MySQL Server Audit Assurance Program - Icq - Eng - 1210
MySQL Server Audit Assurance Program - Icq - Eng - 1210
Audit/Assurance Program
MySQL™ Server Audit/Assurance Program
ISACA®
With 95,000 constituents in 160 countries, ISACA (www.isaca.org) is a leading global provider of knowledge,
certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise
governance and management of IT, and IT-related risk and compliance. Founded in 1969, the nonprofit, independent
ISACA hosts international conferences, publishes the ISACA® Journal, and develops international IS auditing and
control standards, which help its constituents ensure trust in, and value from, information systems. It also advances
and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor ® (CISA®),
Certified Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and
Certified in Risk and Information Systems Control™ (CRISC™) designations. ISACA continually updates COBIT ®,
which helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities,
particularly in the areas of assurance, security, risk and control, and deliver value to the business.
Disclaimer
ISACA has designed and created MySQL™ Server Audit/Assurance Program (the “Work”) primarily as an
informational resource for audit and assurance professionals. ISACA makes no claim that use of any of the Work
will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures
and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same
results. In determining the propriety of any specific information, procedure or test, audit/assurance professionals
should apply their own professional judgment to the specific circumstances presented by the particular systems or IT
environment.
Reservation of Rights
© 2010 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified,
distributed, displayed, stored in a retrieval system or transmitted in any form by any means (electronic, mechanical,
photocopying, recording or otherwise) without the prior written authorization of ISACA. Reproduction and use of
all or portions of this publication are permitted solely for academic, internal and noncommercial use, and
consulting/advisory engagements, and must include full attribution of the material’s source. No other right or
permission is granted with respect to this work.
ISACA
3701 Algonquin Road, Suite 1010
Rolling Meadows, IL 60008 USA
Phone: +1.847.253.1545
Fax: +1.847.253.1443
E-mail: info@isaca.org
Web site: www.isaca.org
ISBN 978-1-60420-165-9
MySQL™ Audit/Assurance Program
CRISC is a trademark/service mark of ISACA. The mark has been applied for or registered in countries throughout
the world.
MySQL™ Server Audit/Assurance Program is an independent publication and is not affiliated with, nor has it been
authorized, sponsored or otherwise approved by the Oracle Corporation.
Expert Reviewers
Abdus Sami Khan, Sami Associates, Pakistan
Prashant Khopkar, CISA, CA, CPA, Grant Thornton LLP, USA
Bart van Lodensteijn, CISA, CGEIT, Ordina Consultancy B.V, The Netherlands
Philippe Rivest, CISA, CEH, CISSP, TransForce, Canada
Knowledge Board
Gregory T. Grocholski, CISA, The Dow Chemical Co., USA, Chair
Michael Berardi Jr., CISA, CGEIT, Nestle USA, USA
John Ho Chi, CISA, CISM, CBCP, CFE, Ernst & Young LLP, Singapore
Jose Angel Pena Ibarra, CGEIT, Alintec S.A., Mexico
Jo Stewart-Rattray, CISA, CISM, CGEIT, CSEPS, RSM Bird Cameron, Australia
Jon Singleton, CISA, FCA, Auditor General of Manitoba (retired), Canada
Patrick Stachtchenko, CISA, CGEIT, CA, Stachtchenko & Associates SAS, France
Kenneth L. Vander Wal, CISA, CPA, Ernst & Young LLP (retired), USA
Table of Contents
I. Introduction 4
II. Using This Document 5
III. Controls Maturity Analysis 8
IV. Assurance and Control Framework 9
V. Executive Summary of Audit/Assurance Focus 11
VI. Audit/Assurance Program 13
1. Planning and Scoping the Audit 13
2. Preparatory Steps 14
3. Host System 16
4. Web Server 17
5. MySQL server 18
6. Data Base Integrity 22
7. Shared IT Management Services 23
8. MySQL server Additional Components 25
VII. Maturity Assessment 26
VIII. Assessment Maturity vs. Target Maturity 28
I. Introduction
Overview
ISACA has developed the IT Assurance FrameworkTM (ITAFTM) as a comprehensive and good-practice-
setting model. ITAF provides standards that are designed to be mandatory and that are the guiding
principles under which the IT audit and assurance profession operates. The guidelines provide
information and direction for the practice of IT audit and assurance. The tools and techniques provide
methodologies, tools and templates to provide direction in the application of IT audit and assurance
processes.
