Trust should be protected because it ensures business and efficiency. Where are IT controls applied? Everywhere. Who is responsible? Everyone. But controls ownership must be defined. When should IT risks and controls be assessed? Always. How much control is enough? Management must decide based on risk appetite, tolerance and mandatory regulations. 10

Principles for IT Controls @ SSC Risk-Based Use of Established Control Frameworks Validated through consultations (e.g. partners, OAG, OCG) Focus on End-State Comprehensive (Security, Finance, Operations) Designed to provide assurance to partners as well as management 11

Levels of Controls Entity Level Controls are pervasive across a department, and include value and ethics, governance, human resource management, risk management, communication, and monitoring Business Process Controls are controls, both manual and automated, embedded in specific business processes Information Technology (IT) General Controls (also referred to as General Computer Controls) include controls over computer operations, access to programs and data, program development, and program changes 12

Generic Universe of IT Controls 13

IT Audit Universe in the Federal Government SSC Corporate Audits e.g: IT Governance IT Procurement Partner s Audits of IM e.g: Application Controls Database Mgmt IT General Controls Partners Operational Financial Security Legacy MAPs SSC Joint Audits and Assessments Assurance to Partners OAG Audits 14

Hierarchy of IT Controls COSO COBIT TBS Policy on Internal Controls Canadian Institute of Chartered Accountants (5925) Consensus Audit Guidelines (20 critical controls) (SSC RMF) CSEC (ITSG33) IT Governance Controls IT Management Controls IT Technical Controls 15

Components of the COSO Framework Control environment senior management establishes the tone from the top regarding the importance of internal control and expected standards of conduct, including: Integrity and ethical values articulated in the Values and Ethics Code for the Public Sector; Organizational structures and assignment of authority and responsibility articulated, in part, in the Policy on Management, Resources and Results Structures; and Process for attracting, developing and retaining competent individuals. Risk assessment a dynamic and iterative process for identifying and analyzing risks to achieving the entity s objectives, forming a basis for determining how risks should be managed: Integrated risk management, including the development of a Corporate Risk Profile, is well articulated in the Treasury Board Framework for the Management of Risk and Treasury Board Guide to Integrated Risk Management. 16

Components of the COSO Framework (Continued) Control activities contributes to the mitigation of risks to the achievements of objectives to acceptable levels: Control activities are manifested in policies that establish what is expected and in relevant procedures to effect the policies; and Control activities are performed at all levels of the entity and at various stages within business processes, and over the technology environment. Information and communication enables personnel to understand the entity s objectives and the importance of their internal control responsibilities. Monitoring activities ongoing evaluations are used to ascertain whether controls are present and functioning: Existing mechanisms include the annual Management Accountability Framework (MAF) assessment, the annual Departmental Performance Report, and the risk-based multi-year audit plan updated annually. 17

Control Environment IT is often mistakenly regarded as a separate organization of the business and thus a separate control environment. IT is complex, not only with regard to its technical components but also in how those components integrate into the organization s overall system of internal control. IT can introduce additional or increased risks that require new or enhanced control activities to mitigate successfully. IT requires specialized skills that may be in short supply. IT may require reliance on third parties where significant processes or IT components are outsourced. Ownership of IT controls may be unclear, especially for application controls. 18

COSO Components Cross-reference of COSO and CobiT CobiT Objectives Evaluate, Direct and Monitor Align, Plan and Organise Build, Acquire and Implement Deliver, Service and Support Monitor, Evaluate and Assess Control Environment Risk Assessment Control Activities Information and Communication Monitoring 19

Interrelationships of CobiT Components Source: Cobit 4.1, Figure 4 Interrelationships of CobiT Components 20

Example: IT Control Objectives for Sarbanes-Oxley IT Control Objectives 1. Acquire and maintain application software 2. Acquire and maintain technology infrastructure 3. Enable operations 4. Install and accredit solutions and changes 5. Manage changes 6. Define and manage service levels 7. Manage third-party services 8. Ensure system security 9. Manage the configuration 10. Manage problems and incidents 11. Manage data 12. Manage the physical environment and operations 21

