Cobit Sox Hipaa and Glba Mapping Templates
Cobit Sox Hipaa and Glba Mapping Templates
Cobit Sox Hipaa and Glba Mapping Templates
COBIT 4.1
Plan an( Or*ani+e&
ana!e IT Risks
"#BA
III.B. Assess Risk
-. -ns(re Re!(lator% Co/pliance -0 *rovide IT 1overnance ana!e IT Risks " Risk Response " -vent Identification
4.2
Se$uri!y S!an(ar(&
a4 1. Risk
III.C.
ana!e/ent 5R4
Se$uri!y S!an(ar(&
II.A. Infor/ation Sec(rit% *ro!ra/ II.B. +23ectives III.A. Invoice Board of Directors
Se$uri!y S!an(ar(&
II.A. Infor/ation Sec(rit% *ro!ra/ II.B. +23ectives III.A. Involve Board of Directors III.C. ana!e and Control Risk III.=. Report to the Board
).2
0x!ernal Par!ies
To /aintain the sec(rit% of infor/ation and infor/ation processin! facilities that are accessed& processed& co//(nicated to& or /ana!ed 2% e7ternal parties
ana!e ?(alit%
" DS1 Define and ana!e Service @evels " DS2 ana!e Third"*art% Services " DS< -ns(re S%ste/s Sec(rit%
" Internal -nviron/ent " Risk Assess/ent " Control Activities " Infor/ation and Co//(nication " onitorin!
Se$uri!y S!an(ar(&
P/ysi$al S!an(ar(&
d4 2. Device and
#$A
Se$uri!y S!an(ar(&
a4 1. Risk Anal%sis 5R4 a4 1. Risk ana!e/ent 5R4
#$A
Infor/ation sho(ld 2e classified to indicate the need& priorities and e7pected de!ree of protection
" Internal -nviron/ent " Control Activities " Infor/ation and Co//(nication
Se$uri!y S!an(ar(&
III.C.
a4 1. Sanction *olic% 5R4 a4 .. A(thori)ation and$or S(pervision 5A4 a4 .. Aorkforce Clearance *roced(re 5A4 a4 <. Sec(rit% Re/inders 5A4 III.C. ana!e and Control Risk
Se$uri!y S!an(ar(&
To ens(re that e/plo%ees& contractors and third part% (sers are a8are of infor/ation sec(rit% threats and concerns& and are e'(ipped to s(pport sec(rit% polic% in the co(rse of their nor/al 8ork
#$A
Se$uri!y S!an(ar(&
#$A
To ens(re that e/plo%ees& contractors and third part% (sers e7it an or!ani)ation or chan!e e/plo%/ent in an orderl% /anner
Todos los Derechos Reservados Valores Corporativos Softtek S.A. de C.V. 2011. Confidencial.
9.1
Se$ure Areas
To prevent (na(thori)ed ph%sical access& da/a!e& and interference to the or!ani)ationCs pre/ises and infor/ation
" DS< -ns(re S%ste/s Sec(rit% " DS11 ana!e Data " DS12 ana!e the *h%sical -nviron/ent
Se$uri!y S!an(ar(&
III.C.
a4 .. A(thori)ation and$or S(pervision 5A4 a4 .. Aorkforce Clearance *roced(re 5A4 a4 1. =acilit% Access Control a4 2. =acilit% Sec(rit% *lan a4 2. Access Control and Validation *roced(res 5A4
P/ysi$al S!an(ar(&
9.2
" DS. ana!e *erfor/ance and Capacit% " DS0 -ns(re Contin(o(s Service To prevent loss& da/a!e& theft or co/pro/ise of assets and interr(ption to the or!ani)ationCs activities
P/ysi$al S!an(ar(&
III.C.
a4 1. =acilit% Access Control 24 Aorkstation Bse 5R4 c4 Aorkstation Sec(rit% d4 1. Device and edia Controls " Disposal 5R4 d4 2. edia Re"(se 5R4 d4 2. Device and edia Controls " Acco(nta2ilit% 5A4
Se$!i%n& 10 C%
10.1
Se$uri!y S!an(ar(&
III.C.
To ens(re the correct and sec(re operation of infor/ation processin! facilities incl(din! se!re!ation of d(ties and chan!e /ana!e/ent f(nctions
a4 1. Infor/ation S%ste/ Activit% Revie8 5R4 a4 1. Sanction *olic% 5R4 a4 2. Assi!ned Sec(rit% Responsi2ilit% 5R4 24 1. Aritten Contract or +ther Arran!e/ent 5R4 a4 9. Response and Reportin! 5R4 a4 2. Contin!enc% +perations 5R4
P/ysi$al S!an(ar(&
" DS0 -ns(re Contin(o(s Service " DS1. ana!e +perations " Internal -nviron/ent " Control Activities
10.2
T/ir( Par!y Ser1i$e 2eli1ery -ana*e en!
