+ All Categories
Home > Education > 03.1 general control

03.1 general control

Date post: 27-Nov-2014
Category:
Upload: mulyadi-yusuf
View: 213 times
Download: 3 times
Share this document with a friend
Description:
 
48
Information System: General Control and Application Control
Transcript
Page 1: 03.1 general control

Information System:General Control and Application Control

Page 2: 03.1 general control
Page 3: 03.1 general control

Sumber: ITGI, COBIT 4.1, 2007

IT General Control v.s. IT Application Control

Page 4: 03.1 general control

Application controls:

Control designed to ensure the complete and accurate processing of data, from input through output.

It includes: Control over Input, Process, and Output of Application.

Examples: data input validation, agreement of batch totals, and encryption.

IT general controls (ITGCs):

Are policies and procedures that relate to many IS application and support the effective functioning of AC by helping to ensure the continued operation of IS.

Objectives: to ensure the proper development and implementation of applications, as well as the integrity of program, data files, and computer operations.

The following are the most common ITGCs:

x Logical access controls over infrastructure, applications, and data.

x System development life cycle controls x Program change mgt controls.

x Data center physical security controls. x Network Operations

x System and data backup and recovery. x Computer operation controls.

Defining IT General and Application Control

Page 5: 03.1 general control

IT General Control v.s. IT Application Control

ERM, Enterprise size,

Application complexity

IT General Control

IT Applica-

tion Control

Reliance to AC depends directly on the design and operating effectiveness of GC.

The design of GC depends directly on the AC requirement and the design of ERM.

There is a direct correlation b/w the complexity of transactional and support applications and the availability, use, and reliance on inherent and configurable AC.

Degree of application complexity will drive the scoping, implementation, level of effort, and knowledge required to execute an AC review, as well as the degree to which internal auditors can assist in a consulting capacity.

Page 6: 03.1 general control

Hall’s IT Control Relationship

Page 7: 03.1 general control

The two broad groupings of information systems control activities are general controls and application controls. General controls include controls:

A. Relating to the correction and resubmission of faulty data.

B. For developing, modifying, and maintaining computer programs.

C. Designed to ensure that only authorized users receive output from processing.

D. Designed to ensure that all data submitted for processing have been properly authorized.

Gleim Test

Page 8: 03.1 general control

IT General ControlThe Most Common ITGCs:

1. IT Organization Structure

2. Logical access controls over system, applications, and data.

3. System development life cycle controls.

4. Program change management controls.

5. Data center physical security controls.

6. System and data backup and recovery controls.

7. Computer operation controls.

Page 9: 03.1 general control

9

• CIO is responsible for IT in relation to business strategy and compliance.

• CIO designs and maintains IT internal controls, IT resources, and IT metric, and determines which new IT to pursue.

CEO

CIOSecurity and Qualit

y

Application and

System

DataTechn

ical Supp

ort

Operation

IIA’s Topic 6: IT Management and Organization

Help Desk, Telecom-munication Network

Admin Web Operation, Change

Controller, Librarian, Data Entry Personnel,

End User

Data Center, Information

Center, Network/LAN Admin, Web Admin, User

Training

Database Admin (DBAs), Data

Admin

System Analyst, Programmers,

Testers

Page 10: 03.1 general control

10

• Operations support all business units, with focus on efficiency.

• The following function are included in Operation:

Help Desk: reduces persistent system interaction errors by users.

Telecommunication network administrator: program telephones.

Web operation: administers Web sites, extranets, and intranets.

Change controller: makes judgment calls whether to escalates an issue or to schedule it.

Librarian maintain control over documentation, programs, and data files; they should have no access to equipment

Data entry personnel: format data for computer use.

End users, training will prevent input errors.

IIA’s Topic 6: Operation Unit

Page 11: 03.1 general control

11

Technical supports keeps back-end system functioning and train end-users.

• Data center: secure location where servers or mainframes are kept, including controls over electricity, HV AC, and physical access.

• Information center: a centralized location to supports staff, traditionally relating to end-user training and ongoing technical support.

