[go: up one dir, main page]

100% found this document useful (2 votes)
184 views25 pages

INFORMATION SECURITY AUDITING Week 1-5

Download as doc, pdf, or txt
Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1/ 25

INFORMATION SECURITY AUDITING

Audit
Independent review and examination of records and activities to assess the adequacy of internal
controls, to ensure compliance with established policies and operational procedures, and to
recommend necessary changes in controls, policies, or procedures.

• Auditing is a posteriori technique for determining security violations.


• An effective auditing subsystem is a key security component of any system.

IT/IS Audit
 The process of collecting and evaluating evidence to determine whether computer system
safeguards assets, maintain data integrity, achieves organisational goals effectively and
consumes resources effectively.

Objectives of IT/IS Audit


Improved Data
Integrity

Safeguarding of IT/IS Improved System


Assets Audit Effectiveness

Improved System
Efficiency

What are the elements of IT/IS Audit?


1. Physical and Environmental
2. System Administration
3. Application Software
4. Application Development
5. Network Security
6. Business Continuity
7. Data Integrity
Types of Information system audit
Internal vs External
 Audit function can be performed internally or externally
 Internal audit is an independent appraisal of operations, conducted under the direction of
management, to assess the effectiveness of internal administrative and accounting
controls and help ensure conformance with managerial policies
 External Audit is an audit conducted by an individual of a firm that is independent of the
company being audited.

 A typical structure and context showing where IS Audit fits within a typical large
corporation
Internal Audit Reporting Structure

Head of Audit Dept

Head of IT Audit Head of Non-IT Audit

IT Audit Team Members Non-IT Audit Team


Members

IS Auditor Qualifications

Independent:

 Professional Independence: Auditor acts independent of group being audited


 No friendships, dating, suggestive language, parties, lunches

 Organizational Independence: Auditor and his/her organization has no special interest


in the audited organization

 Accounting Controls – those controls which are intended to safeguard the client’s assets
and ensure the reliability of the financial records. Whether financial processes have been
carried out properly.

Knowledge, Skills, Abilities required


 Knowledge of auditing, IS and network security
 Investigation and process flow analysis skills
 Interpersonal/human relation skills
 Verbal and written communications skills
 Ability to exercise good judgment
 Ability to maintain confidentiality
 Ability to use IT desktop office tools, vulnerability analysis tools, and other IT tools

Adhere to Professional Ethics Standard

 ISACA standard and professional care

Professional Competence

 Has skills/knowledge to complete task


 Continued professional training/education

The Role of IT Auditors in the Financial Audit Process


 Develop an understanding and perform preliminary audit work
 Develop audit plan by designing a tch based audit approach
 Evaluate internal control systems
 Determine degree of reliance on internal controls, overseeing investigation of
inappropriate use.
 Examine the effectiveness of the IS by performing substantive testing
 Review work and issue audit report
 Conduct follow-up work
 Reviewing and assessing enterprise mgt controls before performing tests on them

Roles of IT Audit Team


Audit Planning Table
Audit Area Time- Date of Responsibility
frame Last Test

Policies & Procedures 1Q Never Internal Auditor


for Registration,
Advising

Business Continuity 2Q 2005 CIO, Security


Consultant

FERPA: Personnel 3Q Never Internal Auditor


interviews

IT: Penetration Test 4Q 2006 CIO, Security


consultant

Family Educational Rights and Privacy Act of 1974 (FERPA or the Buckley Amendment) is a
United States federal law.
Roles and Responsibilities in IT Audit
 Ensure IT governance by assessing risks and monitoring controls over those risks
 Works as either internal or external auditor
 Works on many kind of audit engagements
 Reviewing and assessing enterprise management controls
 Review and perform test of enterprise internal controls
 Report to management

Job Tasks and Responsibilities include:


 Design a technology-based audit approaches; analyzes and evaluates enterprise IT
processes
 Works independently or in a team to review enterprise IT controls
 Examines the effectiveness of the information security policies and procedures
 Develops and presents training workshops for audit staff
 Conduct and oversees investigation of inappropriate computer use
 Performs special projects and other duties as assigned

Effective IT Audit
 Early involvement
 Informal audits
 Knowledge sharing
 Self-assessments

Why do you need IS Audit?


