IT Service Delivery And Support Week Twelve IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA CISA CISSP) 1.

Slides:



Advertisements
Similar presentations
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Advertisements

SERVICE LEVEL AGREEMENTS The Technical Contract Within the Master Agreement.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
IT Governance Infocom India Presentation December 6, 2006.
Chapter 13 Managing Computer and Data Resources. Introduction A disciplined, systematic approach is needed for management success Problem Management,
Change Management (with an IT perspective). MBA Statement of Objective The object of undergoing this study-project is to develop an understanding.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
ITIL: Service Transition
COBIT - II.
The Islamic University of Gaza
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Managing the Information Technology Resource Jerry N. Luftman
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
ECM Project Roles and Responsibilities
Office of Inspector General (OIG) Internal Audit
Computer Security: Principles and Practice
Project Risk Management Risk Mitigation. Risk Management  The prime objective of risk management is to minimize the impact and probability of the occurrence.
Purpose of the Standards
© 2008 Prentice Hall11-1 Introduction to Project Management Chapter 11 Managing Project Execution Information Systems Project Management: A Process and.
Project Execution.
Information Systems Controls for System Reliability -Information Security-
Change Management Chris Colomb Trish Fullmer Jordan Bloodworth Veronica Beichner.
Capability Maturity Model
IT Service Delivery And Support Week Five IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA CISA CISSP) 1.
Change Advisory Board COIN v1.ppt Change Advisory Board ITIL COIN June 20, 2007.
Control environment and control activities. Day II Session III and IV.
Release & Deployment ITIL Version 3
What is Business Analysis Planning & Monitoring?
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Change and Patch Management Controls Critical for Organizational Success Global Technology Auditing Guide 2.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
N By: Md Rezaul Huda Reza n
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
The Challenge of IT-Business Alignment
Page 1 Internal Audit Outsourcing The Moss Adams Approach to Internal Audit Outsourcing Proposed SOX 404 Changes.
Internal Control in a Financial Statement Audit
COBIT - IT Governance.
PPMT CE-408T Engr. Faisal ur Rehman CED N-W.F.P UET P.
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Installation and Maintenance of Health IT Systems
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Service Transition & Planning Service Validation & Testing
1.  Describe an overall framework for project integration management ◦ RelatIion to the other project management knowledge areas and the project life.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Lecture 11 Managing Project Execution. Project Execution The phase of a project in which work towards direct achievement of the project’s objectives and.
Change and Patch Management Controls
Managing Change 1. Why Do Requirements Change?  External Factors – those change agents over which the project team has little or no control.  Internal.
Project Portfolio Management Business Priorities Presentation.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
State of Georgia Release Management Training
12-CRS-0106 REVISED 8 FEB 2013 BAI (Build, Acquire, and Implement) CDG4I3 / Audit Sistem Informasi Angelina Prima K | Gede Ary W. KK SIDE
Information Security tools for records managers Frank Rankin.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Program Performance Criteria.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Changing IT Managing Networks in a New Reality Alex Bakman Founder and CEO Ecora Software.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
ITIL: Service Transition
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Cybersecurity Policies & Procedures ICA
Description of Revision
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Managing Project Work, Scope, Schedules, and Cost
Presentation transcript:

IT Service Delivery And Support Week Twelve IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA CISA CISSP) 1

 Defining IT Change Management  Change Management Key Controls  Change Management Process  Why IT Change and Patch Management are Important  How IT Change and Patch Management Help Control IT Risks and Costs  Effective IT Change Management Elements  How to Verify IT Change and Patch Management Are Working?  How to Reduce IT Change Risks? Change Management 2

 What Internal Audit Should Do?  Change Management Related Standards and Guidance  Sample Change Management Audit Program  Integrate Patch Management, Release Management and Configuration Management Change Management 3

“All changes, including emergency maintenance and patches, relating to infrastructure and applications within the production environment are formally managed in a controlled manner. Changes (including those to procedures, processes, system and service parameters) are logged, assessed and authorised prior to implementation and reviewed against planned outcomes following implementation. This assures mitigation of the risks of negatively impacting the stability or integrity of the production. “ The COBIT Acquire and Implement (AI) domain addresses good practices for systems development and maintenance. AI6 Manage changes specifically addresses change management. Change Control: ISACA Definition 4

 “a set of process executed within the organization to manage the organization’s IT department designed to manage the enhancements, updates, incremental fixes, and patches to production systems.” (GTAG – Change and Patch Management Controls: Critical for Organizational Success)  E.g. Application code revision; System upgrades; Infrastructure changes. Defining Change Management 5

 Change Management Scope - upgrades or updates to IT assets are identified for moving to production  System and application maintenance  Emergency changes  Exclusion: changes occurs during the design and development phases  Source of Change  External environment ( e.g., competitive market, stakeholders/shareholders, changing risks).  Regulatory environment.  Business objectives, goals, strategies, requirements,  processes, and shifts in priorities.  Vendors (e.g., new products, upgrades, patches, and vulnerabilities).  Partners and suppliers.  Results of an audit, risk assessment, and other type of evaluation or assessment.  Operational problems.  Changes in performance or capacity requirements Defining Change Management 6

