VPN Security Audit/Assurance Program
VPN Security Audit/Assurance Program Audit/Assurance Program About ISACA With more than 100,000 constituents in 180 countries, ISACA® (www.isaca.org (www.isaca.org ) is a leading global provider o !no"ledge, certiications, certiications, communit#, advocac# and education on inormation s#stems (IS) assurance and securit#, securit#, enterprise governance and management o I$, and I$%relat I$%related ed ris! and compliance& 'ounded in 1, the nonproit, independent ISACA hosts international conerences, publishes the ISACA the ISACA® Journal , and develops international IS auditing and control standards, "hich help its constituents ensure trust in, and value rom, inormation s#stems& It also advances and attests I$ s!ills and !no"ledge through the globall# respected Certiied Inormation S#stems Auditor ® (CISA®), Certiied Inormation Securit# *anager ® (CIS*®), Certiied in the +overnance o nterprise I$ ® (C+I$ ®) and Certiied in -is! and Inormation S#stems Control. (C-ISC.) designations&
ISACA continuall# continuall# updates and e/pands the practical guidance and product amil# based on the CI$® rame"or!& CI$ helps I$ proessionals and enterprise leaders ulill their I$ governance and management responsibilities, particularl# in in the areas o assurance, assurance, securit#, securit#, ris! and control, control, and deliver deliver value to the business& business& Disclaimer ISACA has designed and created VPN Security Audit/Assurance Program (the 2Wor!3) primaril# primaril# as an educational resource or governance and assurance proessionals& ISACA ma!es ma!es no claim that use o an# o the Wor! "ill assure a successul outcome& $he Wor! Wor! should not be considered inclusive o all proper inormation, procedures and tests or e/clusive o other inormation, procedures and tests that are reasonabl# directed to obtaining the same results& In determining the propriet# o an# speciic inormation, procedure or test, governance and assurance proessionals should appl# their o"n proessional 4udgment to the speciic circumstances circumstances presented presented b# the particular particular s#stems or inormation technolog# technolog# environment& environment& Reservation of Rights 5 6016 ISACA& All rights reserved& 7o part o this publication ma# be used, copied, reproduced, modiied, distributed, displa#ed, stored in a retrieval s#stem or transmitted in an# orm b # an# means (electronic, mechanical, photocop#ing, recording or other"ise) "ithout the prior "ritten authoriation o ISACA& -eproduction -eproduction and use o all or portions o this publication are permitted solel# solel# or academic, academic, internal and noncommercial noncommercial use use and or consulting9advisor# consulting9advisor# engagements, engagements, and must include ull attribution o the material:s source& 7o other right or permission is granted "ith respect to this "or!& ISACA ;<01 Algon=uin -oad, Suite 1010 -olling *eado"s, I> 0008 ?SA @hone B1&8<&6D;&1DD
VPN Security Audit/Assurance Program Audit/Assurance Program ISACA wishes to recognize: Author Norm Kelson, CISA, CGEIT, CPA, C@ Interactive, Inc&, ?SA Expert Reiewers Michael Castro, CISA, ResMor Trust Co, Canada Joanne De Vito Vito De Palma, Palma, CMM, CMM, The Ardent Ardent Grou! Grou! ""C, #SA Russell K$ %airchild, CISA, CRISC, CISSP, PMP, SecureIsle, #SA Ale& Gelden'er(, Gelden'er(, CISA, CRISC, CISSP, MSMM, #SA %rancis Kaitano, CISA, CISM, CISSP, ITI", MCAD$Net, MCSD, Contact Ener(), Ne* +ealand Kamal Khan, CISA, CISSP, CITP, Saudi Aramco, Saudi Ara'ia "il) M$ Shue, CISA, CISM, CGEIT, CRISC, "MS Associates ""C, #SA a'u Srinias, CISA, CISM, SP AusNet, Australia Daid A$ -illiams, CRISC, PMP, .cean%irst an&, #SA ISACA Board of Directors
Gre(or) T$ Grochols&i, CISA, The Do* Chemical Co$, #SA, International President Allan oardman, CISA, CISM, CGEIT, CRISC, ACA, CA /SA0, CISSP, Mor(an Stanle), #K, Vice President Juan "uis Carselle, Carselle, CISA, CGEIT, CRISC, -al1Mart, -al1Mart, Me2ico, Me2ico, Vice Vice President President Christos K$ Dimitriadis, Ph$D$, CISA, CISM, CRISC, INTRA".T S$A$, Greece, Vice President Ramses Galle(o, CISM, CGEIT, CCSK, CISSP, SCPM, 3 Si(ma, 4uest So5t*are, S!ain, Vice President Ton) Ton) 6a)es, CGEIT, A%C6SE, A%C6SE, C6E, %ACS, %ACS, %CPA, %CPA, %IIA, 4ueensland Goernment, Goernment, Australia, Australia, Vice President Je7 S!ie), CRISC, CPP, PSP, Securit) Securit) Ris& Mana(ement Mana(ement Inc$, Inc$, #SA, Vice Vice President President Marc Vael, Ph$D$, CISA, CISM, CGEIT, CISSP, Valuendo, el(ium, Vice President Kenneth "$ Vander -al, CISA, CPA, Ernst 8 9oun( ""P /retired0, #SA, Past International President Emil D:An(elo, CISA, CISM, an& o5 To&)o1Mitsu'ishi #%J "td$ /retired0, #SA, Past International President John 6o Chi, CISA, CISA, CISM, CRISC, CRISC, CCP, CCP, C%E, Ernst Ernst 8 9oun( 9oun( ""P, Sin(a!ore, Sin(a!ore, Director Director Kr)sten McCa'e, CISA, The 6ome De!ot, #SA, Director Jo Ste*art1Rattra), Ste*art1Rattra), CISA, CISM, CGEIT, CGEIT, CRISC, CSEPS, CSEPS, RM 6oldich, 6oldich, Australia, Australia, Dir
VPN Security Audit/Assurance Program Institute o5 Mana(ement Accountants Inc$ ISACA cha!ters ITGI %rance ITGI Ja!an Nor*ich #niersit) Socitum Per5ormance Mana(ement Grou! Sola) russels School o5 Economics and Mana(ement Strate(ic Technolo() Mana(ement Institute /STMI0 o5 the National #niersit) o5 Sin(a!ore #niersit) o5 Ant*er! Mana(ement School ASIS International 6e*lett1Pac&ard IM S)mantec Cor!$
VPN Security Audit/Assurance Program
able of Contents I& Introduction&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&D II& ?sing $his Gocument&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& III& Controls *aturit# Anal#sis&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&8 IH& Assurance and Control 'rame"or!&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& 10 H& /ecutive Summar# o Audit9Assurance 'ocus&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& &&&&&&&&&&&&&&&&&11 HI& Audit9Assurance @rogram&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& 1; 1& @lanning and Scoping the Audit&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&1; 6& @reparator# Steps&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& &&1D ;& +overnance&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& 1 & @olic#&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&& 1< D& Coniguration&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&1 & *aintenance and *onitoring&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&6 HII& *aturit# Assessment&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&68 HIII& *aturit# Assessment vs& $arget Assessment&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&;;
I% Introduction
!eriew ISACA has developed the I' Assurance (ramework $* (I$A'$*) as a comprehensive and good practice%setting model& I$A' provides standards that are designed to be mandator#, and are the guiding principles under "hich the I$ audit and assurance proession operates& $he guidelines provide inormation and direction or the practice o I$ audit and assurance& $he tools and techni=ues provide methodologies, tools and templates to provide direction in the application o I$ audit and assurance processes&
