Spring 2020 - Slide Deck 3
Spring 2020 - Slide Deck 3
Audit
Auditing and Information Security
Policies
What is
“Auditing”
A methodical examination and review
of measuring something against a
standard and report on risks.
Answer the questions
What Works?, What Should Work?, How
do you Know?
Example of Audits
Conformance Audit
Security Audit
Financial Audit
Differences Between Auditing and
Assessing
Auditing
Measurement against a standard
Answer “How do you know”
Usually INCLUDE assessing
Assessing
Subjective measurement
Examples
Identify security issues within the client
infrastructure
Determine how good or bad your computer
infrastructure
What needs to be done to improve the state of
security
Quite often, assessments lead to policies
which can then be audited
Auditing in Info Technology and
Assurance
At Three Levels
Policy Level
Is it effective?
How is it followed?
Procedure Level
Do Administrators/Users follow the procedure?
System/Application Level
The place where we apply the policies and
procedures
What is a
Policy?
Policy
A plan or course of action that influences decisions
Administrative control
For policies to be effective, they must be:
Disseminated
Read
Understood
Agreed-to
Uniformly enforced
Unenforced policies can face hurdles and pose further risk to organization
Policies require constant modification and maintenance
4
Where Policies
Sit
Security Technical
Control Administrative X X X X X X X
Type
Physical
11
Enterprise Information Security
Policy
Sets strategic direction, scope, and tone for
organization’s security efforts
Assigns responsibilities for areas of security
Guides development, implementation, and
management of security program
Typically owned by C-levels/board
Not typically in the auditor’s realm
12
EISP
Elements
EISP should include:
An overview of corporate philosophy on security
Information about security organization and
security roles
Responsibilities for security that are shared by
all roles
Responsibilities for security that are unique to each
13
Example EISP
Components
Issue-Specific Security Policy
(ISSP)
• Provides detailed, targeted
guidance
19
• Statement
of
Purpose
Components of the
ISSP
• Statement of Purpose
• Authorized Access and
Usage of Equipment
• Prohibited Usage of
Equipment
Components of the ISSP
(cont’d.)
• Statement of Purpose
• Authorized Access and Usage of Equipment
• Prohibited Usage of Equipment
• Systems management
• Violations of policy
Components of the ISSP
(cont’d.)
• Statement of Purpose
• Authorized Access and Usage of Equipment
• Prohibited Usage of Equipment
• Systems management
• Violations of policy
• Policy review and modification
• Limitations of liability
Implementing the
ISSP
• Common approaches
– Several independent ISSP documents
– A single comprehensive ISSP document
– A modular ISSP document that unifies policy
creation and administration
• The recommended approach is the modular
policy
– Provides a balance between issue orientation and
policy management
System-Specific Security Policy
(SSP)
• These often look different from other policies
• Each equipment type may have own policies
• General methods of implementation apply
System-Specific Security Policy
(cont’d.)
• Access control lists
– user access lists, matrices, and capability tables
govern the rights and privileges
– A capability table is similar
specifies subjects and objects a user or
group may access
– frequently complex matrices, not simple lists or
tables
– Enable administrations to restrict access
according to user, computer, time, duration,
or even a particular file
System-Specific Security Policy
(cont’d.)
• Configuration rules
– Specific configuration codes entered into security systems
■ Guide the execution of the system when information is passing
through it
• Rule policies are more specific to system operation than ACLs
– May or may not deal with users directly
• Many security systems require specific configuration scripts telling the
systems what actions to perform on each set of information they
process
SSSPs
cont
Where do these reside on systems?
File systems
SELinux Policies
Windows Group Policy
App level ACLs
Firewall rules
32
System-Specific Security Policy
(ex.)
Guidelines for Effective
Policy
Developing Information Security
Policy