Top Banner
*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS *** Compiled by; Mark E.S. Bernard, CISA, CRISC, CGEIT, CISSP, CISM, ISO 27001 Lead Auditor, SABSA-F2 Security Service Management
55

TechSecure, Trust Services, Principles, Criteria 2009

May 12, 2015

Download

Business

TechSecure, Trust Services, Principles, Criteria 2009
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Compiled by; Mark E.S. Bernard, CISA, CRISC, CGEIT, CISSP, CISM, ISO 27001 Lead Auditor, SABSA-F2 Security Service Management

Page 2: TechSecure,  Trust Services, Principles, Criteria 2009

• Introduction

• TSPC Overview

• Project Charter

• GAP Assessment

• GAP Report

• Next Steps

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 3: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 4: TechSecure,  Trust Services, Principles, Criteria 2009

The GAP Assessment is often used to determine how closely an organization has come to successfully implementing or adopting a best practice. To take the GAP Assessment one step further we have adopted the approach used to assess maturity of business processes. Our strategy adds value to our approach by allowing us to provide greater insight. We do not just determine if the Enterprise has come close to adopting a best practice, but we can also say how close they came and how well they are doing across the board. Typically many companies are stronger in some areas and weaker in others. In addition, while the GAP Assessment and Maturity Assessment provide important intelligence about the current state of the Enterprise ISO substitutes the concepts of compliance with conformity . ISO focuses on opportunities for improvement versus compliance or noncompliance.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 5: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Mark E.S. Bernard,

CRISC, CGEIT, CISA, CISM, CISSP, PM, ISO 27001, SABSA-F2

Information Security, Privacy, Governance ,Risk Management, Consultant

Mark has 24 years of proven experience within the domain of Information Security, Privacy & Governance. Mark has led teams of 30 or

more as a Director and Project Manager and managed budgets of $5 Million +. Mark has also provided over sight as a senior manager

during government outsourcing contract valued at $300 million and smaller contracts for specialized services for ERP systems and

security testing. Mark has led his work-stream during RFP process, negotiations, on-boarding, contract renegotiation and as Service

Manager. Mark has architected information security and privacy programs based on ISO 27001 and reengineered IT processes based on

Service Manager ITIL/ISO 20000 building in Quality Management ISO 9001.

Mark is a volunteer on the local professional associations for HTCIA, ISACA, ISSA, IIA. Mark has also been published in trade

magazines and on the Internet in addition to being sought after as an expert by local radio, news papers and television. Mark has taught as

a Professor of a third-year iSeries systems engineering course and led many workshops, led keynote speeches. Mark’s expertise has been

applied in a number of verticals including Financial Services, Banking, Insurance, Pharmaceutical, Telecommunications, Technology,

Manufacturing and Academia. Some of Mark’s recent project highlights are as follows:

Accomplishments:

• In 2012 Assisted a Executive Relocation Organization to ISO/IEC 27001 Registration/Certification

• In 2012 Assisted a Nanotechnology Fabrication Facility to ISO/IEC 27001 Registration/Certification

• In 2012 Assisted a Cloud Software as a Service Provider to ISO/IEC 27001 Registration/Certification

• In 2010/11 co-led US based Cloud Service Provider ISO/IEC 27001 Registration/Certification

• In 2009 led 1st Canadian Public Sector ISO/IEC 27001 Registration/Certification

• In 2009 led On-boarding Project for ERP Service Provider

• In 2009 led Technology and Operations work-stream during Negotiated Request for Proposal

• In 2007 led 1st Canadian Online banking, Trade & Wholesale Service to ISO/IEC 27001 Registration /Certification

• In 2005 led Privacy, Security, and Privacy Compliance work-stream during outsourcing to alternate service delivery organization

• In 2002 led Information Security Program development for International Food Manufacturer.

• In1999 led Independent Security Assurance Review of financial systems located off shore.

Page 6: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 7: TechSecure,  Trust Services, Principles, Criteria 2009

Introduction .01 This section provides guidance to a practitioner providing attestation services, advisory services, or both that address IT-enabled systems including electronic commerce (e-commerce) systems1 and privacy programs. The guidance is relevant when providing services with respect to system security, availability, processing integrity, confidentiality, and privacy. .02 The guidance provided in this section includes:

• trust services principles and criteria; • examples of system descriptions; and • illustrative practitioner reports for trust services engagements.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 8: TechSecure,  Trust Services, Principles, Criteria 2009

Trust Services .03 The term trust services is defined as a set of professional attestation and advisory services based on a core set of principles and criteria that addresses the risks and opportunities of IT enabled systems and privacy programs. Trust services principles and criteria are issued by the Assurance Services Executive Commit-tee of the AICPA (the committee).

