10
Information Systems Security Review (ISR) A Brief Overview Maze & Associates Instructor: Donald E. Hester CISSP, MCSE, Security+, CTT+

Information Systems Security Review (ISR) 2003

Embed Size (px)

DESCRIPTION

Overview of Maze & Associates ISR process for financial audits, 2003.

Citation preview

Page 1: Information Systems Security Review (ISR) 2003

Information Systems Security Review (ISR)A Brief Overview

Maze & Associates

Instructor:Donald E. HesterCISSP, MCSE, Security+, CTT+

Page 2: Information Systems Security Review (ISR) 2003

Everyone has a job in Security

There is a misconception that security is a job for the Experts or the security professionals.

Everyone plays an important role in security Security should be a part of everyone’s job

description History comes from accountants and military

– Auditors

– Network Admins

– Business Managers

Page 3: Information Systems Security Review (ISR) 2003

Part 1: Objectives of IS Security

The Confidentiality of Data The Integrity of Data The Availability of Data

C.I.A.

Page 4: Information Systems Security Review (ISR) 2003

Basic Security Triad As more and more informationbecomes available electronically, IS security will become more and more important.

Page 5: Information Systems Security Review (ISR) 2003

Business Need for Security

Each business model requires emphasis on different security objectives.

A national defense system will place the greatest emphasis on confidentiality.

A bank has a greater need for integrity. An emergency medical system will

emphasize availability.

Page 6: Information Systems Security Review (ISR) 2003

Part 2: Areas of Security

Page 7: Information Systems Security Review (ISR) 2003

Part 3: ISR Sources

Legal and Regulatory Sources NIST - National Institute of Standards and

Technology ISO - International Standards Organization RFCs – Request for Comments Industry Standards Yellow Book SAS 94

Page 8: Information Systems Security Review (ISR) 2003

Part 4: ISR Scope Limited Scope

– Not a full risk assessment– Review not an Audit– Based on information provided by client

Benefits include– Gaining better understanding of FS environment– Raise awareness about controls– Highlight managements responsibilities– Uncover major risks to Financial data– Raise awareness about regulatory requirements– Helped clients improve security – Dispel client myth that everything is public knowledge

Page 9: Information Systems Security Review (ISR) 2003

Part 5: Parts of ISR

Sec 1: Statistics Sec 2: Disaster Plans Sec 3A: Security Management Sec 3B: Physical Security Sec 3C: Personnel Security Sec 3D: Application Security Sec 3E: Network Security Sec 4: Open Questions

Page 10: Information Systems Security Review (ISR) 2003

Review ISR

Review Sections of ISR Review Internal Memo Questions