Top Banner
How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant - VOQUALS N.V. Vice President & in charge of Education - IS ACA Belux
30

How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Dec 30, 2015

Download

Documents

Gyles Gray
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

How to use CobiT to assess the security & reliability of Digital Preservation

Erpa WORKSHOP Antwerp14 - 16 April 2004

Greet Volders Managing Consultant - VOQUALS N.V.

Vice President & in charge of Education - ISACA Belux

Page 2: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 2Voquals NV Greet Volders ERPA - 14 April 2004

Content of this Presentation

ISACA & CobiT – Introduction ISACA Organisation

– IT Audit Process

– CobiT Framework Focus on some CobiT-processes

– Relevant to digital preservation

– With a focus on reliability, confidentiality and security Practical guidelines to audit these processes and domains

Agend

a

Page 3: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 3Voquals NV Greet Volders ERPA - 14 April 2004

Mission & Strategy of Voquals

Voquals offers advice on quality management to organisations or more specifically to Information Technology departments. In addition Voquals provides assistance during the implementation of methods for application development and project management.

Voquals was founded in 1996 by Greet Volders & Eddy Volckaerts and indicates ”Volders quality services” or ”Volckaerts quality services”

A pragmatic and contextual approach is at the heart of every project we carry out.

Page 4: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 4Voquals NV Greet Volders ERPA - 14 April 2004

Our Core Business

We are specialised in : Quality Management Project Management Consultancy, Coordination, Implementation Quality Audits (ISO, EFQM, TickIT, ...) IT-Audits (CobiT, CMM) EFQM - Self Assessment Process Analysis and Development Transitions to a Project-Based Approach to Work Electronic Document Management

(in general or focused on Quality)

Page 5: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 5Voquals NV Greet Volders ERPA - 14 April 2004

Content of this Presentation

ISACA & CobiT – Introduction ISACA Organisation

– IT Audit Process

– CobiT Framework

Agend

a

Page 6: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 6Voquals NV Greet Volders ERPA - 14 April 2004

CobiT Framework Why the need for CobiT

Changing IT Emphasis

Ten years ago we were afraid of

rockets destroying computing centres….

… right now, we should be aware

of software errors destroying rockets

Page 7: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 7Voquals NV Greet Volders ERPA - 14 April 2004

Linking management’s IT expectations

With management‘s IT responsibilities

Business Processes

• Effectiveness• Efficiency• Confidentiality• Integrity• Availability• Compliance• Reliability

• Data• Application systems• Technology• Facilities• People

IT Resources

Information

What you get What you need

Do they match

Information Criteria

CobiT Framework Control Objectives

Page 8: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 8Voquals NV Greet Volders ERPA - 14 April 2004

Linking Process, Resource & Criteria to 34 control objectives

with 318 DETAILED control objectivesPlanning & organisation

Acquisition &Implementation

Delivery &Support

Monitoring

Business Requirements

IT Processes

ControlStatements

Control Practices

The control of

Which statisfy

Is enabled by

And considers

CobiT Framework

Navigation Aids

effectiveness efficiency confidentiality integrity availability compliance reliability

people applications technology facilities data

Page 9: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 9Voquals NV Greet Volders ERPA - 14 April 2004

Content of this Presentation

ISACA & CobiT – Introduction ISACA Organisation

– IT Audit Process

– CobiT Framework Focus on some CobiT-processes

– Relevant to digital preservation

– With a focus on reliability, confidentiality and security Practical guidelines to audit these processes and domains

Agend

a

Page 10: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 10Voquals NV Greet Volders ERPA - 14 April 2004

CobiT Framework relevant to digital

preservation PO1 Define a strategic IT PlanPO2 Define the information architecturePO3 Determine the technological directionPO4 Define the IT org. and relationshipsPO5 Manage the IT investmentPO6 Communicate mngt aims and directionPO7 Manage human resources

PO8 Ensure compliance with ext. req.PO9 Assess risksPO10 Manage ProjectsPO11 Manage Quality

AI1 Identify automated solutionsAI2 Acquire and maintain application SWAI3 Acquire and maintain techn. Infrastr. AI4 Develop and maintain IT proceduresAI5 Install and accredit systemsAI6 Manage changes

M1 Monitor the processM2 Assess internal control adequacyM3 Obtain independent assuranceM4 Provide for independent audit

DS1 Define service levelsDS2 Manage third-party servicesDS3 Manage perform. and capacityDS4 Ensure continuous service

DS5 Ensure systems securityDS6 Identify and attribute costsDS7 Educate and train usersDS8 Assist and advise IT customersDS9 Manage the configurationDS10 Manage problems and incidentsDS11 Manage data

