Network Audit - Pempal

18
Komitas Stepanyan, PhD, CRISC, CRMA, CobitF IT Audit Virtual Training for PEMPAL --- 1 --- Network Audit

Transcript of Network Audit - Pempal

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 1 ---

Network Audit

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 2 ---

How to start ?

What to look for ?

Tools to use

Examples

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 3 ---

IA CYCLE

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 4 ---

THE NATURE OF AUDITING

Audit Planning

✓ Establish scope and objectives

✓ Organize audit team

✓ Develop knowledge of business operations

✓ Review prior audit results Identify risk factors

✓ Prepare audit program

Collection of Audit Evidence

✓ Observation of operating activities

✓ Review of documentation

✓ Discussions with employees

✓ Physical examination of assets

✓ Confirmation through third parties

✓ Reperformance of procedures

✓ Analytical review Audit sampling

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 5 ---

PLANNING, 1

1. Understand your network at policy level

• Network schematics (physical and logical)

• Network Security Policy

• Remote Access Policy

• Configuration Management Policy

• Change Management Policy

• User management Policy

• Internet Access Policy

• Email and Communications Policy

• BYOD Policy

• Backup and restore policy

2. Interview with CIO and CISO

2.1. Interview with senior network admin

2.2. Interview with senior network security admin

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 6 ---

PRELIMINARY ENGAGEMENT ACTIVITIES

Determine the Audit Engagement Team

Requirements

Assess if there is sufficient competency

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 7 ---

PLANNING, 2

3. Study the latest risk assessment and analysis report

3. Study the latest network Scan report

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 8 ---

CONTROL OBJECTIVES AND RISKS

Mechanisms have been established to identify and react to risks, both internal and external

Network security controls have been implemented to safeguard company’s IT resources and data. Network security devices are appropriately managed

IT assets are adequately protected in the network

An appropriate change management has been implemented

IT Responsibilities have been appropriately defined and communicated

Network infrastructure, capacity and security supports the IT strategic plans that are closely aligned with the business objectives.

Contingencies for unforeseeable events have been developed and implemented.

Authentication and authorization controls exist for access to the operating and significant application systems.

User account access privileges are authorized

Undefined Authorization Roles and Administrator Access

Insufficient Disaster Recovery Plan

Missing Controls for New User Setup and Account Termination

Outdated or Missing IT Strategic Plan

Lack of IT Administrative Policies, Procedures and Password Configuration Standards

Need for Formal Change Management

Insufficient Server Room Controls

Insufficient Network Monitoring

Absence of an IT Risk Assessment

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 9 ---

CREATING RISK-CONTROL-MATRIX

Risk Control Testing procedure

Absence or Insufficient IT Risk Assessment Risk identification (both internal and external) is documented in RM guide

Ensure whether and confirm that mechanisms have been established to identify and react to risks, both internal and external✓ Interview with CIO and CISO✓ Study RM guide✓ Study identified High Risk✓ Study implemented controls

Insufficient Controls for New User Setup and Account Termination

User management guide is in place ✓ Interview with HR✓ Select Key staff and check their account setup and

termination

Lack of IT Administrative Policies, Procedures and Password Configuration Standards

Password policy is in place ✓ Interview with network admin✓ Check and confirm if password complexity requirement

has been implemented and followed for all network devices

Insufficient Change Management process Change management process and relevant procedures are in place

✓ Interview with CISO, network admin✓ Ensure whether and confirm that change management

requirements are followed for any change in the network, devices’ configurations, firewall rules etc.

✓ Unauthorize access to server room ✓ Access to server room granted only appropriate personnel

✓ Camera system is in place

✓ Study recordings to ensure if there is any Unauthorize access

✓ Study access logs

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 10 ---

EXECUTING - TESTING

Sampling

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 11 ---

EXAMPLE

Control Description: Only senior admins have root access to network devices

For the control description above, answer the following questions:

1. What pieces of evidence should be obtained?

2. How do you determine the sample size?

3. What testing steps are necessary to test this control?

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 12 ---

EXAMPLE, SAMPLE SIZE

The sample size for a root(administrator) access control depends on the criticality of system; number of user accounts, number of network devices, etc.

Testing Steps:

1. Inquire with IT to gain an understanding of how the security is configured ?

2. Observe IT generate a system query to obtain the list of users with root permissions

3. Compare the list of senior administrators to the IT organization chart or active employee listing to determine if user access is in line with job responsibilities

4. Inquire with IT Management to determine if the individuals with administrator access are appropriate

5. Analyze event-logs to see if there is any anomalies

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 13 ---

EXAMPLE

Control Description: Automated configuration management tools have beenimplemented to manage the backup and retention of all network devices. Backup logs arereviewed every time after any configuration change and documented in the“Configuration Backup Log” check sheet.

For the control description above, answer the following questions:

1. What pieces of evidence should be obtained?

2. How do you determine the sample size?

3. What testing steps are necessary to test this control?

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 14 ---

EXAMPLE, SAMPLE SIZE

The sample size for configuration change management control is based on the entire population of changes, criticality of network devices etc.

Testing Steps:

1. Obtain backup schedule (for in-scope devices) from the automated tool from the network administrator.

2. Randomly select a sample of days

3. From sample, obtain history file and determine that jobs were run according to policy

4. Obtain configuration backup log check sheet and determine that jobs were run according to backup schedule.

5. If jobs were not run according to policy, determine that they were investigated and resolved

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 15 ---

NETWORK AUDIT TOOLS

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 16 ---

NETWORK AUDIT TOOLS

1. Spiceworks Inventory - Network inventory tool that automatically discovers network devices

2. Nessus - Free vulnerability assessment tool with over 450 configuration templates and customizable reports

3. Network Inventory Advisor - inventory scanning tool compatible with Windows, Mac OS, and Linux devices

4. ManageEngine Vulnerability Manager (FREE TRIAL available) - This package of system security checks sweeps your network and checks for security weaknesses. Runs on Windows and Windows Server.

5. Netwrix Auditor - Network security auditing software with configuration monitoring, automated alerts

6. Nmap (Zenmap GUI) - Open-source port scanner and network mapper available as a command-line interface

7. OpenVAS - Vulnerability assessment tool for Linux users with regular updates

8. Acunetix - Web application security scanner that can detect over 50,000 network vulnerabilities when integrated with OpenVAS

9. Metasploit - Penetration testing tool that allows you to hack into exploits in your network

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 17 ---

QA

Thank You !

Komitas Stepanyan,PhD, CRISC, CRMA, CobitF

IT AuditVirtual Training for PEMPAL

--- 18 ---