VPN Security Audit/Assurance Program audit and assurance rame"or!& Since CS is "idel# used, it has been selected or inclusion in this audit9assurance program& $he revie"er ma# delete or rename these columns to align "ith the enterprise:s control rame"or!&
%oernance& Ris$ and Contro" o' I( +overnance, ris! and control o I$ are critical in the perormance o an# assurance management process& +overnance o the process under revie" "ill be evaluated as part o the policies and management oversight controls& -is! pla#s an important role in evaluating "hat to audit and ho" management approaches and manages ris!& oth issues "ill be evaluated as steps in the audit9assurance program& Controls are the primar# evaluation point in the process& $he audit9assurance program "ill identi# the control ob4ectives and the steps to determine control design and eectiveness&
Responsi)i"ities o' I( Audit and Assurance Pro'essiona"s I$ audit and assurance proessionals are e/pected to customie this document to the environment in "hich the# are perorming an assurance process& $his document is to be used as a revie" tool and starting point& It ma# be modiied b# the I$ audit and assurance proessionalJ it is not intended to be a chec!list or =uestionnaire& It is assumed that the I$ audit and assurance proessional has the necessar# sub4ect matter e/pertise re=uired to conduct the "or! and is supervised b# a proessional "ith the CISA designation and9or necessar# sub4ect matter e/pertise to ade=uatel# revie" the "or! perormed&
II% &sing his Document $his audit9assurance program "as developed to assist the audit and assurance proessional in designing and e/ecuting a revie"& Getails regarding the ormat and use o the document ollo"&
*or$ Program Steps
VPN Security Audit/Assurance Program document because it is standard or the audit9assurance unction and should be identiied else"here in the enterprise:s standards&
C!+I( ,-. Crossre'erence $he CI$ cross%reerence provides the audit and assurance proessional "ith the abilit# to reer to the speciic CI$ &1 control ob4ective that supports the audit9assurance step& $he CI$ control ob4ective should be identiied or each audit9assurance step in the section& *ultiple cross%reerences are not uncommon& Subprocesses in the "or! program are too granular to be cross%reerenced to CI$& $he audit9assurance program is organied in a manner to acilitate an evaluation through a structure parallel to the development process& CI$ provides in%depth control ob4ectives and suggested control practices at each level& As proessionals revie" each control, the# should reer to CI$ &1 or the I' Assurance )uide" *sing C#+I' or good%practice control guidance&
C!S! Components As noted in the introduction, CS and similar rame"or!s have become increasingl# popular among audit and assurance proessionals& $his ties the assurance "or! to the enterprise:s control rame"or!& While the I$ audit9assurance unction has CI$ as a rame"or!, operational audit and assurance proessionals use the rame"or! established b# the enterprise& Since CS is the most prevalent internal control rame"or!, it has been included in this document and is a bridge to align I$ audit9assurance "ith the rest o the audit9assurance unction& *an# audit9assurance enterprises include the CS control components "ithin their report and summarie assurance activities to the audit committee o the board o directors& 'or each control, the audit and assurance proessional should indicate the CS component(s) addressed& It is possible but generall# not necessar#, to e/tend this anal#sis to the speciic audit step level& $he original CS internal control rame"or! contained ive components& In 600, CS issued the ,nter!rise isk anagement ,0 Integrated (ramework1 "hich includes eight components& $he -* rame"or! has a business decision ocus "hen compared to the 2334 Internal Control5Integrated (ramework &
VPN Security Audit/Assurance Program (igure ')Com$arison of C*S* Internal Control and +R, Integrated (rameworks Internal Control—Integrated Framework ERM Integrated Framework
Control Activities Control activities are the policies and procedures that help ensure management directives are carried out& $he# help ensure that necessar# actions are ta!en to address ris!s to achievement o the entit#Ks ob4ectives& Control activities occur throughout the organiation, at all levels and in all unctions& $he# include a range o activities as diverse as approvals, authoriations, veriications, reconciliations, revie"s o operating perormance, securit# o assets and segregation o duties& Information and Communication Inormation s#stems pla# a !e# role in internal control s#stems as the# produce reports, including operational, inancial and compliance%related inormation that ma!e it possible to run and control the business& In a broader sense, eective communication must ensure inormation lo"s do"n, across and up the organiation& ective communication should also be ensured "ith e/ternal parties, such as customers, suppliers, regulators and shareholders& ,onitoring Internal control s#stems need to be monitoreda process that assesses the =ualit# o the s#stem:s perormance over time& $his is acc omplished through ongoing monitoring activities or separate evaluations& Internal control deiciencies detected through these monitoring activities should be reported upstream and corrective actions should be ta!en to ensure continuous improvement o the s#stem&
Risk Res$onse- *anagement selects ris! responsesavoiding, accepting, reducing, or sharing ris!developing a set o actions to align ris!s "ith the entit#:s ris! tolerances and ris! appetite& Control Activities- @olicies and procedures are established and implemented to help ensure the ris! responses are eectivel# carried out&
Information and Communication- -elevant inormation is identiied, captured, and communicated in a orm and timerame that enable people to carr# out their responsibilities& ective communication also occurs in a broader sense, lo"ing do"n, across, and up the entit#&
,onitoring- $he entiret# o enterprise ris! management is monitored and modiications made as necessar#& *onitoring is accomplished through ongoing management activities, separate evaluations, or b oth&
Inormation or figure ' "as obtained rom the CS "eb site www.coso.org/a$outus.tm .
$he 16 Internal Control5Integrated (ramework addresses the needs o the I$ audit and assurance proessional control environment, ris! assessment, control activities, inormation and communication, and monitoring& As such, ISACA has elected to include them as a reerence in this document& When completing the CS component columns, consider the deinitions o the components as described in figure '&
Re'erence/0yper"in$ +ood practices re=uire the audit and assurance proessional to create a "or! paper that describes the "or!