• Network/LAN administrator: monitors and maintain network usage.

• Web administrator: develops the company web site, monitor it for inappropriate usage by employee or others, and maintains appropriate bandwidth and availability.

• User training: take place in computer class rooms with a “sandbox” environment, or an area in which application can be used in a testing mode.

IIA’s Topic 6: Technical Support Unit

Page 12: 03.1 general control

12

• Database administrator (DBAs): Centrally organized, maintain their data resources in a central location that is shared

by all end users. Responsible for the security and integrity of the database, Trained to design, implement, and maintain databases, set database policy, and train

users. The DBA help auditors review raw data.

• Data administrator:

Monitor data use and sets policies on how data can be stored, secured, and released. They plan for future data needs and oversee database design and data dictionary development.

IIA’s Topic 6: Data Unit

Page 13: 03.1 general control

Data security must be maintained while data is on site, while data is being transmitted , when it is being stored.

User training in use of email and internet.

Prohibit user to install new application.

Application is kept in program libraries.

Use of special file deletion software.

Backing up data: data is backed up to an off-site storage facility, away from operations.

Include the grandfather, father, son concept.

Control applied is similar with physical controls of primary operations.

Physical form of back up (CD, USB) should be labeled in standard format.

Electronic vaulting: electronically transmit change-to-data to an off-site facility, and then create backup tapes, so it eliminates physical transportation of the backup tapes.

Topic 15: Data Storage and Security

Page 14: 03.1 general control

14

The functions include system analyst, programmers, and testers.

• System analyst: determine the necessary system outputs and how to achieve these goals, either by HW/SW acquisition, upgrade planning, or internal development.

• Programmers: translate the system analysts’ plans by creating or adapting applications. Categories include:

Application developers (end-user application).

System developers (back-end system and networking)

Web developers (Web functionality, Web-based applications).

• Testers: test at the unit and system level. Programmers should not be used to test code that they wrote themselves.

IIA’s Topic 6: System and Application Development Unit

Page 15: 03.1 general control

15

System Development:

Systems prof include systems analyst, database designer, and programmer who design and build the system (see IIA’s).

End users are those for whom the system is built. They are the managers and the operations personnel.

Stakeholders are individuals inside or outside the firm who have an interest in the system, but are not end users.

System Maintenance:

Once a new system has been designed and implemented, the systems maintenance group assumes responsibility for keeping it current with user needs.

The term maintenance refers to making changes to program logic to accommodate shifts in user needs over time.

Hall’s Systems Development and Maintenance

Page 16: 03.1 general control

16

The focus of segregation control shifts from the operational level (transaction processing tasks that computers now perform) to higher-level organizational relationships within the computer services function.

Separating Systems Development from Computer Operations

The segregation of systems development (both new systems development and maintenance) and operations activities is of the greatest importance.

Systems development and maintenance should create (and maintain) systems for users, and should have no involvement in entering data, or running applications.

Operations staff should run these systems and have no involvement in their design.

Separating Database Administration from Other Functions

The DBA function is responsible for a number of critical tasks pertaining to database security, including creating the database schema and user views, assigning database access authority to users, monitoring database usage, and planning for future expansion.

Delegating these responsibilities to others who perform incompatible tasks threatens database integrity. Thus, DBA function is organizationally independent of operations, systems development, and maintenance.

Hall’s Segregation of Incompatible IT Functions

Page 17: 03.1 general control

17

When the programmer who codes the original programs also maintains the system (see IIA), there will be control problems: inadequate documentation and the potential fraud.

Inadequate Documentation. Poor-quality systems documentation is a chronic IT problem and a significant challenge for many organizations seeking SOX compliance.

When a system is poorly documented, it is difficult to interpret, test, and debug. Therefore, the programmer who understands the system (the one who coded it) maintains bargaining power and becomes relatively indispensable.

Program Fraud, involves making unauthorized changes to program modules for the purpose of committing an illegal act. For the fraud to work successfully, however, the programmer must be able to control the situation through exclusive and unrestricted access to the application’s programs.