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 9: TechSecure,  Trust Services, Principles, Criteria 2009

Attestation Services .04 Attestation services include examination, review,2 and agreed-upon procedures engagements. In examination and review engagements, the reporting practitioner expresses an opinion. In an examination engagement, for example, there is an opinion as to whether controls over a defined system were operating effectively to meet the criteria for systems reliability. In an agreed-upon procedures engagement, the practitioner does not express an opinion but rather performs procedures agreed upon by specified parties and reports the findings. Attestation services are developed in accordance with AT section 101, Attest Engagements (AICPA, Professional Standards, vol. 1).

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 10: TechSecure,  Trust Services, Principles, Criteria 2009

A system consists of five key components organized to achieve a specified objective. The five components are categorized as follows:

• Infrastructure. The physical and hardware components of a system (facilities, equipment, and networks) • Software. The programs and operating software of a system (systems, applications, and utilities) • People. The personnel involved in the operation and use of a system (developers, operators, users, and managers) • Procedures. The programmed and manual procedures involved in the operation of a system (automated and manual) • Data. The information used and supported by a system (transaction streams, files, databases, and tables)

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 11: TechSecure,  Trust Services, Principles, Criteria 2009

Advisory Services .05 In the context of trust services, advisory services include strategic, diagnostic, implementation, sustaining, and managing services using trust services principles and criteria. Practitioners providing such services follow CS section 100, Consulting Services: Definitions and Standards (AICPA, Professional Standards, vol. 2). The practitioner does not express an opinion in these engagements.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 12: TechSecure,  Trust Services, Principles, Criteria 2009

Principles, Criteria, and Illustrative Controls .06 The following guidance sets out (1) principles, which are broad statements of objectives, and (2) specific criteria that should be achieved to meet each principle. Criteria are benchmarks used to measure and present the subject matter and against which the practitioner evaluates the subject matter. The attributes of suitable criteria are objectivity, measurability, completeness, and relevance. The committee has concluded that the trust services criteria have all the attributes of suitable criteria. Furthermore, the publication of this guidance makes the criteria available to users. Trust services principles are used to describe the overall objective; however, the practitioner’s opinion makes reference only to the criteria.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 13: TechSecure,  Trust Services, Principles, Criteria 2009

.07 In the trust services principles and criteria, the criteria are supported by a list of illustrative controls that, if operating effectively, enable a system to meet the criteria. These illustrations are not intended to be all-inclusive and are presented as examples only. Actual controls in place at an entity may not be included in the list, and some of the listed controls may not be applicable to all systems and client circumstances. The practitioner should identify and assess the relevant controls that the client has in place to satisfy the criteria. The choice and number of those controls would be based on such factors as the entity's management style, philosophy, size, and industry.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 14: TechSecure,  Trust Services, Principles, Criteria 2009

.08. The following are the types of engagements a practitioner may perform using the trust services principles and criteria:

• Reporting on the operating effectiveness of an entity’s controls over the system. • Reporting on the operating effectiveness of an entity’s controls and the entity’s compliance with its commitments related to the trust services principle(s) and criteria. • Reporting on the suitability of the design of the entity’s controls over the system to achieve the trust services principle(s) and criteria, if the controls were operating effectively. (This engagement would typically be performed prior to the system’s implementation.)

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 15: TechSecure,  Trust Services, Principles, Criteria 2009

Consistency with Applicable Laws and Regulations, Defined Commitments, Service-Level Agreements, and Other Contracts .09 Several of the principles and criteria refer to “consistency with applicable laws and regulations, defined commitments, service-level agreements, and other contracts.” Management is responsible for identification of and compliance with laws and regulations. It is beyond the scope of the engagement for the practitioner to undertake identification of all relevant “applicable laws and regulations, defined commitments, service-level agreements, and other contracts.”

