SlideShare a Scribd company logo
1 of 52
Mobilizing The PCI Resistance:Lessons Learned From Previous Wars (SOX-404) Gene Kim, CISACTO, Tripwire@realgenekim, http://www.realgenekim.me#BSidesLV 2010
Problem Definition Success of any PCI DSS compliance initiative is very dependent on accurate definition and scoping of the Cardholder Data Environment.  There is a wide variance in practice, experience and guidance in merchant and QSA community. These contribute to scoping errors that result in: Overly narrow scope that jeopardizes cardholder data Overly broad scope that adds unnecessary cost and effort for compliance  Decreased confidence in and frustration with the PCI DSS standard
What This Really Means Incredible amount of discontent and growing disenchantment with PCI DSS Complaints that DSS is too specific or too vague Like Michelle Klinger, I have a love/hate relationship with PCI DSS The reach of PCI DSS is awesomely breathtaking, and is relevant to all PII But in the worst case, it's a total waste of time, at enormous cost to the organization
Agenda Describe the problems around SOX-404  What we did about it at the Institute of Internal Auditors The GAIT concepts, politics, tools and outcomes Show how we can use this as a model to change the state of the practice around PCI DSS Share with you the best formulation of the plan I have Get your help improving the plan And ideally… Share my biggest a-ha moments the GAIT experience Excite you enough to do something about it Tell you some interesting stories
Holy Crap. This Looks Familiar!
The Problem The IT portions of SOX-404 compliance has frustrated auditors and management Significant key controls reside inside IT and IT processes as well as in the business processes No well-established guidance for scoping IT work results in inconsistency and the process being overly subjective Sometimes result in overly broad scope and excessive testing costs Significant risks to financial assertions may be left unaddressed Suboptimal use of scarce resources
Why Is There A Problem? No clear guidance exists to define how IT processes and activities can invalidate financial application processing or financial assertions COSO provides an accepted construct for defining overall internal control objectives, assertions, risks and controls, but its application to the IT environmet is ambiguous COBIT doesn’t provide a clear mechanism to scope IT processes and controls to the achievement of specific internal control objectives (e.g., COSO objective for internal control over financial reporting) Something else is needed…
“OMG. 952 IT Deficiencies?!?”
Vision: Create Equivalence to Nine Firm Document on IT Control Exceptions GAIT takes the approach used in the nine firm document.GAIT represents the upfront scoping exercise to appropriately identify the IT controls work relevant to overall internal controls objectives Chart 3: Evaluating Information Technology General Control (ITGC) Deficiencies, “A Framework for Evaluating Control Exceptions and Deficiencies” (December 20, 2004)
What were/are people worried about? Holy cow!!! Enron wasn’t caused by a DBA. So, why are the auditors digging here?? --gk IT controls dominate the deficiencies, significant deficiencies, and material weaknesses identified through the S-O 404 assessment. The estimated percentage of deficiencies identified show IT controls accounting for the most (34 percent), followed distantly by revenue (13 percent), procure to pay (10 percent), and fixed assets (10 percent).  The estimated percentage of significant deficiencies identified again shows IT controls leading the way (23 percent), followed by financial reporting and close (14 percent), procure to pay (13 percent), and revenue (12 percent).   The estimated percentages of material weaknesses identified include IT controls (27 percent), revenue (18 percent), taxes (11 percent), and financial reporting and close (10 percent).   It is important to note that the results presented here are based on self-reporting by the companies that participated in the survey. Conclusions may be affected by the differing methods companies use to report on various elements of Sarbanes-Oxley compliance.
February 2006 Corporate Finance 12 PROBLEMS & CHALLENGES Again, holy cow!!! If the risk isn’t in IT, then auditors are not only generating efforts, but finding deficiencies that don’t matters… --gk ,[object Object]
 Compliance effort.
 Deficiencies.
 Non Finance Apps.
Financial Statement Impact:
 Indirect linkage
 Least likely impact
Business & IT integration.,[object Object]
Thought Experiment Auditors vs. Management We can agree that there are two extremes in spectrum of financial reporting risk eBay auction settlement business process Grain elevators Extremes are easy… Middle is hard…
PCI Scoping Exercises (Show Your Work!) Question 1:  Is the Cardholder Data Environment (CDE) equivalent to the PCI Scope of Assessment? Question 2: Is a domain controller (e.g., Windows Active Directory server) that is being relied upon by CDE applications for authentication and security services in the PCI Scope Of Assessment? Question 3: How about a domain controller (e.g., Windows Active Directory server) that is not relied upon by any CDE applications? Question 4: Is a network attached stapler that happens to be on the same network segment as a CDE system component always also in the CDE? Question 5: Does it matter if a workstation that a customer service representative uses a thin- or thick-client? Question 6: When should it be acceptable that if a virtualization hypervisor hosting  a production application in the CDE be also able to host another VM without it being part of the CDE, as well? Question 7: If you have a domain controller that is not in the CDE, but in the scope of PCI assessment, is a print server on the same network segment as that domain controller also in the scope of PCI assessment? Bonus Exercise: For each of the questions where you answered "in scope of the PCI assessment," describe a strategy to contain the scope, such that systems connected to that system are not in scope.  (See Michelle Klinger's great post on the "PCI Contagion Dilemma.")
SOX-404 Value Network: Primary Constituencies
What Does PCI Value Network Look Like?
Language Is Often An Obstacle In Newton’s time, there were not concrete terms for several critical concepts: Force, acceleration, mass, inertia In the following slide, note how difficult it was for Newton to frame the “three laws of motion” without these concepts…
Early Drafts Of Three Laws Of Motion 1.  If a quantity once move it will never rest unless hindered by some externall cause. 2.  A quantity will always move on in the same straight line (not changing the determination nor celerity of its motion) unless some externall cause divert it. 3.  There is exactly so much required and no more force to reduce a body to rest as there was to put it upon motion. Axiom 100: A body once moved will always keep the same celerity, quantity and determination of its motion Axiom 103: ...as the body (a) is to the body (b0), so must the power of efficacy vigor strength or virtue of the cause which begets the same quantity of velocity Source: Isaac Newton, James Gleick.
