SlideShare a Scribd company logo
A CIO’s Survival Guide
   for
   f an IT Audit
             A di
          Thomas Danford
   CIO, Tennessee Board of Regents
   C,        ss    o do      gs
Background & Objectives …
 State Audit chose the TBR office
 as its “pilot” for developing IT
 Audit plans and procedures for
 Banner.
 Brief discussion of the various
 types of audits and how they relate
 to IT Audits.
 Share with the audience what’s
 investigated in an IT Audit and
 how it’s conducted.
 Relay some findings to date.
 Provide some guidance &
 suggestions for when your
 institution has its IT Audit.
Types of Audits
 Operational Audits examine the use of unit resources to
 evaluate whether those resources are b  being used in the most
                                                  d
 effective and efficient way. They include elements of the other
 audit types listed below.
 Financial A di examine accounting and reporting of financial
 Fi      i l Audits        i           i     d       i     f fi   il
 transactions.
 Compliance Audits examine adherence to laws, regulations,
 policies and procedures.
    li i    d        d
 Internal Control Reviews focus on the components of major
 business activities such as payroll and benefits, and their physical
 security.
 security
 Information Technology (IT) Audits examine internal control
 environment of automated information processing systems and
 how people use those systems.
                         systems
The IT Audit Evaluates …
 System(s) input, output, and processing controls
            input output
 Backup & media storage (off-site)
                           (off-
  Disaster preparedness plan ( d if it has been
  Di              d       l (and i h b
 tested!)
 System(s) security
 Computer facilities
      p
How does the IT Audit Work?
 Kick-
 Kick-off Meeting to discuss
                  g
 audit objectives with delivery
 of extensive questionnaires.
 Interview & investigative
 phase based upon responses
 to questionnaires.
 Exit interview with Q&A on
 any discovered weaknesses or
 findings.
 Published A di Report with
 P bli h d Audit R          ih
 weaknesses and/or findings.
 Management response.
       g          p
What Are Auditors Looking For?
 Reportable conditions – are matters that represent a significant
 deficiency in the d
 d                  design or operation of the internal control
 structure which could adversely affect the organization's ability
 to record, process, summarize, and report financial data
 consistent with the assertions of management in the financial
 statements.
 Material Weaknesses – are significant deficiencies, or
 combination of significant deficiencies, that results in more than
                               deficiencies
 a remote likelihood that a material control process could be
 obverted or bypassed.
 Findings – conditions that do adversely affect the institution and
 may include conditions dealing with irregularities, illegal acts,
 errors, inefficiency, waste, ineffectiveness, conflicts of interest,
 and for our purposes control weaknesses.
              pp
Interview & Investigation Areas
 Infrastructure Security & Control
 Application Security & Control
 Disaster Preparedness Plan
 Di       P       d      Pl
INFRASTRUCTURE SECURITY & CONTROL: Relates to
the d i of the campus network system and i l d the
 h design f h                      k        d includes h
backbones, routers, switches, wireless access points, access
methods and protocols used. Of special interest are the filters
              p          used.      p
& protective measures that govern (1) Internet open access (2)
Intranet controlled access and (3) Secured Access.
Particular areas of interest include:
   Physical security of computer center – Environmental controls, locks,
   cameras & authorizations to enter.
   Network configuration – Fil & firewall rule-sets and their change processes.
   N      k     fi      i    Filter fi     ll rule-
                                                l       d hi h
   ID and password rule-sets – Length, character requirements, aging, etc.
                      rule-
   Operating System – File & directory permissions.
   Patch management – Remediation of known exploits.
   Segregation of duties of IT staff.
APPLICATION SECURITY & CONTROL: Relates to the
design of the administrative system and includes additional
server operating system issues as well as the DBMS and the
application that sits on top of both. Heavily scrutinized are
users, both functional and technical and their roles.
Particular areas of interest include:

   Default users and their passwords
   Role based security – Especially as it is setup in the application itself and
   access to the native DBMS or OS.
                                  OS
   User accounts and password management – Procedures & signoff for account
   holders, length, character requirements, aging, etc.
   Software modification – Procedures and segregation of duties in their
                                                 gg
   implementation.
   Patch management – Remediation of known exploits across multiple
   instances.
   Segregation of duties of IT and functional users.
                                                users
APPLICATION SECURITY & CONTROL
(Top 5 Issues)
(T     I     )

 Improper account p
    pp              provisioning with segregation of duties
                                g       gg
 Insufficient controls for change management
 A general lack of understanding around key system
 configurations
 Audit logs not being reviewed (or that review itself not being
 logged)
 Abnormal transactions not identified in a timely manner
DISASTER PREPAREDNESS PLAN: The state in which an
institution is
i i i i prepared f di  d for disaster. P
                                       Preparedness i
                                              d     involves a
                                                        l
plan for avoiding and recovering from a disaster with
preservation and retrieval of records lost by an unexpected
catastrophic occurrence.
 Particular areas of interest include:

   Backup of critical data – Including frequency, media, where and how far away.
   Printed plans – Kept off site by plan principles with contact lists.
   Recovery processes – Includes not only IT operations but facilities (hot &
            yp                            y      p                      (
   cold sites).
   Business continuity while IT functions are restored.
   Actual testing of the plan.
Banner Issues
 Discovered
 Di       d
  As of 10/12/2007
Y10K Compliance
 Banner cannot handle the switch
 from the year 9999 to 10000
Tips to Make the Audit Go Smoothly
 Avoid making it an “adversarial” engagement
                     adversarial
 Provide what’s asked of you
 Document & diagram
 D            di
For Additional Information:




  Wikipedia has a g
       p           good overview of IT auditing at:
                                              g
  http://en.wikipedia.org/wiki/Information_technology_audit
  Control Objectives for Information and related Technology (COBIT) is a set
  of best practices (framework) for information technology (IT) management
  created by the Information Systems Audit and Control Association (ISACA),
                                                                    (ISACA)
  and the IT Governance Institute (ITGI) in 1992.
  http://www.isaca.org/Template.cfm?Section=COBIT6&Template=/Tagged
  Page/TaggedPageDisplay.cfm&TPLID=55&ContentID=7981
Thank You
Please share your comments, ideas, suggestions,
                 questions . . .

              Thomas Danford
              tdanford@tbr.edu
                615-366-
                615-366-4451

More Related Content

What's hot

Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24jemtallon
 
Risk management of basel norms
Risk management of basel norms Risk management of basel norms
Risk management of basel norms
SKMohamedKasim
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
jayussuryawan
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
Salih Islam
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
Dr. Sushil Bansode
 
Chapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning SystemChapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning System
Muhammad Azmy
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologiesgenetics
 
IT & the Auditor
IT & the AuditorIT & the Auditor
IT & the Auditor
Linda Forbes
 
CISSP Week 9
CISSP Week 9CISSP Week 9
CISSP Week 9
jemtallon
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
Vijay Sekar
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
Sreekanth Narendran
 
9 Bcp+Drp
9 Bcp+Drp9 Bcp+Drp
9 Bcp+Drp
Alfred Ouyang
 
Cissp Week 23
Cissp Week 23Cissp Week 23
Cissp Week 23jemtallon
 
4 Operations Security
4 Operations Security4 Operations Security
4 Operations Security
Alfred Ouyang
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1
Yasir Khan
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
amiable_indian
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
Arish Roy
 

What's hot (20)

Cissp Week 24
Cissp Week 24Cissp Week 24
Cissp Week 24
 
Risk management of basel norms
Risk management of basel norms Risk management of basel norms
Risk management of basel norms
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
8. operations security
8. operations security8. operations security
8. operations security
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
 
Chapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning SystemChapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning System
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
2 Day MOSTI Workshop
2 Day MOSTI Workshop2 Day MOSTI Workshop
2 Day MOSTI Workshop
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
IT & the Auditor
IT & the AuditorIT & the Auditor
IT & the Auditor
 
CISSP Week 9
CISSP Week 9CISSP Week 9
CISSP Week 9
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
9 Bcp+Drp
9 Bcp+Drp9 Bcp+Drp
9 Bcp+Drp
 
Cissp Week 23
Cissp Week 23Cissp Week 23
Cissp Week 23
 
4 Operations Security
4 Operations Security4 Operations Security
4 Operations Security
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Technology Audit
Technology AuditTechnology Audit
Technology Audit
 

Similar to CIO IT Audit Survival TNS07

Technology Audit
Technology AuditTechnology Audit
Technology AuditArish Roy
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentationArish Roy
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
JoshJaro
 
audit_it_250759.pdf
audit_it_250759.pdfaudit_it_250759.pdf
audit_it_250759.pdf
mabkhoutaliwi1
 
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019 PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
Support for Improvement in Governance and Management SIGMA
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
Visal Thach
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
Tripwire
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
Adetula Bunmi
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
Bharath Rao
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
Jeffrey Paulette
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
InSync Conference
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
Ed Tobias
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
Jayant Dalvi
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear LLC
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
Priyanka Aash
 
Services Industry Case Study: A Practical Approach To Process Automation
Services Industry Case Study: A Practical Approach To Process AutomationServices Industry Case Study: A Practical Approach To Process Automation
Services Industry Case Study: A Practical Approach To Process Automation
Nathaniel Palmer
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
Rod Davis
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
gueste080564
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
renetta
 

Similar to CIO IT Audit Survival TNS07 (20)

Technology Audit
Technology AuditTechnology Audit
Technology Audit
 
Technology audit presentation
Technology audit presentationTechnology audit presentation
Technology audit presentation
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
audit_it_250759.pdf
audit_it_250759.pdfaudit_it_250759.pdf
audit_it_250759.pdf
 
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019 PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
Leveraging Change Control for Security
Leveraging Change Control for SecurityLeveraging Change Control for Security
Leveraging Change Control for Security
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Services Industry Case Study: A Practical Approach To Process Automation
Services Industry Case Study: A Practical Approach To Process AutomationServices Industry Case Study: A Practical Approach To Process Automation
Services Industry Case Study: A Practical Approach To Process Automation
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 

More from Thomas Danford

Information and Computer Technology (ICT) Accessibility
Information and Computer Technology (ICT) AccessibilityInformation and Computer Technology (ICT) Accessibility
Information and Computer Technology (ICT) Accessibility
Thomas Danford
 
Success Factors in IT 4 10 and 13
Success Factors in IT 4 10 and 13Success Factors in IT 4 10 and 13
Success Factors in IT 4 10 and 13
Thomas Danford
 
P2P Legislation EduPol08
P2P Legislation EduPol08P2P Legislation EduPol08
P2P Legislation EduPol08
Thomas Danford
 
TBR Collaboration Analysis
TBR Collaboration AnalysisTBR Collaboration Analysis
TBR Collaboration Analysis
Thomas Danford
 
CIC Final Report 050406
CIC Final Report 050406CIC Final Report 050406
CIC Final Report 050406
Thomas Danford
 
Tn 2015 Legislative Compilation
Tn  2015 Legislative CompilationTn  2015 Legislative Compilation
Tn 2015 Legislative Compilation
Thomas Danford
 
Elive15 Discussion TBR Performance Metrics
Elive15 Discussion   TBR  Performance MetricsElive15 Discussion   TBR  Performance Metrics
Elive15 Discussion TBR Performance Metrics
Thomas Danford
 
Talent Mgmt EDULive
Talent Mgmt EDULiveTalent Mgmt EDULive
Talent Mgmt EDULive
Thomas Danford
 
