8 Protection of Information Assets
8 Protection of Information Assets
Domain 5
Senior management
leadership, Policies and Security awareness
Organization
commitment and procedures and education
support
Groups
Information Security
Users External parties security specialist/
administrator advisors
IT developers IS auditors
IS Auditor to ensure
Human Resources Security (cont’d)
IS Auditor to ensure
Third Party Access
• Third party access to an organization’s information processing facilities and
processing and communication of information must be controlled.
• These controls must be agreed to and defined in a contract with the third party.
Third Party Access (cont’d)
• Some recommended contract terms include:
• Compliance with the organization’s information security policy
• A clear reporting structure and agreed reporting formats
• A clear and specified process for change management
• An access control policy
• Arrangements for reporting, notifying and investigating information security incidents and
security breaches
• Service continuity requirements
• The right to monitor and revoke any activity related to the organization’s assets
Proactive
• Safeguards Reactive
Correct
• Controls that attempt • Countermeasures
to prevent an incident • Controls that allow the
detection, containment and
recovery from an incident
Control Methods
Managerial Controls related to the oversight, reporting, procedures and operations
of a process. These include policy, procedures, balancing, employee
development and compliance reporting.
Technical Controls also known as logical controls and are provided through the
use of technology, piece of equipment or device. Examples include
firewalls, network or host-based intrusion detection systems (IDSs),
passwords and antivirus software. A technical control requires proper
managerial (administrative) controls to operate correctly.
Physical Controls that are locks, fences, closed-circuit TV (CCTV) and devices that
are installed to physically restrict access to a facility or hardware.
Physical controls require maintenance, monitoring and the ability to
assess and react to an alert should a problem be indicated.
The IS auditor should evaluate the following criteria for defining permissions and granting
access:
• Need-to-know
• Accountability
• Traceability
• Least privilege
• Separation of Duties (SoD)
Task 5.2
Blackmail
Embezzlement
Physical Access Controls
Door locks (cipher,
Manual or Identification
biometric, bolted, CCTV
electronic logging badges
electronic)
Power failure
• Total failure (blackout)
• Severely reduced voltage (brownout)
• Sags, spikes and surges
• Electromagnetic interference (EMI)
Water damage/flooding
Manmade concerns
• Terrorist threats/attacks
• Vandalism
• Equipment failure
Environmental Controls
• Environmental exposures should be afforded the same level of protection as other types of
exposures. Possible controls include:
Fireproof and
Fire suppression fire-resistant Strategically located Electrical surge
systems building and office computer rooms protectors
materials
Documented and
Uninterruptible
Power leads from Emergency power- tested BCPs and
power supply/
two substations off switch emergency
generator
evacuation plans
Environmental Control Audit
• The IS auditor should first establish the environmental risk by assessing the location of the data center.
• In addition, the IS auditor should verify that the following safeguards are in place:
• Water and smoke detectors
• Strategic and visible location of handheld fire extinguishers
• Fire suppression system documentation and inspection by fire department
• UPS/generator test reports
• Electrical surge protectors
• Documentation of fireproof building materials, use of redundant power lines and wiring located in
fire-resistant panels
• Documented and tested emergency evacuation plans and BCPs
• Humidity and temperature controls
Task 5.3
• Logical access controls are the primary means used to manage and protect
information assets.
• IS auditors should be able to analyze and evaluate the effectiveness of a logical
access control in accomplishing information security objectives and avoiding
losses resulting from exposures.
Logical Access (cont’d)
• For IS auditors to effectively assess logical access controls, they first need to gain
a technical and organizational understanding of the organization’s IT environment
(platform), including the following security layers:
• Network
• OS platform
• Database
• Application
Paths of Logical Access
• Access or points of entry to an organization’s IS infrastructure can be gained
through the following paths:
• Direct
• Local network
• Remote
• General points of entry to either front-end or back-end systems occur through
network connectivity or remote access.
Paths of Logical Access (cont’d)
• Any point of entry not appropriately controlled can potentially compromise the
security of an organization’s sensitive and critical information resources.
• The IS auditor should determine whether all points of entry are identified,
managed and controlled.
Logical Access Exposures (CIA)
• The IS auditor should be familiar with risk and exposures related to network infrastructure.
• Network control functions should:
• Be performed by trained professionals, and duties should be rotated on a regular basis.
• Maintain an audit trail of all operator activities.
• Restrict operator access from performing certain functions.
• Periodically review audit trails to detect unauthorized activities.
• Document standards and protocols.
• Analyze workload balance, response time and system efficiency.
• Encrypt data, where appropriate, to protect messages from disclosure during
transmission.
