Top Banner
1 GAO’s Information Security Audits Presented to: Cyber Security Exchange October 2, 2012
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cybersecurity exchange briefing oct 2012 v2

1

GAO’s Information Security Audits

Presented to:

Cyber Security Exchange

October 2, 2012

Page 2: Cybersecurity exchange briefing oct 2012 v2

• Source of Audits• Audit Methodology for IS Controls• Assessing Finding Significance• Communicating Audit Results• Recent GAO Reports• Q & A

2

Cyber Security Exchange

Agenda

Page 3: Cybersecurity exchange briefing oct 2012 v2

Source of Audits

• Statutory mandates• Congressional requests• Comptroller General’s authority• Engagement acceptance meeting

3

Page 4: Cybersecurity exchange briefing oct 2012 v2

FISMA- Mandate Report / Annual Analysis- Small, Micro, & Independent Agencies- Census, NTSB, NMB- FCC ESN- Cyber risk management- High impact systems

Privacy- Taxpayer Privacy Protections- Privacy of Location-Based Information- Data Breach Notification and Response- Computer Matching Agreements

Critical IT Systems & Infrastructure- Smart Grid- Communications Networks Security- Security of Mobile Devices- Maritime Cyber Threats and Security- Federal Cyber Coordination w/ States & Locals

Emerging Issues- Cybersecurity Strategies- Oversight of Contractor Security- Implantable Medical Devices- Cyber Incident Handling & Response- Continuous Monitoring- FedRAMP

Training/Methodology & External Liaison

- FISCAM- GAO Internal Controls- Internal/External Training- Technical Assistance to Hill- OMB/NIST/NASCIO

Consolidated Financial Statements- IRS- BPD/Federal Reserve- FDIC- SEC- OIGs

- TARP- FHFA - SOSI- CFPB

Page 5: Cybersecurity exchange briefing oct 2012 v2

Audit Methodology for IS Controls• Federal Information System Controls Audit Manual (GAO-09-

232G)• Objective: To assess effectiveness of agency’s security

controls in protecting the confidentiality, integrity, and availability of its information systems and information.

• Scope: • Access controls• Configuration management• Segregation of duties• Contingency planning• Security management

5

Page 6: Cybersecurity exchange briefing oct 2012 v2

Audit Methodology for IS Controls (cont.)Technical & Audit Guidance:• Federal Laws – FISMA

• Office of Management and Budget (OMB)

• National Institute of Standards & Technology (NIST)

• Defense Information Systems Agency (DISA)

• National Security Agency (NSA)

• Vendor Guidance and Industry Practices

• Government Auditing Standards

6

Page 7: Cybersecurity exchange briefing oct 2012 v2

7

Iterative and HolisticAssessment Approach

Audit Methodology for IS Controls (cont.)

Page 8: Cybersecurity exchange briefing oct 2012 v2

8

Audit Methodology

Understanding the Environment• Identify most important assets (information,

databases, systems)

• Approach: formal and informal discussions

• Network diagrams and simple tools (telnet, for instance or nmap)

• Confirm our understanding of environment

Page 9: Cybersecurity exchange briefing oct 2012 v2

9

Audit Methodology – Logical Access

Control Areas

Focus on main controls that might stop an intruder, based on knowledge of latest vulnerabilities such as:

browser – Java, ActiveX, Flash, PDF

“spoofed” emails

Page 10: Cybersecurity exchange briefing oct 2012 v2

10

Audit Methodology – Controlling Access To and From

NetworksIf exploited, how does information go out? HTTP, HTTPS, DNS

Authentication of network routing protocols (EIGRP, BGP)

Cisco SAFE (Security Reference Architecture)

VPN – use of TLS v SSL

Firewall rules (Cisco ASA, Checkpoint, etc.)

Data loss prevention solutions

Page 11: Cybersecurity exchange briefing oct 2012 v2

11

Audit Methodology – Controlling Access To and From

Host Devices• Ask agencies to run scripts to

get key configuration settings (Windows, Linux/Unix, etc)

• Database scanner • Email server (sendmail,

postfix) settings• Internet Explorer, MS Office

settings• Conformance to vendor

guidance (Microsoft, Apple)• Up to date patches• Virtualization – hypervisor

security settings, Storage Area Network (SAN) configurations

Page 12: Cybersecurity exchange briefing oct 2012 v2

12

Audit Methodology

Consider Trust RelationshipsFormal trust – Windows domains

Informal – any device connecting to VPN

Check Windows Active Directory group policy

Weak links that may be exploited

Page 13: Cybersecurity exchange briefing oct 2012 v2

13

Vulnerabilities should be assessed in context to the network and the impact on the organization’s mission.

