IT Service Delivery And Support Week Nine IT Auditing and Cyber Security Spring 2013 Instructor: Liang Yao (MBA MS CIA CISA CISSP) 1.

Slides:



Advertisements
Similar presentations
Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Advertisements

Museum Presentation Intermuseum Conservation Association.
Security and Stockpile
Module 2: Knowing Your Hazards
Site Safety Plans PFN ME 35B.
Module 3: Developing Plans
/0403 Copyright ©2004 Business and Legal Reports, Inc. BLRs Safety Training Presentations Transportation Security TrainingPart II 49 CFR
Facilities Management and Design Chapter 4 Safety and Security systems.
Emergency Preparedness and Response
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
EMS Checklist (ISO model)
Jump to first page Business Continuity Planning The evolution of Disaster Recovery Planning.
Effectively applying ISO9001:2000 clauses 6 and 7.
Chapter 7: Physical & Environmental Security
Let’s watch a DVD… DVD Instructor Notes
1. 2 Earthquake effects on health care facilities 2.
Checking & Corrective Action
Environmental Management Systems Refresher
© 2006 Carnegie Mellon University :1 Physical Security.
There are three types of emergencies:  Internal  External  Natural disasters.
Emergency Evacuation Zayed University, Dubai Campus.
Temporary storage Sven Hagemann GRS. Types of temporary storage 1.Storage of commodity mercury  Dealer, wholesaler, governmental stocks 2.Storage of.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
9 - 1 Computer-Based Information Systems Control.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Information systems Integrity Protection. Facts on fraud  UK computer fraud 400 Million £  on companies  avg case £  France.
Information Security Principles and Practices
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Chapter 7: Assuring Safety and Security in Healthcare Institutions
Chapter 3.  Security Framework  Operational Security Lifecycle  Security Perimeter  Access Control  Social Engineering  Environmental Issues.
Chapter 8: Disaster Management
Agrochemicals and Security: Developing a Hazard Mitigation PlanHazmit-01 Developing a Hazard Mitigation Plan Agrochemicals and Security Developing a Hazard.
AMARI AIR BASE AT/FP EVAL 9 JUNE (No photos taken due to tight security)
每时每刻 可信安全 1 What category of water sprinkler system is currently the most recommended water system for a computer room? A Dry Pipe sprinkler system B Wet.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 The Karmanos Cancer Center’s ENVIRONMENT OF CARE 2009.
Why HSE in an Organization
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
Preparing for Disasters General Liability. Introduction  The one coverage that provides you and your business the most protection is General Liability.
Information Systems Security Operations Security Domain #9.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Physical (Environmental) Security
Introduction to Information Security
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Cmpe 471: Personnel and Legal Issues. Personnel Crime is a human issue not a technological one Hiring On-going management Unauthorised access Redundancy.
Physical security By Ola Abd el-latif Abbass Hassan.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Access Control Jeff Wicklund Computer Security Fall 2013.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Unit 1: Protecting the Facility (Virtual Machines)
Onsite CRM Security
Information Systems Security
NETW4005 COMPUTER SECURITY A
Division of Computer Studies
Understanding Back-End Systems
Managing the IT Function
Presentation transcript:

IT Service Delivery And Support Week Nine IT Auditing and Cyber Security Spring 2013 Instructor: Liang Yao (MBA MS CIA CISA CISSP) 1

Data Center 101 Facility-Based Controls Physical security HVAC Fire Suppression System Power Source Data Center Operations Security Roles and Responsibilities of Data Center Personal Segregation of Duty of Data Center Personal Emergency and Disaster Response Facility and Equipment Maintenance Data Center Capacity Planning Data Center Data Center & Operations Audit 2

Data Center 101 – A data center or computer centre (also datacenter) is a facility used to house computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) and security devices. Large data centers are industrial scale operations using as much electricity as a small town and sometimes are a significant source of air pollution in the form of diesel exhaust. - Wikipediadiesel exhaust Data Center & Operations Audit 3

What does a Data Center look like? =en&tbm=isch&tbo=u&source=univ&sa=X&ei=NOlQUY6L NrXF4APVyICAAg&ved=0CE4QsAQ&biw=1786&bih=779 Data Center & Operations Audit 4

