it audit process.ppt

24
Information Information Technology Audit Technology Audit Process Process Business Practices Business Practices Seminar Seminar Paul Toffenetti, CISA Paul Toffenetti, CISA Internal Audit Internal Audit 29 February 2008 29 February 2008

Upload: gsarwar0786

Post on 14-Apr-2015

105 views

Category:

Documents


9 download

DESCRIPTION

IT Audit Process

TRANSCRIPT

Page 1: IT Audit Process.ppt

Information Technology Information Technology Audit ProcessAudit Process

Business Practices Business Practices SeminarSeminar

Paul Toffenetti, CISAPaul Toffenetti, CISAInternal AuditInternal Audit

29 February 200829 February 2008

Page 2: IT Audit Process.ppt

Overview

• What is Internal Audit• IT Audit Process• Common IT Audit Observations• So What Should We Do• Questions

Page 3: IT Audit Process.ppt

Authority and Policies

What is Internal Audit?

Internal auditing is an independent, objective assurance and advisory activity designed to add value and improve an organization’s operations.

Internal Audit helps organizations accomplish their objectives by evaluating business risk and controls and where appropriate, offer recommendations to improve risk management and governance processes.

Page 4: IT Audit Process.ppt

Audit ProcessAudit Process

Planning

Testing

Reporting

Follow-up

Page 5: IT Audit Process.ppt

PlanningPlanning

• Annual Risk AssessmentAnnual Risk Assessment• Preliminary Audit PlanPreliminary Audit Plan• Board of Visitors ApprovalBoard of Visitors Approval• Notification and Request for InformationNotification and Request for Information• Understand Your Risks and ControlsUnderstand Your Risks and Controls• Opening ConferenceOpening Conference

Page 6: IT Audit Process.ppt

TestingTesting

• SecuritySecurity• Backup & RecoveryBackup & Recovery• Resource ManagementResource Management• Web SiteWeb Site

Page 7: IT Audit Process.ppt

Security TestingSecurity TestingRemote Vulnerability ScansRemote Vulnerability Scans

ServersServers

PrintersPrinters

RoutersRouters

WorkstationsWorkstations

LaptopsLaptops

If it’s on the network If it’s on the network we scan it!we scan it!

Nmap & NessusNmap & Nessus

Page 8: IT Audit Process.ppt

Security TestingSecurity TestingOn-Site, Follow-up Vulnerability Tests On-Site, Follow-up Vulnerability Tests

Workstations Laptops Servers

We Test Computers That May Have Security Vulnerabilities!We Test Computers That May Have Security Vulnerabilities!

WinAudit

MSBA CIS Tools & Benchmarks

Page 9: IT Audit Process.ppt

Backup & Recovery TestingBackup & Recovery Testing

You Must Have Effective Controls to Backup & RecoverYou Must Have Effective Controls to Backup & Recover

““Critical Data”Critical Data”

Page 10: IT Audit Process.ppt

Resource Management Resource Management TestingTesting

Computer Hardware & SoftwareComputer Hardware & Software

Procurement through SurplusProcurement through Surplus

Page 11: IT Audit Process.ppt

Web Site Testing

• University Relations Web Guidelines & Procedures• Web Development Best Practices• Content Recommendations• Templates

• Privacy Statement (Policy 7030)• Web Server & Application Security

Page 12: IT Audit Process.ppt

ReportingReportingObservationsObservations

When Unexpected Results are NotedWhen Unexpected Results are Noted

We Solicit Your CommentsWe Solicit Your Comments

Page 13: IT Audit Process.ppt

ReportingReportingRecommendationsRecommendations

We May Recommend OpportunitiesWe May Recommend Opportunities

To Improve Your ControlsTo Improve Your Controls

Page 14: IT Audit Process.ppt

ReportingReportingManagement Action PlansManagement Action Plans

YouYou Develop Plans, Schedules, and Develop Plans, Schedules, and PrioritiesPriorities

To Implement SolutionsTo Implement Solutions

Page 15: IT Audit Process.ppt

ReportingReporting

A Final Report is Sent A Final Report is Sent

to to

The Board of VisitorsThe Board of Visitors

Page 16: IT Audit Process.ppt

Follow-UpFollow-Up

• Follow-Up Actions are Based on Follow-Up Actions are Based on Your “Management Action Plan”Your “Management Action Plan”

• Progress is Monitored Progress is Monitored • Some Re-Testing May be Some Re-Testing May be

NecessaryNecessary• Board of Visitors is UpdatedBoard of Visitors is Updated• Audit is closedAudit is closed

Page 17: IT Audit Process.ppt

Common Audit ObservationsCommon Audit Observations

Weak Security SettingsWeak Security Settings

Windows Operating SystemWindows Operating System

Page 18: IT Audit Process.ppt

Common Audit ObservationsCommon Audit Observations

Missing Security Patches Missing Security Patches

Operating Systems Operating Systems

ApplicationsApplications

DatabasesDatabases

Page 19: IT Audit Process.ppt

Common Audit ObservationsCommon Audit Observations

Misconfigured Anti-Malware ToolsMisconfigured Anti-Malware Tools

Out-of-Date Threat SignaturesOut-of-Date Threat SignaturesScans Not ScheduledScans Not Scheduled

Page 20: IT Audit Process.ppt

Common Audit ObservationsCommon Audit Observations

Inadequate Access ControlsInadequate Access Controls

Weak Passwords & File PermissionsWeak Passwords & File Permissions

Page 21: IT Audit Process.ppt

Common Audit ObservationsCommon Audit Observations

Open Communication PortsOpen Communication Ports

The Hacker’s Point of EntryThe Hacker’s Point of Entry

Page 22: IT Audit Process.ppt

Common Audit Common Audit ObservationsObservations

““The System Administrator’s Dilemma”The System Administrator’s Dilemma”

How Much Risk is How Much Risk is Senior ManagementSenior Management Willing to Accept?Willing to Accept?

SecurityConvenience

Page 23: IT Audit Process.ppt

So What Should We Do?

• Harden Security Settings• Keep Everything Patched• Install and Use Anti-Malware Tools• Enforce Strong Passwords• Close or Filter Communication Ports• Test Your Systems• Support Your System Administrator!

Page 24: IT Audit Process.ppt

QuestionsQuestions““Success Redefined”Success Redefined”