DS12 Manage facilitiesDS13 Manage operations

IT RESOURCES

IT RESOURCES

• data• application systems• technology• facilities• people

• data• application systems• technology• facilities• people PLANNING AND

ORGANISATIONPLANNING AND ORGANISATION

ACQUISITION ANDIMPLEMENTATIONACQUISITION ANDIMPLEMENTATION

DELIVERY AND SUPPORT

DELIVERY AND SUPPORT

MONITORINGMONITORING

• effectiveness• efficiency• confidentiality• integrity• availability• compliance• reliability

• effectiveness• efficiency• confidentiality• integrity• availability• compliance• reliability

Criteria

Business Objectives

Page 11: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 11Voquals NV Greet Volders ERPA - 14 April 2004

PO8 Ensure Compliance with External Requirements

Control over the IT process of

ensuring compliance with external requirements

that satisfies the business requirement

to meet legal, regulatory and contractual obligations

Is enabled by

identifying and analysing requirements for their IT impact,

and taking appropriate measures to comply with them

Page 12: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 12Voquals NV Greet Volders ERPA - 14 April 2004

PO8 Ensure Compliance with External Requirements Develop Audit Plan

Interviewing: – Legal counsel– Human Resources Officer – Senior Management of the IT function

Obtaining:– Relevant government and/or external requirements– Standards, policies and procedures concerning

» External requirements reviews» Safety and health (including ergonomics)» Privacy» Security» Sensitivity rating of data being input, processed, stored, outputted and transmitted» Electronic commerce» Insurance

– Copies of all IT function related insurance contracts – Audit reports from

» External auditors» Third-party service providers» Governmental agencies

Page 13: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 13Voquals NV Greet Volders ERPA - 14 April 2004

PO8 Ensure Compliance with External Requirements Evaluating

Policies and procedures for:– Coordinating the external requirements review– Addressing appropriate safeguards– Appropriate safety and health training and education is provided to all employees– Monitoring compliance with applicable safety and health laws and regulations– Providing adequate direction/focus on privacy in order that all legal requirements fall

within its scope– Informing the insurers of all material changes to the IT environment– Ensuring compliance with the requirements of the insurance contracts– Ensuring updates are made when applicable

Security procedures are in accordance with all legal requirements and are being adequately addressed, including:

– Password protection and software to limit access– Authorisation procedures– Terminal security measures– Data encryption measures– Firewall controls– Virus protection– Timely follow-up of violation reports

Page 14: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 14Voquals NV Greet Volders ERPA - 14 April 2004

PO8 Ensure Compliance with External Requirements Substantiate the risk of C.O.’s not being met by:

Performing :– Benchmarking of external requirements compliance – A detailed review of the external requirements review files to ensure corrective

actions have been undertaken or are being implemented– A detailed review of security reports to assess whether sensitive/private information

is being afforded appropriate security and privacy protections

Identifying– Privacy and security weaknesses related to data flow and/or transborder data flow– Weaknesses in contracts with trading partners related to communications processes,

transaction messages, security and/or data storage– Weaknesses in trust relationships of trading partners– Non-compliances with insurance contract terms

Page 15: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 15Voquals NV Greet Volders ERPA - 14 April 2004

AI3 Acquire and Maintain Technology Infrastructure

Control over the IT process of

acquiring and maintaining technology infrastructure

that satisfies the business requirement

to provide the appropriate platforms for supportingbusiness applications

Is enabled by

judicious hardware and software acquisition, standardising of software, assessment of hardware and software performance and consistent system administration

Page 16: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 16Voquals NV Greet Volders ERPA - 14 April 2004

AI3 Acquire and Maintain Technology Infrastructure Develop Audit Plan

Interviewing: – IT planning/steering committee– Chief information officer– IT senior management

Obtaining:– Policies and procedures relating to hardware and software acquisition,

implementation and maintenance – Senior management steering roles and responsibilities– IT objectives and long- and short-range plans– Status reports and minutes of meetings– Vendor hardware and software documentation– Hardware and software rental contracts or lease agreement

Page 17: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 17Voquals NV Greet Volders ERPA - 14 April 2004

AI3 Acquire and Maintain Technology Infrastructure Evaluating

Policies and procedure to cover Evaluation plan

– Is prepared to assess new hardware and software for any impact on the overall performance of the system

System software– Ability to access without interruption– Set up, installation and maintenance does not jeopardise the security of the

data and programmes being stored on the system– Parameters are selected in order to ensure the integrity of the data and

programmes– Installed and maintained in accordance with the acquisition and

maintenance framework for the technology infrastructure– Vendors provide integrity assurance statements with their software and all

modifications to their software

Page 18: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 18Voquals NV Greet Volders ERPA - 14 April 2004

DS5 Ensure System Security

Control over the IT process of

ensuring systems security

that satisfies the business requirement

to safeguard information against unauthorised use, disclosure or modification, damage or loss

Is enabled by

logical access controls which ensure that access to systems, data and programmes is restricted to authorised users

Page 19: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 19Voquals NV Greet Volders ERPA - 14 April 2004

