Top Banner
The Process of Auditing Information Systems
87

IS AUDIT presentation

Feb 11, 2017

Download

Education

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IS AUDIT presentation

The Process of Auditing Information Systems

Page 2: IS AUDIT presentation

Situation

Page 3: IS AUDIT presentation

Management Questions

Page 4: IS AUDIT presentation

Reasons for Audits

Page 5: IS AUDIT presentation

Terms

Page 6: IS AUDIT presentation

Assessment

Page 7: IS AUDIT presentation

Audit

Page 8: IS AUDIT presentation

Testing, Examination and Interviewing

Page 9: IS AUDIT presentation

Multiple levels of assessment

Page 10: IS AUDIT presentation

Program Level

Page 11: IS AUDIT presentation

OIG

Page 12: IS AUDIT presentation

System Level

Page 13: IS AUDIT presentation

Assessment Lifecycle

Page 14: IS AUDIT presentation

Common Types of Assessments

Page 15: IS AUDIT presentation

Determine your Scope

Page 16: IS AUDIT presentation

Material

Page 17: IS AUDIT presentation

Level of Effort

Page 18: IS AUDIT presentation

Risk & Audit

Page 19: IS AUDIT presentation

Independence

Page 20: IS AUDIT presentation

Assessment Life Cycle

Page 21: IS AUDIT presentation

Plan (FISCAM)

Page 22: IS AUDIT presentation

Perform (FISCAM)

Page 23: IS AUDIT presentation

Report (FISCAM)

Page 24: IS AUDIT presentation

Certification Process (NIST SP 800-37)

Page 25: IS AUDIT presentation

Security Control Assessment Tasks

Page 26: IS AUDIT presentation

Security Documentation Tasks

Page 27: IS AUDIT presentation

Assessment Tasks (NIST SP 800-37 Rev 1)

Page 28: IS AUDIT presentation

Assessment Tasks (NIST SP 800-37 Rev 1)

Page 29: IS AUDIT presentation

Assessor/Auditor Selection

Page 30: IS AUDIT presentation

Assessor KSAs

Page 31: IS AUDIT presentation

Assessor Competence

Page 32: IS AUDIT presentation

Legal Considerations

Page 33: IS AUDIT presentation

Developing the test plan

Page 34: IS AUDIT presentation

Assessment Methodology

Page 35: IS AUDIT presentation

Auditors/Assessors

Page 36: IS AUDIT presentation

Key Definitions

Page 37: IS AUDIT presentation

Key Definitions (cont.)

Page 38: IS AUDIT presentation

How much testing?

Page 39: IS AUDIT presentation

Sample Size

Page 40: IS AUDIT presentation

Sampling

Page 41: IS AUDIT presentation

Typical Sampling and Evaluation Criteria

Page 42: IS AUDIT presentation

Assessment Methods

Page 43: IS AUDIT presentation

Assessment Objectives and Guidance

Page 44: IS AUDIT presentation

NIST SP 800-53A Rev 1 Example

Page 45: IS AUDIT presentation

Identify and Select Automated Tools

Page 46: IS AUDIT presentation

Checklists

Page 47: IS AUDIT presentation

Live CD Distributions for Security Testing

Page 48: IS AUDIT presentation

Review Techniques

Page 49: IS AUDIT presentation

Target Identification and Analysis Techniques

Page 50: IS AUDIT presentation

Target Vulnerability Validation Techniques

Page 51: IS AUDIT presentation

Checklists / MSAT

Page 52: IS AUDIT presentation

GRC Tools

Page 53: IS AUDIT presentation

Test Types

Page 54: IS AUDIT presentation

Testing

Page 55: IS AUDIT presentation

Incremental Testing

Page 56: IS AUDIT presentation

Verification Testing

Page 57: IS AUDIT presentation

Application testing

Page 58: IS AUDIT presentation

Database Auditing

Page 59: IS AUDIT presentation

Intrusion Detection/Prevention

Page 60: IS AUDIT presentation
Page 61: IS AUDIT presentation

EMR Testing

Page 62: IS AUDIT presentation

Green Computing

Page 63: IS AUDIT presentation

Business Continuity

Page 64: IS AUDIT presentation

Vulnerability Scanning

Page 65: IS AUDIT presentation

MBSA

Page 66: IS AUDIT presentation

Vulnerability Reports

Page 67: IS AUDIT presentation

External and Internal

Page 68: IS AUDIT presentation

Vulnerability Scanners

Page 69: IS AUDIT presentation

Red, White and Blue Teams

Page 70: IS AUDIT presentation

Red and Blue Teams

Page 71: IS AUDIT presentation

Penetration Testing

Page 72: IS AUDIT presentation

Penetration Test Phases

Page 73: IS AUDIT presentation

Attack Phases

Page 74: IS AUDIT presentation

Penetration Assessment Reports

Page 75: IS AUDIT presentation

Vulnerability Information

Page 76: IS AUDIT presentation

Physical Assessments

Page 77: IS AUDIT presentation

The role of the host

Page 78: IS AUDIT presentation

Test execution

Page 79: IS AUDIT presentation

Post-Testing Activities

Page 80: IS AUDIT presentation

Documenting the results

Page 81: IS AUDIT presentation

SAR

Page 82: IS AUDIT presentation

Included in the SAR

Page 83: IS AUDIT presentation

Audit / Assessment Documentation

Page 84: IS AUDIT presentation

Audit Papers

Page 85: IS AUDIT presentation

Concurrent Remediation

Page 86: IS AUDIT presentation

Disagreements with findings

Page 87: IS AUDIT presentation

Organizations that can help