Example: CCA Critical Controls for Effective Cyber Defense Critical Control 1: Inventory of Authorized and Unauthorized Devices Critical Control 2: Inventory of Authorized and Unauthorized Software Critical Control 3:Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Critical Control 4: Continuous Vulnerability Assessment and Remediation Critical Control 5: Malware Defenses Critical Control 6: Application Software Security Critical Control 7: Wireless Device Control Critical Control 8: Data Recovery Capability Critical Control 9:Security Skills Assessment and Appropriate Training to Fill Gaps Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Critical Control 11: Limitation and Control of Network Ports, Protocols, and Services Critical Control 12: Controlled Use of Administrative Privileges Critical Control 13: Boundary Defense Critical Control 14: Maintenance, Monitoring, and Analysis of Audit Logs Critical Control 15: Controlled Access Based on the Need to Know Critical Control 16: Account Monitoring and Control Critical Control 17: Data Loss Prevention Critical Control 18: Incident Response and Management Critical Control 19: Secure Network Engineering Critical Control 20: Penetration Tests and Red Team Exercises Source:, Consortium for Cybersecurity Action, Consensus Audit Guidelines 22

Example: CSEC ITSG-33 Security Control Catalogue Structure Source: CSEC, IT Security Risk Management: A Lifecycle Approach. 23

Senior Roles and Responsibilities Deputy heads have always had the responsibility to ensure that internal controls are regularly reviewed in the context of risk, ensuring that those internal controls are balanced against and proportional to the risks they mitigate. Chief Financial Officer supports the deputy head by establishing and maintaining a system of internal control related to financial management, including financial reporting and departmental accounts. Other senior departmental managers establish and maintain a system of internal control for their areas of responsibility and within the departmental system of internal control. Chief audit executives establish risk-based audit plans and perform assurance engagements necessary to provide the deputy head with independent assurance regarding risk management, control and governance processes. Departmental audit committees are responsible to review and provide advice on the departmental internal control arrangements, and to be informed on all matters of significance arising from work performed by others who provide assurances to senior management and the deputy head. Source: Policy on Internal Control; Directive on Internal Auditing in the Government of Canada 24

IT Controls Implementation Road Map Plan and scope IT controls Assess IT Risk Document Controls Evaluate Control Design and Operating Effectiveness Prioritize and Remediate Deficiencies Build Sustainability 25

IT Controls and the Audit Function Generic Description of Internal Controls: Internal control is a process, effected by an entity s board of directors, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories: Effectiveness and efficiency of operations. Reliability of reporting. Compliance with applicable laws and regulations. Source: COSO Role of audit: The internal audit activity must evaluate the adequacy and effectiveness of controls in responding to risks within the organization s governance, operations and information systems. Source: IIA Standard 2130 26

Proposed Audit Process of Audit of SSC s IT Internal Controls Management Description of SSC s IT Systems Management Assertion that description of SSC s IT systems is fairly presented, controls are suitably designed and operate effectively Internal Audit Report on SSC s IT Internal Controls Office of the Auditor General Provides an Opinion on IT Controls Could Use the Work of SSC Internal Audit Function SSC Partners Departmental Audit and Evaluation Committee (DAEC) provides advice 27

Top-down Audit Approach Audit team develops an understanding of overall risks to internal controls Focus on significant entity-level controls Focus on specifics controls presenting reasonable possibility of failure Select these controls for testing 28

Management of Audits of IT Controls Planning Take stock of Business and IT Processes Risk Assessment Ensure IT competencies and skills are available Executing Identify and document relevant controls Test the design and operating effectiveness of the controls Conclude on the controls Reporting Clearly communicate observations and conclusions Present to DAEC and External Auditors Provide Assurance to Partners 29

Questions 30