Hall’s Separating Systems Development fr Maintenance

Page 18: 03.1 general control

In the organization of the IT function, the most important separation of duties is

A. Not allowing the data librarian to assist in data processing operations.

B. Ensuring that those responsible for programming the system do not have access to data processing operations.

C. Having a separate information officer at the top level of the organization outside of the accounting function.

D. Using different programming personnel to maintain utility programs from those who maintain the application programs.

Gleim Test

Page 19: 03.1 general control

ITGC: Logical Access Controls over System, Applications, and Data

Logical access controls are used to ensure that access to operating systems, data, and programs/ application , is limited to authorized users and IT support personnel.

User ID and Password (OS or Appl)

(Length, Alpha+Num, Session, Change)

Access Control List

Token Device

Remote Access Controls: Internal and External Access

Dedicated Lines

AC

GC

GC

GC

Log on with token device

Automatic dial-back. Secure sockets layer (SSL): Multifactor authentication: Virtual private networks (VPN)

Page 20: 03.1 general control

• General control of system development:

Documentation of user requirement and measurement of achievement of the requirement.

Use of formal process that ensures user requirement and controls and reflected in both design and actual development.

Test of elements and interfaces with actual users.

Planned application maintenance.

Controlled change management process.

For out-sources development, vendor’s on going viability is assessed.

• System development life cycle (SDLC)

ITGC - Topic 12: Application Development

Page 21: 03.1 general control

• System Planning

Executives and IT mgt establish a long-term tech strategy that measures success of IT fulfillment of business strategy.

SC set IT policy, approve plan, monitor and oversight, and assess the impact of IT.

• Systems Analysis

Point out deficiencies and opportunities in existing IT systems.

The result is request for system designs or selection, submitted to SC or IT mgt.

Feasibility studies:

- Identify the needs of all related parties and develop metrics for future assessment.

- Analyze proposal against: needs, resources, additional cost and future impact (e.g. on existing system/HW, training), tech trend, alignment w/ strategy and obj.

- Perform cost-benefit analysis.

- Identify the best risk-based alternatives (e.g. no change, development, purchase)

Require approval from SC and IT mgt. Auditor involved to ensure that control and auditability requirement is included in the project.

Topic 12: SDLC

Page 22: 03.1 general control

• System design/system selection

System design occurs in 2 phases: high level SD and detailed SD. Include prototyping.

High level: 1. analyze inputs, process, and output of existing or proposed system, 2. breakdown user requirement, 3.define functional .

• IA’s review of SDLC activities

Auditor should examine controls specifically related to:

User approval, but the efficient one.

Authorization procedures for program changes and new code development.

Software testing and quality control.

Project staff proficiency.

If the standards are not being met or if IT managers are reluctant to fix an internal control gap, the auditor should report the findings to top management.

Topic 12: Application Development

Page 23: 03.1 general control

• If internal development is selected (system is being adapted or purchased), to customize and configure the system, programmers should follow the detailed system blueprint to write or resuse code, debug code, convert existing data and processes to the new system, reconfigure and require HW as needed, and train staff.

• Risks of customization and configuration:

Creation of multiple version of programs.

Unauthorized access.

Overwriting of valid code.

• Control: programmers must get sign-off from superiors and source of code must be protected during the project by a librarian.

• Computer-aided software engineering (CASE) tools automate systems development. It can enforce an org’s standards and provide an efficient audit trail and doc resources of auditors.

• Auditors asses controls over compiling, storage of source code, and cataloging activity.

Topic 12: Programming/ Customization and Configuration

Page 24: 03.1 general control

• Testing involves: (a) creating a testing plan, (b) collecting or creating testing scenarios, (c) executing the test and managing test conditions, (d) collecting and evaluating feedback, and (e) reporting the results.

• Testing and quality assurance are done in two phases:

Unit/performance testing

It keeps the application in isolation to find internal bugs (problem in SW/HW).

System testing

It strings together all program in application to find intercommunication bugs. The new system’s operation must be tested in an interface with other related system.

Before implementation, system faces final test for quality assurance and user acceptance (implementation control).

