Top Banner
From Our House to Yours Brian T. O’Hara CISA, CISM, CRISC CISO, The Mako Group, LLC [email protected] 260.241.4799
62

Institute of Internal Auditors Presentation 2014

Jan 22, 2018

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Institute of Internal Auditors Presentation 2014

From Our House to

Yours

Brian T. O’Hara CISA, CISM, CRISC

CISO, The Mako Group, LLC

[email protected]

260.241.4799

Page 2: Institute of Internal Auditors Presentation 2014

The Mako Group, LLC

“The Mako Group, LLC is as an Information

Technology and Systems security, compliance,

and consulting firm, specializing in audit,

compliance, Enterprise Risk Management and

data security in both private and public sectors.

As CISO, my responsibilities include the

oversight and management of security related

functions and services including audit and

regulatory compliance reviews, Enterprise Risk

Management (ERM), and development of

strategic planning with regard to current and

emerging security technologies.”

Page 3: Institute of Internal Auditors Presentation 2014

Introduction

• Health Care

• Banking

• SOX

• PCI

• Government

• Critical Infrastructure

• SOC (Service Organization Control)

• Manufacturing

Page 4: Institute of Internal Auditors Presentation 2014

HEALTH CARE

2013-2014

Page 5: Institute of Internal Auditors Presentation 2014

Audit And Compliance Authority

• DHHS Department of Health & Human Services– Charged with administering HIPAA

• OCR Office for Civil Rights– Charged with Enforcement

• KPMG– Audit Subcontractor to OCR

Page 6: Institute of Internal Auditors Presentation 2014

HIPAA

• HITECH Act– Breach Notification

– Business Associate Agreements

– Security Rule

• OMNIBUS Rule– Enforcement Rule

• BA Chain of Assurance

– Clarification of Rules

Page 7: Institute of Internal Auditors Presentation 2014

OCR/KPMG Audit Hot Buttons

• Risk Management

• Risk Assessment

• Risk Management Strategy

• IT Strategic Planning

• Key Phrases

– “Culture of Compliance”

– “Visible Demonstrable Evidence”

Page 8: Institute of Internal Auditors Presentation 2014

PERSISTENT PROBLEMS

• Lack of Knowledge

• Poor Risk Based Decision Making

• Resources

• “Experts”

• Shaming Tactics

Page 9: Institute of Internal Auditors Presentation 2014

Trends

• Poor/Non-Existent Risk Management

• Poor Understanding of Regulations

• Denial

• Overwhelmed– Don’t know where to start

– Don’t understand regulations

• Lots of “Experts” and “Certified” products*– ISC2 CISPP Certification

Page 10: Institute of Internal Auditors Presentation 2014

BANKING

2013-2014

Page 11: Institute of Internal Auditors Presentation 2014

FFIEC TSP Guidance

• FFIEC Statement of Authority

– Anyone who does business with a financial institution

falls under their jurisdiction *

• FDIC Audits

– Now available but you must ask

– TSP should be providing these

Page 12: Institute of Internal Auditors Presentation 2014

FFIEC Cloud Guidance

• Add On to Vendor Management

Page 13: Institute of Internal Auditors Presentation 2014

FFIEC Social Media

Guidance

• Inclusion in Risk Assessment and ERM

– Owning the namespace

• Brand Protection

– Owning and Controlling Data

• Account access controls

– Monitoring Brand Usage

Page 14: Institute of Internal Auditors Presentation 2014

ACH

Page 15: Institute of Internal Auditors Presentation 2014

PERSISTENT PROBLEMS

• Risk Based Decision Making

• Human Behavior

• Cost (not so much)

Page 16: Institute of Internal Auditors Presentation 2014

Trends

• Risk Management and ERM

• BOD Involvement

• Risk Based Vendor Management

• Social Media

Page 17: Institute of Internal Auditors Presentation 2014

SOX

Page 18: Institute of Internal Auditors Presentation 2014

10 Years After

• Beast of Burden?

• Has It Helped?

– Madoff

– CHASE

– Freddie Mx

• Too Large To Fail?