Purpose
The audit/assurance program is a tool and template to be used as a road map for the completion of a
specific assurance process. ISACA has commissioned audit/assurance programs to be developed for use
by IT audit and assurance practitioners. This audit/assurance program is intended to be utilized by IT
audit and assurance professionals with the requisite knowledge of the subject matter under review, as
described in ITAF section 2200—General Standards. The audit/assurance programs are part of ITAF
Many organizations have embraced several frameworks at an enterprise level, including the Committee of
Sponsoring Organizations of the Treadway Commission (COSO) Internal Control Framework. The
importance of the control framework has been enhanced due to regulatory requirements by the US
Securities and Exchange Commission (SEC) as directed by the US Sarbanes-Oxley Act of 2002 and
similar legislation in other countries. They seek to integrate control framework elements used by the
general audit/assurance team into the IT audit and assurance framework. Since COSO is widely used, it
has been selected for inclusion in this audit/assurance program. The reviewer may delete or rename these
columns to align with the enterprise’s control framework.
Step 1 is part of the fact gathering and prefieldwork preparation. Because the prefieldwork is essential to
a successful and professional review, the steps have been itemized in this plan. The first level steps, e.g.,
1.1, are in bold type and provide the reviewer with a scope or high-level explanation of the purpose for
the substeps.
Beginning in step 2, the steps associated with the work program are itemized. To simplify use, the
audit/assurance program describes the audit/assurance objective—the reason for performing the steps in
the topic area and the specific controls follow. Each review step is listed after the control. These steps
may include assessing the control design by walking through a process, interviewing, observing or
otherwise verifying the process and the controls that address that process. In many cases, once the control
design has been verified, specific tests need to be performed to provide assurance that the process
associated with the control is being followed.
The maturity assessment, which is described in more detail later in this document, makes up the last
section of the program.
The audit/assurance plan wrap-up—those processes associated with the completion and review of work
papers, preparation of issues and recommendations, report writing and report clearing—has been
excluded from this document because it is standard for the audit/assurance function and should be
identified elsewhere in the enterprise’s standards.
COBIT Cross-reference
The COBIT cross-reference provides the audit and assurance professional with the ability to refer to the
specific COBIT control objective that supports the audit/assurance step. The COBIT control objective
should be identified for each audit/assurance step in the section. Multiple cross-references are not
uncommon. Subprocesses in the work program are too granular to be cross-referenced to COBIT. The
audit/assurance program is organized in a manner to facilitate an evaluation through a structure parallel to
the development process. COBIT provides in-depth control objectives and suggested control practices at
each level. As professionals review each control, they should refer to COBIT 4.1 or the IT Assurance
Guide: Using COBIT for good-practice control guidance.
COSO Components
As noted in the introduction, COSO and similar frameworks have become increasingly popular among
audit and assurance professionals. This ties the assurance work to the enterprise’s control framework.
While the IT audit/assurance function uses COBIT as a framework, operational audit and assurance
professionals use the framework established by the enterprise. Since COSO is the most prevalent internal
control framework, it has been included in this document and is a bridge to align IT audit/assurance with
the rest of the audit/assurance function. Many audit/assurance organizations include the COSO control
components within their reports, and summarize assurance activities to the audit committee of the board
of directors.
For each control, the audit and assurance professional should indicate the COSO component(s) addressed.
It is possible, but generally not necessary, to extend this analysis to the specific audit step level.
The original COSO internal control framework contained five components. In 2004, COSO was revised
as the Enterprise Risk Management (ERM) Integrated Framework and extended to eight components. The
primary difference between the two frameworks is the additional focus on ERM and integration into the
business decision model. Large enterprises are in the process of adopting ERM. The two frameworks are
compared in figure 1.
The original COSO internal control framework addresses the needs of the IT audit and assurance
professional: control environment, risk assessment, control activities, information and communication,
and monitoring. As such, ISACA has elected to utilize the five-component model for its audit/assurance
programs. As more enterprises implement the ERM model, the additional three columns can be added, if
relevant. When completing the COSO component columns, consider the definitions of the components as
described in figure 1.
