Domain 5 - PPT Slides
Domain 5 - PPT Slides
Domain 5 - PPT Slides
OF INFORMATION ASSETS
CPIS606 - IS Auditing
5.2 INFORMATION SECURITY
MANAGEMENT (ISM)
Security objectives to meet organization’s business requirements include:
3
5.2.2 ISM ROLES AND RESPONSIBILITIES
Responsibilities to consider by position include:
Executive management
IS security steering committee
Security advisory group
Chief Privacy Officer (CPO)
Chief Security Officer (CSO)
Process owners
Information assets owners and data owners
4
5.2.2 ISM ROLES AND
RESPONSIBILITIES
Users
External parties
Security administrator
Specialists or advisors
IT developers
IS auditors
5
5.2.3 INVENTORY AND
CLASSIFICATION OF INFORMATION
ASSETS
The inventory record of each information asset should include:
6
5.2.4 SYSTEM ACCESS PERMISSION
Who has access rights and to what?
Who is responsible for determining the access rights and access levels?
7
5.2.6 CRITICAL SUCCESS FACTORS TO ISM
Strong commitment and support by the senior management on security
training
8
5.2.7 INFORMATION SECURITY AND
EXTERNAL PARTIES
The information processing facilities an external party is required to access
The type of access the external party will have the information and information processing
facilities, for example:
Network connectivity between the organization’s and the external party’s network(s),
e.g., permanent connection and remote access
The different means and controls employed by the external party when storing,
processing, communicating, sharing and exchanging information
The impact of access not being available to the external party when required,
and the external party entering or receiving inaccurate or misleading
information
10
5.2.7 INFORMATION SECURITY AND EXTERNAL PARTIES
11
5.2.8 SECURITY INCIDENT HANDLING AND
RESPONSE
A formal incident response capability should be established and should include the
following phases:
Planning
Detection
Initiation
Recording
Evaluation
Containment
Eradication
Escalation
Response
Closure
Reporting
Post incident review
Lesson Learned 12
5.3 LOGICAL ACCESS CONTROLS
Logical access controls are the primary means used to manage and protect
information assets.
13
5.3.1 LOGICAL ACCESS EXPOSURES
Technical exposures include:
Data leakage
Wire tapping
Viruses and Worms
Logic bombs
Denial-of-Service (DoS) attacks
Distributed DOS (using Trojan horses)
Computer shutdown
War driving
14
5.3.2 FAMILIARIZATION WITH THE
ORGANIZATION’S IT ENVIRONMENT
It is important for the IS auditors to gain a technical and organizational
understanding of the organization’s IT environment.
This helps them to identify the risk areas where IS auditing should be
focused on in planning current and future work and finally assess the
logical control effectively
15
5.3.3 PATHS OF LOGICAL ACCESS
Access or points of entry to an organization's IS infrastructure can be
gained through several avenues.
The general points of entry and/or the modes of access into this
infrastructures happens through the following:
Network connectivity
Remote access
Operator console
Online workstations or terminals
16
5.3.4 LOGICAL ACCESS CONTROL SOFTWARE
17
5.3.4 LOGICAL ACCESS CONTROL SOFTWARE
18
5.3.5 IDENTIFICATION AND AUTHENTICATION (I&A)
19
5.3.5 IDENTIFICATION AND AUTHENTICATION (I&A)
Token devices , one-time passwords (something you have and something you
know)
Two-factor authentication technique
20
5.3.5 IDENTIFICATION AND AUTHENTICATION (I&A)
21
5.3.5 IDENTIFICATION AND AUTHENTICATION (I&A)
Biometrics
Quantitative measures (FRR, FAR, and EER)
Physically-oriented biometric (something you are)
22
5.3.5 SINGLE SIGN-ON (SSO) IN I&A
SSO is the process for consolidating all organizational platform-based
administration, authentication, and authorization functions into a single
centralized administrative function.