Network Infrastructure
https://www.renesas.com/us/en/solutions/network-infrastructure.html
http://itfinalsolutions.com/?page_id=154
LAN Security
• To gain a full understanding of the LAN, the IS auditor should identify and
document the following:
• Users or groups with privileged access rights
• LAN topology and network design
• LAN administrator/LAN owner
• Functions performed by the LAN administrator/owner
• Distinct groups of LAN users
• Computer applications used on the LAN
• Procedures and standards relating to network design, support, naming
conventions and data security
https://www.mekongnet.com.kh/en/latest-news/205/local-area-network-lan-?m_id=143
Virtualization
• IS auditors need to understand the advantages and disadvantages of virtualization to
determine whether the enterprise has considered the applicable risk in its decision to
adopt, implement and maintain this technology.
• Some common advantages and disadvantages include:
Advantages Disadvantages
• Decreased server hardware costs. • Inadequate host configuration could create
• Shared processing capacity and storage vulnerabilities that affect not only the host,
space. but also the guests.
• Decreased physical footprint. • Data could leak between guests.
• Multiple versions of the same OS. • Insecure protocols for remote access could
result in exposure of administrative
credentials.
https://www.youtube.com/watch?v=V9AiN7oJaIM
Client-Server Security
• A client-server is a group of computers connected by a communications network
in which the client is the requesting machine and the server is the supplying
machine.
• Several access routes exist in a client-server environment.
Client-Server Security (cont’d)
• The IS auditor should ensure that:
• Application controls cannot be bypassed.
• Passwords are always encrypted.
• Access to configuration or initialization files is kept to a minimum.
• Access to configuration or initialization files are audited.
Wireless Security
• Wireless security requirements include the following:
• Authenticity—A third party must be able to verify that the content of a message
has not been changed in transit.
• Nonrepudiation—assurance that someone cannot deny something
The origin or the receipt of a specific message must be verifiable by a third party.
• Accountability—The actions of an entity must be uniquely traceable to that entity.
• Network availability—The IT resource must be available on a timely basis to meet
mission requirements or to avoid substantial losses.
Internet Security
• The IS auditor must understand the risk and security factors needed to ensure
that proper controls are in place when a company connects to the Internet.
• Network attacks involve probing for network information.
• Examples of passive attacks include network analysis, eavesdropping and
traffic analysis.
Internet Security (cont’d)
• Once enough network information has been gathered, an intruder can launch an
actual attack against a targeted system to gain control.
• Examples of active attacks include denial of service (DoS), phishing,
unauthorized access, packet replay, brute force attacks and email spoofing.
Firewall is a network security system that monitors and controls incoming and outgoing network traffic
Internet Security (cont’d)
• The IS auditor should also be familiar with common firewall implementations,
including:
• Screened-host firewall
• Dual-homed firewall
• Demilitarized zone (DMZ) or screened-subnet firewall
• The IS auditor should be familiar with the types, features and limitations of
intrusion detection systems (IDS) and intrusion prevention systems (IPS).
Malware
• There are two primary methods to prevent and detect malware that infects
computers and network systems.
• Have sound policies and procedures in place (preventive controls).
• Have technical controls (detective controls), such as anti-malware software,
including:
• Scanners
• Behavior blockers
• Active monitors
• Integrity CRC checkers
• Immunizers
Neither method is effective without the other.
Encryption
• Encryption generally is used to:
• Protect data in transit over networks from unauthorized interception and
manipulation.
• Protect information stored on computers from unauthorized viewing and
manipulation.
• Deter and detect accidental or intentional alterations of data.
• Verify authenticity of a transaction or document.
https://www.youtube.com/watch?v=fNC3jCCGJ0o
https://www.youtube.com/watch?v=r4HQ8Bp-pfw
Encryption (cont’d)
• Key encryption elements include:
• Encryption algorithm—A mathematically based function that
encrypts/decrypts data
• Encryption keys—A piece of information that is used by the encryption
algorithm to make the encryption or decryption process unique
• Key length—A predetermined length for the key; the longer the key, the more
difficult it is to compromise
Encryption (cont’d)
• There are two types of encryption schemes:
• Symmetric—a unique key (usually referred to as the “secret key”) is used for both
encryption and decryption.
• Asymmetric—the decryption key is different than the one used for encryption.
• There are two main advantages of symmetric key systems over asymmetric ones.
• The keys are much shorter and can be easily remembered.
• Symmetric key cryptosystems are generally less complicated and, therefore, use less
processing power.
Encryption (cont’d)
• In a public key cryptography system, two keys work together as a pair. One of the
keys is kept private, while the other one is publicly disclosed.
• The underlying algorithm works even if the private key is used for encryption and
the public key for decryption.
Encryption (cont’d)
• Digital signature schemes ensure:
• Data integrity— Any change to the plaintext message would result in the
recipient failing to compute the same document hash.
• Authentication—The recipient can ensure that the document has been sent
by the claimed sender because only the claimed sender has the private key.
• Nonrepudiation—The claimed sender cannot later deny generating the
document.
• The IS auditor should be familiar with how a digital signature functions to protect
data.
https://www.youtube.com/watch?v=JR4_RBb8A9Q