Reference/Hyperlink
Good practices require the audit and assurance professional to create a work paper that describes the work
performed, issues identified and conclusions for each line item. The reference/hyperlink is to be used to
cross-reference the audit/assurance step to the work paper that supports it. The numbering system of this
Issue Cross-reference
This column can be used to flag a finding/issue that the IT audit and assurance professional wants to
further investigate or establish as a potential finding. The potential findings should be documented in a
work paper that indicates the disposition of the findings (formally reported, reported as a memo or verbal
finding, or waived).
Comments
The comments column can be used to indicate the waiving of a step or other notations. It is not to be used
in place of a work paper that describes the work performed.
IT Assurance Guide Using COBIT, Appendix VII—Maturity Model for Internal Control (figure 2)
provides a generic maturity model that shows the status of the internal control environment and the
establishment of internal controls in an enterprise. It shows how the management of internal control, and
an awareness of the need to establish better internal controls, typically develops from an ad hoc to an
optimized level. The model provides a high-level guide to help COBIT users appreciate what is required
for effective internal controls in IT and to help position their enterprise on the maturity scale.
1 Initial/ad hoc There is some recognition of the need for internal control. There is no awareness of the need for assessment of what is
The approach to risk and control requirements is ad hoc and needed in terms of IT controls. When performed, it is only on
disorganized, without communication or monitoring. an ad hoc basis, at a high level and in reaction to significant
Deficiencies are not identified. Employees are not aware of incidents. Assessment addresses only the actual incident.
their responsibilities.
2 Repeatable but Controls are in place but are not documented. Their operation Assessment of control needs occurs only when needed for
Intuitive is dependent on the knowledge and motivation of individuals. selected IT processes to determine the current level of control
Effectiveness is not adequately evaluated. Many control maturity, the target level that should be reached and the gaps
weaknesses exist and are not adequately addressed; the that exist. An informal workshop approach, involving IT
impact can be severe. Management actions to resolve control managers and the team involved in the process, is used to
issues are not prioritized or consistent. Employees may not define an adequate approach to controls for the process and to
be aware of their responsibilities. motivate an agreed-upon action plan.
3 Defined Controls are in place and adequately documented. Operating Critical IT processes are identified based on value and risk
effectiveness is evaluated on a periodic basis and there is an drivers. A detailed analysis is performed to identify control
average number of issues. However, the evaluation process is requirements and the ROOT cause of gaps and to develop
not documented. While management is able to deal improvement opportunities. In addition to facilitated
predictably with most control issues, some control workshops, tools are used and interviews are performed to
weaknesses persist and impacts could still be severe. support the analysis and ensure that an IT process owner
Employees are aware of their responsibilities for control. owns and drives the assessment and improvement process.
The maturity model evaluation is one of the final steps in the evaluation process. The IT audit and
assurance professional can address the key controls within the scope of the work program and formulate
an objective assessment of the maturity levels of the control practices. The maturity assessment can be a
part of the audit/assurance report and can be used as a metric from year to year to document progress in
the enhancement of controls. However, the perception of the maturity level may vary between the
process/IT asset owner and the auditor. Therefore, an auditor should obtain the concerned stakeholder’s
concurrence before submitting the final report to management.
At the conclusion of the review, once all findings and recommendations are completed, the professional
assesses the current state of the COBIT control framework and assigns it a maturity level using the six-
level scale. Some practitioners utilize decimals (x.25, x.5, x.75) to indicate gradations in the maturity
model. As a further reference, COBIT provides a definition of the maturity designations by control
objective. While this approach is not mandatory, the process is provided as a separate section at the end of
the audit/assurance program for those enterprises that wish to implement it. It is suggested that a maturity
assessment be made at the COBIT control level. To provide further value to the client/customer, the
professional can also obtain maturity targets from the client/customer. Using the assessed and target
maturity levels, the professional can create an effective graphic presentation that describes the
achievement or gaps between the actual and targeted maturity goals. A graphic is provided as the last
page of the document (section VIII), based on sample assessments.
COBIT IT process DS9 Manage the configuration from the Deliver and Support (DS) domain addresses
good practices for ensuring the integrity of hardware and software configurations. This requires the
establishment and maintenance of an accurate and complete configuration repository. Sections from DS5
Ensure systems security and AI3 Acquire and maintain technology infrastructure are relevant. The
primary COBIT control objectives are:
DS9.1 Configuration repository and baseline—Establish a supporting tool and a central repository to
contain all relevant information on configuration items. Monitor and record all assets and changes to
assets. Maintain a baseline of configuration items for every system and service as a checkpoint to
which to return after changes.
