IT Audit Report
IT Audit Report
IT Audit Report
These findings represent controls that were not in place during the audit conducted by the Occupational Safety Health and IT agency
on Discount Juice Shop. All information systems must meet these controls. Remember to test all changes before applying to a
production environment.
Management
Finding Control Objective Results Noted Evidence Requested
Response
1.1. 1.1. Organization shall protect NOT IN PLACE Provide evidence that
confidentiality and integrity of demonstrates only
transmitted information to ensure The organization did not use secure protocols are
that the confidentiality and integrity secure protocols, such as Secure in use.
of the data are maintained during Shell (SSH), Transport Layer
the transfer process. Security (TLS), and Internet Provide IP address
Protocol Security (IPSec), for for new web server.
Ref: NIST SP 800-53 SC-8 secure network management Auditor will review
functions. TLS configuration.
PAGE 1 OF 10
CONFIDENTIAL OCCUPATIONAL SAFETY HEALTH AND IT
Management
Finding Control Objective Results Noted Evidence Requested
Response
2.1. 2.1.1. Organization shall (a) NOT IN PLACE Provide evidence that
establish and document usage demonstrates MFA is
restrictions, The organization did not use in use and describe
configuration/connection multi-factor authentication how the current
requirements, and implementation (MFA) when establishing implementation
guidance for each type of remote remote access for system meets this
access allowed; and (b) authorize administration functions that requirement.
remote access to the information originated from networks
system prior to allowing such external to the organization,
connections. such as the Internet.
PAGE 2 OF 10
CONFIDENTIAL OCCUPATIONAL SAFETY HEALTH AND IT
Management
Finding Control Objective Results Noted Evidence Requested
Response
PAGE 3 OF 10
CONFIDENTIAL OCCUPATIONAL SAFETY HEALTH AND IT
Management
Finding Control Objective Results Noted Evidence Requested
Response
communications traffic. A
deny-all, permit-by-exception
network communications traffic
policy ensures that only those
connections which are essential
and approved are allowed.
Limiting the number of external
network connections facilitates
more comprehensive
monitoring of inbound and
outbound communications
traffic. NIST SP 800-41,
Guidelines on Firewalls and
Firewall Policy must be used as
guidance on firewalls and
firewall rule set.
3.1. 3.1.1. Organization shall uniquely NOT IN PLACE Provide evidence that
identify and authenticate demonstrates shared
organizational users. Individual The organization used shared accounts are not in
authenticators include, for example, accounts (credentials used by use.
passwords, tokens, biometrics, PKI more than one individual)
certificates, and key cards. within their systems. The use of
shared user accounts makes it
Ref: NIST SP 800-53 IA-2 difficult to (a) uniquely identify
individuals accessing or (b)
provide detailed accountability
of user activity within an
information system.
PAGE 4 OF 10
CONFIDENTIAL OCCUPATIONAL SAFETY HEALTH AND IT
Management
Finding Control Objective Results Noted Evidence Requested
Response
Default/generic credentials,
such as "root" or "admin",
should be disabled or changed
prior to a system being put into
production.
3.1.2. Organization shall (a) ensure NOT IN PLACE Auditor will test for
that authenticators have sufficient default and easily
strength of mechanism for their The organization had not guessable passwords.
intended use and (b) change default changed default passwords prior
content of authenticators prior to to information system
information system installation. installation.
PAGE 5 OF 10
CONFIDENTIAL OCCUPATIONAL SAFETY HEALTH AND IT
Management
Finding Control Objective Results Noted Evidence Requested
Response
3.2. 3.2.1. Organization shall (a) review NOT IN PLACE Provide a completed
proposed configuration-controlled change control form
changes to the information system The organization did not (a) as an attached PDF.
and approve or disapprove such provide adequate management
changes with explicit consideration of or (b) document changes to
for security impact analyses, (b) systems and application
document configuration change programs to protect the systems
decisions associated with the and programs against failure as
information system, and (c) retain well as security breaches.
records of configuration-controlled Changes should be analyzed
changes to the information system and evaluated for the impact on
for at least three (3) years. security, preferably before they
are approved and implemented.
Ref: NIST SP 800-53 CM-3
PAGE 6 OF 10
CONFIDENTIAL OCCUPATIONAL SAFETY HEALTH AND IT
Management
Finding Control Objective Results Noted Evidence Requested
Response
4.1. 4.1.1. Organization shall (a) NOT IN PLACE Provide a copy of the
implement incident handling relevant incident
capability for security incidents that The organization did not have handling procedures
includes preparation, detection and procedures defined for properly as an attached PDF.
analysis, containment, eradication, responding to a ransomware
and recovery; and (b) incorporates security incident. The incident
lessons learned from ongoing handling procedures should
incident handling activities into address processes throughout all
incident response procedures, stages of the NIST incident
training, and testing, and implement response life cycle, including
the resulting changes accordingly. the following:
PAGE 7 OF 10
CONFIDENTIAL OCCUPATIONAL SAFETY HEALTH AND IT
Management
Finding Control Objective Results Noted Evidence Requested
Response
PAGE 8 OF 10
CONFIDENTIAL OCCUPATIONAL SAFETY HEALTH AND IT
Management
Finding Control Objective Results Noted Evidence Requested
Response
4.1.3. Organization shall test the NOT IN PLACE Provide a copy of the
incident response capability for the documented test
information system at least annually The organization did not results as an attached
using to determine the incident perform testing to simulate a PDF.
response effectiveness and breach of restricted or highly
documents the results. restricted data and test the
organization's incident response
Ref: NIST SP 800-53 IR-3 policies and procedures. Each
test must produce an after-
action report to improve
existing processes, procedures,
and policies.
5.1. 5.1.1. Organization shall establish NOT IN PLACE Describe how the
usage restrictions, configuration mobile device
requirements, connection The organization did not have a ownership model and
requirements, and implementation formal practice for securing MDM solution
guidance for organization- mobile devices. Employees secures mobile
controlled mobile devices; and (b) were required to use mobile devices.
authorize the connection of mobile phones but had not been
devices to organizational provided guidance on how
information systems. mobile devices were to be used,
how access was to be
Ref: NIST SP 800-53 AC-19 controlled, and how data was to
be secured.
PAGE 9 OF 10
CONFIDENTIAL OCCUPATIONAL SAFETY HEALTH AND IT
Management
Finding Control Objective Results Noted Evidence Requested
Response
PAGE 10 OF 10