Physical Security and Access Control Build on the right spot. Be sure the building is some distance from headquarters (20 miles is typical) and at least 100 feet from the main road. Bad neighbors: airports, chemical facilities, power plants. Bad news: earthquake fault lines and (as we've seen all too clearly this year) areas prone to hurricanes and floods. And scrap the "data center" sign. 2. Have redundant utilities. Data centers need two sources for utilities, such as electricity, water, voice and data. Trace electricity sources back to two separate substations and water back to two different main lines. Lines should be underground and should come into different areas of the building, with water separate from other utilities. Use the data center's anticipated power usage as leverage for getting the electric company to accommodate the building's special needs. Data Center & Operations Audit 5

Physical Security and Access Control Pay attention to walls. Foot-thick concrete is a cheap and effective barrier against the elements and explosive devices. For extra security, use walls lined with Kevlar. Avoid windows. Think warehouse, not office building. If you must have windows, limit them to the break room or administrative area, and use bomb-resistant laminated glass.use bomb-resistant laminated glass Use landscaping for protection. Trees, boulders and gulleys can hide the building from passing cars, obscure security devices (like fences), and also help keep vehicles from getting too close. Oh, and they look nice too.landscaping Keep a 100-foot buffer zone around the site. Where landscaping does not protect the building from vehicles, use crash-proof barriers instead. Bollard planters are less conspicuous and more attractive than other devices. Data Center & Operations Audit 6

Physical Security and Access Control Use retractable crash barriers at vehicle entry points. Control access to the parking lot and loading dock with a staffed guard station that operates the retractable bollards. Use a raised gate and a green light as visual cues that the bollards are down and the driver can go forward. In situations when extra security is needed, have the barriers left up by default, and lowered only when someone has permission to pass through. retractable bollards Plan for bomb detection. For data centers that are especially sensitive or likely targets, have guards use mirrors to check underneath vehicles for explosives, or provide portable bomb-sniffing devices. You can respond to a raised threat by increasing the number of vehicles you checkperhaps by checking employee vehicles as well as visitors and delivery trucks. Limit entry points. Control access to the building by establishing one main entrance, plus a back one for the loading dock. This keeps costs down too.the loading dock Data Center & Operations Audit 7

Physical Security and Access Control Make fire doors exit only. For exits required by fire codes, install doors that don't have handles on the outside. When any of these doors is opened, a loud alarm should sound and trigger a response from the security command center. Use plenty of cameras. Surveillance cameras should be installed around the perimeter of the building, at all entrances and exits, and at every access point throughout the building. A combination of motion-detection devices, low-light cameras, pan-tilt-zoom cameras and standard fixed cameras is ideal. Footage should be digitally recorded and stored offsite.Surveillance cameras Protect the building's machinery. Keep the mechanical area of the building, which houses environmental systems and uninterruptible power supplies, strictly off limits. If generators are outside, use concrete walls to secure the area. For both areas, make sure all contractors and repair crews are accompanied by an employee at all times. Data Center & Operations Audit 8

Physical Security and Access Control Plan for secure air handling. Make sure the heating, ventilating and air- conditioning systems can be set to recirculate air rather than drawing in air from the outside. This could help protect people and equipment if there were some kind of biological or chemical attack or heavy smoke spreading from a nearby fire. For added security, put devices in place to monitor the air for chemical, biological or radiological contaminant.chemical, biological or radiological contaminant Ensure nothing can hide in the walls and ceilings. In secure areas of the data center, make sure internal walls run from the slab ceiling all the way to subflooring where wiring is typically housed. Also make sure drop-down ceilings don't provide hidden access points. Use two-factor authentication. Biometric identification is becoming standard for access to sensitive areas of data centers, with hand geometry or fingerprint scanners usually considered less invasive than retinal scanning. In other areas, you may be able to get away with less-expensive access cards. Data Center & Operations Audit 9

Physical Security and Access Control Harden the core with security layers. Anyone entering the most secure part of the data center will have been authenticated at least three times, including: At the outer door. Don't forget you'll need a way for visitors to buzz the front desk. At the inner door. Separates visitor area from general employee area. At the entrance to the "data" part of the data center. Typically, this is the layer that has the strictest "positive control," meaning no piggybacking allowed. A floor-to-ceiling turnstile. If someone tries to sneak in behind an authenticated user, the door gently revolves in the reverse direction. (In case of a fire, the walls of the turnstile flatten to allow quick egress.) A "mantrap." Provides alternate access for equipment and for persons with disabilities. This consists of two separate doors with an airlock in between. Only one door can be opened at a time, and authentication is needed for both doors. At the door to an individual computer processing room. This is for the room where actual servers, mainframes or other critical IT equipment is located. Provide access only on an as-needed basis, and segment these rooms as much as possible in order to control and track access. Data Center & Operations Audit 10