DS9.2 Identification and maintenance of configuration items—Establish configuration procedures to
support management and logging of all changes to the configuration repository. Integrate these
procedures with change management, incident management and problem management procedures.
DS9.3 Configuration integrity review—Periodically review the configuration data to verify and
confirm the integrity of the current and historical configuration. Periodically review installed software
against the policy for software usage to identify personal or unlicensed software or any software
instances in excess of current license agreements. Report, act on and correct errors and deviations.
Refer to the ISACA publication COBIT Control Practices: Guidance to Achieve Control Objectives for
Successful IT Governance, 2nd Edition, published in 2007, for the related control practice value and risk
drivers.
MySQL™ Security
MySQL is a popular database that operates on numerous operating systems and is most popular on
UNIX™/Linux™ variants. MySQL is often implemented as part of LAMP or WAMP 1—Linux/Windows
prepackaged implementation of the Apache Web Server, MySQL database and PHP scripting language.
MySQL was originally developed by a Swedish software development company and was acquired by
Oracle Corp. The license is open source, which requires the user to preserve copyright notices, but
permits the source code to be modified and/or distributed freely.
MySQL Servers are used in the enterprise operating environment as database systems for general
applications including accounting, business operations and documentation repositories. In addition, they
are used as e-commerce backend servers and web content management servers. The failure of a MySQL
Server to be properly configured could result in the inability for the business to execute its critical
processes, the loss of intellectual property, the loss of critical or sensitive information, and/or the
utilization of the database server to implement malicious processes. In addition, the security of MySQL
Server is dependent on the configuration of the host operating system.
Scope—The review will focus on the configurations of the relevant MySQL Servers within the enterprise.
The selection of the applications/functions and specific servers will be based on the risks introduced to
the enterprise by these systems.
MySQL Server relies on the integrity of the host operating system. Accordingly, the auditor must perform
or have access to a recent audit of the host operating system’s configuration and be assured of the
integrity and security of the host. If this cannot be assured, the audit of the host operating system should
be completed prior to beginning this audit. If the audit has identified significant deficiencies or material
weaknesses, the audit should be postponed until these issues are remediated.
{The remainder of this paragraph needs to be customized to describe which servers and applications
within the enterprise will be reviewed.}
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
1.4.2 Establish the process for suggesting and implementing changes to the audit/assurance program and
the authorizations required.
1.5 Define assignment success.
The success factors need to be identified. Communication among the IT audit/assurance team,
other assurance teams and the enterprise is essential.
1.5.1 Identify the drivers for a successful review (this should exist in the assurance
function’s standards and procedures).
1.5.2 Communicate success attributes to the process owner or stakeholder, and obtain
agreement.
1.6 Define the audit/assurance resources required.
The resources required are defined in the introduction of this audit/assurance program.
1.6.1 Determine the audit/assurance skills necessary for the review.
1.6.2 Estimate the total audit/assurance resources (hours) and time frame (start and end
dates) required for the review.
1.7 Define deliverables.
The deliverable is not limited to the final report. Communication between the audit/assurance
teams and the process owner is essential to assignment success.
1.7.1 Determine the interim deliverables, including initial findings, status reports, draft
reports, due dates for responses or meetings, and the final report.
1.8 Communications
The audit/assurance process must be clearly communicated to the customer/client.
1.8.1 Conduct an opening conference to discuss:
Review objectives with the stakeholders
Documents and information security resources required to effectively perform
the review
Timelines and deliverables
2. PREPARATORY STEPS
2.1 Obtain and review the current organization responsible for the OS and database
configuration and security functions.
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
2.2 Determine if an audit of the host operating system has been performed.
2.2.1 If an audit has been performed, determine if the specific database servers under
consideration for inclusion in the scope of this audit have been included in the
operating system review
2.2.1.1 Obtain the work papers for the previous audit.
2.2.1.2 Review the security configuration, and determine if identified issues have been
resolved.
2.2.1.3 Determine if the database specific servers under consideration for inclusion in
the scope of this audit were included in the OS review.
2.2.2 If an audit has not been performed or the database servers were not within scope,
consider performing an audit of the MySQL Server’s host operating system prior to
continuing with this audit/assurance program.
2.3 Select the MySQL servers to be included in the review.
2.3.1 Based on the prioritized list of MySQL servers developed previously, identify the
servers to be included in the review. Be sure that there is a representative sample of
database high-risk servers. A group of servers may have similar functions and can be
aggregated into a group.
