SlideShare a Scribd company logo
1 of 29
IT Security Audit of Information Systems M. Imran Ameerally Project Manager IT Security Unit Ministry of Information and  Communication Technology 22 April 2010
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
About IT Security Unit (I) ,[object Object],[object Object],[object Object],[object Object],[object Object]
About IT Security Unit (II) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Audits Conducted (I) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Audits Conducted (II) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Audits Conducted (III) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Audits Conducted (IV) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Companies Division Audit ,[object Object],[object Object],[object Object],[object Object]
Audit Tasks (I) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Audit Tasks (II) ,[object Object],[object Object],[object Object],[object Object]
Audit Tasks (III) ,[object Object],[object Object],[object Object],[object Object]
Audit Tasks (IV) ,[object Object],[object Object],[object Object],[object Object]
Audit Tasks (V) ,[object Object],[object Object],[object Object],[object Object]
Audit Deliverables (I) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Audit Deliverables (II) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Audit Deliverables (III) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Audit Deliverables (IV) ,[object Object],[object Object],[object Object],[object Object]
Audit Deliverables (V) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audit Deliverables (VI) ,[object Object],[object Object],[object Object]
Audit Deliverables (VII) ,[object Object],[object Object],[object Object]
Overview of Audit Findings (I) ,[object Object],[object Object],[object Object],[object Object],Severity Rating Basis of giving severity rating Recommended timeframe to fix High Privileged access or severely impact system operation Immediate Medium Hacker may gain limited user or network level access Within 1 month Low Minimal possibility for hacker to again access to resources Within 6 months
Overview of Audit Findings (II) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Overview of Audit Findings (III) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of the Audit (I) ,[object Object],[object Object],[object Object]
Benefits of the Audit (II) ,[object Object],[object Object],[object Object]
Benefits of the Audit (III) ,[object Object],[object Object],[object Object],[object Object]
Benefits of the Audit (IV) ,[object Object],[object Object],[object Object],[object Object]
[object Object]

More Related Content

What's hot

IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
genetics
 
Information System audit
Information System auditInformation System audit
Information System audit
Pratapchandra
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
Cyril Soeri
 

What's hot (20)

Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
Security audit
Security auditSecurity audit
Security audit
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
HITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
 
Information System audit
Information System auditInformation System audit
Information System audit
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 
Patch Management Best Practices
Patch Management Best Practices Patch Management Best Practices
Patch Management Best Practices
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
The Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
Evolving role of internal auditing function
Evolving role of internal auditing functionEvolving role of internal auditing function
Evolving role of internal auditing function
 

Similar to 5.4 it security audit (mauritius)

17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
SARJERAO Sarju
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 

Similar to 5.4 it security audit (mauritius) (20)

Navigating Process Safety Audits in the Oil and Gas Industry
Navigating Process Safety Audits in the Oil and Gas IndustryNavigating Process Safety Audits in the Oil and Gas Industry
Navigating Process Safety Audits in the Oil and Gas Industry
 
The optimization method of the integrated management systems audit program v2+
The optimization method of the integrated management systems audit program v2+The optimization method of the integrated management systems audit program v2+
The optimization method of the integrated management systems audit program v2+
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
It Audit
It AuditIt Audit
It Audit
 
Domain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and TestingDomain 6 - Security Assessment and Testing
Domain 6 - Security Assessment and Testing
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...Security Level Analysis of Academic Information Systems Based on Standard ISO...
Security Level Analysis of Academic Information Systems Based on Standard ISO...
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
CQI-IRCA 27001:2013 Lead Auditor Course
CQI-IRCA 27001:2013  Lead Auditor Course CQI-IRCA 27001:2013  Lead Auditor Course
CQI-IRCA 27001:2013 Lead Auditor Course
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
 
ONLINE VOTING SYSTEM.docx
ONLINE VOTING SYSTEM.docxONLINE VOTING SYSTEM.docx
ONLINE VOTING SYSTEM.docx
 
Security-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptxSecurity-Monitoring-and-Improvement.pptx
Security-Monitoring-and-Improvement.pptx
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Practical IT auditing
Practical IT auditingPractical IT auditing
Practical IT auditing
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 

More from Corporate Registers Forum

More from Corporate Registers Forum (20)

South Africa - Digital AFS Reporting via xBRL
South Africa - Digital AFS Reporting via xBRLSouth Africa - Digital AFS Reporting via xBRL
South Africa - Digital AFS Reporting via xBRL
 
United Kingdom - Companies House Response to the Covid-19 Pandemic
United Kingdom - Companies House Response to the Covid-19 PandemicUnited Kingdom - Companies House Response to the Covid-19 Pandemic
United Kingdom - Companies House Response to the Covid-19 Pandemic
 
Slovenia - AJPES Digitisation a more transparent non possessory lien rights r...
Slovenia - AJPES Digitisation a more transparent non possessory lien rights r...Slovenia - AJPES Digitisation a more transparent non possessory lien rights r...
Slovenia - AJPES Digitisation a more transparent non possessory lien rights r...
 