Physical Security and Access Control Watch the exits too. Monitor entrance and exitnot only for the main facility but for more sensitive areas of the facility as well. It'll help you keep track of who was where when. It also helps with building evacuation if there's a fire. Prohibit food in the computer rooms. Provide a common area where people can eat without getting food on computer equipment. Install visitor rest rooms. Make sure to include bathrooms for use by visitors and delivery people who don't have access to the secure parts of the building. Source: csoonline.com 19 Ways to Build Physical Security into a Data Center Data Center & Operations Audit 11

Data Center & Operations Audit 12

Facility Based Controls: Access Control Systems Security Booth ID Check (Card-key, Biometric) Turnstile & Man Trap Visitors (?) Alarm Systems Burglar Alarm Fire Alarm Water Alarm Humidity Alarm Power Fluctuation Alarm Chemical or Gas Alarm Tools used to send alerts: e.g. WatchDog Data Center & Operations Audit 13

Facility Based Controls: Fire Suppression Systems Water Based System (Wet-pipe, Dry-pipe, ) Gas Based System (Halon vs. FM200) Power Redundant Power Feeds (connect to more than one power grid) Ground to Earth (to carry power away from critical equipment during fault condition) Power Conditioning (to flatten out harmful spike and sags in current) Battery Backups Power Generator Data Center & Operations Audit 14

Facility Based Controls: HVAC Heating Ventilation Air Condition Capacity and Redundancy Monitoring Network Connectivity Redundant Internet and WAN connections using different carriers Lease and Contract – Renew and Expiration Data Center & Operations Audit 15

Threats to Data Centers Natural Disaster (flooding, earthquakes, fire) Man-Made Threats (terrorist attack, riot, theft) Environmental Hazards (heat or humidity) Loss of utilities (Black out, Brown out) Auditors Concerns Physical Access Control (Preventive & Detective) System and Facility Monitoring Equipment Maintenance Record (HVAC, UPS, Generator, etc.) Emergency Responding Data Center & Operations Audit 16

Data Center Operations Roles and Responsibilities Segregation of Duties E.g. developers vs. Operations Capacity Planning and Monitoring Emergency Procedures to address reasonably anticipated threats (DR/BCP) Training and Education of Data Center Personnel Information Asset Disposal Data Center & Operations Audit 17

Statement of the issue: A summary statement of the actual finding or issue (the Fact) Standard (Policies and procedures, etc.) Root cause Impact/Effect (so what? Why the business should concern the risk/exposure found during the audit?) E.g. financial statement, customer satisfaction, reputation, litigation, etc. Action Plan Documenting Audit Findings 18

Root Cause Analysis Vanilla Ice Cream Dilemma Symptoms vs. causes Symptoms are the most immediate or obvious reason for a problem. Symptoms are simply conditions that exist because of the issue, but are not the direct/ true cause of the issue. Correcting symptoms will mask the problem for a short time period, but will not prevent the problem from occurring again. Documenting Audit Findings 19

Five Why Model Issue: Individuals have access to the claims processing system that should not have access. Why: Because the inappropriate security clearance has not been deleted from the system Why: Because system associates didnt know to delete the access Why: Operation Management didnt communicate to system when these individuals left the department Why: Operation Management didnt aware that they are responsible for communicating this information to the system area Why: Operation Management was not clear their responsibilities Documenting Audit Findings 20

Individual Assignment for Week Nine (due in two weeks, 4/11?) Write 4 IT audit findings based on the communication requirements learned from this class IT Audit area is at your choice (DB, AD, Unix/Linux, Network, Data Center, etc.) Documenting Audit Findings 21

Why need pre-implementation Audit Lack of Awareness of Control Guideline (C.I.A) Developers do not have adequate exposure or knowledge of IT polices and procedures Ambiguous Policy Statement Security and Controls are viewed as Disabler – Causing projects delay Control Ownership and Accountability Pre-implementation Audit 22

Pre-implementation Audit Scope Critical Success Factors (Project Steering Committee, PMO, etc.) Risk Management (quantify risks, contingency plan, management reporting) Requirements Management Project Management QA Configuration Management Staffing and Organization Sub-contractor and supplier Management Pre-implementation Audit 23