 Change Management Scope - upgrades or updates to IT assets are identified for moving to production  Scope of Changes  Hardware: mainframes, servers, workstations, routers, switches, and mobile devices.  Software: operating systems and applications.  Information, data, and data structures: files and databases.  Security controls: antivirus software, firewalls, and intrusion protection/detection systems.  Processes, policies, and procedures.  Roles/responsibilities: authorization, authority to act, and access controls. Defining Change Management 7

 Types of Changes in IT Operations  New installation  Replacement  Upgrade/Addition  Downgrade/Removal  Patches/hotfixes  Move/Relocation  Change Categories  Standard  Minor  Major  Significant Types of Changes in IT Operations & Change Categories 8

 Only the minimal staff required to implement IT production changes should have access to the production environment (preventive).  Authorization processes should involve stakeholders to assess and mitigate risks associated with proposed changes (preventive).  Supervisory processes should encourage IT management and staff to undertake their duties responsibly (preventive) and be able to detect errant performance (detective). Change Management Controls 9

 Identifying the need for the change.  Preparing for the change.  Documenting the change request in detail.  Documenting the change test plan.  Documenting a change rollback plan in the event of change failure.  Writing a step-by-step procedure that incorporates the change, test plan, and rollback plan.  Submitting the change procedure in the form of a change request.  Developing the business justification and obtaining approvals.  Assessing the impact, cost, and benefits associated with the change request.  Reviewing and assessing the risks and impacts of the change request, including regulatory impacts. Change Management Processes 10

 Authorizing the change request.  Authorizing, rejecting, or requesting additional information about the change request.  Prioritizing the change request with respect to others that are pending.  Scheduling, coordinating, and implementing the change.  Scheduling and assigning a change implementer.  Scheduling and assigning a change tester.  Testing the change in a preproduction environment.  Communicating the change to stakeholders who likely will be affected.  Approving the change for implementation.  Implementing the change as requested. Change Management Processes 11

 Verifying and reviewing the implemented change. (This is an often- overlooked critical step.)  Was the change successful?  Was the change process followed?  What was the variance between the planned and implemented change?  Were internal control, operations, and regulatory compliance requirements maintained?  What were the lessons learned that can be used to improve the process?  Backing out the change (if unsuccessful).  Closing the change request and communicating with the affected parties.  Making agreed-to changes to the change management process.  Publishing the change schedule. Change Management Processes 12

A good change management can help an organization:  Spend less money and IT energy on unplanned work.  Spend more money and IT energy on new work and achieving business goals.  Experience less downtime.  Install patches with minimum disruption.  Focus more on improvements and less on “putting out fires.” Why IT Change Management are Important 13

 Unauthorized business process changes being introduced into the operations  Financial statements being materially misstated  Unintended side effects  Inconsistent processing results  Changes not being recorded and tracked  Emergency changes being implemented without adequate oversight, resulting in the introduction of erroneous processes, unauthorized business processes and inefficiencies  Lack of priority management of changes  Inability to respond effectively to emergency change needs Key Risks Associated with Change Management 14

 Additional access authorization not being terminated properly  Unauthorized changes being applied, resulting in compromised security and unauthorized access to corporate information  Failure to comply with compliance requirements  Changes not being adequately prioritized or aggregated, resulting in lost productivity, late implementation of required changes, or redundancy  Adverse effects on capacity and performance of the infrastructure  System or application failure, resulting in lack of availability  Reduced system availability  Security intrusions  Insufficient allocation of resources Key Risks Associated with Change Management (cont.) 15

IT Management Needs to Know:  What is being changed, why it is being changed, and when it is being changed.  How efficiently and effectively changes are implemented.  Problems that are caused by changes and the severity of the problems.  Cost of the changes.  Benefits the changes provide.  Early and frequent involvement by management and end users to align IT changes with business needs.  A defined, predictable, repeatable process with defined, predictable, repeatable results.  Coordination and communication with constituents affected by changes. Effective IT Change Management Elements 16

 An documented change management process  Identify controls in place in change management process. Are controls in place and being improved, or are they just being evaluated and deferred until “firefighting” subsides?  Benefits from the change management process? Are there measurable benefits  Number of outages caused by changes? Recurrence of the problem?  How does IT monitor the effectiveness of the change management process?  Indicators and measures  What is the goal of our change management process?  How disruptive is the patching process? Is patch management part of a defined, repeatable change and release process, or is it ad hoc, informal, and emergency-based? Verify IT Change Management Effectiveness 17

 Top five poor change management indicator  Unauthorized changes (Above zero is unacceptable.)  Unplanned outages  Low change success rate  High number of emergency changes  Delayed project implementations Indicators & Symptoms 18

 Unavailability of critical services and functions — even for short periods of time.  Unplanned system or network downtime that halts execution of critical business processes, such as coordinating schedules with suppliers and responding to customer orders.  Downtime on critical applications, databases, or Web servers that prevent users from performing their critical tasks.  Negative publicity and unwanted board attention. Indicators & Symptoms 19