2.3.2 Determine if there are a corporate standard server configuration and related settings
for MySQL servers.
3. If a corporate standard server configuration and related settings for MySQL servers do
not exist, recommend the development of standards as a basis for continuing the
audit.
3.1 Obtain documentation for the servers to be reviewed.
3.1.1 Print out the file /chroot3/my.cnf, the host operating system’s utilities or reporting
software.4
3.1.2 Obtain an understanding of the operating environment and management issues.
3
The directory /choot is a directory directly subordinate to the ROOT of a volume. It can have any name but its purpose is to isolate the directory structure of the MySQL files from other directories.
4
Consult UNIX/LINUX documentation for specific commands and locations.
© 2010 ISACA. All rights reserved. Page 15
MySQL™ Server Audit/Assurance Program
COSO
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
3.1.3 Interview the senior operating systems management analyst (manager or director) to
obtain an understanding of policies, procedures, and known issues and known (risk-
based accepted) deviations from policies and procedures.
4. HOST SYSTEM
4.1 Hardened Host System
Audit/Assurance Objective: The operating system of the server that hosts the MySQL server has
been configured to address identified security vulnerabilities or compensating controls for
residual risks.
5. MySQL Server is Isolated AI3.2
X
Control: MySQL Server is hosted on a dedicated server. DS9.1
5.1.1.1 Verify that the computer hosting the MySQL Server is dedicated to the MySQL
server function.
6. MySQL Server Operating System Configuration AI3.2
Control: The host operating system is configured to ensure the MySQL server will not be DS5.3
subject to host operating system configuration vulnerabilities. DS5.4
DS9.1 X
DS9.2
DS9.3
DS13.1
6.1.1.1 Determine if an assurance review has been performed on the configuration of the
host MySQL Server.
6.1.1.2 If an assurance review has been performed, determine that all follow-up security
issues have been corrected.
6.1.1.3 If an assurance review has not been performed, execute a review of the host server
prior to continuing with this assessment. It is suggested that you use the relevant
audit/assurance program available from ISACA.
6.1.1.4 Determine if a list of authorized services and daemons exists for MySQL Servers.
6.1.1.4.1 If a list exists, examine the list for potentially risky modules or services.
6.1.1.4.2 If no list exists, determine how servers are protected from unauthorized 6.1.1.4.3 6.1.1.4.4
6.1.1.4.5
services or modules.
6.1.1.5 Determine that only core services required to host a MySQL Server are installed.
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
5
Most of the operating system commands given in the following sections are applicable for UNIX/Linux servers. For Windows servers, the relevant documentation of “MySQL server for
Windows” should be consulted (refer to www.mysql.com).
© 2010 ISACA. All rights reserved. Page 18
MySQL™ Server Audit/Assurance Program
COSO
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
DS9.2
13.1.1.1 Determine that the MySQL Server login has no directory or shell.
5.1.2.1.1On the server, enter: FINGER and the UID for the MySQL Server
account.
5.1.2.1.2Verify the following:
dir = /dev/null
shell = /sbin/nologin
14. MySQL Server Has a Separate Password File DS5.3
Control: The MySQL Server has a separate password file for access to the MySQL Server. DS5.4
X
DS9.1
DS9.2
5.1.3.1Verify that an .htaccess file is in the ROOT directory of the MySQL Server
software.
14.1 Secure Network Services
Audit/Assurance Objective: The MySQL Server configuration establishes secure network
connections.
15. MySQL server Firewall AI3.2
Control: A firewall has been installed on the MySQL Server. DS5.5 X
DS5.10
15.1.1.1 Obtain the configuration of the firewall.
15.1.1.2 Determine if the MySQL Server uses the standard port 3306.
15.1.1.3 If a different port is used, determine that the appropriate NAT translation is
installed.
15.1.1.4 Determine that the firewall limits access to the MySQL Server base system. If
remote access to the server is permitted, verify that the port is nonstandard and
appropriate.
16. Data Transmissions over the Internet are secure.
Control: Data encryption is used when communicating with the MySQL Server.