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 16: TechSecure,  Trust Services, Principles, Criteria 2009

Foundation for Trust Services—Trust Services Principles and Criteria .10 The following principles and related criteria have been developed by the AICPA and the Canadian Institute of Chartered Accountants (CICA) for use by practitioners in the performance of trust services engagements:

a. Security. The system is protected against unauthorized access (both physical and logical). b. Availability. The system is available for operation and use as committed or agreed. c. Processing integrity. System processing is complete, accurate, timely, and authorized. d. Confidentiality. Information designated as confidential is protected as committed or agreed. e. Privacy. Personal information5 is collected, used, retained, disclosed, and destroyed in conformity with the commitments in the entity’s privacy notice and with criteria set forth in generally accepted privacy principles (GAPP) issued by the AICPA and CICA (found in appendix D [paragraph .48]).

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 17: TechSecure,  Trust Services, Principles, Criteria 2009

.11 The trust services principles and criteria of security, availability, processing integrity, and confidentiality are organized into four broad areas:

a. Policies. The entity has defined and documented its policies relevant to the particular principle. (The term policies as used here refer to written statements that communicate management's intent, objectives, requirements, responsibilities, and standards for a particular subject.) b. Communications. The entity has communicated its defined policies to responsible parties and authorized users of the system. c. Procedures. The entity placed in operation procedures to achieve its objectives in accordance with its defined policies. d. Monitoring. The entity monitors the system and takes action to maintain compliance with its defined policies.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 18: TechSecure,  Trust Services, Principles, Criteria 2009

.12 For the trust services principles and criteria of security, availability, processing integrity, and confidentiality, a two-column format has been used to present the criteria. The first column presents the criteria for each principle, and the second column provides illustrative controls.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 19: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 20: TechSecure,  Trust Services, Principles, Criteria 2009

.13 A system description is used to delineate the boundaries of the system under examination for the trust ser-vices principles and criteria of security, availability, processing integrity, and confidentiality. For engagements covering an entity’s compliance with its commitments, those commitments should be included in system description or should otherwise accompany the report.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 21: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 22: TechSecure,  Trust Services, Principles, Criteria 2009

.14 A reliable system is one that is capable of operating without material error, fault, or failure during a specified period in a specified environment. A practitioner may provide a report on systems reliability that addresses the trust services principles and criteria of security, availability, and processing integrity. These criteria are used to evaluate whether a system is reliable.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 23: TechSecure,  Trust Services, Principles, Criteria 2009

.15 The trust services principles and criteria of privacy are organized into two broad areas:

a. Policies and communications. Privacy policies are written statements that convey management’s intent, objectives, requirements, responsibilities, and standards concerning privacy. Communications refers to the organization’s communication to individuals, internal personnel, and third par-ties about its privacy notice and its commitments therein and other relevant information. b. Procedures and controls. The other actions the organization takes to achieve the criteria.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 24: TechSecure,  Trust Services, Principles, Criteria 2009

.16 The scope of a privacy engagement can cover

(1) either all personal information or only certain identified types of personal information, such as customer information or employee information, and (2) all business segments and locations for the entire entity or only certain identified segments of the business (for example, retail operations but not manufacturing operations or only operations originating on the entity’s Web site or specified Web domains) or geographic locations (such as only Canadian operations).

The scope of a privacy engagement should cover all of the activities in the information life cycle that consists of the collection, use, retention, disclosure and destruction, de-identification, or anonymization.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 25: TechSecure,  Trust Services, Principles, Criteria 2009

.17 For the trust services principles and criteria of privacy, a three-column format has been used to present the criteria. The first column contains the measurement criteria for each principle—the attributes that the entity must meet to be able to demonstrate that it has achieved the principle. The second column provides illustrative controls and procedures, which are designed to enhance the understanding of the criteria. The illustrations are not intended to be comprehensive, nor are any of the illustrations necessary for an entity to have met the criteria. The third column presents additional considerations, including supplemental in-formation such as good privacy practices and selected requirements of specific laws and regulations that pertain to a certain industry or country.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 26: TechSecure,  Trust Services, Principles, Criteria 2009

Effective Date .18 The trust services principles and criteria are effective as of September 15, 2009.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 27: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 28: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 29: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 30: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 31: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 32: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 33: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 34: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 35: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 36: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 37: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 38: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 39: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Exclusions Please note clause 1.2 - Any exclusion of controls found to be necessary to satisfy the risk acceptance criteria needs to be justified and evidence needs to be provided that the associated risks have been accepted by accountable persons. Where any controls are excluded, claims of conformity to this International Standard are not acceptable unless such exclusions do not affect the organization’s ability, and/or responsibility, to provide information security that meets the security requirements determined by risk assessment and applicable legal or regulatory requirements.

