Lecture 12

Security Audit and testing

Security Auditing

Are security policies sound and appropriate for the business or activity? Are there controls supporting your policies?

Is there effective implementation and upkeep of controls?

alt text

Determining What is Acceptable

Permission Levels

Types of Security Audits

alt text

Tollgate

Portfolio

Purpose of Security Audits

An audit gives you the opportunity to review your risk management program and to confirm that the program has correctly identified and reduced (or otherwise addressed) the risks to your organisation.

Appropriateness of controls

Correct installation of controls

Address purpose of controls

Service Organisational Control (SOC) Reports

The American Institute of Certified Public Accountants has recognized the increased complexities of service organisations (such as cloud service providers) and created three different levels of audit reporting for service organisations. The Service Organisation Control (SOC) framework defines the scope and contents of three levels of audit reports.

alt text

Planning the Audit

alt text

Defining the Scope of the Plan

Review risk analysis

Review the server and application

Pen test

Benchmarks for Audits

Benchmark – The standard to which your system is compared to determine whether it is securely configured

ITIL: Information Technology Infrastructure Library COBIT: Control Objectives for Information and related Technology COSO: Committee of Sponsoring Organizations of the Treadway Commission

NIST

The COSO ERM Framework

alt text

Summary: The COSO Enterprise risk management (ERM) framework calls on the Internal Audit Function to assist management and the board of directors and its audit committee by examining, evaluating, reporting on and recommending improvements to the adequacy and effectiveness of the entity’s ERM process.

How does it help an internal audit?

Audit Data Collection Methods

Areas included in Audit Plan

alt text alt text

Control Checks and Identity Management

It is important to ensure that your security controls are effective, reliable, and functioning as you intended. Without monitoring and reviewing, you have no assurance that your information security program is effective or that personnel are exercising due diligence. When auditing an identity management system, you should focus on these key areas:

Post-Audit activities

Each recommendation should have a recommended deadline

Give management an opportunity to respond to audit

Present findings

Example Security Audit Report: Passwords

alt text

Part 2: Security Testing

alt text

alt text

Security testing road map

alt text

Network Mapping

Establishing Testing Goals and Reconnaissance Methods

Whois service

alt text

Social Engineering

alt text

Reconnaissance method: Social engineering

alt text

Which influence Technique was used?

alt text

alt text

alt text

alt text

alt text

alt text

Testing methods

Black-box testing

White-box testing

Grey-box testing

alt text

Pentest software

alt text

alt text

Security Metrics (measuring performance)

alt text

Examples of Security Performance Metrics

Example: Deloitte‘s Cyber Risk Assessment Approach

alt text

alt text

alt text