VPN Security Audit/Assurance Program is based on a method o evaluating the organiation, so it can be rated rom a maturit# level o non%e/istent (0) to optimied (D)& $his approach is derived rom the maturit# model that the Sot"are ngineering Institute (SI) o Carnegie *ellon ?niversit# deined or the maturit# o sot"are development& $he I' Assurance )uide *sing C#+I' , Appendi/ HII*aturit# *odel or Internal Control ( figure 0) provides a generic maturit# model sho"ing the status o the internal control environment and the establishment o internal controls in an enterprise& It sho"s ho" the management o internal control, and an a"areness o the need to establish better internal controls, t#picall# develops rom an ad oc to an optimied level& $he model provides a high%level guide to help CI$ users appreciate "hat is re=uired or eective internal controls in I$ and to help position their enterprise on the maturit# scale&
,aturit/ 1evel 0 7on%e/istent
1 Initial9ad oc
6 -epeatable but Intuitive
; Geined
*anaged and *easurable
(igure 0),aturit/ ,odel for Internal Control Status of the Internal Control +nvironment +stablishment of Internal Controls $here is no recognition o the need or internal control& Control is not part o the organisation:s culture or mission& $here is a high ris! o control deiciencies and incidents& $here is some recognition o the need or internal control& $he approach to ris! and control re=uirements is ad oc and disorganised, "ithout communication or monitoring& Geiciencies are not identiied& mplo#ees are not a"are o their responsibilities& Controls are in place but a re not documented& $heir operation is dependent on the !no"ledge and motivation o individuals& ectiveness is not ade=uatel# evaluated& *an# control "ea!nesses e/ist and are not ade=uatel# addressedJ the impact can be severe& *anagement actions to resolve control issues are not prioritised or consistent& mplo#ees ma# not be a"are o their responsibilities& Controls are in place and ade=uatel# documented& perating eectiveness is evaluated on a periodic basis and there is an average number o issues& Lo"ever, the evaluation process is not documented& While management is able to deal predictabl# "ith most control issues, some control "ea!nesses persist and impacts could still be severe& mplo#ees are a"are o their re sponsibilities or control& $here is an eective internal control and ris! management environment& A ormal, documented evaluation o controls
$here is no intent to assess the need or internal control& Incidents are dealt "ith as the# arise& $here is no a"areness o the need or assessment o "hat is needed in terms o I$ c ontrols& When perormed, it is onl# on an ad oc basis, at a high level and in reaction to signiicant incidents& Assessment addresses onl# the actual incident& Assessment o control needs occurs onl# "hen needed or selected I$ processes to determine the current level o control maturit#, the target level that should be reached and the gaps that e/ist& An inormal "or!shop approach, involving I$ managers and the team involved in the process, is used to deine an ade=uate approach to controls or the process and to motivate an a greed%upon action plan& Critical I$ processes are identiied based on value and ris! drivers& A detailed anal#sis is perormed to identi# control re=uirements and the root cause o gaps and to develop improvement opportunities& In addition to acilitated "or!shops, tools are used and intervie"s are perormed to support the anal#sis and ensure that an I$ process o"ner o"ns and drives the assessment and improvement process& I$ process criticalit# is regularl# deined "ith ull support and agreement rom the relevant business process o"ners&
VPN Security Audit/Assurance Program auditor& $hereore, an auditor should obtain the concerned sta!eholder:s concurrence beore submitting the inal report to the management& At the conclusion o the revie", once all indings and recommendations are completed, the proessional assesses the current state o the CI$ control rame"or! and assigns it a maturit# level using the si/%level scale& Some practitioners utilie decimals (/&6D, /&D, /&
I2% Assurance and Control (ramework
ISACA I( Assurance #ramewor$ and Standards $he ollo"ing sections in I$A' are relevant to virtual private net"or! (H@7) Securit# • • • • •
;D0I$ @rocesses ;0I$ Support o -egulator# Compliance ;;0&Inormation S#stems perations ;;0&<Inormation Securit# *anagement ;;0&117et"or! *anagement and Controls
VPN Security Audit/Assurance Program •
•
•
•
•
GSD&< Protection of security tecnology *a!e securit#%related technolog# resistant to tampering, and do not disclose securit# documentation unnecessaril#& GSD&8 Cry!togra!ic key management Getermine that policies and procedures are in place to organise the generation, change, revocation, destruction, distribution, certiication, storage, entr#, use and archiving o cr#ptographic !e#s to ensure the protection o !e#s against modiication and unauthorised disclosure& GSD& alicious software !re6ention1 detection and correction @ut preventive, detective and corrective measures in place (especiall# up%to%date securit# patches and virus control) across the organisation to protect inormation s#stems and technolog# rom mal"are (e&g&, viruses, "orms, sp#"are, spam)& GSD&10 Network security ?se securit# techni=ues and related management procedures (e&g&, ire"alls, securit# appliances, net"or! segmentation, intrusion detection) to authorise access and control inormation lo"s rom and to net"or!s& GS&6 Identification and maintenance of configuration items stablish coniguration procedures to support management and logging o all changes to the coniguration repositor#& Integrate these procedures "ith change management, incident management and problem management procedures&
-eer to the I$ +overnance Institute:s C#+I' Control Practices" )uidance to Acie6e Control #$7ecti6es for Successful I' )o6ernance1 2 nd ,dition, published in 600<, or the related control practice value and ris! drivers&
2% +3ecutive Summar/ of Audit4Assurance (ocus A virtual private net"or! (H@7) is a technolog# to protect data as the# travel through public net"or!s& $he Internet has modiied the manner in "hich enterprises interconnect their inormation net"or!s& Access can be over the Internet (public access) or over an e/tranet (trusted parties, e&g&, suppliers, customers, partners)& @reviousl#, an enterprise "ould lease dedicated communications lines bet"een sites or trusted business partners& $he Internet permits ubi=uitous connectivit#J ho"ever, an# data traversing a public net"or! can be captured b# unintended parties, thereb# potentiall# disclosing data& A H@7 provides a means to encr#pt data bet"een communicating parties&
VPN Security Audit/Assurance Program
+usiness Impact and Ris$ $he impact on the business transmitting data through public net"or!s and the accompan#ing ris! are signiicant& Gepending on the industr#, enterprises ma# e/perience outages and intrusion attempts or inancial gain, to obtain intellectual propert#, to create business disruption, to obtain sensitive private inormation, or to compromise national securit#& $he perpetrators o an intrusion can be e/ternal or internal, private government sponsored& $his activit# ma# increase the enterprise:s ris! o @ublic relations issues "ith the customers or the public (reputational ris!) • Inabilit# to compl# "ith regulator# processing re=uirements (regulator# and inancial ris!) • Inabilit# to perorm critical business unctions (operational and inancial ris!) • Inabilit# to maintain pa#roll and e mplo#ee privac# (regulator# and reputational ris!) • >oss o ph#sical or inormational assets (reputational and inancial ris!) • Inabilit# to meet contractual service level agreements (S>As) "ith third parties or customers (contractual • ris!) H@7 technolog#, i properl# conigured, "ill reduce the ris! associated "ith privileged data traversing a public net"or!&