Credit Card Computers and Their Application in HE
Credit Card Computers and Their Application in HECredit Card Computers and Their Application in HE
Credit Card Computers and Their Application in HE
Thomas Danford
 
Providing Metrics for Decision Makers CoHEsion13
Providing Metrics for Decision Makers CoHEsion13Providing Metrics for Decision Makers CoHEsion13
Providing Metrics for Decision Makers CoHEsion13
Thomas Danford
 
10 Determinants and 13 Ground Rules CoHEsion13
10 Determinants and 13 Ground Rules CoHEsion1310 Determinants and 13 Ground Rules CoHEsion13
10 Determinants and 13 Ground Rules CoHEsion13
Thomas Danford
 
Big Data in Higher Ed TENNAIR13
Big Data in Higher Ed TENNAIR13Big Data in Higher Ed TENNAIR13
Big Data in Higher Ed TENNAIR13
Thomas Danford
 
TBR Common Data Repository ITS13
TBR Common Data Repository ITS13TBR Common Data Repository ITS13
TBR Common Data Repository ITS13
Thomas Danford
 
Ellucian Live ES 2013
Ellucian Live ES 2013Ellucian Live ES 2013
Ellucian Live ES 2013
Thomas Danford
 
Colaborative Cloud Poster EDUCAUSE12
Colaborative Cloud Poster EDUCAUSE12Colaborative Cloud Poster EDUCAUSE12
Colaborative Cloud Poster EDUCAUSE12
Thomas Danford
 
TBR Business Process Improvement EDUCAUSE12
TBR Business Process Improvement EDUCAUSE12TBR Business Process Improvement EDUCAUSE12
TBR Business Process Improvement EDUCAUSE12
Thomas Danford
 
eProcurement TN-Summit 2012
eProcurement TN-Summit 2012eProcurement TN-Summit 2012
eProcurement TN-Summit 2012
Thomas Danford
 
Statewide CI Resources TNSCORE12
Statewide CI Resources TNSCORE12Statewide CI Resources TNSCORE12
Statewide CI Resources TNSCORE12
Thomas Danford
 
An Exploration: Moving Your Enterprise to a Cloud Collaboration
An Exploration: Moving Your Enterprise to a Cloud CollaborationAn Exploration: Moving Your Enterprise to a Cloud Collaboration
An Exploration: Moving Your Enterprise to a Cloud Collaboration
Thomas Danford
 
Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12
Thomas Danford
 

More from Thomas Danford (20)

Information and Computer Technology (ICT) Accessibility
Information and Computer Technology (ICT) AccessibilityInformation and Computer Technology (ICT) Accessibility
Information and Computer Technology (ICT) Accessibility
 
Success Factors in IT 4 10 and 13
Success Factors in IT 4 10 and 13Success Factors in IT 4 10 and 13
Success Factors in IT 4 10 and 13
 
P2P Legislation EduPol08
P2P Legislation EduPol08P2P Legislation EduPol08
P2P Legislation EduPol08
 
TBR Collaboration Analysis
TBR Collaboration AnalysisTBR Collaboration Analysis
TBR Collaboration Analysis
 
CIC Final Report 050406
CIC Final Report 050406CIC Final Report 050406
CIC Final Report 050406
 
Tn 2015 Legislative Compilation
Tn  2015 Legislative CompilationTn  2015 Legislative Compilation
Tn 2015 Legislative Compilation
 
Elive15 Discussion TBR Performance Metrics
Elive15 Discussion   TBR  Performance MetricsElive15 Discussion   TBR  Performance Metrics
Elive15 Discussion TBR Performance Metrics
 
Talent Mgmt EDULive
Talent Mgmt EDULiveTalent Mgmt EDULive
Talent Mgmt EDULive
 
Credit Card Computers and Their Application in HE
Credit Card Computers and Their Application in HECredit Card Computers and Their Application in HE
Credit Card Computers and Their Application in HE
 
