Chapter 4. Planning

Solutions in this chapter:

▪ Performance of Audit Work
▪ Scope
▪ Audit Planning
Summary

Introduction

This section provides guidelines for those involved in audit and review work. While written for people with a limited understanding of the security audit environment to perform most of the tasks required with minimum supervision, it does require that persons undertaking a technical task have knowledge of the operating environment in which they are working.
The idea behind this chapter is to allow any one area of the organization to be reviewed; therefore, you may find instructions to gather certain information appear in more than one section of the book. If you are performing a review of more than one component of your organization's infrastructure, use your good judgment and don't gather the information twice!

Performance of Audit Work

At the end of the day, you (as the auditor) are responsible for planning and conducting the audit assignment, subject to supervisory review and approval.

Note

In this section, the term The Program refers to the documented process (the master plan) of performing a review/audit/evaluation.

Planning the Audit

As the project owner, you should plan your own audit, taking into consideration:
▪ Communication with all who need to know about the audit.
▪ Any personnel to be used on the assignment.
▪ Background information on the customer.
▪ Work to be done and the general approach.
▪ The format and general content of the report to be issued.
Planning is important to ensure results will reflect the objectives of the audit. The planning should be documented and should include:
▪ Establishing audit objectives and scope of work.
▪ Obtaining background information about what is to be reviewed.
▪ Determining the resources necessary to perform the audit.
▪ Communication with all who need to know about the review.
▪ Performing, as appropriate, an on-site survey to become familiar with activities and services to be reviewed, to identify areas for emphasis, and to invite customer comments and suggestions.
Determine how, when, and to whom results will be communicated.
▪ Obtaining approval of the work plan from all concerned parties.

The Importance of Planning

Planning is arguably the most critical phase of any audit. Without it, you will waste precious time, miss the opportunity for improvement, and potentially leave a system vulnerable.
Good planning leads to good scope definitions and an awareness of potential issues before you start. Keep in mind that the auditor's and others' time is limited. What will happen if the people you need to interview are on vacation when you decide to meet with them? Planning cannot stop all problems, but certainly reduces the damage that can occur without it.

Examining and Evaluating Information

You should collect, analyze, interpret, and document information to support your findings. The process of examining and evaluating information is as follows:
▪ Information should be collected on all matters related to the objective and scope of work.
▪ Information should be sufficient, competent, relevant, and useful to provide a sound basis for findings and recommendations.
▪ Sufficient information is factual, adequate, and convincing so a prudent, informed person would reach the same conclusions as the final report author.
▪ Information should be reliable and the best attainable through the use of appropriate techniques.
▪ Relevant information supports findings and recommendations and is consistent with the objectives.
▪ Audit procedures, including the testing techniques employed, should be selected in advance, where practicable, and then expanded or altered if circumstances warrant.

Communicating Results

You should formally report the results of your work as follows:
▪ A written report should be issued after the project is completed. Interim reports may be written or oral and may be transmitted formally or informally (whether in writing, or using a recording, the interim report should still be recorded).
▪ You should discuss conclusions and recommendations to appropriate levels of management before issuing final written reports.
▪ Reports should be objective, clear, concise, constructive, and timely.
▪ Reports should present the purpose, scope, and results, and, where appropriate, express the authors' opinion.
Reports should include recommendations for improvements and acknowledge satisfactory performance and corrective action.
▪ Management should review and approve the final report before issuance and decide to whom the report will be distributed.
A Security review should be a comprehensive assessment, by a skilled security professional, of how effective your security environment is for today's threats.
During a review of your environment, it is essential to examine:
▪ Your business requirements
▪ How you currently provide your security
▪ Industry's best practices for providing those requirements

Security Review Methodology

A security review should be designed to take a snap shot of your network's security. To do this, you need to correctly examine a site's security from a technical, policy, and procedure perspective. Understanding the various stages in auditing and reviewing a network will ensure you will not miss sections of it. Planning now will help save time later.
To be complete, a security review involves the following areas (this is not an exhaustive list; other areas may be discovered):
▪ Information Asset Identification
▪ Information Sensitivity and Criticality Assessment
▪ Access Policy Review
▪ Security Supporting Functions Review
▪ Security Enforcing Functions Review
▪ Preparation of Final Report

Information Asset Identification

Protection cannot be applied to an environment until the environment has been correctly identified. During this phase, the audit staff needs to work with the information owners to identify what information assets exist, where they are located, who needs access to this information (internal employees, external customers, or external companies), and who must not have access.
This stage is essential in defining what information or intellectual property actually exists. A Business Impact Analysis (BIA) is based on an understanding of the information that needs to be defended.