!)1ectie and Scope *b.ective) $he ob4ective o the audit9assurance revie" is to provide management "ith an independent assessment o the H@7 implementation and ongoing monitoring9maintenance o the eectiveness o the supporting technolog#& Sco$e) $he audit9assurance revie" "ill ocus on H@7 standards, guidelines and procedures as "ell as the implementation and governance o these activities& $he revie" "ill rel# upon other operational audits o the incident management process, coniguration management and securit# o net"or!s and servers, securit# management and a"areness, business continuit# management, inormation securit# management, governance
VPN Security Audit/Assurance Program
2I% Audit4Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
.- P"anning and Scoping the Audit 1&1 Define audit4assurance ob.ectives% $he audit9assurance ob4ectives are high level and describe the overall audit goals& 1&1&1 -evie" the audit9assurance ob4ectives in the introduction to this audit9assurance program& 1&1&6 *odi# the audit9assurance ob4ectives to align "ith the audit9assurance universe, annual plan and charter& 1&6 Define boundaries of review% $he revie" must have a deined scope& $he revie"er must understand the operating environment and prepare a proposed scope, sub4ect to a later ris! assessment& 1&6&1 @erorm a high%level "al!%through o the net"or! architecture using H@7%technolog#& 1&6&6 stablish initial boundaries o the audit9assurance revie"& 1&6&6&1 Identi# limitations and9or constraints aecting the audit& 1&; Define assurance% $he revie" re=uires t"o sources o standards& $he corporate standards deined in the polic# and procedure documentation establish the corporate e/pectations& At minimum, corporate standards should be implemented& $he second source, a good%practice reerence, establishes industr# standards& nhancements should be proposed to address gaps bet"een the t"o& 1&;&1 Getermine i CI$ and the appropriate securit# incident management rame"or! "ill be used as a good%practice reerence&
5 6016 ISACA& All rights reserved& @age 1;
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
1& Identif/ and document risk% $he ris! assessment is necessar # to evaluate "here audit resources should be ocused& $he ris!%based approach assures utiliation o audit resources in the most eective manner& 1&&1 Identi# the business ris! associated "ith the ailure to implement H@7 technologies and the ailure to implement H@7 technologies securel#& 1&&6 Identi# the technolog# ris! associated "ith the ailure to implement H@7 technologies and the ailure to implement H@7 technologies securel#& 1&&; Getermine i a H@7 architecture threat assessment and modeling processing process has been established and implemented& 1&& ased on ris! assessment, identi# changes to the scope& 1&&D Giscuss the ris! "ith I$, business and operational audit management, and ad4ust the ris! assessment& 1&D Define the change $rocess% $he initial audit approach is based on the revie"er:s understanding o the operating environment and associated ris!& As urther research and anal#sis are perormed, changes to the scope and approach "ill result& 1&D&1 Identi# the senior I$ audit9assurance resource responsible or the revie"& 1&D&6 stablish the process or suggesting and implementing changes to the audit9assurance program, and the authoriations re=uired& 1& Define assignment success% $he success actors need to be identiied& Communication among the I$ audit9assurance team, other assurance teams and the enterprise is essential& 1&&1 Identi# the drivers or a successul revie" (this should e/ist in the audit9assurance unction:s standards and procedures)& 1&&6 Communicate success attributes to the process o"ner or sta!eholder, and obtain agreement& 5 6016 ISACA& All rights reserved& @age 1
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
1&< Define audit4assurance resources re7uired% $he resources re=uired are deined in the introduction to this audit9assurance program& 1&<&1 Getermine the audit9assurance s!ills necessar# or the revie"& 1&<&6 Getermine the estimated total resources (hours) and time rame (start and end dates) re=uired or the revie"& 1&8 Define deliverables% Geliverables are not limited to the inal report& Communication bet"een the audit9assurance teams and the process o"ner is essential to assignment success& 1&8&1 Getermine the interim deliverables, including initial indings, status reports, drat reports, due dates or responses and the inal r eport& 1& Communicate% $he audit9assurance process is clearl# communicated to the customer9client& 1&&1 Conduct an opening conerence to discuss the revie" ob4ectives "ith the e/ecutive responsible or operating s#stems and inrastructure&
3- Preparatory Steps 6&1 *btain and review the current organi8ation chart for the s/stem and network administration areas& 1& Identi# the !e# net"or! administration sta, the securit# manager and the !e# net"or! user sta!eholders& 6& btain a cop# o the latest net"or! securit# ris! anal #sis, including an# inormation on s#stem, data and service classiications& ;& btain and revie" a cop# o the enterprise:s • • •
Securit# polic# Securit# strateg# or strategies Securit# procedures and standards 5 6016 ISACA& All rights reserved& @age 1D
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
• • • • • •
7et"or! architecture documentation 7et"or! inventor# or schematic o ph#sical net"or! components 7et"or! problem trac!ing, resolution and escalation procedures H@7%related documentation and vendor contracts Copies o signed user securit# and a"areness documents 7e" emplo#ee training materials relating to securit# -
•
elevant legal and regulator# inormation related to securit# and inormation access H@7 supplier contracts, S>As • Supplier due diligence selection criteria, process • usiness impact anal#sis (IA), business continuit# plans • (C@s),disaster recover# plans (G-@s) and all continuit# o operations plans Luman resources (L-) onboarding9oboarding procedures and standards • Inormation securit# remote access policies, procedures and standards • Inormation securit# mobile computing policies, procedures and • standards Inormation securit# "ireless net"or!ing standards • Inormation securit# acceptable use policies, procedures and standards • ncr#ption policies, procedures and standards • Incident response policies, procedures, standards • *onitoring and audit policies, procedures, standards • & Intervie" the senior securit# oicer and the I$ securit# administrator regarding H@7 implementation& D& Intervie" the technical support team leader or e=uivalent responsible or H@7 architecture, design, implementation, and maintenance processes and procedures&
4- %oernance ;&1 +3ecutive S$onsor Audit9Assurance b4ective $he H@7 implementation and maintenance is assigned to an 5 6016 ISACA& All rights reserved& @age 1