Benchmarks Pythagorean theorem: 24 words Archimedes' Principle: 67 words Newton’s Three Laws Of Motion: 91 words The 10 Commandments: 179 words GAIT Proposed Principles v3.0: 168 words The Gettysburg Address: 286 words The Declaration of Independence: 1,300 words  GAIT Principles v1.3:    6,856 words  GAIT Methodology v2.2: 11,348 words The US Government regulations on the sale of cabbage: 26,911 words
Solution: GAIT… Released in Feb 2007, Establishes four principles that Defines the relevance of IT infrastructure elements to financial reporting integrity Define the three types of IT processes that can affect them: change management and systems development, operations and security Defines an end-to-end process view of these three processes Defines an approach to defining objectives and key controls within those three processes Provides a methodology and thinking process that continues the top down, risk based approach started in AS2 to scope IT general controls Provides a common context for management and auditors to support and test management’s assessment that the necessary IT controls exist and are effective Initial target is internal control objectives for financial reporting, but should extend to operating effectiveness and complying with laws and regulations (as defined by COSO)
GAIT Principle #1 The only IT infrastructure elements (e.g., databases, operating systems, networks) relevant to ITGC assessment are those that support financially-significant applications and data. (“What are the relevant IT infrastructure elements?”)
GAIT Principle #2 The IT processes primarily relevant to ITGC assessment are those that directly impact the integrity of financially-significant applications and data: Change management and systems development: the processes around developing, implementing, and maintaining financially significant applications and supporting IT infrastructure  Operations management: the processes around managing the integrity of production data and program execution  Security management: the processes around limiting access to information assets  (“What are the relevant end-to-end IT processes?”)
GAIT Principle #3 Implications to the reliability of financially-significant applications and data, including controls, are based upon the achievement or failure of IT process objectives, not the design and operating effectiveness of the individual controls within those processes.  (“What are the relevant objectives of those IT processes?  In other words, we shouldn’t get carried away when reaching a conclusion when testing a control.”)
GAIT Principle #4 The basis for identifying key controls in the three IT processes is based on: Inherent risk of not achieving the IT process objectives IT process risk indicators (“How do we select key controls within those IT processes?”)
GAIT Scoping: Step By Step AS2 begins here GAIT Starts Here
GAIT Tools Scenarios Online auction settlement process (high IT) Rebate approval process (med IT) Option expensing process (low IT) Ask Dr. GAIT
GAIT Evolution GAIT-R for Business Risk
Conclusions and Lessons Learned, Continued Improved audit comment wording helps to connect to things management cares about: “We noted poor change control procedures and were unable to obtain comfort that all changes were authorized and tested as required”     --  vs. --  “Poor change control practices introduced the risk of unauthorized or untested changes to key data such as annual threshold amounts for toxic chemical releases.  Given the level of precision applied to reviewing the final report downstream, it is unlikely management would detect such errors.  Our testing disclosed numerous “break/fix” changes had been made to code or data without supervisory review and approval or notifying the users.”
GAIT Evolution Elements of GAIT was incorporated into PCAOB AS-5 GAIT-R for Business Risk To me, it's the first really well thought out way of linking IT to any COSO internal control objective Unlike ITIL, COBIT: it helps focus on what matters Which is very much unlike PCI… The Integrated Auditing Project (“Magic Glasses”)
Wait, You’re Lowering The PCI Bar! Until you get scoping right, you can't raise the bar Unless you correctly identify the scope of PCI assessment correctly, any work on the controls is potentially wasted
My PCI Mission And Crusade Create guidance to be able to scope correctly Enable a risk based way to not only scope, but to evaluate controls Prioritized PCI DSS is a disappointment What controls for the PCI Scope of Assessment? First, to earn the right to do all of this, we must enable correct scoping first
Participants Leads Kent Fox (Intermountain Healthcare) Brandon Green (T-Mobile) Gretchen Forsyth (Southwest Airlines) Mike Dahn (Verizon) Tabitha Greiner (Verizon) Ian White (Verizon) James Summers (Nike)
Extend Concepts In PCI DSS Page 4: DSS 1.2: “System components” are defined as any network component, server, or application that is included in or connected to the cardholder data environment.
Before vs. After Before: Prior to creating a structured method, we needed over 40 hours to come to a scoping conclusion. After: With the model under development, we generated consensus on 15 scoping conclusions in less than 2 hours.
Proposed Deliverables Define and deliver the following, in a manner that clarifies and supports the spirit and intent of protecting cardholder data: Scoping principles A structured scoping methodology A library of scoping scenarios demonstrating its usage for educational and clarification purposes Create useful tools and guidance that will assist in the scoping effort for both merchants and QSAs.
Decision Tree
Proposed Timeline Submit a set of guidance to the PCI SSC for approval before the PCI Community meeting in September 2010 Desired outcome: PCI SSC and Board of Advisors agree with problem and its significant, have confidence in the approach Assign a staff member to validate guidance and integrate it into the PCI practice
Also TODO Identify attributes of effective segmentation to contain PCI contagion Encrypted PIN device Citrix Thin Client Virtualization Where necessary, fix the words, "segment", "connected to,"
Next Up: Scoping Category vs. Control Consideration ????? ControlConsiderations
Next: Alternate Control Procedures Create a framework to evaluate alternate control procedures -- for that you need risk Right now, PCI is 220+ control activities: create the framework to state what the control objectives are, so you can evaluate whether the objective is being met COSO construct Objective, risk, control objective THEN control activities and controls!
Top A-Ha Moments Auditors rock: they have a comprehensive vocabulary that we need – otherwise, we’re stuck in Flatland We need more people who can see the sphere Auditors have seen the dead people longer than anyone These auditors will eventually go crazy, and need friends After a long detour into IT operations and audit, I’m returning to information security, in the guise of compliance
We Can Change The State Of The Practice It’s an important problem There are models we can replicate Do you want to get involved?
My New Twins
My Last Day At Tripwire
What I’m Working On 50% with my family 50% on When IT Fails: The Novel Figure out the methods, procedures and tools needed to enable the transformation Collaborate with communities of practice to help mobilize these transformations BSides, DevOps, ITIL, IIA, SEI