5.2.2.1 Test the data stream using the command:
Tcdump–l–i eth0–w–src or dst port 3306|strings
If plain text is visible, encryption is not in use. If the data are encrypted, the data
© 2010 ISACA. All rights reserved. Page 19
MySQL™ Server Audit/Assurance Program
COSO
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
18.1.1.1.1 Use an editor or file list program to print the my.cnf file.
19. Utilize Configuration Options to Minimize Vulnerabilities AI3.2
Control: Use appropriate configuration options to minimise vulnerabilities. DS9.1 X
DS9.2
5.4.2.1Verify that the LOAD DATA LOCAL INFILE option has been disabled.
5.4.2.1.1Use an editor or file list program to access the my.cnf file.
5.4.2.1.2Determine that the file /chroot/mysql/etc/my.cnf in section mysqld has
the parameter set-variable=local-infile=0.
5.4.2.2Verify that the –socket option forces the mysql socket.
5.4.2.2.1Use an editor or file list program to access the my.cnf file.
5.4.2.2.2Determine that the file /chroot/mysql/etc/my.cnf in the section [client] has
the parameter socket= /chroot/mysql/temp/mysql.sock.
5.4.2.3Verify that the symbolic links to tables have been disabled.
5.4.2.3.1Use an editor or file list program to access the my.cnf file.
5.4.2.3.2Determine that the file /chroot/mysql/etc/my.cnf has the option parameter
–skip-symbolic-links.
20. MySQL ROOT Table Is Protected AI3.2
Control: The MySQL Server is protected with a password and not easily identified user DS5.3
X
ID. DS9.1
DS9.2
5.4.3.1Determine if admin userID has been renamed.
5.4.3.1.1Run phpMyadmin or an equivalent utility, or use the SQL SELECT
command including the user name and password name from the table.
5.4.3.2Determine if a password has been assigned for the admin user ID; if not, anyone
could access ROOT.
5.4.3.2.1Connect to the MySQL server by entering mysql–u root. If you connect,
no password has been assigned.
5.4.3.3Determine if access has been limited.
5.4.3.3.1Enter SHOW GRANTS, and identify users with:
ALTER TABLES
© 2010 ISACA. All rights reserved. Page 21
MySQL™ Server Audit/Assurance Program
COSO
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
ALL PRIVILEGES
GRANT ALL
GRANT
REVOKE
CREATE
SHUTDOWN
LOCK TABLES
REPLICATION SLAVE
SUPER
KILL
PURGE BINARY LOGS
SET GLOBAL
TRIGGER
UPDATE
Determine if this level of access is appropriate for the concerned users.
21. Other Databases and Users Are Removed AI3.2
Control: Only required databases are installed on the MySQL Server with only required DS9.1 X
users. DS9.2
21.1.1.1 Run phpMyadmin or an equivalent utility, or use the SQL SELECT command
including the user name and password name from the table.
21.1.1.1.1 List the databases displayed.
21.1.1.1.2 Determine if all databases are authorized and required.
21.1.1.1.3 Select each database, and list the user Ids.
21.1.1.1.4 Determine if admin user ID has been renamed.
21.1.1.1.5 Determine if a password has been assigned for the admin user ID; if
not, anyone could access ROOT.
21.1.1.1.6 Determine if the other user IDs are appropriate and have passwords.
22. History File Content Removed
Control: The mysql-history file containing SQL commands has been cleared.
22.1.1.1 Determine that the /chroot/mysql/etc/tmp/.mysql_history file has no contents.
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
Control Environment
e Cross- Comments
Control Activities
COBIT
Monitoring
Audit/Assurance Program Step Cross- Hyper- reference
reference link
recognizable.
27.1.1.2 Obtain documentation about the enterprise incident management process.
27.1.1.3 Determine if database activities are included in the incident management
procedure.
27.1.1.4 Select database-related incidents from the incident management system. Follow
the process for incident investigation and remediation to closure.
27.1.1.5 Determine if significant security incidents have been escalated to the appropriate
officials.
27.1.1.6 Determine if remediation and closure have been appropriately documented.
27.2 Intrusion Monitoring and Prevention
Audit/Assurance Objective: MySQL Servers are included in the intrusion detection/prevention
activities of the enterprise.
28. Intrusion Detection/Prevention DS5.5
Control: MySQL Servers are within the scope of the enterprise intrusion DS5.9 X X X
detection/prevention policies. DS13.3
28.1.1.1 Determine if an audit/assurance assessment has been performed of the intrusion
monitoring and detection process associated with network perimeter audits.