To i/ple/ent and /aintain the appropriate level of infor/ation sec(rit% and service deliver% in line 8ith third part% service deliver% a!ree/ents
Se$uri!y S!an(ar(&
10.4
Sys!e
To /ini/i)e the risk of s%ste/ fail(res
" Control Activities " onitorin! " Control Activities " -vent Identification " Infor/ation and Co//(nication
#$A
III.C.
10.4
Pr%!e$!i%n A*ains! -ali$i%us an( -%bile C%(e
*reca(tions are re'(ired to prevent and detect the introd(ction of /alicio(s code and (na(thori)ed /o2ile code
Se$uri!y S!an(ar(&
III.C.
a4 0. Access -sta2lish/ent and odification 5A4 a4 <. *rotection fro/ alicio(s Soft8are
10.5
Ba$'5u3
Se$uri!y S!an(ar(&
III.C.
a4 :. Data Back(p *lan 5R4 a4 :. Disaster Recover% *lan 5R4 a4 :. -/er!enc% ode +peration *lan 5R4 a4 :. Testin! and Revision *roced(re 5A4 a4 2. Contin!enc% +perations 5R4 a4 2. Data Back(p and Stora!e 5A4
P/ysi$al S!an(ar(&
10.)
Te$/ni$al S!an(ar(&
a4 2. -ncr%ption and Decr%ption 5A4 e4 1. Trans/ission Sec(rit% e4 2. Inte!rit% Controls 5A4
III.C.
10.7
-e(ia Han(lin*
To prevent (na(thori)ed disclos(re& /odification& re/oval of destr(ction of assets& and interr(ption to 2(siness activities
P/ysi$al S!an(ar(&
III.C.
d4 1. Device and edia Controls " Disposal 5R4 d4 2. edia Re"(se 5R4 d4 2. Device and edia Controls " Acco(nta2ilit% 5A4
Todos los Derechos Reservados Valores Corporativos Softtek S.A. de C.V. 2011. Confidencial.
10..
" Risk Assess/ent " Risk Response " Control Activities " Infor/ation and Co//(nication " onitorin!
Se$uri!y S!an(ar(&
III.C.
24 1. Aritten Contract or +ther Arran!e/ent 5R4 a4 2. -ncr%ption and Decr%ption 5A4 d4 *erson or -ntit% A(thentication 5R4 e4 1. Trans/ission Sec(rit% e4 2. Inte!rit% Controls 5A4
Te$/ni$al S!an(ar(&
10.9
0le$!r%ni$ C%
To ens(re the sec(rit% of electronic co//erce services& and their sec(re (se
#$A
III.C.
10.10
-%ni!%rin*
To detect (na(thori)ed infor/ation processin! activities incl(din! revie8 of operator lo!s and fa(lt lo!!in!
Se$uri!y S!an(ar(&
a4 <. @o!"In onitorin! 5A4 a4 1. Infor/ation S%ste/ Activit% Revie8 5R4 24 >. A(dit Controls 5R4
III.C.
Se$uri!y S!an(ar(&
III.C.
11.2
9ser A$$ess -ana*e en! =or/al proced(res to control the allocation of access ri!hts to infor/ation s%ste/s and services
Se$uri!y S!an(ar(&
III.C.
a4 0. Access A(thori)ation 5A4 a4 0. Access -sta2lish/ent and odification 5A4 a4 <. *ass8ord ana!e/ent 5A4 a4 2. Bni'(e Bser Identification D III.C. ana!e and Control Risk
11.4
9ser Res3%nsibili!ies
Bser a8areness& partic(larl% 8ith the (se of pass8ords and the sec(rit% of e'(ip/ent
Se$uri!y S!an(ar(&
a4 <. *ass8ord
ana!e/ent 5A4
P/ysi$al S!an(ar(&
24 Aorkstation Bse 5R4 d4 Aorkstation Sec(rit% III.C. ana!e and Control Risk a4 <. *ass8ord ana!e/ent 5A4
2eli1er an( Su33%r!& " DS< -ns(re S%ste/s Sec(rit% 6e!7%r' A$$ess C%n!r%l -ns(re that appropriate interfaces and a(thentication
11.4
Se$uri!y S!an(ar(&
Te$/ni$al S!an(ar(&
c4 2. echanis/ to A(thenticate -lectronic *rotected ;ealth Infor/ation 5A4 d4 *erson or -ntit% A(thentication
11.5
O3era!in* Sys!e
To ens(re (na(thori)ed access to operatin! s%ste/s. So/e /ethods incl(de6 ens(re '(alit% pass8ords& (ser a(thentication& and the recordin! of s(ccessf(l and failed s%ste/ accesses
Se$uri!y S!an(ar(&
III.C.
a4 0. Access -sta2lish/ent and odification 5A4 a4 <. *ass8ord ana!e/ent 5A4 a4 2. Bni'(e Bser Identification 5R4 a4 2. A(to/atic @o!off 5A4 d4 *erson or -ntit% A(thentication
Te$/ni$al S!an(ar(&
11.)
