IT AUDIT AND SECURITY COMPLIANCE:
WHERE TO FOCUS YOUR EFFORTS FOR 2014-15
IT Audit and Security O’Connor & Drew, P.C. www.ocd.com @ocdcpa Jake McAleer @johnjakem
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
1
March 2014
IT AUDIT AND SECURITY COMPLIANCE: WHERE TO FOCUS YOUR EFFORTS FOR - - PowerPoint PPT Presentation
O'Connor & Drew, P.C. www.ocd.com @ocdcpa 1 IT AUDIT AND SECURITY COMPLIANCE: WHERE TO FOCUS YOUR EFFORTS FOR 2014-15 IT Audit and Security OConnor & Drew, P.C. www.ocd.com @ocdcpa Jake McAleer @johnjakem March 2014
IT Audit and Security O’Connor & Drew, P.C. www.ocd.com @ocdcpa Jake McAleer @johnjakem
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
1
March 2014
jmcaleer@ocd.com @johnjakem
Professional Profile
Industry Expertise
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
2
An Overview Of A Security Program and Review of IT Control Terminology
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
3
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
6
education, and enforcement
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
8
No “sets” are allowed.
employer.
15-day period. If needed, the Help Desk can reset the password at any time.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
11
http://portal.cs.oag.state.tx.us/OAGStaticContent/portal/login/help/listPasswordRules.htm
number, special character, etc.) to prevent just a word as the password
laptop, etc.)
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
13
Focusing on the three inputs:
Business Needs Legal and Regulatory Customers and Partners
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
15
Intended to protect someone else, not your business
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
17
Payment Card Industry (PCI)
Health Insurance Portability and Accountability Act (HIPAA)
Gramm–Leach–Bliley Act (GLBA)
Federal Information Security Management Act (FISMA)
Sarbanes-Oxley Act (SOX)
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
18
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
19
core 12 security areas remain the same, but the updates will include several new sub-requirements that did not exist
to implement some of these sub-requirements, the Council will introduce future implementation dates accordingly. This means until 1 July 2015 some of these sub-requirements will be best practices only, to allow organizations more flexibility in planning for and adapting to these changes. Additionally, while entities are encouraged to begin implementation of the new version of the Standards as soon as possible, to ensure adequate time for the transition, Version 2.0 will remain active until 31 December 2014.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
20 https://www.pcisecuritystandards.org/documents/DSS and PA-DSS Change Highlights.pdf
components in scope for PCI DSS to support development of configuration standards.
sensitive areas for onsite personnel, including a process to authorize access, and revoke access immediately upon termination.
penetration testing
the written agreement/acknowledgment to their customers.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
21 https://www.pcisecuritystandards.org/documents/PCI DSS v3 Summary of Changes.pdf
technologies, PII data types, etc
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
24
name and last name or first initial and last name in combination with any one or more of the following data elements that relate to such resident: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a resident’s financial account; provided, however, that “Personal information” shall not include information that is lawfully obtained from publicly.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
25
We need an ID for your I-9 Form. We need your routing number so we can pay you.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
26
http://www.theonion.com/articles/manny-being-manny-during-massachusetts-state-drive,9801/ http://www.psdgraphics.com/psd/blue-check-psd-template/
Nearly every employee has access to a PC at work
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
28
http://www.blogcdn.com/jobs.aol.com/articles/media/2009/04/ptw12target.jpg
Are employees surfing the web
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
29
http://www2.fireeye.com/rs/fireye/images/fireeye-advanced-threat-report-2013.pdf
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
30
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
32
safeguarding it?
SLAs and other commitments are they agreeing to?
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
33
SOC 1 (SSAE 16) – Internal Financial Reporting SOC 2 – Service Provider – Detailed Report SOC 3 – Service Provider – Summary Report
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
37
Timely topics to investigate
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
38
systems
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
41
generated by network hardware and applications
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
42
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
44
the event of a loss or employee termination?
phones?
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
45
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
47
Supervisory Control And Data Acquisition
systems (HVAC), physical access, and energy consumption
center, facilities, etc)
software/web servers
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
48
monitored
Example Template:
http://www.sans.org/security-resources/policies/Acceptable Use Policy.pdf
Massachusetts customers
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
49
General IT Controls any business should have in place.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
51
They can be long, complex, generic (too high-level), industry specific, etc… In other words: Many have similar pitfalls as legal and regulatory compliance!
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
52
agreed upon and outlined, taking risk into consideration.
and private organizations
processes and technologies to implement
http://www.sans.org/critical-security-controls
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
53
1: Inventory of Authorized and Unauthorized Devices 2: Inventory of Authorized and Unauthorized Software 3: Secure Configurations for Hardware and Software 4: Continuous Vulnerability Assessment and Remediation 5: Malware Defenses 6: Application Software Security 7: Wireless Access Control 8: Data Recovery Capability 9: Security Skills Assessment and Appropriate Training 10: Secure Configurations for Network Devices
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
54
Wording shortened to fit on slide, full text available at http://www.sans.org/critical-security-controls/controls
11: Limitation and Control of Network Ports, Protocols, Services 12: Controlled Use of Administrative Privileges 13: Boundary Defense 14: Maintenance, Monitoring, and Analysis of Audit Logs 15: Controlled Access Based on the Need to Know 16: Account Monitoring and Control 17: Data Protection 18: Incident Response and Management 19: Secure Network Engineering 20: Penetration Tests and Red Team Exercises
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
55
Wording shortened to fit on slide, full text available at http://www.sans.org/critical-security-controls/controls
Inventory of Authorized and Unauthorized Devices Actively manage (inventory, track, and correct) all hardware devices on the network so that
given access, and unauthorized and unmanaged devices are found and prevented from gaining access.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
56 https://www.sans.org/media/critical-security-controls/spring-2013-poster.pdf
supply chain process?
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
57
Deploy an automated asset inventory discovery tool
Deploy dynamic host configuration protocol (DHCP) server logging
Ensure that all equipment acquisitions automatically update the inventory system as new, approved devices are connected to the network
Maintain an asset inventory
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
58
Deploy network level authentication via 802.1x to limit and control which devices can be connected to the network
Deploy network access control (NAC) to monitor authorized systems
Utilize client certificates to validate and authenticate systems prior to connecting to the private network
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
59
protected?
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
60
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
61
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
62
discover.
http://adage.com/article/datadriven-marketing/nrf-offensive-data-breaches/291476/
the affected organization.
http://adage.com/article/datadriven-marketing/nrf-offensive-data-breaches/291476/
breaches ($199 and $188 per record, respectively).
https://www4.symantec.com/mktginfo/whitepaper/053013 GL NA WP Ponemon-2013-Cost-of-a-Data-Breach- Report daiNA cta72382.pdf O'Connor & Drew, P.C. www.ocd.com @ocdcpa
63
jmcaleer@ocd.com Senior IT Security and Audit Manager O’Connor & Drew, P.C.
www.ocd.com @ocdcpa
www.jakemcaleer.com @johnjakem
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
64
the presentation:
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
65