• Testing terminology includes: load testing, throughput testing, alpha testing, beta testing, pilot testing, regression testing, sociability testing (SOCT), and security testing.

• Testing may involve hacking, trying to make the system fail.

Topic 12: Testing

Page 25: 03.1 general control

• Conversion: the process of closing down the old sys and migrating any data to the new sys.

Errors can be introduced at this points, include: incorrectly converting code, truncating fields, use of the wrong decimal, or loss records.

To reduce data migrating errors: use hash total, records count, visual inspection.

• Implementation: turning on the new system. Implementation approach:

Bigbang/cutover: the entire system go “live” at the same time.

Phased: implement by department or plant

Pilot: implement a test version and run it for a given period prior full implementation.

Parallel: run the old and new systems simultaneously for a period, requiring double entry of all transactions.

• Documentation: record specification, security features, backup process, and prevent fraud.

Topic 12: Conversion and Implementation

Page 26: 03.1 general control

• Patch: A piece of software designed to fix problems with, or update a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance.

• Changes must be approved by management, follow development standards, and be tested in a sandbox environment.

• Change and Patch Management Control:Risk Control Metric

Unauthorized changes • Policy for zero unplanned changes.

• Implementation Control.• Detective software

• Number of unplanned changes.• Number of unplanned outages.• Number of changes authorized.• Number of changes implemented

Changes fail to be implemented or are late

• Change management process • Greater than 70% change success rate• New work created by change

Unplanned work displaces planned work

• Perform triage.• Bundle planned changes.• Treat patches as a normal

process to expect.

• Less than 5% of work is unplanned.• % of time on unplanned work.• % of projects delivered late.• % of patches installed in a planned

software release.

Topic 12: Refinement / Change Mgt

Page 27: 03.1 general control

• Cost and benefit of IT investment can be tangible and intangible.

• The first part of IT selection process is feasibility study (cost-benefit analysis)

• Feasibility study starts by stating objectives and the requirement of the system.

Include identification of end-user’s and management’s needs.

• Feasibility studies can be subdivided:

Scheduling: determine the schedule for IT staff and other IT resources.

Operational: determine information requirements for operations.

Technical: determine if system have required capacity, ability to upgrade, and maintenance.

Economic: determine if the organization has the available resources for a project and sets a required return.

• IT out-sourcing should be considered when the same result can be achieved for the lower cost and/or higher quality. But, IAr still need to perform TOC of the out-sourced IT.

Topic 9: Evaluate Investment in IT

Page 28: 03.1 general control

28

Physical Location

The physical location of the computer center directly affects the risk of destruction to a natural or man-made disaster.

Construction

A computer center should be located in a single-story building of solid construction with controlled access. Utility lines should be underground and an air filtration system should be in place that is capable of extracting pollens, dust, and dust mites.

(Physical) Access

Physical controls, such as locked doors, should be employed to limit access to the center. Access should be controlled by a keypad or swipe card, and based on their roles and responsibilities.

Air Conditioning

Logic errors can occur in computer hardware when temperatures depart significantly from this optimal range. Also, the risk of circuit damage from static electricity is increased when humidity drops. In contrast, high humidity can cause molds to grow and paper products (such as source documents) to swell and jam equipment.

ITGC: Data Center Physical Security Controls

Page 29: 03.1 general control

29

• The choice of networks types will affect IT control design.

• Computer network:

The sum of all infrastructure and applications required to connect two or more networks nodes, which are computers and devices:

Computers (own processing power), servers (powerful computer with high bandwidth), and client (recipient of server function) /server infrastructure (data request server, database server).

Mainframe (large, scalable computer to process and store large amount of data) and data terminal (input/output node for a mainframe system)

• Data Processing method:

Centralized: all data processing is performed by one or more large computers housed at a central site that serves users throughout the organization.

Decentralized.

Distributed (decentralized processing, but networked together/centralized).