• Describe security state
– Determine if system enters unauthorized state
• Evaluate effectiveness of protection mechanisms
– Determine which mechanisms are appropriate and working
– Deter attacks because of presence of record
• What do you log?
– Hint: looking for violations of a policy, so record at least what will show such
violations
• What do you audit?
– Need not audit everything
– Key: what is the policy involved?
• IT audit work on financial audit engagements is likely to increase as internal control
evaluation becomes more important

Classifications of Audit
 Financial Audit: Assure integrity of financial statements
 Operational Audit: Evaluate internal controls for a given process or area
 Integrated Audit: Includes both Financial and Operational aspects
 Forensic Audit: Follows up on fraud/crime
 IS Audit: Does IS safeguard data, provide CIA in efficient way?
 Administrative Audit: Assess efficiency of a process or organization
 Specialized Audit: Example:
 SAS 70: Assesses internal controls of a service organization
 Standards, such as SAS No. 94, guide the work of IT auditors on financial audit
engagements

COMPUTERISED INFORMATION SYSTEMS


What Is an Information System?
Information system has been defined in terms of two perspectives:
 Relating to its function-From a functional perspective an information system is a
technologically implemented medium for the purpose of recording, storing, and
disseminating linguistic expressions as well as for the supporting of inference making.
 Relating to its structure- An information system consists of a collection of people,
processes, data, models, technology and partly formalized language, forming a cohesive
structure which serves some organizational purpose or function.

The functional definition has its merits in focusing on what actual users - from a conceptual point
of view- do with the information system while using
it. They communicate with experts to solve a particular problem.

The structural definition makes clear that IS are socio-technical systems, i.e., systems consisting
of humans, behavior rules, and conceptual and technical artifacts.

 An information system can be defined technically as a set of interrelated


components that collect (or retrieve), process, store, and distribute information to
support decision making and control in an organization. In addition to supporting
decision making, coordination, and control, information systems may also help
managers and workers analyze problems, visualize complex subjects, and create
new products.

Three activities in an information system produce the information that organizations need to
make decisions, control operations, analyze problems, and create new products or services.
These activities are:
 input,
 processing,
 output

Input captures or collects raw data from within the organization or from its external environment.
Processing converts this raw input into a more meaningful form.
Output transfers the processed information to the people who will use it or to the activities for
which it will be used. Information systems also require feedback, which is output that is returned
to appropriate members of the organization to help them evaluate or correct the input stage.

What Is A Computer-Based Information System?


A computer-based information system (CBIS) is an information system that uses computer
technology to perform some or all of its intended tasks. Such a system can include as little as a
personal computer and software. Or it may include several thousand computers of various sizes
with hundreds of printers, plotters, and other devices as well as communication networks (wire-
line and wireless) and databases. In most cases an information system also includes people. The
basic components of information systems are:

Components of Information Systems


1. Resources of people: (end users and IS specialists, system analyst, programmers, data
administrators etc.).
2. Hardware: (Physical computer equipments and associate device, machines and media).
3. Software: (programs and procedures).
4. Data: (data and knowledge bases), and
5. Networks: (communications media and network support).

People Resources
 End users: (also called users or clients) are people who use an information system or the
information it produces. They can be accountants, salespersons, engineers, clerks,
customers, or managers. Most of us are information system end users.
 IS Specialists: people who actually develop and operate information systems. They
include systems analysts, programmers, testers, computer operators, and other
managerial, technical, and clerical IS personnel.
 Systems analysts design information systems based on the information requirements of
end uses, programmers prepare computer programs based on the specifications of
systems analysts, and computer operators operate large computer systems.

Hardware Resources
 Machines: as computers and other equipment along with all data media, objects on which
data is recorded and saved.
 Computer systems: consist of variety of interconnected peripheral devices. Examples are
microcomputer systems, midrange computer systems, and large computer systems.

Software Resources
Software Resources includes all sets of information processing instructions. This generic concept
of software includes not only the programs, which direct and control computers but also the sets
of information processing (procedures). Software Resources includes:
 System software, such as an operating system
 Application software, which are programs that direct processing for a
particular use of computers by end users.
 Procedures, which are operating instructions for the people, who will use
an information system. Examples are instructions for filling out a paper
form or using a particular software package.