More Related Content

What's hot

Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceCitrix
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementRiwut Libinuko
 
Logicalis Data Center Solutions
Logicalis Data Center SolutionsLogicalis Data Center Solutions
Logicalis Data Center SolutionsLogicalisUS
 
Best-Practices-Web-Usability
Best-Practices-Web-UsabilityBest-Practices-Web-Usability
Best-Practices-Web-UsabilityLarry Wilson
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365Don Daubert
 
Best Practices: Data Virtualization Perspectives and Best Practices
Best Practices: Data Virtualization Perspectives and Best PracticesBest Practices: Data Virtualization Perspectives and Best Practices
Best Practices: Data Virtualization Perspectives and Best PracticesDenodo
 
Cryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching EngineCryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching EngineMassimo Bertaccini
 
Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for StorageSymantec
 
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationMaximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationDenodo
 
Myths About Cloud Storage In Healthcare
Myths About Cloud Storage In HealthcareMyths About Cloud Storage In Healthcare
Myths About Cloud Storage In HealthcareTyrone Systems
 
Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationDenodo
 
ZL Unified Archive 2015
ZL Unified Archive 2015ZL Unified Archive 2015
ZL Unified Archive 2015Des McHugh
 

What's hot (16)

Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
Logicalis Data Center Solutions
Logicalis Data Center SolutionsLogicalis Data Center Solutions
Logicalis Data Center Solutions
 
Best-Practices-Web-Usability
Best-Practices-Web-UsabilityBest-Practices-Web-Usability
Best-Practices-Web-Usability
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
Best Practices: Data Virtualization Perspectives and Best Practices
Best Practices: Data Virtualization Perspectives and Best PracticesBest Practices: Data Virtualization Perspectives and Best Practices
Best Practices: Data Virtualization Perspectives and Best Practices
 
Cryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching EngineCryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching Engine
 
Symantec Data Insight for Storage
Symantec Data Insight for StorageSymantec Data Insight for Storage
Symantec Data Insight for Storage
 
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationMaximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
 
Myths About Cloud Storage In Healthcare
Myths About Cloud Storage In HealthcareMyths About Cloud Storage In Healthcare
Myths About Cloud Storage In Healthcare
 
Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013Symantec Data Insight 4.0 July 2013
Symantec Data Insight 4.0 July 2013
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data Virtualization
 
ZL Unified Archive 2015
ZL Unified Archive 2015ZL Unified Archive 2015
ZL Unified Archive 2015
 

Viewers also liked

How to do pci compliance in google apps
How to do pci compliance in google appsHow to do pci compliance in google apps
How to do pci compliance in google appsSysCloud
 
Bailey advertisement
Bailey advertisementBailey advertisement
Bailey advertisementbbkett
 
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aGene Kim
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksGene Kim
 
Jake yoon세미나
Jake yoon세미나Jake yoon세미나
Jake yoon세미나Jake Yoon
 
Africrans pwr point for schools
Africrans pwr point for schoolsAfricrans pwr point for schools
Africrans pwr point for schoolsg4husky
 
Cat 250 slideshare assignment
Cat 250 slideshare assignmentCat 250 slideshare assignment
Cat 250 slideshare assignmentrdsmith86
 
Speechless Brochure
Speechless BrochureSpeechless Brochure
Speechless Brochuresharmuys
 
ICF Conference 2012 - Host Intro Speech
ICF Conference 2012 - Host Intro SpeechICF Conference 2012 - Host Intro Speech
ICF Conference 2012 - Host Intro SpeechPaul Dumitru
 
101110-Presentation ICSadviseurs-Building better schools conference
101110-Presentation ICSadviseurs-Building better schools conference101110-Presentation ICSadviseurs-Building better schools conference
101110-Presentation ICSadviseurs-Building better schools conferenceHidde Benedictus
 
Tnt Post E Commerce
Tnt Post E CommerceTnt Post E Commerce
Tnt Post E Commercevanderkrogt
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circularSusana Valls Andreu
 
Love me, fuseli.illustrated.final
Love me, fuseli.illustrated.finalLove me, fuseli.illustrated.final
Love me, fuseli.illustrated.finalJ. E. Freed
 
GAIT value network 2005 06
GAIT value network 2005 06GAIT value network 2005 06
GAIT value network 2005 06Gene Kim
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circularSusana Valls Andreu
 
블로그의이해
블로그의이해블로그의이해
블로그의이해Chaenam, Jun
 

Viewers also liked (20)

How to do pci compliance in google apps
How to do pci compliance in google appsHow to do pci compliance in google apps
How to do pci compliance in google apps
 
Bailey advertisement
Bailey advertisementBailey advertisement
Bailey advertisement
 
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6aSecureWorld   Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
SecureWorld Kim - Infosec at Ludicrous Speeds - Rugged DevOps 6a
 
United2012 Rugged DevOps Rocks
United2012 Rugged DevOps RocksUnited2012 Rugged DevOps Rocks
United2012 Rugged DevOps Rocks
 
Jake yoon세미나
Jake yoon세미나Jake yoon세미나
Jake yoon세미나
 
Maquines simples
Maquines simplesMaquines simples
Maquines simples
 
Africrans pwr point for schools
Africrans pwr point for schoolsAfricrans pwr point for schools
Africrans pwr point for schools
 
Cat 250 slideshare assignment
Cat 250 slideshare assignmentCat 250 slideshare assignment
Cat 250 slideshare assignment
 
Speechless Brochure
Speechless BrochureSpeechless Brochure
Speechless Brochure
 
ICF Conference 2012 - Host Intro Speech
ICF Conference 2012 - Host Intro SpeechICF Conference 2012 - Host Intro Speech
ICF Conference 2012 - Host Intro Speech
 
101110-Presentation ICSadviseurs-Building better schools conference
101110-Presentation ICSadviseurs-Building better schools conference101110-Presentation ICSadviseurs-Building better schools conference
101110-Presentation ICSadviseurs-Building better schools conference
 
Tnt Post E Commerce
Tnt Post E CommerceTnt Post E Commerce
Tnt Post E Commerce
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circular
 
Tecnologias y sistemas de informacion
Tecnologias y sistemas de informacionTecnologias y sistemas de informacion
Tecnologias y sistemas de informacion
 
Love me, fuseli.illustrated.final
Love me, fuseli.illustrated.finalLove me, fuseli.illustrated.final
Love me, fuseli.illustrated.final
 
Exposion equipo3 tema 4
Exposion equipo3 tema 4Exposion equipo3 tema 4
Exposion equipo3 tema 4
 
GAIT value network 2005 06
GAIT value network 2005 06GAIT value network 2005 06
GAIT value network 2005 06
 
Mecanismes de transmissio circular
Mecanismes de transmissio circularMecanismes de transmissio circular
Mecanismes de transmissio circular
 