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
e/ecutive sponsor, "ho is responsible or its eective implementation and operations& & /ecutive -esponsibilit# and Accountabilit# o H@7%related @rocesses Control A senior e/ecutive "ithin the I$ organiation is responsible or the H@7 implementation, maintenance and oversight&
@& *1&D *6&D *&1
=
= = =
=
= = =
;&1&1&1 Identi# the senior e/ecutive responsible or the H@7 program& ;&1&1&6 btain the position description o the e/ecutive responsible or the H@7 program& ;&1&1&; Getermine i the position has cross%reporting to the business units and I$ management (securit#, administration, etc&) ;&1&1& btain meeting minutes and other documentation to support the responsibilities and accountabilit# o the e/ecutive sponsor& ;&6 Senior ,anagement Involvement in 2P9 Programs Audit9Assurance b4ective Senior management participates in !e# decisions related to H@7 programs& <& Senior *anagement versight o H@7 @rograms Control Senior management provides oversight o the H@7 programs, including revie" and approval o policies aecting their respective operations&
*1&D
;&6&1&1 Getermine i business units aected b# H@7 implementation participate in the revie" o policies aecting their business units& ;&6&1&6 Getermine i support unctions (e&g&, L-, corporate communications, compliance, inormation securit#) aected b# H@7 implementation participate in the revie" o H@7 policies&
5 6016 ISACA& All rights reserved& @age 1<
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
,- Po"icy &1 6R Policies Aligned :ith and Su$$ort 2P9 Policies Audit9Assurance b4ective H@7 policies align "ith and are integrated into L- policies& 8& L- @olicies Include -elated H@7 @olicies Control L- policies include H@7 disclosures, usage re=uirements as part o initial PonboardingP process and the annual emplo#ee ac!no"ledgement o use policies&
@&; @&
=
@&8 *;&1 *;&;
= = =
&1&1&1 btain a selection o L- policies relating to H@7 usage& &1&1&6 Getermine i H@7 usage policies are incorporated in the L- policies& &6 2P9 Policies in Com$liance :ith Cor$orate Policies Audit9Assurance b4ective H@7 policies align "ith corporate compliance policies& & H@7 @olicies Are in Compliance With Corporate Compliance and -elated @olicies Control Corporate compliance (inancial reporting, regulator# and statutor#) unctions revie" H@7 policies prior to implementation to assure adherence to appropriate re=uirements& &6&1&1 btain the corporate compliance policies relating to data securit# and privac#& &6&1&6 Getermine i H@7 re=uirements are a component o the policies& &6&1&; btain a selection o H@7 polic# proposals or modiications& &6&1& Getermine i corporate compliance representatives have revie"ed and provided documented approval o H@7 policies& &; 2P9 Policies in Com$liance :ith 1egal and Reg ulator/ Policies and Re7uirements Audit9Assurance b4ective H@7 policies align "ith legal and regulator# policies and re=uirements& 10& H@7 @olicies Are in Compliance With >egal -egulator# -e=uirements Control H@7 technologies are deined to satis# legal and regulator# re=uirements "ithin the enterpriseKs industr#&
@&8 *;&1 *;&6
&;&1&1 btain a selection o H@7 polic# proposals or modiications& &;&1&6 Getermine i the enterprise:s legal representatives have revie"ed and provided 5 6016 ISACA& All rights reserved& @age 18
= = =
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
documented approval o H@7 policies& & 2P9 Policies Align :ith Information Securit/ Audit9Assurance b4ective H@7 policies are in compliance "ith inormation securit# policies 11& H@7 @olicies Are Approved b# the Inormation Securit# 'unction Control $he inormation securit# unction assures compliance "ith inormation securit# polic# b# revie"ing inormation securit#%related H@7 policies prior to their adoption and implementation&
@&; @& GSD&1 *6&D *;&
=
@6&;
=
&&1&1 btain a selection o H@7 polic# proposals or modiications& &&1&6 Getermine i inormation securit# representatives have revie"ed and provided documented approval o H@7 policies& &D 2P9 Polic/ Integrated :ith +nter$rise;s Data Classification Polic/ Audit9Assurance b4ective Gata Classiication @olic# includes H@7 usage and coniguration re=uirements& 16& Gata Classiication @olic# H@7 -e=uirements Control $he data classiication polic# identiies H@7 re=uirements and coniguration or each data classiication& &D&1&1 btain the data classiication polic#& &D&1&6 Getermine i the data classiication polic# includes H@7 coniguration and usage re=uirements& &D&1&; Getermine i the H@7 coniguration and usage polic# includes speciic applications or data elements re=uiring H@7 usage& &D&1& Getermine i H@7 coniguration and usage polic# identiies unctions that must be e/ecuted using a H@7, and unctions that must be e/cluded rom e/ecution, "ith or "ithout a H@7&
5 6016 ISACA& All rights reserved& @age 1
=
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
5- Con6guration D&1 2P9 Architecture Audit9Assurance b4ective est securit# practices are implemented or the various H@7 architectures& @6&1 GSD& GSD&10
1;& dge -outers 1
=
1& dge -outer $ermination Control dge routers terminate at the net"or! ire"all and an eective ire"all coniguration applies appropriate iltering& D&1&1&1&1 Identi# edge routers "ithin the net"or! architecture& D&1&1&1&6 Getermine that the edge router terminates (a) at or in ront o the G*Q or (b) at an inline Intrusion @revention S#stem (I@S) deplo#ed bet"een the edge router and the ire"all& D&1&1&1&; Select a sample o edge routers& D&1&1&1& Getermine i the edge routers selected terminate at the ire"all or in the G*Q& 1D& dge -outer ncr#ption Control dge routers use as#mmetric !e#s supported b# a @ublic Ee# Inrastructure or alternativel#, one o the t"o standard s#mmetric !e# technologies, ;GS or AS 6 D&1&1&1&D Select a sample o edge routers&
= GSD&8 GSD&
D&1&1&1& Identi# the encr#ption coniguration in use to protect the data& D&1&1&1&< Getermine the eectiveness o the control o !e#s and digital certiicates&
1 $hese are deined as untrusted site%to%site connected net"or!s& 6 Consider perorming an audit o the @EI implementation using the ISACA ,-commerce and Pu$lic 8ey Infrastructure P8I0 Audit/Assurance Program & ncr#ption controls, including !e# storage, !e# maintenance, securit#, etc&, should be revie"ed& 5 6016 ISACA& All rights reserved& @age 60
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
D&1&1&1&8 Getermine i an untrusted partner "ould have the abilit# to compromise the private !e# structure& 1& $rusted -outers ; 1<& $rusted -outer $ermination Control $rusted routers terminate in a trusted G*Q or "ithin the net"or!, sub4ect to appropriate ire"all iltering & D&1&1&1& Identi# trusted router terminations "ithin the net"or! architecture&
GSD& GSD&10 GS&6
=
GSD&< GSD&8
=
@D& @&6 GSD&;
=