Providing Metrics for Decision Makers CoHEsion13
Providing Metrics for Decision Makers CoHEsion13Providing Metrics for Decision Makers CoHEsion13
Providing Metrics for Decision Makers CoHEsion13
 
10 Determinants and 13 Ground Rules CoHEsion13
10 Determinants and 13 Ground Rules CoHEsion1310 Determinants and 13 Ground Rules CoHEsion13
10 Determinants and 13 Ground Rules CoHEsion13
 
Big Data in Higher Ed TENNAIR13
Big Data in Higher Ed TENNAIR13Big Data in Higher Ed TENNAIR13
Big Data in Higher Ed TENNAIR13
 
TBR Common Data Repository ITS13
TBR Common Data Repository ITS13TBR Common Data Repository ITS13
TBR Common Data Repository ITS13
 
Ellucian Live ES 2013
Ellucian Live ES 2013Ellucian Live ES 2013
Ellucian Live ES 2013
 
Colaborative Cloud Poster EDUCAUSE12
Colaborative Cloud Poster EDUCAUSE12Colaborative Cloud Poster EDUCAUSE12
Colaborative Cloud Poster EDUCAUSE12
 
TBR Business Process Improvement EDUCAUSE12
TBR Business Process Improvement EDUCAUSE12TBR Business Process Improvement EDUCAUSE12
TBR Business Process Improvement EDUCAUSE12
 
eProcurement TN-Summit 2012
eProcurement TN-Summit 2012eProcurement TN-Summit 2012
eProcurement TN-Summit 2012
 
Statewide CI Resources TNSCORE12
Statewide CI Resources TNSCORE12Statewide CI Resources TNSCORE12
Statewide CI Resources TNSCORE12
 
An Exploration: Moving Your Enterprise to a Cloud Collaboration
An Exploration: Moving Your Enterprise to a Cloud CollaborationAn Exploration: Moving Your Enterprise to a Cloud Collaboration
An Exploration: Moving Your Enterprise to a Cloud Collaboration
 
Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12Rethinking Disaster Prepardness THEITS12
Rethinking Disaster Prepardness THEITS12
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

