SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
A CIO’s Survival Guide
   for
   f an IT Audit
             A di
          Thomas Danford
   CIO, Tennessee Board of Regents
   C,        ss    o do      gs
Background & Objectives …
 State Audit chose the TBR office
 as its “pilot” for developing IT
 Audit plans and procedures for
 Banner.
 Brief discussion of the various
 types of audits and how they relate
 to IT Audits.
 Share with the audience what’s
 investigated in an IT Audit and
 how it’s conducted.
 Relay some findings to date.
 Provide some guidance &
 suggestions for when your
 institution has its IT Audit.
Types of Audits
 Operational Audits examine the use of unit resources to
 evaluate whether those resources are b  being used in the most
                                                  d
 effective and efficient way. They include elements of the other
 audit types listed below.
 Financial A di examine accounting and reporting of financial
 Fi      i l Audits        i           i     d       i     f fi   il
 transactions.
 Compliance Audits examine adherence to laws, regulations,
 policies and procedures.
    li i    d        d
 Internal Control Reviews focus on the components of major
 business activities such as payroll and benefits, and their physical
 security.
 security
 Information Technology (IT) Audits examine internal control
 environment of automated information processing systems and
 how people use those systems.
                         systems
The IT Audit Evaluates …
 System(s) input, output, and processing controls
            input output
 Backup & media storage (off-site)
                           (off-
  Disaster preparedness plan ( d if it has been
  Di              d       l (and i h b
 tested!)
 System(s) security
 Computer facilities
      p
How does the IT Audit Work?
 Kick-
 Kick-off Meeting to discuss
                  g
 audit objectives with delivery
 of extensive questionnaires.
 Interview & investigative
 phase based upon responses
 to questionnaires.
 Exit interview with Q&A on
 any discovered weaknesses or
 findings.
 Published A di Report with
 P bli h d Audit R          ih
 weaknesses and/or findings.
 Management response.
       g          p
What Are Auditors Looking For?
 Reportable conditions – are matters that represent a significant
 deficiency in the d
 d                  design or operation of the internal control
 structure which could adversely affect the organization's ability
 to record, process, summarize, and report financial data
 consistent with the assertions of management in the financial
 statements.
 Material Weaknesses – are significant deficiencies, or
 combination of significant deficiencies, that results in more than
                               deficiencies
 a remote likelihood that a material control process could be
 obverted or bypassed.
 Findings – conditions that do adversely affect the institution and
 may include conditions dealing with irregularities, illegal acts,
 errors, inefficiency, waste, ineffectiveness, conflicts of interest,
 and for our purposes control weaknesses.
              pp
Interview & Investigation Areas
 Infrastructure Security & Control
 Application Security & Control
 Disaster Preparedness Plan
 Di       P       d      Pl
INFRASTRUCTURE SECURITY & CONTROL: Relates to
the d i of the campus network system and i l d the
 h design f h                      k        d includes h
backbones, routers, switches, wireless access points, access
methods and protocols used. Of special interest are the filters
              p          used.      p
& protective measures that govern (1) Internet open access (2)
Intranet controlled access and (3) Secured Access.
Particular areas of interest include:
   Physical security of computer center – Environmental controls, locks,
   cameras & authorizations to enter.
   Network configuration – Fil & firewall rule-sets and their change processes.
   N      k     fi      i    Filter fi     ll rule-
                                                l       d hi h
   ID and password rule-sets – Length, character requirements, aging, etc.
                      rule-
   Operating System – File & directory permissions.
   Patch management – Remediation of known exploits.
   Segregation of duties of IT staff.
APPLICATION SECURITY & CONTROL: Relates to the
design of the administrative system and includes additional
server operating system issues as well as the DBMS and the
application that sits on top of both. Heavily scrutinized are
users, both functional and technical and their roles.
Particular areas of interest include:

   Default users and their passwords
   Role based security – Especially as it is setup in the application itself and
   access to the native DBMS or OS.
                                  OS
   User accounts and password management – Procedures & signoff for account
   holders, length, character requirements, aging, etc.
   Software modification – Procedures and segregation of duties in their
                                                 gg
   implementation.
   Patch management – Remediation of known exploits across multiple
   instances.
   Segregation of duties of IT and functional users.
                                                users
APPLICATION SECURITY & CONTROL
(Top 5 Issues)
(T     I     )