Page 40: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

We are not just seeking evidence of some policy, procedure or standard to confirm that it is in place because in reality we expect that many are. We will also be attempting to identify the level of maturity based on a common scale to help us in our assessment of control effectiveness.

Page 41: TechSecure,  Trust Services, Principles, Criteria 2009

Within the ‘Control Effectiveness’ we assess the current status of existing controls based on a scale of 1 – 5.

The ‘X’/’Y’ Axis tracks the various stages of adoption as process maturity evolves, while the ‘Z’ Axis tracks the business benefits as incidents and faults decrease lowering costs.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 42: TechSecure,  Trust Services, Principles, Criteria 2009

Assessing the Maturity of Conformity with best practices such as ISO/IEC 27001:2005 provides management with greater insight facilitating decision making, including prioritization, resource and capital allocation and the necessary amount of detail required for corrective actions and /or preventive actions designed to close the delta.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 43: TechSecure,  Trust Services, Principles, Criteria 2009

Within the scale of 1 – 5 less conformity and maturity results in a higher score which also increases the priority rating for management decision making. As a result policies, procedures and standards that are completely missing will get the necessary resources and capital to close these deltas.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 44: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

The GAP Assessment worksheet requires that accountability be clearly identified and that the location of evidence of conformity be provided for review to verify and validate the level of maturity assigned. 127 control objectives based on 600 control points are Trust Services Principles and Criteria in comparison to the 235 listed in ISO/IEC 27001.

Page 45: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 46: TechSecure,  Trust Services, Principles, Criteria 2009

***

THIS

DO

CU

MEN

T IS

CLA

SSIF

IED

FO

R P

UB

LIC

AC

CES

S **

*

The Heat Map provides an effective communication tool to summarize the GAP

Assessment identifying where management needs to prioritize their efforts to get

the most value and reduce risk to Enterprise Assets.

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 47: TechSecure,  Trust Services, Principles, Criteria 2009

***

THIS

DO

CU

MEN

T IS

CLA

SSIF

IED

FO

R P

UB

LIC

AC

CES

S **

*

The Star Chart provides valuable insight into current state and future state - where

are we today ? Where do we need to be to maximize value delivery and achieve

strategic and tactical goals?

Page 48: TechSecure,  Trust Services, Principles, Criteria 2009

The following table identifies the supplemental information that is required in addition to

the GAP Assessment to facilitate the communication of our to be state and target state.

***

THIS

DO

CU

MEN

T IS

CLA

SSIF

IED

FO

R P

UB

LIC

AC

CES

S **

*

Page 49: TechSecure,  Trust Services, Principles, Criteria 2009

***

THIS

DO

CU

MEN

T IS

CLA

SSIF

IED

FO

R P

UB

LIC

AC

CES

S **

*

The Knowledge Capability Chart provides valuable insight into current state of

Knowledge Management and potential areas where gaps in knowledge exist.

Page 50: TechSecure,  Trust Services, Principles, Criteria 2009

***

THIS

DO

CU

MEN

T IS

CLA

SSIF

IED

FO

R P

UB

LIC

AC

CES

S **

*

The Boston Square provides valuable insight by identifying potential areas of

improvement where the Enterprise can achieve the most value and business benefit.

Page 51: TechSecure,  Trust Services, Principles, Criteria 2009

Management Area Affected

Detailed Description

Quantifiable Benefit

Strategic Benefit

Risks of Implementing

Risk of Not Implementing

Groups Impacted

The following table identifies the supplemental information that is required in addition

to the GAP Assessment to facilitate the communication of high value opportunities for

improvement and business benefits.

***

THIS

DO

CU

MEN

T IS

CLA

SSIF

IED

FO

R P

UB

LIC

AC

CES

S **

*

Page 52: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Conformity with Annex ‘A’

Control Objectives.

Conformity with Mandatory

Control Objectives.

Page 53: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Page 54: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

• Executive Endorsement of ISMS Project Delta

• Executive Endorsement for ISMS project charter

• Executive Endorsement for ISMS project budget

Page 55: TechSecure,  Trust Services, Principles, Criteria 2009

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Mark E.S. Bernard, CISSP, CISM, CRISC, CISA, CGEIT, CNA

Skype; Mark_E_S_Bernard Twitter; @MESB_TechSecure

LinkedIn; http://ca.linkedin.com/in/markesbernard