23
5.3.5 ADVANTAGES AND DISADVANTAGES OF SSO IN I&A
It reduces the time taken by users to log into multiple applications and
platforms
24
5.3.5 ADVANTAGES AND
DISADVANTAGES OF SSO IN I&A
Disadvantages of SSO are:
25
5.3.6 AUTHORIZATION ISSUES
Access restrictions at the file level include:
Read, inquiry, or copy only
Write, create, update, or delete only
Execute only
A combination of the above
26
5.3.6 AUTHORIZATION ISSUES
The advantages of conducting security in a decentralized
environment are:
Security administration is onsite at the distributed location
Security issues are resolved in a timely manner
Security controls are monitored frequently
27
5.3.6 AUTHORIZATION ISSUES
Remote access security
Today’s organizations require remote access connectivity to their
information resources for different types of users such as employees,
vendors, consultants, business partners, and customer representatives.
28
5.3.6 AUTHORIZATION ISSUES
Remote access security risks include:
Denial of service
Malicious third parties
Misconfigured communications software
Misconfigured devices on the corporate computing infrastructure
Host systems that are not secured appropriately
Physical security issues over remote users’ computers
29
5.3.6 AUTHORIZATION ISSUES
Remote access security controls include:
30
5.3.6 AUTHORIZATION ISSUES
Remote access using Personal Digital Assistants (PDAs) addresses control issues
including the following:
Compliance
Approval
Standard PDA applications
Due care
Awareness training
PDA applications
Synchronization
Encryption
Virus detection and control
Device registration
Camera use
31
5.3.6 AUTHORIZATION ISSUES
There can be several access issues with mobile technology. Therefore,
these devices should be strictly controlled both by policy and by denial of
use.
Some of the possible actions to deal with the access issues include:
Disabling use of mobiles with a logon script which removes them from
the system directory, where no authorized use of USB ports exists
If they are considered necessary for business use, encrypting all data
transported or saved by these devices
32
5.3.6 AUTHORIZATION ISSUES
Audit logging in monitoring system access provides management an audit trail
to monitor activities of a suspicious nature, such as a hacker attempting brute
force attacks on a privileged logon ID.
34
5.3.6 AUTHORIZATION ISSUES
Attempted security violations can be detected or prevented by implementing
the following:
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
35
5.3.7 HANDLING CONFIDENTIAL INFORMATION
36
5.3.7 HANDLING CONFIDENTIAL INFORMATION
37
5.3.7 HANDLING CONFIDENTIAL INFORMATION
38
5.4 NETWORK INFRASTRUCTURE SECURITY
Some of the controls over communication network are as follows:
Network control functions should be performed by technically qualified operators.
Network control functions should be separated and the duties should be rotated
on a regular basis, where possible.
Network control software must restrict operator access from performing certain
functions (example, the ability to amend or delete operator activity logs).
Network control software should maintain an audit trail of all operator activities.
39
5.4.1 LAN SECURITY
The IS auditor should identify and document:
40
5.4.2 CLIENT-SERVER SECURITY
The control techniques that should be in place are:
41
5.4.3 WIRELESS SECURITY
THREATS AND RISK MITIGATION
Some of the common threats are:
Errors and omissions
Fraud and theft committed by authorized or unauthorized users of the
system
Employee sabotage
Loss of physical and infrastructure support
Malicious hackers
Industrial espionage
Malicious code
Threats to personal privacy
42
5.4.3 WIRELESS SECURITY THREATS
AND RISK MITIGATION
To mitigate these risks, an organization must adopt security measures and
practices that help bring their risks to a manageable level.
o Authenticity
o Nonrepudiation
o Accountability
o Network availability
43
5.4.3 WIRELESS SECURITY
THREATS AND RISK MITIGATION
Malicious access to WLANs include:
o War driving
o War walking
o War chalking
o Man-in-the-middle attack
44
5.4.4 INTERNET THREATS AND SECURITY
Network security attacks could be of two types:
Active attacks- Once enough network information has been gathered, the
intruder will launch an actual attack against a targeted system to either gain
complete control over that system or enough control to cause certain threats
to be realized.