D&1&1&1&10 Getermine that the trusted router terminates in a designated G*Q designed "ith ire"all iltering appropriate to the data classiication o the data traversing the net"or! segment& D&1&1&1&11 Getermine that the designated G*Q is designed "ith ire"all iltering appropriate to the data classiication o the data traversing the net"or! segment& 18& $rusted -outer ncr#ption Control $rusted routers use s#mmetric !e#s supported b# appropriate !e# length, securit# o !e# storage and, "here appropriate, contracts9agreements D&1&1&1&16 Select a sample o trusted router net"or!s& D&1&1&1&1; Identi# the encr#ption coniguration in use to protect the data& D&1&1&1&1 Getermine the eectiveness o the control o !e#s& D&1&1&1&1D Getermine i appropriate S>As, contracts and other legal remedies have been e/ecuted bet"een nonrelated parties& D&1&1&1&1 Getermine i a trusted partner "ould have the abilit# to compromise the !e# structure& 1& SS> H@7 60& Secure SS> H@7 Coniguration Control SS> H@7 is installed "ith a secure coniguration "hich mitigates its inherent "ea!nesses&
; $hese are deined as site%to%site net"or!s integrated into a "ide%area local area net"or! (>A7)& $his generall# applies to e/tranets and non%o"ned net"or!s& 5 6016 ISACA& All rights reserved& @age 61
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
GSD& GSD&10 &1&1&1< btain the SS> H@7 Coniguration @olic#& D&1&1&1&18 Getermine i strong user authentication has been implemented& Consider $"o%actor authentication • @ass"ord A7G hard"are to!ens • Gigital certiicates • Smart cards • D&1&1&1&1 Getermine i user computer identit# veriication has been implemented ?ser computer validated to be in compliance "ith enterprise • securit# re=uirements and policies prior to connection& Halidation o user computer identit# and c oniguration includes • @ersonal ire"all coniguration Antivirus9mal"are coniguration and currenc# o pattern iles -e=uired securit# patches >imitation o split tunneling D valuation o registr# entries D&1&1&1&60 Getermine i a secure des!top solution or 2sandbo/ing3 has been implemented or connections not satis#ing or unable to validate computer identit# veriication& D&1&1&1&61 Getermine i the SS> H@7 provides or deletion o all session data rom the client:s cache, including ro"ser histor# • Internet temporar# iles • Coo!ies • Gocuments •
D $his enables net"or! traic to traverse separate net"or!s via the same net"or! connection& 5 6016 ISACA& All rights reserved& @age 66
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
@ass"ords • D&1&1&1&66 Getermine i the SS> H@7 provides a !e#stro!e logger detection s"eep prior to completing a connection& D&1&1&1&6; Getermine i session time%outs are implemented and "hat the time%out period is and determine i it complies "ith securit# policies, standards and procedures& D&1&1&1&6 Getermine i SS> veriication is re=uired prior to connection and denied i the SS> version level is at a lo"er level that securit# polic# dictates& D&1&1&1&6D Getermine i server certiicate support has been implemented and "ill onl# permit connection "ith a valid, authenticated certiicate& D&1&1&1&6 Getermine i resource availabilit#, s#stem unctionalit#, and application access are limited based on satis#ing the coniguration parameters considered above& D&1&1&1&6< Getermine i public computers (e&g&, Internet caRs, !ios!s, etc&) are permitted to connect to the SS> H@7& D&1&1&1&68 Getermine i client%side certiicates are re=uired, and i so, connection is contingent upon client%side certiicate veriication and authentication& 61& SS> H@7 A"areness @rogram Control ?ser education and securit# a"areness is provided on a regular basis and participation b# all users o the enterpriseKs H@7 acilities is re=uired&
GS1& GS<
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
D&1&1& valuate ho" the ollo"%up process is maintained to assure user participation& D&1&1&D Getermine i participation is documented in logs or sign%in sheets& 66& H@7 Appliances GS&6
5 6016 ISACA& All rights reserved& @age 6;
g n i r o t i n o *
= = =
D&1&1&6 Getermine that H@7 a"areness and securit# programs are routinel# and regularl# oered& D&1&1&; Getermine i the securit# a"areness program addresses H@7 use polic#&
6;& H@7 Appliance Coniguration and Hendor Support Control H@7 appliances are maintained "ith the most current coniguration,
Reference Issue 6/$er5 Cross5 Comments link reference
=
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
and support is readil# available rom the vendor& D&1&1&D&1 Heri# that the most current coniguration o the H@7 appliance has been applied& D&1&1&D&6 Getermine that a vendor support contract or vendor support option is available& 6& H@7 Appliance Coniguration est @ractices Control Hendor%suggested and other best practices are applied to H@7 appliance coniguration&
GSD&< GSD& GSD&10 GS&6
=
GSD& GSD&D GS&6 GS10
=
D&1&1&D&; Getermine i the H@7 appliance vendor oers best practice guidance& D&1&1&D& Getermine i the H@7 appliance coniguration is in compliance "ith vendor guidance& 6D& H@7 Clients Installed on Speciic Computers 6& H@7 Clients Are Securel# Conigured Control H@7 clients are conigured using vendor%suggested and other best practices in compliance "ith organiation securit# policies & D&1&1&D&D Getermine i strong user authentication has been implemented $"o%actor authentication • @ass"ord A7G hard"are to!ens, digital certiicates or smart • cards D&1&1&D& Getermine i user computer identit# veriication has been implemented ?ser computer is in compliance "ith organiation securit# • re=uirements and policies Halidation o user computer identit# and coniguration • @ersonal ire"all coniguration Antivirus9mal"are coniguration and currenc# o pattern iles -e=uired securit# patches 5 6016 ISACA& All rights reserved& @age 6
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
>imitation o split tunnelingD valuation o registr# entries D&1&1&D&< Getermine i resource availabilit#, s#stem unctionalit# and application access are limited to authoried individuals, based on satis#ing the coniguration parameters considered above& 6<& H@7 Clients Are Installed ased on Fob 'unctional 7eed Control H@7 clients are installed on user computers based on data classiication polic# o applications installed on computer or on another re=uest& D&1&1&D&8 Getermine i the data classiication polic# re=uires a H@7 be installed as a condition o accessing speciic sensitive data& D&1&1&D& Select a sample o computers "ith the H@7 installed and determine i the data classiication polic#9H@7 polic# is practiced& 68& H@7s Installed on 2 ring Oour "n Gevice3 Adhere to Inormation Securit# @olic# Control H@7s installed on non%enterprise o"ned e=uipment subscribe to minimum securit# standards& D&1&1&D&10 Getermine i user computer identit# veriication has been implemented ?ser computer in compliance "ith enterprise securit# • re=uirements and policies Halidation o user computer identit# and coniguration • @ersonal ire"all coniguration Antivirus9mal"are coniguration and currenc# o pattern iles -e=uired securit# patches >imitation o split tunnelingD valuation o -egistr# entries 6& H@7 Access Is -emoved ?pon $ermination or $ranser Control H@7 access is terminated or removed as part o the user deprovisioning process& D&1&1&D&11 btain the deprovisioning procedure&
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
@6&; GS&6
=
GSD& GSD&10 GS&6
=
GSD& GSD&10
=
5 6016 ISACA& All rights reserved& @age 6D
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
