Security Audit
Security Audit
Martin Goldberg
Todays Topics
Defining IT Audit and the Auditor
Steps of an IT Audit
Preparing to be Audited
How IT Audit Applications
Physical Audit
Inventory
Who is an IT Auditor
Accountant Raised to a CS Major
CISA? CISM?
CISA - Certified Information Systems Auditor
CISM - Certified Information Systems
Mangager - new
www.isaca.org (Information Systems Audit and
Control Organization)
Teaching financial auditors to talk to CS people
CISA
Min. of 5 years of IS auditing, control or security
work experience
Code of professional ethics
Adhering to IS auditing standards
Exam topics:
CISA (cont.)
Exam topics: (cont.)
4. Disaster Recovery and Business Continuity
5. Business Application System Development,
Acquisition, Implementation, and Maintenance
6. Business Process Evaluation and Risk
Management
7. The IS Audit Process
CISM
Next step above CISA
Exam topics:
Steps of An IT Audit
1. Planning Phase
2. Testing Phase
3. Reporting Phase
Ideally its a continuous cycle
Again not always the case
Planning Phase
Entry Meeting
Site Survey
Define Scope
Review Current
Policies
Questionnaires
Learn Controls
Historical Incidents
Past Audits
Define Objectives
Develop Audit Plan /
Checklist
Example Checklist
An Auditors Checklist for Performing a
Perimeter Audit of on IBM ISERIES
(AS/400) System - Craig Reise
Scope of the audit does not include the
Operating System
Physical security
Services running
Testing Phase
Meet With Site Managers
What data will be collected
How/when will it be collected
Site employee involvement
Answer questions
Based on scope/objectives
Types of Data
Physical security
Interview staf
Vulnerability assessments
Access Control assessments
Reporting Phase
Exit Meeting - Short Report
Immediate problems
Questions & answer for site managers
Preliminary findings
NOT able to give in depth information
Table format
Historical data (if available)
Ratings
Fixes
Page # where in depth description is
Glossary of terms
References
Preparing To Be Audited
This Is NOT a Confrontation
Make Your Self Available
Know What The Scope/Objectives Are
Know What Type of Data Will be
Collected
Know What Data Shouldnt be Collected
Application Audit
An assessment Whose Scope Focuses on a Narrow
but Business Critical Processes or Application
Excel spreadsheet with embedded macros used to
analyze data
Payroll process that may span across several diferent
servers, databases, operating systems, applications, etc.
The level of controls is dependent on the degree of risk
involved in the incorrect or unauthorized processing of
data
References
www.isaca.org
An Auditors Checklist for Performing a
Perimeter Audit of on IBM ISERIES (AS/400)
System - Craig Reise
Conducting a Security Audit: An Introductory
Overview - Bill Hayes
The Application Audit Process - A Guide for
Information Security Professionals - Robert Hein