– again

Page 19: Institute of Internal Auditors Presentation 2014

PCAOB Scrutiny

• Pressuring Accounting firms to further verify information coming out of systems

Page 20: Institute of Internal Auditors Presentation 2014

PCI

PCI 3.0

Changes 2013-2015

Page 21: Institute of Internal Auditors Presentation 2014

Goals of Standards Clarification

• Drive more consistency among assessors

• Help manage evolving risks / threats

• Align with changes in industry best practices

• Clarify scoping and reporting

• Eliminate redundant sub-requirements and consolidate

documentation

• Provide stronger focus on some of the greater risk areas in the

threat environment

• Provide increased clarity on PCI DSS & PA-DSS requirements

• Build greater understanding on the intent of the requirements and

how to apply them

• Improve flexibility for all entities implementing, assessing, and

building to the Standards

Page 22: Institute of Internal Auditors Presentation 2014

Change Categories

• Clarification

• Additional Guidance

• Evolving Requirements

– Passwords and Passphrases

Page 23: Institute of Internal Auditors Presentation 2014

Rankings (Updated)

• In Place

• In Place with Compensating Controls

• Not Applicable

• Not In Place

• Not Tested

Page 24: Institute of Internal Auditors Presentation 2014

Review of Target and Neiman Marcus

COMPLIANCE DOES NOT MEAN SECURITY

Page 25: Institute of Internal Auditors Presentation 2014

PERSISTENT PROBLEMS

• Inconsistent application of standards in audit from QSAs

• Inconsistent knowledge from acquiring banks

• Slow Adoption of EVM Chip Based Technology

– Has been successfully breached but extremely difficult, time

consuming, and expensive.

Page 26: Institute of Internal Auditors Presentation 2014

Trends

• Tighter controls on applications

• Tighter controls on terminal devices

– Physical seals used much like weights and measures

• Move to EVM Chip Based Cards

– Provides end to end encryption

– Already in Use in EU

– Some in Use Today in US

Page 27: Institute of Internal Auditors Presentation 2014

PUBLIC SECTOR

2013-2014NIST and FISMA

Page 28: Institute of Internal Auditors Presentation 2014

NIST

• SP 800 Series

• SP 800-53 Rev 4 Security and Privacy Controls for Federal

Information Systems and Organizations • Those certified under Rev 3 will have catch up work to do

• New control mappings

Page 29: Institute of Internal Auditors Presentation 2014

FISMA

• Federal Information Security Act of 2002

• Required of all Federal Agencies or Sub Contractors

– “Chain of Assurance”

• DoD Does Own Thing

– Examples

• FDA, DHHS, IRS, etc.

Page 30: Institute of Internal Auditors Presentation 2014

PERSISTENT PROBLEMS

• Standards Keeping Pace

• Compliance does not = security

• Cost

Page 31: Institute of Internal Auditors Presentation 2014

Trends

• “Chain of Assurance”*

– Any subcontractor doing business with an agency required to have

completed FISMA audits, must also undergo FISMA audit and meet

requirements

Page 32: Institute of Internal Auditors Presentation 2014

CRITICAL INFRASTRUCTURE

“systems and assets, whether physical or virtual, so vital to

the United States that the incapacity or destruction of such

systems and assets would have a debilitating impact on

security, national economic security, national public health

or safety, or any combination of those matters.”

From President Obama’s Executive Order – Improving Critical Infrastructure Cybersecurity February 12, 2013.

Page 33: Institute of Internal Auditors Presentation 2014

Industrial Control

Systems (ICS)

• SCADA

– Supervisory Control And Data Acquisition

• Typically larger than traditional stand alone ICS

– Water plant versus small manufacturing

– Examples

• Water Utility

• Power Utility

• Supply Chain

• Transportation

Page 34: Institute of Internal Auditors Presentation 2014

PERSISTENT PROBLEMS

• Lack of Security in Design Phase

• Costly Upgrades

• Poor Inter Vendor Operability

• Poor Industry Awareness

• Poor Regulations

Page 35: Institute of Internal Auditors Presentation 2014

Trends

• Just Scratching the Surface

• Increased Vendor Awareness and Diligence

• Improving Operator Awareness Via Training

• ICS-CERT

Page 36: Institute of Internal Auditors Presentation 2014

SOC Updates

SSAE16 Is Dead and Gone

Page 37: Institute of Internal Auditors Presentation 2014

No Longer SSAE16

• SOC 1

• SOC 2

• SOC 3

SHOULD RESULT IN NO DEFICIENCIES!

Page 38: Institute of Internal Auditors Presentation 2014

SOC 1

• Primarily for User Auditors

– Internal Controls Related to Financial Reporting

Page 39: Institute of Internal Auditors Presentation 2014

SOC 2

• Describes the suitability of design and operating effectiveness of controls at a service organization relevant to security, availability, processing integrity or confidentiality.