D&1&1&D&16 Getermine that the H@7 deactivation is part o the deprovisioning process& D&1&1&D&1; btain a sample o recent user terminations and determine that the H@7 privileges or the terminated users have been deactivated& ;0& H@7 Installation >ist -evie" Control $he list o installed H@7s is revie"ed at least annuall#& ;1& Getermine i a list o computers or users "ith H@7s installed e/ists& ;6& I the list e/ists, determine i the list is revie"ed at least annuall# to ensure that onl# authoried users have access to and have an installed H@7& D&6 2P9 Architecture Audit9Assurance b4ective $he H@7 architecture is revie"ed on a regular basis to ensure the solution is current and addresses the ris! and vulnerabilit# issues identiied in ris! assessments& ;;& H@7 Architecture -evie" Control H@7 architecture revie" is conducted on a regular basis& D&6&1&1 Getermine i the H@7 architecture revie" process is documented&
@6&1 @;
D&6&1&6 Getermine the date o the most re cent H@7 architecture revie"& D&6&1&; valuate the eectiveness o the most recent revie"& D&6&1& Getermine i a vulnerabilit# e/ists due to out%o%date technolog#&
7- 2aintenance and 2onitoring &1 Patch ,anagement Audit9Assurance b4ective H@7 technolog# is included in the routine patch management process& ;& @atch *anagement Administration Control @atch management o H@7 technolog# is included in the coniguration change management processes&
AI AI< GS&6
&1&1&1 Scan the change management s#stem or coniguration changes aecting the H@7 technologies& 5 6016 ISACA& All rights reserved& @age 6
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
&1&1&6 Getermine i the change management process implemented or H@7 maintenance is in compliance "ith the installation change management procedure& &6 Integration of 2P9 echnologies :ith the 6el$ Desk Audit9Assurance b4ective H@7 support re=uests are processed routinel# through the help des!& ;D& H@7 Support Is @rovided b# the Lelp Ges! Control H@7 support is a help des! tas! "ith appropriate controls and procedures&
GS8 GS10
GS;
&6&1&1 btain the help des! procedures& &6&1&6 Getermine i H@7 support tas!s are included in the help des! @rocedures& &6&1&; Getermine i H@7 issues are reported in the incident reporting9issue monitoring s#stem& &6&1& Select H@7 related incidents in the help des!, Incident -eporting, and9or Issue *onitoring S#stem& &6&1&D Getermine that the issues "ere closed on a timel# basis in an eective manner& &; 2P9 Ca$acit/ Planning Audit9Assurance b4ective H@7 utiliation and resources re=uirements are integrated into the installation capacit# plan& ;& H@7 Capacit# @lanning Control $he capacit# plan incorporated H@7 re=uired resources and such resources are activel# monitored& &;&1&1 btain the installation capacit# plan& &;&1&6 Getermine that H@7 technologies are included in the plan& &;&1&; valuate capacit# reports to determine that H@7 resource utiliation is monitored and the necessar# ad4ustments are implemented in a timel# manner&
5 6016 ISACA& All rights reserved& @age 6<
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
VPN Security Audit/Assurance Program C*S*
C*BI Cross5 reference
Audit4Assurance Program Ste$
t n e m n o r i v n , l o r t n o C
t n e m s s e s s A ! s i -
s e i t i v i t c A l o r t n o C
Reference Issue 6/$er5 Cross5 Comments link reference g n i r o t i n o *
& 2P9 ,onitoring Audit9Assurance b4ective @rocesses e/ist to monitor H@7 usage and identi# unauthoried activities and H@7 usage& ;<& H@7 *onitoring Control H@7 usage is monitored or unauthoried use&
GSD&D
&&1&1 Getermine the process or revie"ing H@7 usage& &&1&6 Select a sample o H@7 usage violations& Getermine ho" the violations "ere investigated and the actions ta!en&
Gue to high volume, logging should be automated and unusual activities should be deined in an automated e/tract process& 5 6016 ISACA& All rights reserved& @age 68
VPN Security Audit/Assurance Program
2II% ,aturit/ Assessment $he maturit# assessment is an opportunit# or the revie"er to assess the maturit# o the processes revie"ed& ased on the results o audit9assurance revie"s, and the revie"er:s observations, assign a maturit# level to each o the ollo"ing CI$ &1 control practices& When completing this assessment, ocus the evaluation on ho" the H@7 implementation relates to each o the issues identiied in the ollo"ing table&
C*BI <%' Control Practice
Assessed ,aturit/
DS5.3 Identity Management 1& stablish and communicate policies and procedures to uni=uel# identi#, authenticate and authorise access mechanisms and access rights or all users on a need%to%!no"9need%to%have basis, based on predetermined and preapproved roles& Clearl# state accountabilit# o an# user or an# action on an# o the s#stems and9or applications involved& 6& nsure that roles and access authorisation criteria or assigning user access rights ta!e into account Sensitivit# o inormation and applications involved (data classiication) @olicies or inormation protection and dissemination (legal, regulator#, internal policies and contractual re=uirements) -oles and responsibilities as deined "ithin the enterprise $he need%to%have access rights associated "ith the unction Standard but individual user access proiles or common 4ob roles in the organisation -e=uirements to guarantee appropriate segregation o duties ;& stablish a m ethod or authenticating and authorising users to establish responsibilit# and enorce access rights in line "ith sensitivit# o inormation and unctional application re=uirements and inrastructure components, and in compliance "ith applicable la"s, regulations, internal policies and contractual agreements& & Geine and implement a procedure or identi#ing ne" users and recording, approving and maintaining access rights& $his needs to be re=uested b# user management, approved b# the s#stem o"ner and implemented b# the responsible securit# person& D& nsure that a timel# inormation lo" is in place that reports changes in 4obs (i&e&, people in, people out, people change)& +rant, revo!e and adapt user access rights in co%ordination "ith human resources and user departments or users "ho are ne", "ho have let the organisation, or "ho have changed roles or 4obs& • •
• • • •
5 6016 ISACA All rights reserved& @age 6
arget ,aturit/
Reference 6/$er5 link
Comments
VPN Security Audit/Assurance Program
C*BI <%' Control Practice
Assessed ,aturit/
DS5.4 User Ao!nt Management 1& nsure that access control procedures include but are not limited to ?sing uni=ue user IGs to enable users to be lin!ed to and held accountable or their actions A"areness that the use o group IGs results in the loss o individual accountabilit# and are permitted onl# "hen 4ustiied or business or operational reasons and compensated b# mitigating controls& +roup IGs must be approved and documented Chec!ing that the user has authorisation rom the s#stem o"ner or the use o the inormation s#stem or service, and the level o access granted is appropriate to the business purpose and consistent "ith the organisational securit# polic# A procedure to re=uire users to understand and ac!no"ledge their access rights and the conditions o such access nsuring that internal and e/ternal service providers do not provide access until authorisation procedures have been completed *aintaining a ormal record, including access levels, o all persons registered to use the service A timel# and regular revie" o user IGs and access rights 6& nsure that management revie"s or reallocates user access rights at regular intervals using a ormal process& ?ser access rights should be revie"ed or reallocated ater an# 4ob changes, such as transer, promotion, demotion or termination o emplo#ment& Authorisations or special privileged access rights should be revie"ed independentl# at more re=uent intervals& • •