Singapore - Seamless Filing Project
Singapore - Seamless Filing ProjectSingapore - Seamless Filing Project
Singapore - Seamless Filing Project
 
Azerbaijan - State Tax Service State Registration with Single Procedure
Azerbaijan - State Tax Service State Registration with Single ProcedureAzerbaijan - State Tax Service State Registration with Single Procedure
Azerbaijan - State Tax Service State Registration with Single Procedure
 
North Macedonia - Joint Platform for Starting a Business
North Macedonia  -  Joint Platform for Starting a BusinessNorth Macedonia  -  Joint Platform for Starting a Business
North Macedonia - Joint Platform for Starting a Business
 
Ultimate Beneficial Ownership Register - Belgium
Ultimate Beneficial Ownership Register - BelgiumUltimate Beneficial Ownership Register - Belgium
Ultimate Beneficial Ownership Register - Belgium
 
CRF 2019 Work Session 4 intro and conclusions
CRF 2019 Work Session 4  intro and conclusionsCRF 2019 Work Session 4  intro and conclusions
CRF 2019 Work Session 4 intro and conclusions
 
Ws6 panel challenges in modern registry management
Ws6 panel   challenges in modern registry managementWs6 panel   challenges in modern registry management
Ws6 panel challenges in modern registry management
 
Business Registration Service of Kenya
Business Registration Service of KenyaBusiness Registration Service of Kenya
Business Registration Service of Kenya
 
Introduction to EBRA Conference June 2019
Introduction to EBRA Conference June 2019Introduction to EBRA Conference June 2019
Introduction to EBRA Conference June 2019
 
Commercial Registers Economic & Digital Infrastructure
Commercial Registers  Economic & Digital InfrastructureCommercial Registers  Economic & Digital Infrastructure
Commercial Registers Economic & Digital Infrastructure
 
New Zealand - Data use and frameworks.
New Zealand - Data use and frameworks.New Zealand - Data use and frameworks.
New Zealand - Data use and frameworks.
 
Singapore. ACRA's Data Services Journey.
Singapore.  ACRA's Data Services Journey.Singapore.  ACRA's Data Services Journey.
Singapore. ACRA's Data Services Journey.
 
Data and Users. The Experience of the IBFC in Labuan.
Data and Users.  The Experience of the IBFC in Labuan.Data and Users.  The Experience of the IBFC in Labuan.
Data and Users. The Experience of the IBFC in Labuan.
 
Data Usage from Business Registries
Data Usage from Business RegistriesData Usage from Business Registries
Data Usage from Business Registries
 
Supporting a new iXBRL mandate (CIPC)
Supporting a new iXBRL mandate (CIPC)Supporting a new iXBRL mandate (CIPC)
Supporting a new iXBRL mandate (CIPC)
 
South Africa - CIPC XBRL Project Journey and Update
South Africa - CIPC XBRL Project Journey and UpdateSouth Africa - CIPC XBRL Project Journey and Update
South Africa - CIPC XBRL Project Journey and Update
 
Business Registers - A European Perspective
Business Registers - A European PerspectiveBusiness Registers - A European Perspective
Business Registers - A European Perspective
 
Challenges in Modern Registry Management - US persceptive.
Challenges in Modern Registry Management - US persceptive. Challenges in Modern Registry Management - US persceptive.
Challenges in Modern Registry Management - US persceptive.
 

Recently uploaded

Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
seri bangash
 
What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...
AnaBeatriz125525
 
ch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.pptch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.ppt
ZawadAmin2
 

Recently uploaded (20)

Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
 
Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed Guide
 
HAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsHAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future Prospects
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
Hyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings releaseHyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings release
 
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
 
The Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdfThe Truth About Dinesh Bafna's Situation.pdf
The Truth About Dinesh Bafna's Situation.pdf
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybrid
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?
 
Stages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerStages of Startup Funding - An Explainer
Stages of Startup Funding - An Explainer
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
 
What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...
 
tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)
 
ch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.pptch 2 asset classes and financial instrument.ppt
ch 2 asset classes and financial instrument.ppt
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
Making Sense of Tactile Indicators: A User-Friendly Guide
Making Sense of Tactile Indicators: A User-Friendly GuideMaking Sense of Tactile Indicators: A User-Friendly Guide
Making Sense of Tactile Indicators: A User-Friendly Guide
 
Your Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxYour Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptx
 

5.4 it security audit (mauritius)

  • 1. IT Security Audit of Information Systems M. Imran Ameerally Project Manager IT Security Unit Ministry of Information and Communication Technology 22 April 2010
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.