Se$uri!y S!an(ar(&
III.C.
a4 0. Access -sta2lish/ent and odification 5A4 a4 <. *ass8ord ana!e/ent 5A4 a4 2. Bni'(e Bser Identification 5R4 d4 *erson or -ntit% A(thentication III.C. odification 5A4 ana!e and Control Risk
Te$/ni$al S!an(ar(&
11.7
-%bile C% 3u!in* an( Tele7%r'in*
To ens(re infor/ation sec(rit% 8hen (sin! /o2ile co/p(tin! and tele8orkin! facilities
Se$uri!y S!an(ar(&
#$A
#$A
Todos los Derechos Reservados Valores Corporativos Softtek S.A. de C.V. 2011. Confidencial.
12.2
Te$/ni$al S!an(ar(&
III.C.
12.4
Cry3!%*ra3/i$ C%n!r%ls
To protect the confidentialit%& a(thenticit% or inte!rit% of infor/ation 2% cr%pto!raphic /eans.
Te$/ni$al S!an(ar(&
III.C.
a4 2. -ncr%ption and Decr%ption 5A4 e4 2. Trans/ission Sec(rit% " -ncr%ption 5A4 III.C. ana!e and Control Risk
12.4
Se$uri!y %, Sys!e
#$A
12.5
Se$uri!y in 2e1el%3 en! an( Su33%r! Pr%$esses
*ro3ect and s(pport environ/ents sho(ld 2e strictl% controlled
#$A
#$A
12.)
Te$/ni$al ;ulnerabili!y -ana*e en!
To red(ce risks res(ltin! fro/ e7ploitation of p(2lished technical v(lnera2ilities
#$A
ana!e IT Risks
Se$uri!y S!an(ar(&
III.C.
#$A
Se$uri!y S!an(ar(&
III.C.
To ens(re infor/ation sec(rit% events and 8eaknesses associated 8ith infor/ation s%ste/s are co//(nicated in a /anner allo8in! ti/el% corrective -%ni!%r an( 01alua!e& action to 2e taken " -1 onitor and -val(ate IT *erfor/ance " -2 onitor and -val(ate Internal Control
14.2
#$A
#$A
III.C.
To ens(re a consistent and effective approach is applied to the /ana!e/ent of infor/ation sec(rit% incidents.
Se$uri!y S!an(ar(&
III.C.
To co(nteract interr(ptions to 2(siness activities and to protect critical 2(siness processes fro/ the effects of /a3or fail(res or disasters and to ens(re their ti/el% res(/ption
a4 :. Disaster Recover% *lan 5R4 a4 :. Testin! and Revision *roced(res 5A4 a4 :. Applications and Data Criticalit% Anal%sis 5A4
Se$!i%n& 15 C% 3lian$e
15.1
-%ni!%r an( 01alua!e&
-. -ns(re Re!(lator% Co/pliance -0 *rovide IT 1overnance " To avoid 2reaches of an% la8& stat(tor%& re!(lator% or " contract(al o2li!ations& and of an% sec(rit% re'(ire/ents
" Internal -nviron/ent " -vent Identification " Risk Assess/ent " Control Activities " Infor/ation and Co//(nication " onitorin! " Internal -nviron/ent " Control Activities " onitorin!
Se$uri!y S!an(ar(&
a4 1. Sanction *olic% 5R4 a4 9. Response and Reportin! 5R4 24 1. Aritten Contract or +ther Arran!e/ent 5R4
15.2
C% 3lian$e 7i!/ Se$uri!y P%li$ies an( S!an(ar(s8 an( Te$/ni$al C% 3lian$e
Se$uri!y S!an(ar(&
a4 >. Technical -val(ation that /eas(res co/pliance 8ith sec(rit% re'(ire/ents 5R4
III.C. ana!e and Control Risk III.-. Ad3(st the *ro!ra/ III.=. Report to the Board
To ens(re co/pliance of s%ste/s 8ith or!ani)ational -%ni!%r an( 01alua!e& sec(rit% policies and standards " -1 onitor and -val(ate IT *erfor/ance " -2 onitor and -val(ate Internal Control " -0 *rovide IT 1overnance
Todos los Derechos Reservados Valores Corporativos Softtek S.A. de C.V. 2011. Confidencial.
15.4
"
onitorin!
-1 onitor and -val(ate IT *erfor/ance -2 onitor and -val(ate Internal Control -0 *rovide IT 1overnance
Se$uri!y S!an(ar(&
Todos los Derechos Reservados Valores Corporativos Softtek S.A. de C.V. 2011. Confidencial.