 Improper account p
    pp              provisioning with segregation of duties
                                g       gg
 Insufficient controls for change management
 A general lack of understanding around key system
 configurations
 Audit logs not being reviewed (or that review itself not being
 logged)
 Abnormal transactions not identified in a timely manner
DISASTER PREPAREDNESS PLAN: The state in which an
institution is
i i i i prepared f di  d for disaster. P
                                       Preparedness i
                                              d     involves a
                                                        l
plan for avoiding and recovering from a disaster with
preservation and retrieval of records lost by an unexpected
catastrophic occurrence.
 Particular areas of interest include:

   Backup of critical data – Including frequency, media, where and how far away.
   Printed plans – Kept off site by plan principles with contact lists.
   Recovery processes – Includes not only IT operations but facilities (hot &
            yp                            y      p                      (
   cold sites).
   Business continuity while IT functions are restored.
   Actual testing of the plan.
Banner Issues
 Discovered
 Di       d
  As of 10/12/2007
Y10K Compliance
 Banner cannot handle the switch
 from the year 9999 to 10000
Tips to Make the Audit Go Smoothly
 Avoid making it an “adversarial” engagement
                     adversarial
 Provide what’s asked of you
 Document & diagram
 D            di
For Additional Information:




  Wikipedia has a g
       p           good overview of IT auditing at:
                                              g
  http://en.wikipedia.org/wiki/Information_technology_audit
  Control Objectives for Information and related Technology (COBIT) is a set
  of best practices (framework) for information technology (IT) management
  created by the Information Systems Audit and Control Association (ISACA),
                                                                    (ISACA)
  and the IT Governance Institute (ITGI) in 1992.
  http://www.isaca.org/Template.cfm?Section=COBIT6&Template=/Tagged
  Page/TaggedPageDisplay.cfm&TPLID=55&ContentID=7981
Thank You
Please share your comments, ideas, suggestions,
                 questions . . .

              Thomas Danford
              tdanford@tbr.edu
                615-366-
                615-366-4451

Contenu connexe

Tendances

Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24
jemtallon
 
8. operations security
8. operations security8. operations security
8. operations security
7wounders
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 
Cissp Week 23
Cissp Week 23Cissp Week 23
Cissp Week 23
jemtallon
 

Tendances (20)

Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24
 
Risk management of basel norms
Risk management of basel norms Risk management of basel norms
Risk management of basel norms
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
8. operations security
8. operations security8. operations security
8. operations security
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
 
Chapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning SystemChapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning System
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
2 Day MOSTI Workshop
2 Day MOSTI Workshop2 Day MOSTI Workshop
2 Day MOSTI Workshop
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
IT & the Auditor
IT & the AuditorIT & the Auditor
IT & the Auditor
 
CISSP Week 9
CISSP Week 9CISSP Week 9
CISSP Week 9
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
9 Bcp+Drp
9 Bcp+Drp9 Bcp+Drp
9 Bcp+Drp
 
Cissp Week 23
Cissp Week 23Cissp Week 23
Cissp Week 23
 
4 Operations Security
4 Operations Security4 Operations Security
4 Operations Security
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
 

Similaire à CIO IT Audit Survival TNS07

Technology Audit
Technology AuditTechnology Audit
Technology Audit
Arish Roy
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentation
Arish Roy
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
JoshJaro
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 

Similaire à CIO IT Audit Survival TNS07 (20)

Technology Audit
Technology AuditTechnology Audit
Technology Audit
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentation
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
audit_it_250759.pdf
audit_it_250759.pdfaudit_it_250759.pdf
audit_it_250759.pdf
 
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019 PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Services Industry Case Study: A Practical Approach To Process Automation
Services Industry Case Study: A Practical Approach To Process AutomationServices Industry Case Study: A Practical Approach To Process Automation
Services Industry Case Study: A Practical Approach To Process Automation
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 

Plus de Thomas Danford

Plus de Thomas Danford (20)

Information and Computer Technology (ICT) Accessibility
Information and Computer Technology (ICT) AccessibilityInformation and Computer Technology (ICT) Accessibility
Information and Computer Technology (ICT) Accessibility
 
Success Factors in IT 4 10 and 13
Success Factors in IT 4 10 and 13Success Factors in IT 4 10 and 13
Success Factors in IT 4 10 and 13
 