•
•
•
•
•
DS5.5 Se!rity "esting# S!r$eillane and Monitoring 1& Implement monitoring, testing, revie"s and other controls to @romptl# prevent9detect errors in the results o processing @romptl# identi# attempted, successul and unsuccessul securit# breaches and incidents Getect securit# events and thereb# prevent securit# incidents b# using detection and prevention technologies Getermine "hether the actions ta!en to resolve a breach o securit# are eective 6& Conduct eective and eicient securit# testing procedures at regular intervals to Heri# that identit# management procedures are eective Heri# that user a ccount management is eective Halidate that securit#%relevant s#stem parameter settings are deined correctl# and are in compliance "ith the inormation securit# baseline Halidate that net"or! securit# controls9settings are conigured properl# and are in compliance "ith the inormation securit# baseline Halidate that securit# monitoring procedures are "or!ing properl# Consider, "here necessar#, obtaining e/pert revie"s o the securit# perimeter • • •
•
• • •
•
• •
5 6016 ISACA All rights reserved& @age ;0
arget ,aturit/
Reference 6/$er5 link
Comments
VPN Security Audit/Assurance Program
C*BI <%' Control Practice
Assessed ,aturit/
DS5.% &rotetion o' Se!rity "e(nology 1& nsure that all hard"are, sot"are and acilities related to the securit# unction and controls, e&g&, securit# to!ens and encr#ptors, are tamperproo& 6& Secure securit# documentation and speciications to prevent unauthorised access& Lo"ever, do not ma!e securit# o s#stems reliant solel# on sec rec# o securit# speciications& ;& *a!e the securit# design o dedicated securit# technolog# (e&g&, encr#ption algorithms) strong enough to resist e/posure, even i the securit# design is made available to unauthorised individuals& & valuate the protection mechanisms on a regular basis (at least annuall#) and perorm updates to the protection o the securit# technolog#, i necessar#& DS5.) Cry*togra*(i +ey Management 1& nsure that there are appropriate procedures and practices in place or the generation, storage and rene"al o the root !e#, including dual custod# and observation b# "itnesses& 6& *a!e sure that procedures are in place to determine "hen a root !e# rene"al is re=uired (e&g&, the root !e# is compromised or e/pired)& ;& Create and maintain a "ritten certiication practice statement that describes the practices that have been implemented in the certiication authorit#, registration authorit# and director# "hen using a public%!e#%based encr#ption s#stem& & Create cr #ptographic !e#s in a secure manner& When possible, enable onl# individuals not involved "ith the operational use o the !e#s to create the !e #s& Heri# the credentials o !e# re=uestors (e&g&, registration authorit#)& D& nsure that cr#ptographic !e#s are distributed in a secure manner (e& g&, oline mechanisms) and stored securel#, that is In an encr#pted orm regardless o the storage media used (e&g&, "rite%once dis! "ith encr#ption) With ade=uate ph#sical protection (e&g&, sealed, dual custod# vault) i stored on paper & Create a process that identiies and revo!es compromised !e#s& 7oti# all sta!eholders as soon as possible o the compromised !e#& <& Heri# the authenticit# o the counterpart# beore establishing a trusted path& •
•
5 6016 ISACA All rights reserved& @age ;1
arget ,aturit/
Reference 6/$er5 link
Comments
VPN Security Audit/Assurance Program
C*BI <%' Control Practice
Assessed ,aturit/
DS5., Maliio!s So'tware &re$ention# Detetion and Corretion 1& stablish, document, communicate and enorce a malicious sot"are prevention polic# in the organisation& nsure that people in the organisation are a"are o the need or protection against malicious sot"are, and their responsibilities relative to same& 6& Install and activate malicious sot"are protection tools on all processing acilities, "ith malicious sot"are deinition iles that are updated as re=uired (automaticall# or semi% automaticall#)& ;& Gistribute all protection sot"are centrall# (version and patch%level) using centralised coniguration and change management& & -egularl# revie" and evaluate inormation on ne" potential threats& D& 'ilter incoming traic, such as email and do"nloads, to protect against unsolicited inormation (e&g&, sp#"are, phishing emails)& DS5.- /etwork Se!rity 1& stablish, maintain, communicate and enorce a net"or! securit# polic# (e&g&, provided services, allo"ed traic, t#pes o connections permitted) that is revie"ed and updated on a regular basis (at least annuall#)& 6& stablish and regularl# update the standards and procedures or administering all net"or!ing components (e&g&, core routers, G*Q, H@7 s"itches, "ireles s)& ;& @roperl# secure net"or! devices "ith special mechanisms and tools (e&g&, authentication or device management, secure communications, strong authentication mechanisms)& Implement active monitoring and pattern recognition to protect devices rom attac!& & Conigure operating s#stems "ith minimal eatures enabled (e&g&, eatures that are necessar# or unctionalit# and are hardened or securit# applications)& -emove all unnecessar# services, unctionalities and interaces (e&g&, graphical user interace M+?IN)& Appl# all relevant securit# patches and ma4or updates to the s #stem in a timel# manner& D& @lan the net"or! securit# architecture (e&g&, G*Q arc hitectures, internal and e/ternal net"or!, IGS placement and "ireless) to address processing and securit# re=uirements& nsure that documentation contains inormation on ho" traic is e/changed through s#stems and ho" the structure o the organisation:s internal net"or! is hidden rom the outside "orld& & Sub4ect devices to revie"s b# e/perts "ho are independent o the implementation or maintenance o the devices&
5 6016 ISACA All rights reserved& @age ;6
arget ,aturit/
Reference 6/$er5 link
Comments
VPN Security Audit/Assurance Program
C*BI <%' Control Practice
Assessed ,aturit/
arget ,aturit/
DS,.0 Identi'iation and Maintenane o' Con'ig!ration Items 1& Geine and implement a polic# re=uiring all coniguration items and their attributes and versions to be identiied and maintained& 6& $ag ph#sical assets according to a deined polic#& Consider using an automated mechanism, such as barcodes& ;& Geine a polic# that integrates incident, change and problem management procedures "ith the maintenance o the coniguration repositor#& & Geine a process to record ne", modiied and deleted coniguration items and their relative attributes and versions& Identi# and m aintain the relationships bet"een coniguration items in the coniguration repositor#& D& stablish a process to maintain an audit trail or all changes to coniguration items& & Geine a process to identi# critical coniguration items in relationship to business unctions (component ailure impact anal#sis)& <& -ecord all assetsincluding ne" hard"are and sot"are, procured or internall# developed "ithin the coniguration management data repositor#& 8& Geine and implement a process to ensure that valid licences are in place to prevent the inclusion o unauthorised sot"are&
2III% ,aturit/ Assessment vs% arget Assessment $his spider graph is an e/ample o the assessment results and maturit# target or a H@7 securit# assessment&
5 6016 ISACA All rights reserved& @age ;;
Reference 6/$er5 link
Comments