블로그의이해
블로그의이해블로그의이해
블로그의이해
 
passU
passUpassU
passU
 

Similar to 2010 07 BSidesLV Mobilizing The PCI Resistance 1c

3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3aGene Kim
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 
Building Information System
Building Information SystemBuilding Information System
Building Information SystemRabia Jabeen
 
Itpi metricon 0906a final
Itpi metricon 0906a finalItpi metricon 0906a final
Itpi metricon 0906a finalGene Kim
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
 
SDLC Control
SDLC ControlSDLC Control
SDLC Controlbenji00
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft CorpAntoinette Williams
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004Donald E. Hester
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
Iiaic08 power point cs2-3_track_regulatory session v3
Iiaic08 power point cs2-3_track_regulatory session v3Iiaic08 power point cs2-3_track_regulatory session v3
Iiaic08 power point cs2-3_track_regulatory session v3Gene Kim
 
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxRunning Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxjeffsrosalyn
 
Read the article Security Controls that Work by Dwayne Melancon .pdf
Read the article Security Controls that Work by Dwayne Melancon .pdfRead the article Security Controls that Work by Dwayne Melancon .pdf
Read the article Security Controls that Work by Dwayne Melancon .pdfsales113
 
Read the article Security Controls that Work by Dwayne Melancon.pdf
Read the article  Security Controls that Work by Dwayne Melancon.pdfRead the article  Security Controls that Work by Dwayne Melancon.pdf
Read the article Security Controls that Work by Dwayne Melancon.pdfsales113
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceBill Lisse
 
Health Information Governance Analysis
Health Information Governance AnalysisHealth Information Governance Analysis
Health Information Governance AnalysisKaty Allen
 
Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014Tami Flowers
 

Similar to 2010 07 BSidesLV Mobilizing The PCI Resistance 1c (20)

3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
 
CISSPills #3.02
CISSPills #3.02CISSPills #3.02
CISSPills #3.02
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
 
Itpi metricon 0906a final
Itpi metricon 0906a finalItpi metricon 0906a final
Itpi metricon 0906a final
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
SDLC Control
SDLC ControlSDLC Control
SDLC Control
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Iiaic08 power point cs2-3_track_regulatory session v3
Iiaic08 power point cs2-3_track_regulatory session v3Iiaic08 power point cs2-3_track_regulatory session v3
Iiaic08 power point cs2-3_track_regulatory session v3
 
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxRunning Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
 
Read the article Security Controls that Work by Dwayne Melancon .pdf
Read the article Security Controls that Work by Dwayne Melancon .pdfRead the article Security Controls that Work by Dwayne Melancon .pdf
Read the article Security Controls that Work by Dwayne Melancon .pdf
 
Read the article Security Controls that Work by Dwayne Melancon.pdf
Read the article  Security Controls that Work by Dwayne Melancon.pdfRead the article  Security Controls that Work by Dwayne Melancon.pdf
Read the article Security Controls that Work by Dwayne Melancon.pdf
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT Governance
 
Health Information Governance Analysis
Health Information Governance AnalysisHealth Information Governance Analysis
Health Information Governance Analysis
 
Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014Agile in a highly regulated organization 2014
Agile in a highly regulated organization 2014
 
Khazi Sox A
Khazi Sox AKhazi Sox A
Khazi Sox A
 
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
 

More from Gene Kim

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Gene Kim
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)Gene Kim
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience ReportGene Kim
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...Gene Kim
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)Gene Kim
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was ReleasedGene Kim
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedGene Kim
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesGene Kim
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity ConferenceGene Kim
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?Gene Kim
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!Gene Kim
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?Gene Kim
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsGene Kim
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementGene Kim
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOGene Kim
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns DistilledGene Kim
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKimGene Kim
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Gene Kim
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...Gene Kim
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsGene Kim
 

More from Gene Kim (20)

Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
 
The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)The Unicorn Project and The Five Ideals (Updated Dec 2019)
The Unicorn Project and The Five Ideals (Updated Dec 2019)
 
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
 
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
 
The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)The Unicorn Project and The Five Ideals (older: see notes for newer version)
The Unicorn Project and The Five Ideals (older: see notes for newer version)
 
2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released2019 Top Lessons Learned Since the Phoenix Project Was Released
2019 Top Lessons Learned Since the Phoenix Project Was Released
 
Leading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons LearnedLeading A DevOps Transformation: Lessons Learned
Leading A DevOps Transformation: Lessons Learned
 
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case StudiesKeeping The Auditor Away: DevOps Audit Compliance Case Studies
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
 
2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference2014 State Of DevOps Findings! Velocity Conference
2014 State Of DevOps Findings! Velocity Conference
 
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
 
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
 
How Can We Better Sell DevOps?
How Can We Better Sell DevOps?How Can We Better Sell DevOps?
How Can We Better Sell DevOps?
 