Topic 2: Data and NetworkCommunication / Connections

Page 30: 03.1 general control

30

Fire Suppression

Some of the major features of such a system include the following:

1. Automatic and manual alarms should be placed in strategic locations.

2. There must be an automatic fire extinguishing system.

3. Manual fire extinguishers should be placed at strategic locations.

Fault Tolerance

Fault tolerance is the ability of the system to continue operation when part of the system fails because of hardware failure, application program error, or operator error.

Two examples of fault tolerance technologies are:

1. Redundant arrays of independent disks (RAID), involves using parallel disks that contain redundant elements of data and applications.

2. Uninterruptible power supplies (UPS).

ITGC: Data Center Physical Security Controls

Page 31: 03.1 general control

31

Audit Procedures:

Tests of Physical Construction: Auditor should obtain architectural plans to determine that the computer center is solidly built of fireproof material. In addition, the auditor should assess the physical location of the computer center.

Tests of the Fire Detection System: The auditor obtains and evaluates evidence by reviewing official fire records of tests, which are stored at the computer center.

Tests of Access Control: The auditor observe the implementation of access control, also obtain and evaluates the access log, including CCTV.

Tests of RAID: From, RAID graphical mapping, the auditor should determine if the level of RAID in place is adequate for the organization, given the level of business risk associated with disk failure.

Gambar: Room Access Log Report

ITGC: Data Center Physical Security Controls

Page 32: 03.1 general control

• Elements of information security:

Confidentiality: policies for privacy and safeguarding confidential information and protection against unauthorized interception.

Integrity: data is both complete and correct.

Availability: no/little downtime + recovery of data after disruptions, disaster, data corruption.

• IT general controls and application controls are the basis for information protection.

• Information security has two aspects:

Data security: only authorized users can access, user access is restricted by user’s role, unauthorized is denied, and all changes to system are logged.

Security infrastructure: can be part of end-user application, and/or can be integral to servers and mainframes, called security software (i.e.: computer program whose purpose is to (help) secure a computer system or computer network). Example:

• Change list of authorized employee only from computer within the payroll dept.

• Terminal available only during business hours, automatically time out.

• Tell users when they last accessed the system.

Topic 8: Information Protection

Page 33: 03.1 general control

33

Disasters can interupt/ halt company’s ability to do business. The more dependent on technology (such Amazon and E-bay), the more exposed to these types of risks.

With DRP, the impact of a disaster can be absorbed and the organization can recover.

This is acomprehensive statement of all actions to be taken before (include testing), during, and after any type of disaster.

DCP possess 4 features:

1. Identify critical applications2. Create a DRP team3. Provide site backup4. Specify backup and off-site

storage procedures

ITGC: System and Data Backup and Recovery Control

Page 34: 03.1 general control

Contingency plan begins with a risk assessment, called business impact analysis (BIA).

When making a plan, org. combine risk and likelihood with their restoration priorities.

Types of off-site facilities (second site back up):

Hot site: fully stocked with HW needed, but not have org.’s data.

Cold site: empty space with no computer but is set up and ready for data center.

Warm site: a site partway between hot site and cold site.

Topic 14: Developing A Contigency Plan

Reciprocal agreement: several organizations share resources if one party suffer a failure.

Backup and Off-Site Storage Procedures: data file, application, documentation, and supplies needed to perform critical function should be automatically backed up and stored at a secure off-site location.

BCM should be tested, periodically, with a variety of scenarios.

Page 35: 03.1 general control

Hall’s ITGC: OS ControlsIf OS integrity is compromised, controls within individual accounting applications that impact financial reporting may also be compromised. For this reason, the design and assessment of OS security controls are SOX compliance issues.

OS Controls areas: access privileges, PW control, virus control, and audit trail control.

Controlling Access Privileges

Privileges determine which directories, files, applications, and other resources an individual or group may access and do actions, according to their roles.

For example, a cash receipts clerk who is granted the right to access and make changes to the accounts receivable file.

Password Control, should be controlled by a program / system

Regular change.

One-Time Passwords.

Length

Use the combination of alpha (small and caps) and numeric.

Page 36: 03.1 general control

Hall’s ITGC: OS ControlsOS Controls areas: access privileges, PW control, virus control, and audit trail control.