Information Sensitivity and Criticality Assessment

Different organizations place different degrees of sensitivity and criticality on their different information assets. Not all information assets have the same degree of sensitivity or criticality and therefore need different levels of security to provide cost-effective protection for them.
During this phase, you need to work with the information owners to determine the level of:
▪ Sensitivity of the information
▪ Classification of each information asset
▪ Identification of the consequences of the information falling into the wrong hands
▪ Criticality of each of the organization's information assets:
▪ During normal times
▪ During special periods (end of year, end of month, reporting periods etc.)
▪ Identification of consequences of data being unavailable for:
▪ 1 hour or less
▪ 8 hours
▪ 24 hours
▪ 1 week
▪ 30 days
▪ More than 30 days
The information gathered during this phase is then used to determine a suitable level of protection and redundancy for each identified information asset.

Access Policy Review

The objective of this phase is to identify, based on the information collected in the previous phases, what your organization's security model should permit and what it should deny.
During this phase, the auditor needs to work closely with the IT Security Manager to correctly identify the organization's specific access policy given the known levels of sensitivity and criticality of each information asset. Consequently, this stage needs to occur following the identification of the assets; otherwise, how do you know what you are protecting? One of the biggest issues that occur with security reviews today is a direct consequence of not discovering what you need to defend first.

Security Supporting Functions Review

Security Supporting Functions are those parts of your existing environment that passively enhance the security of your environment from a monitoring or procedural perspective, including:
▪ Policies and standards
▪ Procedures
▪ Intrusion detection systems (or prevention systems)
▪ User activity monitoring systems
▪ System integrity testing systems
▪ Logging and correlation engines
Any security-enforcing device is only as good as the organizational security policy it enforces. Review your security policies and all the relevant procedures that govern the operation and use of your environment. Without a valid security policy in place, this gap in policy may prohibit certain security controls from being implemented or enforced. For example, not having a documented policy on password changes in writing can be against Department of Labor law to enforce it on the servers. Users could claim that because it is not in policy, it prohibits them from doing their job.
During this phase, start to examine your environment using:
▪ The knowledge gained in earlier phases on the sensitivity and criticality of each information asset.
▪ Your organization's access requirements.
Consensus knowledge of industry best practices in the maintenance and monitoring of similar environments. SANS and CISecurity.org are ideal sources of this information.
The results of this process will allow you to determine if your current environment has adequate processes in place to cover:
Maintenance procedures These procedures include patches and upgrades, account maintenance, backups and recovery, change management, development, testing, and implementation.
Intrusion detection/intrusion prevention These processes include attack detection, identification, reporting, and response. They are not just an IDS.
User activity monitoring These processes include correct detection and investigation of incidents of inappropriate use.

Security Enforcing Functions Review

Security Enforcing Functions are those parts of your environment that actively enforce security, including:
▪ Filter routers
▪ Firewalls
▪ Operating system access controls
▪ Application server configurations
▪ Digital certificates
▪ Encryption
During this phase of assessing your systems, you need to examine the Security Enforcing Functions. To do this, you will need to use:
▪ The knowledge gained in earlier phases on the sensitivity and criticality of each information asset.
▪ Your organization's access requirements.
▪ Consensus knowledge of industry best practices in the maintenance and monitoring of similar environments. SANS and CISecurity.org are ideal sources of this information. This can be used to assess industry best practices in the provision of protection and redundancy of similar information assets.
From this assessment, you may now determine if your existing Security Enforcing Functions:
▪ Provide an adequate level of redundancy
▪ Provide an adequate level of protection
▪ Require modification to provide more appropriate levels of protection or redundancy