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology OrgsWhy Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
 
Kevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process ImprovementKevin Behr: Integrating Controls and Process Improvement
Kevin Behr: Integrating Controls and Process Improvement
 
SecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFOSecureWorld - Communicating With Your CFO
SecureWorld - Communicating With Your CFO
 
2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled2012 Velocity London: DevOps Patterns Distilled
2012 Velocity London: DevOps Patterns Distilled
 
PuppetConf2012GeneKim
PuppetConf2012GeneKimPuppetConf2012GeneKim
PuppetConf2012GeneKim
 
Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps Infosec at Ludicrous Speeds - Rugged DevOps
Infosec at Ludicrous Speeds - Rugged DevOps
 
When IT Fails The Business Fails...
When IT Fails The Business Fails...When IT Fails The Business Fails...
When IT Fails The Business Fails...
 
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev opsKim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
Kim IT Pro Forum Eugene: IT at Ludicrous Speeds - rugged dev ops
 

Recently uploaded

Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 

Recently uploaded (20)

Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 

2010 07 BSidesLV Mobilizing The PCI Resistance 1c

  • 1. Mobilizing The PCI Resistance:Lessons Learned From Previous Wars (SOX-404) Gene Kim, CISACTO, Tripwire@realgenekim, http://www.realgenekim.me#BSidesLV 2010
  • 2.
  • 3. Problem Definition Success of any PCI DSS compliance initiative is very dependent on accurate definition and scoping of the Cardholder Data Environment. There is a wide variance in practice, experience and guidance in merchant and QSA community. These contribute to scoping errors that result in: Overly narrow scope that jeopardizes cardholder data Overly broad scope that adds unnecessary cost and effort for compliance Decreased confidence in and frustration with the PCI DSS standard
  • 4. What This Really Means Incredible amount of discontent and growing disenchantment with PCI DSS Complaints that DSS is too specific or too vague Like Michelle Klinger, I have a love/hate relationship with PCI DSS The reach of PCI DSS is awesomely breathtaking, and is relevant to all PII But in the worst case, it's a total waste of time, at enormous cost to the organization
  • 5. Agenda Describe the problems around SOX-404 What we did about it at the Institute of Internal Auditors The GAIT concepts, politics, tools and outcomes Show how we can use this as a model to change the state of the practice around PCI DSS Share with you the best formulation of the plan I have Get your help improving the plan And ideally… Share my biggest a-ha moments the GAIT experience Excite you enough to do something about it Tell you some interesting stories
  • 6. Holy Crap. This Looks Familiar!
  • 7. The Problem The IT portions of SOX-404 compliance has frustrated auditors and management Significant key controls reside inside IT and IT processes as well as in the business processes No well-established guidance for scoping IT work results in inconsistency and the process being overly subjective Sometimes result in overly broad scope and excessive testing costs Significant risks to financial assertions may be left unaddressed Suboptimal use of scarce resources
  • 8. Why Is There A Problem? No clear guidance exists to define how IT processes and activities can invalidate financial application processing or financial assertions COSO provides an accepted construct for defining overall internal control objectives, assertions, risks and controls, but its application to the IT environmet is ambiguous COBIT doesn’t provide a clear mechanism to scope IT processes and controls to the achievement of specific internal control objectives (e.g., COSO objective for internal control over financial reporting) Something else is needed…
  • 9. “OMG. 952 IT Deficiencies?!?”
  • 10. Vision: Create Equivalence to Nine Firm Document on IT Control Exceptions GAIT takes the approach used in the nine firm document.GAIT represents the upfront scoping exercise to appropriately identify the IT controls work relevant to overall internal controls objectives Chart 3: Evaluating Information Technology General Control (ITGC) Deficiencies, “A Framework for Evaluating Control Exceptions and Deficiencies” (December 20, 2004)
  • 11. What were/are people worried about? Holy cow!!! Enron wasn’t caused by a DBA. So, why are the auditors digging here?? --gk IT controls dominate the deficiencies, significant deficiencies, and material weaknesses identified through the S-O 404 assessment. The estimated percentage of deficiencies identified show IT controls accounting for the most (34 percent), followed distantly by revenue (13 percent), procure to pay (10 percent), and fixed assets (10 percent).  The estimated percentage of significant deficiencies identified again shows IT controls leading the way (23 percent), followed by financial reporting and close (14 percent), procure to pay (13 percent), and revenue (12 percent).   The estimated percentages of material weaknesses identified include IT controls (27 percent), revenue (18 percent), taxes (11 percent), and financial reporting and close (10 percent).   It is important to note that the results presented here are based on self-reporting by the companies that participated in the survey. Conclusions may be affected by the differing methods companies use to report on various elements of Sarbanes-Oxley compliance.
  • 12.
  • 19.