Virus Control (Controlling against Malicious and Destructive Programs)

Types: viruses, worms, logic bombs, back doors, and Trojan horses, etc.

Purchase SW and antivirus program , from reputable vendors.

Contol end-user installation, download, internet access.

System Audit Trail Controls

System audit trails are logs that record significant activity at the system, application, and user level, consist of 2 types of audit logs monitoring:

(1) logs of individual keystrokes (consider privacy): monitoring keystrokes.

(2) event-oriented logs: monitoring user ID acces, time, duration, access to programs, files, databases, printers, and other resources accessed.

Control: Unauthorized or terminated user; Periods of inactivity; Activity by user, workgroup, or department; Log-on and log-off times; Failed log-on attempts; Access to specific files or applications.

Page 37: 03.1 general control

• Six indicators of poor vulnerability management:Higher number of security incidents.

An inability to identify IT vulnerabilities systematically.

An inability to assess risks associated w/ vulnerabilities and to prioritize mitigation efforts.

Poor working relationship between IT management and IT security.

Lack of an asset management.

Lack of a configuration mgt process integrated with vulnerability mitigation efforts.

• To improve management of vulnerability:Enlist senior management support.

Inventory all IT assets and their associated vulnerabilities.

Prioritize mitigation/remediation steps according to risks.

Remediate vulnerabilities by presenting planned work projects to IT Management.

Continually update asset discovery, vulnerability testing and remediation processes.

Use automated patch management (to fix problem) and vulnerability discovery tools.

Topic 8: Internal Auditing and Vulnerability Management

Page 38: 03.1 general control

• Malware: design to gain access to a computer system w/o owner’s permission w/ the purpose of controlling or damaging the system or stealing data (financial and non financial).

• Virus: code that attaches itself to storage media, documents, or executable files and is spread when the files are shared with others.

• Worms: self-replicating that disrupt networks or computers; does not attach itself to an existing program or code; spread by sending copies of itself to terminals throughout a network. Worms may act to open holes in networks security and. They may also trigger a flood of illegitimate Denial of Service data transmissions that take up system bandwidth.

• Trojan horses: disguised to be innocuous/useful using social engineering (= set of rhetorical techniques used to make fraudulent messages seem inviting and is initiated through deceptive e-mails, instant messages, or phone contact).

Once installed, can install more harmful software for long-term use by the writer.

Banker programs: steal bank account data.Backdoor or trapdoor: bypass normal authentication for remote access. Backdoor canbe worm.Root kits: tools installed at the root (administrator level)Trojan-proxies: use an infected computer as a proxy to send spam.Piggyback: allows unauthorized users to enter network by attaching data to authorized packet.Logic bomb: dormant malware activated by specified variable (action, date, size) to destroy data.

Topic 8: Malicious Software (Malware)

Page 39: 03.1 general control

Other Malware• Box nets: chat programs to send simultaneous instructions to all system or upload

malware.

• SpamTools: gather e-mail address for future spam mailings.

• Key logger: records keystroke to steal passwords and user typing.

• A dialer: dials a high fee-line to generate huge debts.

Other External Threats• Hacker: unauthorized access to a computer system, cracker has criminal intent.

• Phishing or spoofing: website appears identical to an organization’s site.

• Pharming: redirect a valid URL entry to the hacker’s site.

• Evil-twin: wi-fi network operated as a mirror of legitimate network.

• Identity theft: an illegal use of sensitive information to impersonate an individual (solution = virtual information cards = user information is encrypted).

• Warddriving software: intruder drive through an area and locate vulnerable wireless networks.

Topic 8: Other Malware and Other External Threats

Page 40: 03.1 general control

40

Internal Threats (Illegal program alterations)• Asynchronous attacks: cause an initial attacks, then a subsequent system reaction. After

shutdown, before restart, change made to the restart parameter that weaken security.

• Data diddling: intentionally manipulating data in a system.

• Data hiding is manipulation of file name or extension (e.g. hiding an audit log).

• Backdoor/trapdoor.

• Rounding down and the salami technique.