Data Resources
Data resources include data (which is raw material of information systems) and database. Data
can take many forms, including traditional alphanumeric data, composed of numbers and
alphabetical and other characters that describe business transactions and other events and
entities.
Text data, consisting of sentences and paragraphs used in written communications; image data,
such as graphic shapes and figures; and audio data, the human voice and other sounds, are also
important forms of data.
Data resources must meet the following criteria:
 Comprehensiveness: means that all the data about the subject are actually
present in the database.
 Non-redundancy: means that each individual piece of data exists only once
in the database.
 Appropriate structure: means that the data are stored in such a way as to
minimize the cost of expected processing and storage. The data resources of IS are typically
organized into:
o Processed and organized data-Databases.
o Knowledge in a variety of forms such as facts, rules, and case examples about
successful business practices.

Network Resources
Telecommunications networks like the Internet, intranets, and extranets have become essential to
the successful operations of all types of organizations and their computer-based information
systems. Telecommunications networks consist of computers, communications processors, and
other devices interconnected by communications media and controlled by communications
software. The concept of Network Resources emphasizes that communications networks are a
fundamental resource component of all information systems.
Network resources include:
•Communications media: such as twisted pair wire, coaxial cable, fiber-optic cable, microwave
systems, and communication satellite systems.
•Network support: This generic category includes all of the people, hardware, software, and data
resources that directly support the operation and use of a communications network. Examples
include communications control software such as network operating systems and Internet
packages.
Components of Information Systems

Difference between Computers and Information Systems


Computers provide effective and efficient ways of processing data, and they are a necessary part
of an information system. An IS, however, involves much more than just computers. The
successful application of an IS requires an understanding of the business and its environment that
is supported by the IS. For example, to build an IS that supports transactions executed on the
Nairobi Stock Exchange, it is necessary to understand the procedures related to buying and
selling stocks, bonds, options, and so on, including irregular demands made on the system, as
well as all related government regulations.
In learning about information systems, it is therefore not sufficient just to learn about computers.
Computers are only one part of a complex system that must be designed, operated, and
maintained. A public transportation system in a city provides an analogy. Buses are a necessary
ingredient of the system, but more is needed. Designing the bus ro
utes, bus stops, different schedules, and so on requires considerable understanding of customer
demand, traffic patterns, city regulations, safety requirements, and the like. Computers, like
buses, are only one component in a complex system.

Information Technology and Information Systems Information technology broadly defi


ned as the collection of computer systems used by an organization. Information technology, in its
narrow definition, refers to the technological side of an information system. It includes the
hardware, software, databases, networks, and other electronic devices. It can be viewed as a
subsystem of an information system. Sometimes, though,
the term information technology is also used interchangeably with information system.
THREATS TO AN IS AND WHY THESE THREATS ARE INCREASING

 Examples of natural and political disasters


– fire or excessive heat
– floods
– earthquakes
– high winds
– war
 Examples of software errors and equipment malfunctions
– hardware failures
– power outages and fluctuations
– undetected data transmission errors
 Examples of unintentional acts
– accidents caused by human carelessness
– innocent errors of omissions
– lost or misplaced data
– logic errors
– systems that do not meet company needs
 Examples of intentional acts
– sabotage
– computer fraud
– embezzlement

Why are IS Threats Increasing?

 Increasing numbers of client/server systems mean that information is available to an


unprecedented number of workers.
 Because LANs and client/server systems distribute data to many users, they are harder to
control than centralized mainframe systems.
 WANs are giving customers and suppliers access to each other’s systems and data,
making confidentiality a concern.

Generic IS structure

Internal controls

Storage
Input Processes Outputs
s

CONCEPTS OF IT AUDITING
The purpose of Information Security Auditing is to create a careful balance of the audit process,
governance, and compliance regulations, as well as hands-on introduction to the latest
technology tools.
Internal control is the plan of organization and the methods a business uses to safeguard assets,
provide accurate and reliable information, promote and improve operational efficiency, and
encourage adherence to prescribed managerial policies.
 The specific control procedures used in the internal control and management control
systems may be classified using the following four internal control classifications:
 Preventive, detective, and corrective controls
 General and application controls
 Administrative and accounting controls
 Input, processing, and output controls

Management control encompasses the following three features:


1 It is an integral part of management responsibilities.
2 It is designed to reduce errors, irregularities, and achieve organizational goals.