28.1.1.2 If audits have been performed, obtain the work papers and report.
28.1.1.3 Determine if the scope of the intrusion detection/prevention process includes the
MySQL Server environment.
28.1.1.4 If an audit has not been performed or the MySQL Server environment has been
excluded from the standard monitoring process, expand the scope of this audit or
perform a separate audit of the intrusion monitoring program.
29. MYSQL SERVER ADDITIONAL COMPONENTS
Audit/Assurance Objective: Additional MySQL Server components provide adequate security to
prevent unauthorized access to MySQL Server services and database content.
29.1 The audit/assurance professional can add audit steps for Secure Sockets Layer (SSL)
database extensions, database dynamic content components, Server Side Includes and
common gateway interfaces (CGI). Since these components will vary by installation, it is
preferable to customize the audit/assurance program to fit the specific installation
components. They can be filled in below.
© 2010 ISACA. All rights reserved. Page 25
MySQL™ Server Audit/Assurance Program
Referenc
Assessed Target e
Comments
Maturity Maturity Hyper-
COBIT Control Objective
link
AI3.2 Infrastructure Resource Protection and Availability
Implement internal control, security and auditability measures during configuration, integration
and maintenance of hardware and infrastructural software to protect resources and ensure
availability and integrity. Responsibilities for using sensitive infrastructure components should
be clearly defined and understood by those who develop and integrate infrastructure
components. Their use should be monitored and evaluated.
AI3.3 Infrastructure Maintenance
Develop a strategy and plan for infrastructure maintenance, and ensure that changes are
controlled in line with the organisation’s change management procedure. Include periodic
reviews against business needs, patch management, upgrade strategies, risks, vulnerabilities
assessment and security requirements.
DS5.3 Identity Management
Ensure that all users (internal, external and temporary) and their activity on IT systems
(business application, IT environment, system operations, development and maintenance) are
uniquely identifiable. Enable user identities via authentication mechanisms. Confirm that user
access rights to systems and data are in line with defined and documented business needs and
that job requirements are attached to user identities. Ensure that user access rights are requested
by user management, approved by system owners and implemented by the security-responsible
person. Maintain user identities and access rights in a central repository. Deploy cost-effective
technical and procedural measures, and keep them current to establish user identification,
implement authentication and enforce access rights.
DS5.4 User Account Management
Address requesting, establishing, issuing, suspending, modifying and closing user accounts and
related user privileges with a set of user account management procedures. Include an approval
procedure outlining the data or system owner granting the access privileges. These procedures
should apply for all users, including administrators (privileged users) and internal and external
users, for normal and emergency cases. Rights and obligations relative to access to enterprise
systems and information should be contractually arranged for all types of users. Perform regular
management review of all accounts and related privileges.
DS5.5 Security Testing, Surveillance and Monitoring
© 2010 ISACA. All rights reserved. Page 27
MySQL™ Server Audit/Assurance Program
Referenc
Assessed Target e
Comments
Maturity Maturity Hyper-
COBIT Control Objective
link
Test and monitor the IT security implementation in a proactive way. IT security should be
reaccredited in a timely manner to ensure that the approved enterprise’s information security
baseline is maintained. A logging and monitoring function will enable the early prevention
and/or detection and subsequent timely reporting of unusual and/or abnormal activities that may
need to be addressed.
DS5.6 Security Incident Definition
Clearly define and communicate the characteristics of potential security incidents so they can be
properly classified and treated by the incident and problem management process.
DS5.10 Network Security
Use security techniques and related management procedures (e.g., firewalls, security
appliances, network segmentation, intrusion detection) to authorise access and control
information flows from and to networks.
DS9.1 Configuration Repository and Baseline
Establish a supporting tool and a central repository to contain all relevant information on
configuration items. Monitor and record all assets and changes to assets. Maintain a baseline of
configuration items for every system and service as a checkpoint to which to return after
changes.
DS9.2 Identification and Maintenance of Configuration Items
Establish configuration procedures to support management and logging of all changes to the
configuration repository. Integrate these procedures with change management, incident
management and problem management procedures.
DS9.3 Configuration Integrity Review
Periodically review the configuration data to verify and confirm the integrity of the current and
historical configuration. Periodically review installed software against the policy for software
usage to identify personal or unlicensed software or any software instances in excess of current
license agreements. Report, act on and correct errors and deviations.
2
DS9.2 Identification and
DS5.3 Identity Management
Maintenance of Configuration Items