Server/Mainframe Malware• Publicly available servers are assumed to be under constant barrage of attacks (e.g. by

hacker)

• Network sniffer (network analyzer) may detect credit card number formats in streams of data. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet's raw data, showing the values of various fields in the packet, and analyzes its content.

Topic 8: Internal Threats and Server/Mainframe Malware

Page 41: 03.1 general control

41

• Use of sandbox: ‘virtual’ area, separated from the system, meaning nothing done in a sandbox can effect your system.

• Use antivirus software and regular antivirus update.

• Allow download from reputable locations with security seals (e.g.: yahoo mail).

• Take sensitive information off-line.

• Use of user identification (ID) and authentication of identity.

Topic 8: Protecting System from Malicious Software and Computer Crime

Page 42: 03.1 general control

42

• Privacy is the right to have a say over how personal information is used and collected.

Personal information in IT can be improperly used for marketing or crime

• Privacy is an issue for corporate data, employee, and customers.

• FIP (fair information practice): individual has rights to privacy, but need to prove their identity; organization have responsibilities over the collection and use of information.

FIP include: Notice, Choice, Access, Security, and Enforcement

• The role of auditor in privacy:

ensure that relevant privacy laws and other regulations are communicated to the responsibilities parties.

compliance is documented.

benefit v.s. cost of privacy control.

Topic 8: Privacy

Page 43: 03.1 general control

• Goal of system security: to maintain the integrity of information assets and processing and mitigate and remediate vulnerabilities.

• IT General Controls: apply to all system components, processes, and data in the org or the system environment.

Logic control: software-based controls that check amounts or validate access based on logical rules.

• Logical access control: identify authorized users and give access.

Use of valid password does not prove the authenticity of a user. Why?

User ID can be also used to identify roles, which grant access to only certain areas.

• Audit trail: logs of functions performed and changes made in a system, including who made the change and when. Also include repeated incorrect password entries.

The trail is kept in a separate file or in system activity log file.

• Other logic control: automatic log-off, access from remote area (e.g. help desk), access logs (e.g. internet logs), single use of access codes, or codes valid for certain period (e.g. e-audit)

Topic 15: System Security

Page 44: 03.1 general control

Physical Control: physical access controls, environmental hazard control, and fire and flood protection.

• Physical access control: control access to building, to data centers, or to key operational areas. Control include use of lock, key card, badge, biometric devices, motion censors, CCTV.

Laptop/PC outside data center should have UPS and be locked.

• Environmental hazard control: Heating, venting, and air conditioning (HVAC) are vital, why?

• Fire and flood protection: data center and media storage should be fire-rated, equipped with fire alarms.

44

Topic 15: IT General Controls

Page 45: 03.1 general control

Hardware control: built-in controls designed to detect and report HW errors or failures.

Type of HW controls:

• Redundant character check: send additional data items to serve as a check on the other transmitted data; (e.g. part of a customer name can be matched against the name associated with the transmitted customer number).

• Equipment check: circuitry controls that detect HW errors.

• Duplicate process check: a process done twice and then compared.

• Echo check: received data is returned to the sender for comparison. (e.g. CPU sends a signal to a printer that is echoed just prior to printing. The signal verifies that the proper print position has been activated)

• Fault-tolerant components: redundancies to allow continued operations if a system fails (e.g. safe mode, system restores?).

45

Topic 15: IT General Controls

Page 46: 03.1 general control

IT operational control, include:

Planning controls; Policies, standard, and procedure; Data and program security; Insurance and continuity planning; and Control over external providers.

IT operational control, may involve:

Ensuring audit trails exist;

Reviewing exception reporting and transaction logs;

Minimizing the number of users with administrative privileges;

Using software tools and supervisor to monitor the activities of users;

Obligating system controllers and key person to take vacation or rotate jobs.

Ensuring person in-charge for custody does not have access to computer records.

Preventive maintenance on hardware and software system, as well as their controls.

46

Topic 15: IT Operational Controls

Page 47: 03.1 general control
Page 48: 03.1 general control

Informasi Lebih Lanjut,Hubungi:


Recommended