Final Report

Plan the final report early. This document will need to include the details of all the information discovered in the preceding phases along with recommendations on how any identified deficiencies can be corrected.
The report should be structured to include and identify areas needing improvement, identify why they need improvement, and recommend methods of improving them. Most importantly, do not be afraid to point out what the organizations being reported are doing well.
Whether you do it in-house or if you hire an external party, a Security Review is performed to help you discover if the security of your organization's environment is adequate for its security requirements. This process is unique for each organization; the issues faced by one company will not be the same as another. Yes, there are going to be common frameworks (such as in requirements like the PCI-DSS and privacy), but there are also extensive differences even within industries. Instead of just auditing your security environment and reporting what you pass and fail on, add the following:
▪ Review your requirements
▪ Review your security
▪ Identify areas needing improvement
▪ Identify why they need improvement
▪ Recommend methods to improve them

Scope

The scope is one of the most important aspects of any audit, and one of the most critical. In an audit, the scope details what we are actually auditing and specifies the area of authority and responsibility. Always ensure the scope is clearly defined before any engagement. Other terms are used to refer to “scope”; for example, the “auditable entity.”
When preparing the scope, think of the second habit that Stephen R. Covey cites in his book, The Seven Habits of Highly Effective People: begin with the end in mind. In essence, the scope encompasses the definition of what is to be done and sets what we're actually responsible for evaluating. In effect, the scope is our “what” when auditing. One of the biggest issues when scoping an engagement is the need to find the “how.” We cover many aspects of the “how” later, but for the most part, an audit is doomed to failure unless “the what” is adequately defined, which is why scope is so important.

The “Who”

A common issue in any audit is individuals exceeding their authority. As an auditor, you do not generally own information or processes within an organization. Consequently, it is critical that you work within your scope. It is also important to understand the relationship between information and its owners. Scope should be defined by the parties with authority over the systems you wish to test. Without authorization, you may be in violation of the law, so always ensure that the person who signs off on the scope of the audit has the authority to do so.
This leads to a common problem in audits, and projects in general—scope creep. There are two aspects of Scope creep of particular concern to an auditor. First, any time we exceed scope we are exceeding authority—this is never good. Next, exceeding scope costs extra time and resources, which will not be viewed favorably.

Statement of Purpose/Scope

One of an auditor's most critical tools is the checklist (also known as the auditor's pitchfork). Subsequent chapters of this book discuss the details of finding the information necessary to create a checklist. The best secret to learn to be an effective auditor is how to create a great checklist. If you can create a checklist from consensus-based principles that will improve your organization's security, you're already a step ahead.
Checklists, like policies, are often created without detail, and generally based on the knowledge of the individual auditor. The best thing any auditor can do is learn how to cite industry references and consensus benchmarks. These benchmarks will add support to your technical statements based on the weight of authority associated with the consensus effort that has created them. This is not to say you will not find opposition, but it is easier to overcome.
This makes the audit process less subjective. The creation and use of industry consensus-based standards in audits backs up your assertions and findings and adds a level of scientific reproducibility to the process. If you create a separate scope and methodology for every single system, you are asking for “snowflakes” in your environment. This also gives ammunition to technical staff who notice differences between systems and become more likely to report other discrepancies.
The next benefit of a systematic checklist is that you can distribute it widely throughout the organization. The goal of the audit process is not to catch people out; it is to instill good governance principles and due diligence within information technology in an organization. If you hand the checklist to information technology staff and management well before any audit, they are more likely to implement the recommendations. An audit with no findings because the issues were mitigated before you got there is a good audit.
The audit checklist should always include a statement of scope, which will include what needs to be verified and if necessary, why. Further, any metrics that will be used to measure compliance can be included for agreement up front. Always document the process. This documentation should be simple enough to be understood by management, yet comprehensive enough to be implemented effectively and consistently within your organization by the technical people.

Audit Objective

An important aspect of the scope of any audit is to define the audit objective; in other words, the goal of our audit. The audit objective must be understood by the auditor and all individuals and groups involved in the audit process.