IT Governance

 …the process for controlling an organization’s IT resources, including information and


communication systems, and technology.

 …using IT to promote an organization’s objectives and enable business processes and to


manage and control IT related risks.
 To ensure that effective IT management and security principles, policies and processes
with appropriate compliance measurement tools are in place, requires an active audit
committee

Compliance audit
What is a compliance audit?

 A compliance audit is a comprehensive review of an organization's adherence to


regulatory guidelines. Independent accounting, security or IT consultants evaluate the
strength and thoroughness of compliance preparations. Auditors review security polices,
user access controls and risk management procedures over the course of a compliance
audit.
 What, precisely, is examined in a compliance audit will vary depending upon whether an
organization is a public or private company, what kind of data it handles and if it
transmits or stores sensitive financial data.
 Compliance auditors will generally ask CIOs, CTOs and IT administrators a series of
pointed questions over the course of an audit. These may include what users were added
and when, who has left the company, whether user IDs were revoked and which IT
administrators have access to critical systems. IT administrators prepare for compliance
audits using event log managers and robust change management software to allow
tracking and documentation authentication and controls in IT systems. The growing
category of GRC (governance, risk management and compliance) software enables CIOs
to quickly show auditors (and CEOs) that the organization is in compliance and will not
be not subject to costly fines

Governance

Policies

IT
Standards

Management
IT General and Application Management and
Controls Hierarchy Organization

Physical and
Environmental Controls

Systems Software Controls


Technical

Systems Development Controls

Application – based controls

What does Auditing involve?


• Logging
– Recording events or statistics to provide information about system use and
performance
• Auditing
– Analysis of log records to present information about the system in a clear,
understandable manner
THE IMPACT OF INFORMATION TECHNOLOGY ON THE AUDIT FUNCTION
How Information Technologies Enhance Internal Control
 Computer controls replace manual controls

 Higher-quality information is available

 Separation of duties
 Delegation of authority and responsibility
 Competent and trustworthy personnel
 System of authorizations
 Adequate documents and records
 Physical control over asset and records
 Adequate management supervision
 Independent check on performance
 Comparing recorded accountability with assets

Effects of computers on auditing


 Changes to evidence collection
 Changes to evidence evaluation

Changing IT & Its Effect on Auditing


 Distributed data processing- IP at division/user level (as opposed to central/HQ)

 networking,-LAN, WAN

 electronic data interchange (EDI)- business transactions over networks/internet; benefits:


reduction in paperwork, faster turnaround time;

- Audit implications:

# DDP  access controls/telecom controls that transmit data to/from the central computer;
completeness/accuracy of data transmitted btw central & divisions

# Networking  need to understand network & accounting cycles affected by network; access
controls – validity, authorisation, completeness of transactions processed

 e-commerce

 Real-time systems:

- batch transactions  transactions entered into a group, batched, transaction file then
created & run against master file
- Online/real time system  transactions entered individually, master file changed
immediately (e.g. ATM, JIT, EPOS)

- Audit implications:

# Fewer hard copy source documents

# No batch controls (to ensure completeness)

# Access controls

# Electronic authorisation in system

# Auditing needs to be continuous

 Intelligent systems – DSS & ES

- Knowledge & decision processes of experts into a computer program

- E.g. American Express – Authoriser’s Assistant  no credit limit, so need to know when
to accept/deny a credit card transaction

- Audit implications:

- Integrity of knowledge captured in the system, logic of decision-making process

 End-user computing

- End users use own applications/files – shorter development time, reduction in conflicts
btw user/IT dept

- But end users may not be subject to the same IT controls at central

- Audit implications:

- Weak controls may allow end users to access/modify data at main computer centre 
safeguarding of assets/data integrity

COMPLEXITY OF IT SYSTEMS
 Low complexity:

- Stand-alone PC/a few PC’s in a network

- Lack of segregation of duties, limited security/access controls, limited data/operation


controls
 Medium complexity:

- mini-computer/server, number of PC’s/terminals networked to server

- More advanced software, utility programs to enter/change data, purchased software


used/modified

- Limited segregation of duties within computer dept & btw IT/user depts

- May not be a separate/secure location for computer

- Documentation of system may be limited

 Advanced systems:

- telecommunications, extensive DB systems, online/real-time processing, automatic


transaction initiation/EDI/e-commerce, no visual audit trail

- Mainframe computers

- General/application controls

Internal Controls Specific to Information Technology


General controls = relate to overall IP environment, have pervasive effect on computer
operations

Application controls = relate to processing of specific computer applications

Control environment factors affected by IT


 Assignment of authority & responsibility

- DBMS – authorisation of access, responsibility over data integrity

- Remote locations – needs to build in supervisory controls & monitoring processes into
computer systems

 Human resource policies/procedures

- trustworthy, skillful employees

 Information processing:

- Transaction authorisation  part of computer program, e.g. automatic credit approval


within set credit limit, automatic pricing of sales transaction
- Unauthorised access

- Keeping of adequate documents  paper audit trail may not be present  auditor must
rely on CAAT’s to obtain evidence on transaction processing

 Segregation of duties:

- In an IT environment, programs within a computer system may perform all the following
functions: initiating transactions, authorisation, recording, custody of assets.

- Must have adequate controls to compensate

 Physical controls

- Easier to hide theft of assets, e.g. fictitious purchases of goods, then mail cheque to
fictitious supplier  cash goes to personal funds

- Backup controls, disaster recovery plan

The Audit Process in an IT Environment


Auditor's knowledge of the entity's computer processing must include:

 The extent to which the computer is used in each significant accounting


application.

 The complexity of the entity's computer operations.

 The organizational structure of the computer processing activities.

 The availability of data for audit evidence.

NB: Audit objectives do not change in an IT environment.

However, methods of applying specific audit procedures change  need to use CAAT’s

How PC’s can be used as an Audit Tool


 Lead schedule preparation.

 Working paper preparation and data retrieval and analysis.

 Audit program preparation.

 Analytical procedures.
 Documentation of internal control .

 Performance of statistical sampling applications.

Key IT areas involved in IT Audit


 General Controls (physical, DR, users)
 Technology (Windows, Unix, Networks, Firewalls)
 Penetration Tests and vulnerability assessments
 Systems Development Life Cycle
 Application Reviews
 Post Implementation Reviews
THE BUSINESS PROCESS AND IT RISK
Key Problems – Management & Organisational
• Management has no detailed insight into Information or IT Risks
– The Value of Information, Applications and systems is unknown
– The Costs of Security Incidents cannot be predicted
– The Effectiveness and Efficiency of Controls cannot be evaluated and measured
• Organisational Structure
– Responsibility for Information, Applications, IT Systems not clearly defined
– Monitoring and Evaluation of Security posture lacking
– Disaster Preparedness, Business Continuity and Testing not clearly embedded in
organisational structure

Why Standards?
Costs • Use of proven and existing Models
• Methodology of standardisation and repeatability
• Consolidation of resources through continuity and
standardization
Introduction of a • State of the Art technological standards
relevant security • Currency
framework model • Improving the security maturity through cyclical
assessment
Competition • Certification of organisations, services or products
• Improve the image of the organisation
• Reduce litigation risk
• Leading edge over competitors through meeting
standards
Compliance • Readiness for impending regulatory requirements
• Compliance with existing regulations

Best Practice – Key Areas


Roles & • Clear Segregation of Duties
Responsibilities • Clear Definition of Roles and Responsibilities
SODs • Defined Security Management Processes
Policies & • Central Acquisition of systems and
Procedures infrastructure
• Prohibit private systems and software use
• Physical access to data centre, interfaces etc.
• Maintenance and upgrade schedule
• Guidelines to destroy unused data and systems
• Clear definition of communications protocols
• Use of preventative control systems (AV,
Firewalls, IDSs, etc.)
• Design and implementation of BCP/ DRP
concepts
Documentation • State-of-the-Art Network and System
documentation
• User Matrix
• Labelling of hosts, cables, devices, etc.
• Up-to-Date IT Inventory
• Port Matrix
Audit and Control • Authentication and Authorisation Rules
• Regular audits of controls and behaviour of
users
• Logging

What is information security?


• Safeguarding your company’s business interests by protecting its information assets’
Confidentiality, Integrity, and Availability.

• Protect information against unauthorised access, disclosure, modification, manipulation,


misuse, destruction or loss, whether intentional or otherwise.