• Becoming More prevalent

• Involves 5 Security Trust Principles

• Standard Being Updated

Page 40: Institute of Internal Auditors Presentation 2014

SOC 3

• Similar to SOC 2 but does not disclose detailed controls and testing.

• More for Public Awareness

– Website Logos

Page 41: Institute of Internal Auditors Presentation 2014

PERSISTENT PROBLEMS

• Terminology Confusion

– SSAE16, SOC 1, etc.

• Standards Evolving

• HUGE CHANGE

– From SAS70

Page 42: Institute of Internal Auditors Presentation 2014

Trends

• More SOC 2 Reports

• Better Understanding of

– Target Audience

– Purpose

– Trust Security Principles

Page 43: Institute of Internal Auditors Presentation 2014

Summary Top Issues

1. Risk Management

2. Vendor Management

3. BYO(C)(D)

4. Social Media

5. Cloud Computing

6. “Chain of Assurance”

7. Application Security

8. Mobile Device Security

Page 44: Institute of Internal Auditors Presentation 2014

Summary

• Some Things Never Change

– Behavior

• Some Things Always Change

– Regulations

– Examiner Expectations

• Compliance Does Not Lead To Security

• Security Will Lead To Compliance

Page 45: Institute of Internal Auditors Presentation 2014

Q&A

Page 46: Institute of Internal Auditors Presentation 2014

BREAK

5 Minutes

Page 47: Institute of Internal Auditors Presentation 2014

TOOLS

RECON FOR AUDITORS

Page 48: Institute of Internal Auditors Presentation 2014

TOOLS

• Beginners

– InSSIDER

– Nmap

– MBSA

• Intermediate

– MS EMET

• Advanced

– Wireshark

Page 49: Institute of Internal Auditors Presentation 2014

InSSIDER

• Home of Wi-Fi Reconnaissance Tools (Metageek.net)

– Spectrum Analyzers

– SSID Identifier (free and paid)

– Wi-Fi Packet Analyzers

Page 50: Institute of Internal Auditors Presentation 2014

InSSIDER

Page 51: Institute of Internal Auditors Presentation 2014

Nmap

• Network Cartography

– Free

– Easy to use

– Non Intrusive

– Non Disruptive

• With exceptions

– CLI and Gui

– Scanme.org

Page 52: Institute of Internal Auditors Presentation 2014

Nmap

Page 53: Institute of Internal Auditors Presentation 2014

Nmap

Page 54: Institute of Internal Auditors Presentation 2014

MBSA

Page 55: Institute of Internal Auditors Presentation 2014

MBSA

• Patch Status

• Reboot Status

• Administrator Access Status

• Non-Expiring Passwords

• IIS Misconfigurations

• SQL Misconfigurations

– Runtimes AND Instances

Page 56: Institute of Internal Auditors Presentation 2014

MBSA

Page 57: Institute of Internal Auditors Presentation 2014

Microsoft EMET

• MS Enhanced Mitigation Experience Toolkit (4.1)

– “The Enhanced Mitigation Experience Toolkit (EMET) is a utility that

helps prevent vulnerabilities in software from being successfully

exploited. EMET achieves this goal by using security mitigation

technologies. These technologies function as special protections and

obstacles that an exploit author must defeat to exploit software

vulnerabilities. These security mitigation technologies do not

guarantee that vulnerabilities cannot be exploited. However, they

work to make exploitation as difficult as possible to perform.”

Page 58: Institute of Internal Auditors Presentation 2014

EMET

Page 59: Institute of Internal Auditors Presentation 2014

Wireshark

• “Wireshark is the world's foremost network protocol

analyzer. It lets you see what's happening on your network

at a microscopic level. It is the de facto (and often de jure)

standard across many industries and educational

institutions.”

• For Advanced Users

• Packet Capture and Analysis Tool

– Identify data exfiltration

– Identify C&C Traffic

Page 60: Institute of Internal Auditors Presentation 2014

Wireshark

Page 61: Institute of Internal Auditors Presentation 2014

Q&A

Page 62: Institute of Internal Auditors Presentation 2014

From Our House to

Yours

THANKS!

Brian T. O’Hara CISA, CISM, CRISC

CISO, The Mako Group, LLC

[email protected]

260.241.4799