Audit Planning

Audit planning involves all actions that need to be taken before the audit actually begins. There are five key phases in audit planning:
1 Researching the system or processes.
2 Determining the scope of the audit.
3 Formulating a strategy for the audit.
4 Creating the audit checklist.
5 Developing audit procedures and plans to ensure the audit completes successfully.
The planning phase of any audit is arguably the most critical stage. It is in effect equivalent to the initiation stage of a project. In fact, an audit is analogous to a project in many ways. It is important to ensure that the scope of the audit is defined and agreed to prior to starting the audit. Failure to agree on the scope will lead to cost overruns or may be problematic due to issues with permissions, which is one of the reasons why research is so critical. The research phase of the audit planning ensures that the audit team and management come to understand the reason why the audit needs to occur and the desired outcome.
Additionally, good research will provide resources to the team that may aid in alleviating ill feelings or misgivings that often occur before an audit. Both technical staff and management commonly distrust audit teams. It does not matter whether this has occurred because of poor processes or bad feedback in the past, but it does matter how the audit is handled presently. Quality research will demonstrate forethought and alleviate many of the concerns surrounding an audit.
Material collected during this phase will also go a long way to creating the “How To” component of the audit checklist. Detailing independent best practice research using this document allows others within the organization to validate what you are doing before it occurs.
Remember that the purpose of an audit is not to catch people out. Providing the checklist to those whose systems we seek to audit up front affords them the opportunity to rectify any control failures before we get there. In some instances, the checklist may be provided weeks or months in advance of the audit date, allowing adequate time for systems to be patched and vulnerabilities rectified.
The thing to think about is why we are doing this. Are we auditing to catch people out and get them in trouble? If so, we are unlikely to achieve any lasting results, and at best, technical teams will do their utmost to subvert the audit process. However, if we work with the organization (internally or as an external party client) we will achieve better results. Remember, it is always better to have a system vulnerability patched before an audit. Keep in mind that it may be a year before the next audit is conducted, so correcting problems beforehand ensures issues are addressed and rectified up front.

Research

The auditor needs to research many areas prior to an audit, including:
▪ The organizational policy, procedural framework, and any standards and implementation guidelines used
▪ The organization's mission statement
▪ Industry best practice guidelines
▪ Legislation, regulations, or standards that apply to the organization
▪ Audit frameworks and guidelines, including generic checklists and system specific standards and checklists from organizations such as CIS, SANS, NIST, DISA, and others
▪ Internal knowledge within the organization
Research is generally one of the more time-consuming aspects of the audit. Successfully planning the audit in creating the checklist and scope prior to commencement will save time. Many people skimp on research time, believing they can make it up during the audit. This is a fallacy. Treat an audit like a project. Although the scope may change, there needs to be reasons for this change and it needs to be agreed and documented. The best way to ensure this will occur is to formalize the process, and the best way to do so is to start by researching the audit.
Even when you're auditing the same systems, research is critical. If you come back six months or a year later, there will be additional vulnerabilities, frameworks may have changed, policies could be updated, legislation could come into effect, and many other constraints that affect the system could now apply. A common mistake in audits is to assume nothing has changed and rerun the audit using a prior scope and checklist without reviewing and updating it where needed.
The research stage provides all the material for our “How To” guidelines. Each time an audit is conducted, this material should be saved. Although it needs to be updated every time an audit occurs, not all the material will change, and in fact, much of what we have done will also apply to other systems within an organization. Citing references also provides authority. Psychologically, people react to authority, and the addition of external references makes it more likely that the audit will be accepted and fewer scope changes will occur.