45
5.4.4 INTERNET THREATS AND SECURITY
Passive attacks:
Network analysis
Eavesdropping
Traffic analysis
Active attacks:
- Brute-force attack - Unauthorized access
- Masquerading - Denial of Service
- Packet replay - Email spamming
Phishing - Email Spoofing
- Message Modification
46
5.4.4 INTERNET THREATS AND SECURITY
Causal factors for Internet attacks are:
47
5.4.4 INTERNET THREATS AND SECURITY
Firewalls enable organizations to:
Block access to particular sites on the Internet
Limit traffic on an organization’s public services segment to relevant
addresses and ports
Prevent certain users from accessing certain servers or services
Monitor communications between an internal and an external network
Monitor and record all communications between an internal network and
the outside world to investigate network penetrations or detect internal
subversion
Encrypt packets that are sent between different physical locations within
an organization by creating a VPN over the Internet (IP security [IPSec],
VPN tunnels)
48
5.4.4 INTERNET THREATS AND SECURITY
Firewall implementations can take advantage of the functionality available in
a variety of firewall designs, to provide a robust layered approach in
protecting an organization’s information assets.
49
5.4.4 INTERNET THREATS AND SECURITY
Firewall Types
Router packet filtering
Application firewall systems
Statefull inspection
50
5.4.4 INTERNET THREATS AND SECURITY
Intrusion Detection System (IDS)
An IDS works in conjunction with routers and firewalls by monitoring
network usage anomalies.
o Network-based IDS
o Host-based IDS
Components of an IDS are:
Sensors that are responsible for collecting data
Analyzers that receive input from sensors and determine intrusive activity
An administration console
A user interface
51
5.4.4 INTERNET THREATS AND SECURITY
Features of an IDS are:
Intrusion detection
Gathering evidence on intrusive activity
Automated response
Security monitoring
Interface with system tolls
Security policy management
52
5.4.4 INTERNET THREATS AND SECURITY
Honeypots act as decoy systems to detect active Internet attacks.
53
5.4.5 ENCRYPTION
The key elements of encryption systems are:
o Encryption algorithm
o Encryption key
o Key length
54
5.4.5 ENCRYPTION
Types of encryption are:
Digital Signatures
Authentication
Nonrepudiation
Replay protection
55
5.4.5 ENCRYPTION
Use of encryption in OSI protocols are:
Secure Sockets Layer (SSL)
Secure Hypertext Transfer Protocol (S/HTTP)
IP Security
SSH
Secure Multipurpose Internet Mail Extensions (S/MIME)
Secure Electronic Transactions (SET)
56
5.5 AUDITING LOGICAL ACCESS
When evaluating logical access controls, the IS auditor should:
57
5.5.1 TECHNIQUES FOR TESTING SECURITY
Terminal cards and keys
Terminal identification
Login IDs and passwords
Controls over production resources
Logging and reporting access violations
Follow-up access violations
Bypassing security and compensating controls
58
5.6 AUDITING NETWORK
INFRASTRUCTURE SECURITY
When performing an audit of the network infrastructure, the IS auditor
should:
Review network diagrams
Identify the network design implemented
Determine the applicable security policies, standards, procedures, and
guidance on network management and usage exist
Identify who is responsible for security and operation of Internet
connections
Identify legal problems arising from the Internet
Review Service Level Agreements (SLAs), if applicable
Review network administrator procedures
59
5.7.1 ENVIRONMENTAL ISSUES
AND EXPOSURES
Environmental exposures are primarily due to naturally occurring events
such as lightning storms, earthquakes, volcanic eruptions, hurricanes,
tornados and other types of extreme weather conditions.
60
5.7.2 CONTROL FOR
ENVIRONNEMENTAL
EXPOSURES
Ways to control environmental exposures are:
Alarm control panels
Water detectors
Handheld fire extinguishers
Manual fire alarms
Smoke detectors
Fire suppression systems
Unauthorized entry
Damage or theft to equipment or documents
Copying or viewing of sensitive or copyrighted information
Alteration of sensitive equipment and information
Public disclosure of sensitive information
Abuse of data processing resources
Blackmail
Embezzlement
62
5.8.2 PHYSICAL ACCESS CONTROLS
Examples of some of the more common access controls are:
Bolting door locks
Combination door locks (cipher locks)
Electronic door locks
Biometric door locks
Manual logging
Electronic logging
Identification badges (photo IDs)
Video cameras
Security guards
Controlled visitor access
Deadman doors
Alarm System
Windows
63
5.8.3 AUDITING PHYSICAL ACCESS
Touring the Information Processing Facility (IPF) is useful.
Testing should extend beyond IPF to include the following related facilities:
64