CIO IT Audit Survival TNS07

  • 1. A CIO’s Survival Guide for f an IT Audit A di Thomas Danford CIO, Tennessee Board of Regents C, ss o do gs
  • 2. Background & Objectives … State Audit chose the TBR office as its “pilot” for developing IT Audit plans and procedures for Banner. Brief discussion of the various types of audits and how they relate to IT Audits. Share with the audience what’s investigated in an IT Audit and how it’s conducted. Relay some findings to date. Provide some guidance & suggestions for when your institution has its IT Audit.
  • 3. Types of Audits Operational Audits examine the use of unit resources to evaluate whether those resources are b being used in the most d effective and efficient way. They include elements of the other audit types listed below. Financial A di examine accounting and reporting of financial Fi i l Audits i i d i f fi il transactions. Compliance Audits examine adherence to laws, regulations, policies and procedures. li i d d Internal Control Reviews focus on the components of major business activities such as payroll and benefits, and their physical security. security Information Technology (IT) Audits examine internal control environment of automated information processing systems and how people use those systems. systems
  • 4. The IT Audit Evaluates … System(s) input, output, and processing controls input output Backup & media storage (off-site) (off- Disaster preparedness plan ( d if it has been Di d l (and i h b tested!) System(s) security Computer facilities p
  • 5. How does the IT Audit Work? Kick- Kick-off Meeting to discuss g audit objectives with delivery of extensive questionnaires. Interview & investigative phase based upon responses to questionnaires. Exit interview with Q&A on any discovered weaknesses or findings. Published A di Report with P bli h d Audit R ih weaknesses and/or findings. Management response. g p
  • 6. What Are Auditors Looking For? Reportable conditions – are matters that represent a significant deficiency in the d d design or operation of the internal control structure which could adversely affect the organization's ability to record, process, summarize, and report financial data consistent with the assertions of management in the financial statements. Material Weaknesses – are significant deficiencies, or combination of significant deficiencies, that results in more than deficiencies a remote likelihood that a material control process could be obverted or bypassed. Findings – conditions that do adversely affect the institution and may include conditions dealing with irregularities, illegal acts, errors, inefficiency, waste, ineffectiveness, conflicts of interest, and for our purposes control weaknesses. pp
  • 7. Interview & Investigation Areas Infrastructure Security & Control Application Security & Control Disaster Preparedness Plan Di P d Pl
  • 8. INFRASTRUCTURE SECURITY & CONTROL: Relates to the d i of the campus network system and i l d the h design f h k d includes h backbones, routers, switches, wireless access points, access methods and protocols used. Of special interest are the filters p used. p & protective measures that govern (1) Internet open access (2) Intranet controlled access and (3) Secured Access. Particular areas of interest include: Physical security of computer center – Environmental controls, locks, cameras & authorizations to enter. Network configuration – Fil & firewall rule-sets and their change processes. N k fi i Filter fi ll rule- l d hi h ID and password rule-sets – Length, character requirements, aging, etc. rule- Operating System – File & directory permissions. Patch management – Remediation of known exploits. Segregation of duties of IT staff.
  • 9. APPLICATION SECURITY & CONTROL: Relates to the design of the administrative system and includes additional server operating system issues as well as the DBMS and the application that sits on top of both. Heavily scrutinized are users, both functional and technical and their roles. Particular areas of interest include: Default users and their passwords Role based security – Especially as it is setup in the application itself and access to the native DBMS or OS. OS User accounts and password management – Procedures & signoff for account holders, length, character requirements, aging, etc. Software modification – Procedures and segregation of duties in their gg implementation. Patch management – Remediation of known exploits across multiple instances. Segregation of duties of IT and functional users. users
  • 10. APPLICATION SECURITY & CONTROL (Top 5 Issues) (T I ) Improper account p pp provisioning with segregation of duties g gg Insufficient controls for change management A general lack of understanding around key system configurations Audit logs not being reviewed (or that review itself not being logged) Abnormal transactions not identified in a timely manner
  • 11. DISASTER PREPAREDNESS PLAN: The state in which an institution is i i i i prepared f di d for disaster. P Preparedness i d involves a l plan for avoiding and recovering from a disaster with preservation and retrieval of records lost by an unexpected catastrophic occurrence. Particular areas of interest include: Backup of critical data – Including frequency, media, where and how far away. Printed plans – Kept off site by plan principles with contact lists. Recovery processes – Includes not only IT operations but facilities (hot & yp y p ( cold sites). Business continuity while IT functions are restored. Actual testing of the plan.
  • 12. Banner Issues Discovered Di d As of 10/12/2007
  • 13. Y10K Compliance Banner cannot handle the switch from the year 9999 to 10000
  • 14. Tips to Make the Audit Go Smoothly Avoid making it an “adversarial” engagement adversarial Provide what’s asked of you Document & diagram D di
  • 15. For Additional Information: Wikipedia has a g p good overview of IT auditing at: g http://en.wikipedia.org/wiki/Information_technology_audit Control Objectives for Information and related Technology (COBIT) is a set of best practices (framework) for information technology (IT) management created by the Information Systems Audit and Control Association (ISACA), (ISACA) and the IT Governance Institute (ITGI) in 1992. http://www.isaca.org/Template.cfm?Section=COBIT6&Template=/Tagged Page/TaggedPageDisplay.cfm&TPLID=55&ContentID=7981
  • 16. Thank You Please share your comments, ideas, suggestions, questions . . . Thomas Danford tdanford@tbr.edu 615-366- 615-366-4451