Planning Scope

Planning the scope of an audit needs to be a collaborative effort, involving the audit team, management, and the system or process owner. Additionally, technical experts and other interested parties may also need to be involved.
The purpose of the audit will help us define the scope—“the why” of the audit. Generally, it is necessary to start with the purpose of the audit and refine it during the research phase as additional information becomes known. Working from the purpose of the audit (such as the need to become compliant to a regulatory standard such as the PCI-DSS for payment card processing), research will lead to a definition of the systems that need to be checked, the timeframe, and the standards that need to be met.
With the purpose and research together, scope can be planned with various milestones and completion stages. The goal of the scoping exercise is to get a basic scope plan together before taking it to management. There are likely to be changes when the scope is initially given to management, most of which will be rectified based on agreement. On the other hand, obtaining agreement on scope before doing additional research that leads to a change in scope and subsequent management re-approval makes the auditor or audit team appear incompetent.
Always ensure that you have researched and fully documented your scope before taking it to management for approval. Including a Gantt chart (see Figure 4.1) with the scope also makes it look like you have put more effort into the planning. It is generally unlikely that management will scrutinize the Gantt chart in any detail, but the simple fact that you have included it makes it more likely that the scope will be accepted, as it demonstrates forethought.
B9781597492669000047/gr1.jpg is missing
Figure 4.1
An Audit Is a Project

Audit Strategy

Research so far has provided the scope of our audit and hence the “what” of our audit. Now we need to think about the “how.” In the research, we covered many of the potentials for determining how we will conduct an audit, so now we have to choose which ones to use.
When creating an audit strategy, our aim is to produce the most effective means of achieving our purpose.
Categories of audit strategy include:
▪ System baselining
▪ Reviewing compliance
▪ Direct comparisons of systems
▪ Assessment and review
▪ Snapshots and sampling
Each of these is detailed further in later chapters.

Defining the “How”

Defining how we will conduct an audit is a component of audit planning. First, we need to determine the information we need to gather. Next, we need to determine the best tools and processes to gather this information, and how we will measure the various metrics we wish to collect. Auditing is not just about a Boolean test, meaning that we are seeking more than a true/false or pass/fail outcome. We also want to measure how well we did or how poorly we performed.
Many implementation guides provide advice on tools that can be used to achieve the results we seek. In subsequent sections of this book, we detail a number of tools that may be used to both gather information and measure it through collected metrics.

Scope Also Covers Time

Audits should be treated as a project. Ensure that you have accounted for time and maintain metrics to report on time usage. Following an audit, these metrics can be used to see where overruns occurred and determine if inefficiencies exist. There are a number of reasons for this other than just budgeting, one of which is the ability to audit the audit. We can baseline the audit process itself and use these metrics to improve the process and aid in our determination problem areas.
In the event a particular phase or audit test takes far longer in one system or department within an organization, we can use the metrics to help point this problem out. This also provides ammunition if we need to go to management to solve the problem.
The old adage that “time is money” is true in audit and compliance just as much as any other area of business. The more efficiently we run our audit program, the more effective it will be. This does not mean that we run our testing as quickly as possible instead of as efficiently as possible; doing so would not give us the results we need. Similarly, if we spend too much time auditing a system seeking perfection, we will leave little or no time to audit any other systems.
Some aspects of time you need to consider include:
▪ How long the audit will take
▪ How long it will take to rectify major and minor problems
▪ How long before we issue the report and how long it be with management before we meet with them
▪ How much time it takes to run a test
▪ How much time we take away from other people in the organization.
Time comes with a cost. When interviewing or working with others such a system administrators, we have to remember that we are taking their time—this is a cost. One of the reasons for collecting metrics about the audit is to be able to assess the real cost of conducting the audit. A further benefit is that this information may be used to justify the purchase or inclusion of commercial automated tools.
The cost of having a system administrator run a particular test several times a year to validate a control can be significant. For example, if the system administrator spends 100 hours a year running particular control tests and is paid $175 per hour, including benefits and office costs, the control test will cost the organization at least $17,500. If the job is particularly boring or undesirable, the cost may be higher because of staff turnover. If the time to conduct these tests was cut to 40 hours per year with the purchase of a tool that cost $6,000, we have an initial savings of $11,500 with potentially greater savings in future years.

Summary

Planning is one of the most critical stages of any audit. Good planning results in good scope definitions and raises awareness about key issues. When you are examining or evaluating information, remember to analyze, interpret, and document information to support your findings. Treat your object as a project, and as the project owner, you are responsible for collecting metrics about the costs, time, personnel, and so on. Remember time is money.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.19.162