DS5 Ensure System Security Develop Audit Plan

Interviewing: – Senior security officer of the organisation– IT senior and security management– IT data base administrator– IT security administrator– IT application development management

Obtaining:– Organisation-wide policies and procedures– IT policies and procedures– Relevant policies and procedures, and legal and regulatory body information

systems security requirements including» User account management procedures» User security or information protection policy» Data classification schema» Inventory of access control software» Floor pan & schematic of physical access points to IT resources» Security software change control procedures» Security violation reports and management review procedures» Copies of contracts with service providers for data transmission

Page 20: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 20Voquals NV Greet Volders ERPA - 14 April 2004

DS5 Ensure System SecurityEvaluating

Strategic security plan Cryptographic modules and key maintenance procedures Password policy includes

– Change initial password– Minimum password length– Allowed values (list of not-)

Location control methods are used to apply additional restrictions at specific locations

Security related hardware and software, such as cryptographic modules, are protected against tampering or disclosure, and access is limited to a “need to know” basis

Trusted paths are used to transmit non-encrypted sensitive information

Page 21: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 21Voquals NV Greet Volders ERPA - 14 April 2004

DS12 Manage Facilities

Control over the IT process of

managing facilities

that satisfies the business requirement

to provide a suitable physical surrounding which protectsthe IT equipment and people against man-made and natural hazards

Is enabled by

the installation of suitable environmental and physical controls which are regularly reviewed for their proper functioning

Page 22: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 22Voquals NV Greet Volders ERPA - 14 April 2004

DS12 Manage FacilitiesDevelop Audit Plan

Interviewing: – Facility manager– Security officer– Risk manager– IT operations manager– IT security manager

Obtaining:– Organisational policies and procedures relating to facility management,

layout, security, safety, fixed asset inventory and capital acquisition/leasing– List of individuals who have access to the facility and floor layout of facility– List of performance, capacity and service level agreements

Page 23: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 23Voquals NV Greet Volders ERPA - 14 April 2004

DS12 Manage Facilities Evaluating

Facility location– Is not obvious externally– Is in least accessible area or organisation– Access is limited to least number of people

Logical and physical access procedures are sufficient, including security access profiles

“Key” and “card reader” management procedures and practices are adequate

Organisation is responsible for physical access within the IT function that includes

– Security policies and procedures– Relationships with security-oriented vendors– Security awareness– Logical access control

Penetration test procedures and results

Page 24: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 24Voquals NV Greet Volders ERPA - 14 April 2004

ISACA & ISACF ISACA Belux3701 Algonquin Road, suite 1010Rolling Meadows, Illinois 60008 USAPhone +1 708 253 [email protected] [email protected]://www.isaca.org http://www.isaca.be

Voquals N.V.Greet VoldersDiestsebaan 13290 Diest - BelgiumPhone +32 13 326464 Mobile +32 475 63 45 06

[email protected]

More InformationCoordinates

Page 25: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

The recognized global

leaders in IT governance,

control and assurance.

Information Systems Audit and Control Association®

Information Systems Audit and Control Foundation

Page 26: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 26Voquals NV Greet Volders ERPA - 14 April 2004

Mission: To support enterprise objectives through the development, provision and

promotion of research, standards, competencies and practices for the effective governance,

control and assurance of information, systems and technology.

Information Systems Audit and Control

Association(ISACATM)

Information Systems Audit and Control

Foundation(ISACFTM)

Page 27: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 27Voquals NV Greet Volders ERPA - 14 April 2004

ISACA Membership Benefits

To:

• Leading-edge research• K-NET, an internet-based

global knowledge network for

IT governance, control and

assurance information

Through: Local chapters

On:

• CISA exam registration fee

and study materials

• CISM exam registration fee and

study materials

• ISACA-sponsored conferences

and Training Weeks

• COBIT and other publications

ACCESS

DISCOUNTS

NETWORKING AND LEADERSHIP OPPORTUNITIES

Page 28: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 28Voquals NV Greet Volders ERPA - 14 April 2004

Do you

want to

know more?

Information Systems Audit and

Control Association/ Foundation3701 Algonquin Road,Suite 1010Rolling Meadows, IL, USA 60008Phone: +1.847.253.1545Fax: +1.847.253.1443E-mail: [email protected] site: www.isaca.org

Page 29: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 29Voquals NV Greet Volders ERPA - 14 April 2004

Chapter OrganizationISACA

BeLux Chapter

ISACA BeluxBoard

ISACA BeluxEducation Committee

ISACA BeluxLuxembourg Development

Page 30: How to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14 - 16 April 2004 Greet Volders Managing Consultant.

Slide 30Voquals NV Greet Volders ERPA - 14 April 2004

Core activities • CISA preparation• CISM preparation• Round Table Meetings• Board meetings• Educational Committee meetings• Annual General Meeting• Miscellaneous events (social)

New Year drinkGala Dinner

For more information: www.isaca.be

ISACABeLux Chapter