P2P Legislation EduPol08
P2P Legislation EduPol08P2P Legislation EduPol08
P2P Legislation EduPol08
 
TBR Collaboration Analysis
TBR Collaboration AnalysisTBR Collaboration Analysis
TBR Collaboration Analysis
 
CIC Final Report 050406
CIC Final Report 050406CIC Final Report 050406
CIC Final Report 050406
 
Tn 2015 Legislative Compilation
Tn  2015 Legislative CompilationTn  2015 Legislative Compilation
Tn 2015 Legislative Compilation
 
Elive15 Discussion TBR Performance Metrics
Elive15 Discussion   TBR  Performance MetricsElive15 Discussion   TBR  Performance Metrics
Elive15 Discussion TBR Performance Metrics
 
Talent Mgmt EDULive
Talent Mgmt EDULiveTalent Mgmt EDULive
Talent Mgmt EDULive
 
Credit Card Computers and Their Application in HE
Credit Card Computers and Their Application in HECredit Card Computers and Their Application in HE
Credit Card Computers and Their Application in HE
 
Providing Metrics for Decision Makers CoHEsion13
Providing Metrics for Decision Makers CoHEsion13Providing Metrics for Decision Makers CoHEsion13
Providing Metrics for Decision Makers CoHEsion13
 
10 Determinants and 13 Ground Rules CoHEsion13
10 Determinants and 13 Ground Rules CoHEsion1310 Determinants and 13 Ground Rules CoHEsion13
10 Determinants and 13 Ground Rules CoHEsion13
 
Big Data in Higher Ed TENNAIR13
Big Data in Higher Ed TENNAIR13Big Data in Higher Ed TENNAIR13
Big Data in Higher Ed TENNAIR13
 
TBR Common Data Repository ITS13
TBR Common Data Repository ITS13TBR Common Data Repository ITS13
TBR Common Data Repository ITS13
 
Ellucian Live ES 2013
Ellucian Live ES 2013Ellucian Live ES 2013
Ellucian Live ES 2013
 
Colaborative Cloud Poster EDUCAUSE12
Colaborative Cloud Poster EDUCAUSE12Colaborative Cloud Poster EDUCAUSE12
Colaborative Cloud Poster EDUCAUSE12
 
TBR Business Process Improvement EDUCAUSE12
TBR Business Process Improvement EDUCAUSE12TBR Business Process Improvement EDUCAUSE12
TBR Business Process Improvement EDUCAUSE12
 
eProcurement TN-Summit 2012
eProcurement TN-Summit 2012eProcurement TN-Summit 2012
eProcurement TN-Summit 2012
 
Statewide CI Resources TNSCORE12
Statewide CI Resources TNSCORE12Statewide CI Resources TNSCORE12
Statewide CI Resources TNSCORE12
 
An Exploration: Moving Your Enterprise to a Cloud Collaboration
An Exploration: Moving Your Enterprise to a Cloud CollaborationAn Exploration: Moving Your Enterprise to a Cloud Collaboration
An Exploration: Moving Your Enterprise to a Cloud Collaboration
 
Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

CIO IT Audit Survival TNS07

  • 1. A CIO’s Survival Guide for f an IT Audit A di Thomas Danford CIO, Tennessee Board of Regents C, ss o do gs
  • 2. Background & Objectives … State Audit chose the TBR office as its “pilot” for developing IT Audit plans and procedures for Banner. Brief discussion of the various types of audits and how they relate to IT Audits. Share with the audience what’s investigated in an IT Audit and how it’s conducted. Relay some findings to date. Provide some guidance & suggestions for when your institution has its IT Audit.
  • 3. Types of Audits Operational Audits examine the use of unit resources to evaluate whether those resources are b being used in the most d effective and efficient way. They include elements of the other audit types listed below. Financial A di examine accounting and reporting of financial Fi i l Audits i i d i f fi il transactions. Compliance Audits examine adherence to laws, regulations, policies and procedures. li i d d Internal Control Reviews focus on the components of major business activities such as payroll and benefits, and their physical security. security Information Technology (IT) Audits examine internal control environment of automated information processing systems and how people use those systems. systems
  • 4. The IT Audit Evaluates … System(s) input, output, and processing controls input output Backup & media storage (off-site) (off- Disaster preparedness plan ( d if it has been Di d l (and i h b tested!) System(s) security Computer facilities p
  • 5. How does the IT Audit Work? Kick- Kick-off Meeting to discuss g audit objectives with delivery of extensive questionnaires. Interview & investigative phase based upon responses to questionnaires. Exit interview with Q&A on any discovered weaknesses or findings. Published A di Report with P bli h d Audit R ih weaknesses and/or findings. Management response. g p
  • 6. What Are Auditors Looking For? Reportable conditions – are matters that represent a significant deficiency in the d d design or operation of the internal control structure which could adversely affect the organization's ability to record, process, summarize, and report financial data consistent with the assertions of management in the financial statements. Material Weaknesses – are significant deficiencies, or combination of significant deficiencies, that results in more than deficiencies a remote likelihood that a material control process could be obverted or bypassed. Findings – conditions that do adversely affect the institution and may include conditions dealing with irregularities, illegal acts, errors, inefficiency, waste, ineffectiveness, conflicts of interest, and for our purposes control weaknesses. pp
  • 7. Interview & Investigation Areas Infrastructure Security & Control Application Security & Control Disaster Preparedness Plan Di P d Pl
  • 8. INFRASTRUCTURE SECURITY & CONTROL: Relates to the d i of the campus network system and i l d the h design f h k d includes h backbones, routers, switches, wireless access points, access methods and protocols used. Of special interest are the filters p used. p & protective measures that govern (1) Internet open access (2) Intranet controlled access and (3) Secured Access. Particular areas of interest include: Physical security of computer center – Environmental controls, locks, cameras & authorizations to enter. Network configuration – Fil & firewall rule-sets and their change processes. N k fi i Filter fi ll rule- l d hi h ID and password rule-sets – Length, character requirements, aging, etc. rule- Operating System – File & directory permissions. Patch management – Remediation of known exploits. Segregation of duties of IT staff.
  • 9. APPLICATION SECURITY & CONTROL: Relates to the design of the administrative system and includes additional server operating system issues as well as the DBMS and the application that sits on top of both. Heavily scrutinized are users, both functional and technical and their roles. Particular areas of interest include: Default users and their passwords Role based security – Especially as it is setup in the application itself and access to the native DBMS or OS. OS User accounts and password management – Procedures & signoff for account holders, length, character requirements, aging, etc. Software modification – Procedures and segregation of duties in their gg implementation. Patch management – Remediation of known exploits across multiple instances. Segregation of duties of IT and functional users. users
  • 10. APPLICATION SECURITY & CONTROL (Top 5 Issues) (T I ) Improper account p pp provisioning with segregation of duties g gg Insufficient controls for change management A general lack of understanding around key system configurations Audit logs not being reviewed (or that review itself not being logged) Abnormal transactions not identified in a timely manner
  • 11. DISASTER PREPAREDNESS PLAN: The state in which an institution is i i i i prepared f di d for disaster. P Preparedness i d involves a l plan for avoiding and recovering from a disaster with preservation and retrieval of records lost by an unexpected catastrophic occurrence. Particular areas of interest include: Backup of critical data – Including frequency, media, where and how far away. Printed plans – Kept off site by plan principles with contact lists. Recovery processes – Includes not only IT operations but facilities (hot & yp y p ( cold sites). Business continuity while IT functions are restored. Actual testing of the plan.
  • 12. Banner Issues Discovered Di d As of 10/12/2007
  • 13. Y10K Compliance Banner cannot handle the switch from the year 9999 to 10000
  • 14. Tips to Make the Audit Go Smoothly Avoid making it an “adversarial” engagement adversarial Provide what’s asked of you Document & diagram D di
  • 15. For Additional Information: Wikipedia has a g p good overview of IT auditing at: g http://en.wikipedia.org/wiki/Information_technology_audit Control Objectives for Information and related Technology (COBIT) is a set of best practices (framework) for information technology (IT) management created by the Information Systems Audit and Control Association (ISACA), (ISACA) and the IT Governance Institute (ITGI) in 1992. http://www.isaca.org/Template.cfm?Section=COBIT6&Template=/Tagged Page/TaggedPageDisplay.cfm&TPLID=55&ContentID=7981
  • 16. Thank You Please share your comments, ideas, suggestions, questions . . . Thomas Danford tdanford@tbr.edu 615-366- 615-366-4451