• Information Security is not about Safety

• Information Security is not restricted to Physical Security (access control, etc…) but
covers data protection, business continuity, operations, communications, project
development, etc…

Understanding the Risk


• What Are You Trying To Protect ?

• What Are You Trying To Protect It From ?


• How Do You Protect It ?

What are You Trying to Protect?


• Your Data
– Confidentiality - don’t want others to know it
– Integrity - don’t want others to change it
– Availability - the ability to use it yourself

• Your Resources
– Computer time and disk space

• Your Reputation
– What you do and what others do posing as you

What are You Trying to Protect Against?


• Types of Attacks
– Intrusion - the most common
– Denial of Service - preventing usage (including , etc)
– Information Theft - exploit Internet services

• That’s not all you’re protecting against!


– Accidents
• 55% of incidents result from untrained users doing what they shouldn’t
(Computer Security Institute)

Why Do They Break In?

• Money or profit (theft)

• Modification of information

• Fun, challenge, and acceptance

• Vengeance or justice

• Religious or political beliefs

• Military or economic advantage

• Gathering or destruction of information


The Internet: Benefits v. Risks
• The Benefits:
– Low-cost access to huge databases
– Access to World Wide Web
– E-mail / E-Commerce
– Information!

• The Risks:
– Reduced security for system resources
– Possibility of compromised confidential data
– Possibility of malicious attacks from outside sources
– Information!

Real Threats
1. Hacker

2. Social Engineering
• Attackers usually assume a position of trust
– People are naturally helpful and trusting

• Used by attackers to gain information or open holes


– Dumpster diving and shoulder surfing
• Org charts, passwords, phone books, log files

• The Best Defence: SECURE AUTHENTICATION and AWARENESS

3. Sniffing
• Sniffing is a term for digital wiretapping on the network

• Similar to a phone tap but undetectable


• Defeated by encrypting data (Kerberos, SSL, Certificates)

4. Viruses
• Can perform unauthorised actions

• Caught by downloading infected program or data files

• Viruses reproduce by copying themselves into other files

5. Hoaxes

• An e-mail or rumour of computer viruses, free giveaways or chain letter contests that are
untrue.
• There is no way to track e-mail proliferation.

• Hoaxes tie up e-mail bandwidth and job time as well as embarrass the sender.
– II.1 Letter from tsunami victim (hoax)
• The Bait: An email that wants you to transfer money for them (like the
Nigerian hoax)
• What it tries to make you do: Reply to the email
• Where you can see how it actually appears:
http://www.sophos.com/virusinfo/hoaxes/tsunami.html
– II.2 Unidentified tsunami boy (hoax)
• The Bait: A picture of a Tsunami victim
• What it tries to make you do: Forward the email (2MB in size) to slow
down your network.
• Where you can read more on this story:
http://www.sophos.com/virusinfo/hoaxes/tsunami_boy.html

6. Denial of Service
• Most result from an overload of resources
– Disk
– Network bandwidth
– Internal tables
– Input buffers

• Examples of Denial of Service attacks


– Ping floods
– TCP Syn floods
– Ping of death
– UDP bombs
The financial impact

• 80% of information attacks/leaks come from inside a company (CSI/FBI)


• Corporate Firewall is no guarantee of protection

• Our network is a microcosm of the World Wide Internet


– Employees
– Joint Venture Employees
– Contractors
– Non-Kenyan Citizens

The Solution
Implementing a suitable set of controls…

People Process Technology

Organisational structures Policies, IT infrastructure/


practices and Architecture
procedures

….while incorporating business and other requirements e.g. regulatory and in reference to best
practise

Regulations, Standards, Best Practices

• Sarbanes-Oxley Act of 2002 (SOX)


• Payment Card Industry Data Security Standard (PCI DSS)
• ISO17799 & ISO27001 for Information Security Management
• COBIT (Control Objectives for Information Technology) for IT Governance and
Controls
• ITIL (IT Infrastructure Library) and ISO20000 for IT service management, etc.
• COSO (Committee of Sponsoring Organizations of the Treadway Commission)

• Health Insurance Portability and Accountability Act (HIPAA)


• Gramm-Leach-Bliley Act of 1999(GLBA)

You might also like