  • 20. Thought Experiment Auditors vs. Management We can agree that there are two extremes in spectrum of financial reporting risk eBay auction settlement business process Grain elevators Extremes are easy… Middle is hard…
  • 21. PCI Scoping Exercises (Show Your Work!) Question 1: Is the Cardholder Data Environment (CDE) equivalent to the PCI Scope of Assessment? Question 2: Is a domain controller (e.g., Windows Active Directory server) that is being relied upon by CDE applications for authentication and security services in the PCI Scope Of Assessment? Question 3: How about a domain controller (e.g., Windows Active Directory server) that is not relied upon by any CDE applications? Question 4: Is a network attached stapler that happens to be on the same network segment as a CDE system component always also in the CDE? Question 5: Does it matter if a workstation that a customer service representative uses a thin- or thick-client? Question 6: When should it be acceptable that if a virtualization hypervisor hosting a production application in the CDE be also able to host another VM without it being part of the CDE, as well? Question 7: If you have a domain controller that is not in the CDE, but in the scope of PCI assessment, is a print server on the same network segment as that domain controller also in the scope of PCI assessment? Bonus Exercise: For each of the questions where you answered "in scope of the PCI assessment," describe a strategy to contain the scope, such that systems connected to that system are not in scope. (See Michelle Klinger's great post on the "PCI Contagion Dilemma.")
  • 22. SOX-404 Value Network: Primary Constituencies
  • 23. What Does PCI Value Network Look Like?
  • 24. Language Is Often An Obstacle In Newton’s time, there were not concrete terms for several critical concepts: Force, acceleration, mass, inertia In the following slide, note how difficult it was for Newton to frame the “three laws of motion” without these concepts…
  • 25. Early Drafts Of Three Laws Of Motion 1. If a quantity once move it will never rest unless hindered by some externall cause. 2. A quantity will always move on in the same straight line (not changing the determination nor celerity of its motion) unless some externall cause divert it. 3. There is exactly so much required and no more force to reduce a body to rest as there was to put it upon motion. Axiom 100: A body once moved will always keep the same celerity, quantity and determination of its motion Axiom 103: ...as the body (a) is to the body (b0), so must the power of efficacy vigor strength or virtue of the cause which begets the same quantity of velocity Source: Isaac Newton, James Gleick.
  • 26. Benchmarks Pythagorean theorem: 24 words Archimedes' Principle: 67 words Newton’s Three Laws Of Motion: 91 words The 10 Commandments: 179 words GAIT Proposed Principles v3.0: 168 words The Gettysburg Address: 286 words The Declaration of Independence: 1,300 words GAIT Principles v1.3: 6,856 words GAIT Methodology v2.2: 11,348 words The US Government regulations on the sale of cabbage: 26,911 words
  • 27. Solution: GAIT… Released in Feb 2007, Establishes four principles that Defines the relevance of IT infrastructure elements to financial reporting integrity Define the three types of IT processes that can affect them: change management and systems development, operations and security Defines an end-to-end process view of these three processes Defines an approach to defining objectives and key controls within those three processes Provides a methodology and thinking process that continues the top down, risk based approach started in AS2 to scope IT general controls Provides a common context for management and auditors to support and test management’s assessment that the necessary IT controls exist and are effective Initial target is internal control objectives for financial reporting, but should extend to operating effectiveness and complying with laws and regulations (as defined by COSO)
  • 28. GAIT Principle #1 The only IT infrastructure elements (e.g., databases, operating systems, networks) relevant to ITGC assessment are those that support financially-significant applications and data. (“What are the relevant IT infrastructure elements?”)
  • 29. GAIT Principle #2 The IT processes primarily relevant to ITGC assessment are those that directly impact the integrity of financially-significant applications and data: Change management and systems development: the processes around developing, implementing, and maintaining financially significant applications and supporting IT infrastructure Operations management: the processes around managing the integrity of production data and program execution Security management: the processes around limiting access to information assets (“What are the relevant end-to-end IT processes?”)
  • 30. GAIT Principle #3 Implications to the reliability of financially-significant applications and data, including controls, are based upon the achievement or failure of IT process objectives, not the design and operating effectiveness of the individual controls within those processes. (“What are the relevant objectives of those IT processes? In other words, we shouldn’t get carried away when reaching a conclusion when testing a control.”)
  • 31. GAIT Principle #4 The basis for identifying key controls in the three IT processes is based on: Inherent risk of not achieving the IT process objectives IT process risk indicators (“How do we select key controls within those IT processes?”)
  • 32. GAIT Scoping: Step By Step AS2 begins here GAIT Starts Here