Assessing Finding Significance

Page 14: Cybersecurity exchange briefing oct 2012 v2

14

Communicating Audit ResultsFocus on most important problems – the ones that’ll help agency become more secure

Criteria – CIS, NIST, vendor guidanceCondition – describe problemEffect – explain what couldhappen if exploitedCause – sometimes unclear, often related to immature information security program

Page 15: Cybersecurity exchange briefing oct 2012 v2

Communicating Audit Results (cont.)• Reports:

• Publicly available• Limited distribution

• Testimony statements

• Congressional briefings

• Media Interviews

15

Page 16: Cybersecurity exchange briefing oct 2012 v2

Recent GAO Reports• GAO-12-757, Information Security: Better Implementation of

Controls for Mobile Devices Should Be Encouraged (Sept. 2012)

• GAO-12-961T, Privacy: Federal Law Should Be Updated to Address Changing Technology Landscape (July 2012)

• GAO-12-926T, Cybersecurity: Challenges in Securing the Electricity Grid (July 2012)

• GAO-12-696, Information Security: Environmental Protection Agency Needs to Resolve Weaknesses (July 2012)

• GAO-12-876T, Information Security: Cyber Threats Facilitate Ability to Commit Economic Espionage (June 2012)

16

Page 17: Cybersecurity exchange briefing oct 2012 v2

Recent GAO Reports (cont.)• GAO-12-666T, Cybersecurity: Threats Impacting the Nation

(April 2012)• GAO-12-424R, Management Report: Improvements Needed

in SEC’s Internal Control and Accounting Procedure (April 2012)

• GAO-12-393, Information Security: IRS Needs to Further Enhance Internal Control over Financial Reporting and Taxpayer Data (March 2012)

• GAO-12-361, IT Supply Chain: National Security-Related Agencies Need to Better Address Risks (March 2012)

• GAO-12-507T, Cybersecurity: Challenges in Securing the Modernized Electricity Grid (February 2012)

Page 17

Page 18: Cybersecurity exchange briefing oct 2012 v2

Recent GAO Reports (cont.)• GAO-12-92, Critical Infrastructure Protection: Cybersecurity

Guidance is Available, but More Can Be Done to Promote Its Use (December 2011)

• GAO-12-8, Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination (November 2011)

• GAO-12-130T, Information Security: Additional Guidance Needed to Address Cloud Computing Concerns (October 2011)

• GAO-12-137, Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements (October 2011)

Page 18

Page 19: Cybersecurity exchange briefing oct 2012 v2

Recent GAO Reports (cont.)• GAO-11-751, Personal ID Verification: Agencies Should Set a

Higher Priority on Using the Capabilities of Standardized Identification Cards (September 2011)

• GAO-11-708, Information Security: FDIC Has Made Progress, but Further Actions Are Needed to Protect Financial Data (August 2011)

• GAO-11-695R, Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for DOD to Develop Full-Spectrum Cyberspace Budget Estimates (July 2011)

• GAO-11-865T, Cybersecurity: Continued Attention Needed to Protect Our Nation’s Critical Infrastructure (July 2011)

Page 19

Page 20: Cybersecurity exchange briefing oct 2012 v2

Recent GAO Reports (cont.)• GAO-11-149, Information Security: State Has Taken Steps to

Implement a Continuous Monitoring Application, but Key Challenges Remain (July 2011)

• GAO-11-75, Defense Department Cyber Efforts: DOD Faces Challenges in Its Cyber Activities (July 2011)

• GAO-11-605, Social Media: Federal Agencies Need Policies and Procedures for Managing and Protecting Information They Access and Disseminate (June 2011)

• GAO-11-463T, Cybersecurity: Continued Attention Needed to Protect Our Nation’s Critical Infrastructure and Federal Information Systems (March 2011)

• GAO-11-308, Information Security: IRS Needs to Enhance Internal Control Over Financial Reporting and Taxpayer Data (March 2011)

Page 20

Page 21: Cybersecurity exchange briefing oct 2012 v2

21

Contact Information

Greg WilshusenDirector, Information Security Issues

202.512.6244 – [email protected]

Naba Barkakati, Ph.DDirector, Center for Science, Technology & Engineering

Chief Technologist202.512.4499 – [email protected]