  • 33. GAIT Tools Scenarios Online auction settlement process (high IT) Rebate approval process (med IT) Option expensing process (low IT) Ask Dr. GAIT
  • 34. GAIT Evolution GAIT-R for Business Risk
  • 35. Conclusions and Lessons Learned, Continued Improved audit comment wording helps to connect to things management cares about: “We noted poor change control procedures and were unable to obtain comfort that all changes were authorized and tested as required” -- vs. -- “Poor change control practices introduced the risk of unauthorized or untested changes to key data such as annual threshold amounts for toxic chemical releases. Given the level of precision applied to reviewing the final report downstream, it is unlikely management would detect such errors. Our testing disclosed numerous “break/fix” changes had been made to code or data without supervisory review and approval or notifying the users.”
  • 36. GAIT Evolution Elements of GAIT was incorporated into PCAOB AS-5 GAIT-R for Business Risk To me, it's the first really well thought out way of linking IT to any COSO internal control objective Unlike ITIL, COBIT: it helps focus on what matters Which is very much unlike PCI… The Integrated Auditing Project (“Magic Glasses”)
  • 37. Wait, You’re Lowering The PCI Bar! Until you get scoping right, you can't raise the bar Unless you correctly identify the scope of PCI assessment correctly, any work on the controls is potentially wasted
  • 38. My PCI Mission And Crusade Create guidance to be able to scope correctly Enable a risk based way to not only scope, but to evaluate controls Prioritized PCI DSS is a disappointment What controls for the PCI Scope of Assessment? First, to earn the right to do all of this, we must enable correct scoping first
  • 39. Participants Leads Kent Fox (Intermountain Healthcare) Brandon Green (T-Mobile) Gretchen Forsyth (Southwest Airlines) Mike Dahn (Verizon) Tabitha Greiner (Verizon) Ian White (Verizon) James Summers (Nike)
  • 40. Extend Concepts In PCI DSS Page 4: DSS 1.2: “System components” are defined as any network component, server, or application that is included in or connected to the cardholder data environment.
  • 41. Before vs. After Before: Prior to creating a structured method, we needed over 40 hours to come to a scoping conclusion. After: With the model under development, we generated consensus on 15 scoping conclusions in less than 2 hours.
  • 42. Proposed Deliverables Define and deliver the following, in a manner that clarifies and supports the spirit and intent of protecting cardholder data: Scoping principles A structured scoping methodology A library of scoping scenarios demonstrating its usage for educational and clarification purposes Create useful tools and guidance that will assist in the scoping effort for both merchants and QSAs.
  • 44. Proposed Timeline Submit a set of guidance to the PCI SSC for approval before the PCI Community meeting in September 2010 Desired outcome: PCI SSC and Board of Advisors agree with problem and its significant, have confidence in the approach Assign a staff member to validate guidance and integrate it into the PCI practice
  • 45. Also TODO Identify attributes of effective segmentation to contain PCI contagion Encrypted PIN device Citrix Thin Client Virtualization Where necessary, fix the words, "segment", "connected to,"
  • 46. Next Up: Scoping Category vs. Control Consideration ????? ControlConsiderations
  • 47. Next: Alternate Control Procedures Create a framework to evaluate alternate control procedures -- for that you need risk Right now, PCI is 220+ control activities: create the framework to state what the control objectives are, so you can evaluate whether the objective is being met COSO construct Objective, risk, control objective THEN control activities and controls!
  • 48. Top A-Ha Moments Auditors rock: they have a comprehensive vocabulary that we need – otherwise, we’re stuck in Flatland We need more people who can see the sphere Auditors have seen the dead people longer than anyone These auditors will eventually go crazy, and need friends After a long detour into IT operations and audit, I’m returning to information security, in the guise of compliance
  • 49. We Can Change The State Of The Practice It’s an important problem There are models we can replicate Do you want to get involved?
  • 51. My Last Day At Tripwire
  • 52. What I’m Working On 50% with my family 50% on When IT Fails: The Novel Figure out the methods, procedures and tools needed to enable the transformation Collaborate with communities of practice to help mobilize these transformations BSides, DevOps, ITIL, IIA, SEI
  • 53. When IT Fails: The Novel: Day 1 Steve Masters, CEO Dick Landry, CFO Parts Unlimited$4B revenue/year
  • 54. When IT Fails: The Novel: Day 2 Bill Palmer, VP IT Operations (new) Wes Davis, Director, Distributed Systems Patty McKee, Director, Support and Process Improvement
  • 55. When IT Fails: The Novel: Day 3 Norman Merz, Chief Audit Executive John Kirkland, CISO
  • 56. When IT Fails: The Novel: Day 4 Chris Anderson, VP Application Development Sarah Moulton, SVP Retail Products The outsourcing sales rep
  • 57. When IT Fails: The Novel: Day 10 The Deployment
  • 58. When IT Fails: The Novel: The Two Critical Projects Project Phoenix: designed to close the gap with the retail competition: $20M project Project Argo: designed to integrate POS systems with accounting systems to reduce time to close books, manufacturing order-to-cash, restock intervals

Editor's Notes

  1. There are many ways to react to this: like, fear, horror, trying to become invisible… All understandable, given the circumstances…