 Majority of the IT organization’s time is spent on operations and maintenance (>70 percent) instead of helping the business in deploying new capability.  Failure to complete projects and planned work (due to high amounts of “firefighting” and unplanned work).  IT management is being awakened in the middle of the night regarding problems.  High IT staff turnover.  Adversarial relationships between IT support staff, developers, and business customers (internal or external), usually over poor service quality or late delivery of functionality.  High amounts of time required for IT management to prepare for IT audits and to remediate the resulting findings. Indicators & Symptoms 20

 Changes authorized per week.  Changes implemented per week.  Number of unauthorized changes that circumvent the change process.  Change success rate (percentage of actual changes made that did not cause an outage, service impairment, or an episode of unplanned work).  Number of emergency changes (including patches).  Percentage of patches deployed in planned software releases.  Percentage of time spent on unplanned work.  Percentage of projects delivered later than planned. Indicators & Symptoms 21

 Create tone at the top motivating the need for a culture of change management across the enterprise that is supported by a declaration from IT management that the only acceptable number of unauthorized changes is zero. Preventive and detective controls can then be put in place to help achieve and sustain this objective, ensuring that all production changes can be reconciled with authorized work orders.  Continually monitor the number of unplanned outages, which is an excellent indicator of unauthorized change and failures in change control. How to Reduce IT Change Risks? 22

 Reduce the number of risky changes by specifying well-defined and enforced change freeze and maintenance windows. This maximizes stability and productivity during production hours. Unplanned outages serve as effective indicators that the change process is being circumvented.  Use change success rate as a key IT management performance indicator. Where changes are unmanaged, unmonitored, and uncontrolled, change success rates are typically less than 70 percent. Each failed change creates potential downtime, unplanned and emergency work, variance from plans, and business risk. Increasing the change success rate requires effective preventive, detective, and corrective controls.  Use unplanned work as an indicator of effectiveness of IT management processes and controls. High performing IT organizations typically spend less than 5 percent of their time on unplanned work, while average organizations often spend 45 percent to 55 percent of their time on unplanned (and urgent) activities. How to Reduce IT Change Risks? 23

 Understanding the organization’s objectives regarding confidentiality, integrity, and availability of IT processing.  Assisting in identifying risks that could arise from changes and determining whether such risks are consistent with the organization’s risk appetite and tolerances.  Assisting in deciding an appropriate portfolio of risk management responses.  Looking for and fostering a culture of disciplined change management, including promoting the benefits of good change management. What Internal Audit Should Do? 24

 Understanding the controls that are crucial to a solid IT change management approach:  Preventive.  Appropriate authorizations.  Separation of duties.  Supervision.  Detective.  Detection of unauthorized changes.  Monitoring of valid, objective change management metrics.  Corrective.  Post-implementation reviews.  Change information fed into early problem diagnosis steps.  Keeping up to date on leading IT change and patch management processes and recommending that the organization adopt them.  Demonstrating how management can reap the benefits of better risk management, greater effectiveness, and lower costs.  Assisting management in identifying practical, effective approaches to IT change management. What Internal Audit Should Do? 25

 Standards  Standard 2120: Risk Management  Practice Advisory : Assessing the Adequacy of Risk Management Processes  Standard 2130: Control  Practice Advisory : Assessing the Adequacy of Control Processes  Practice Advisory 2130-A1-1: Information Reliability and Integrity  Guidance  GTAG 1: IT Controls  GTAG 3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment  GTAG 9: Identity and Access Management  GTAG 17: IT Governance (pending publication)  Practice Guide, Auditing the Control Environment  Practice Guide, Assessing the Adequacy of Risk Management Change Management Related Standards and Guidance 26

 Control objective—Set up formal change management procedures to handle in a standardized manner all requests (including maintenance and patches) for changes to applications, procedures, processes, system and service parameters, and the underlying platforms.  Value drivers:  An agreed-upon standardized approach for managing changes in an efficient and effective manner  Changes reviewed and approved in a consistent and coordinated way  Formally defined expectations and performance measurements  Risk drivers:  Inappropriate resource allocation  No tracking of changes  Insufficient control over emergency changes  Increased likelihood of unauthorized changes being introduced to key business systems  Failure to comply with compliance requirements  Unauthorized changes  Reduced system availability AI6.1 Change standards and procedures 27

 Control objective — Assess all requests for change in a structured way to determine the impact on the operational system and its functionality. Ensure that changes are categorized, prioritized and authorized.  Value drivers:  An agreed-upon and standardized approach for assessing impacts in an efficient and effective manner  Formally defined change impact expectations based on business risk and performance measurement  Consistent change procedure  Risk drivers:  Unintended side effects  Adverse effects on capacity and performance of the infrastructure  Lack of priority management of changes AI6.2 Impact assessment, prioritization and authorization 28

 Control objective—Establish a process for defining, raising, testing, documenting, assessing and authorizing emergency changes that do not follow the established change process.  Value drivers:  An agreed-upon and standardized approach for managing changes in an efficient and effective manner  Formally defined emergency change expectations and performance measurement  Consistent procedure for emergency changes  Risk drivers:  Inability to respond effectively to emergency change needs  Additional access authorization not terminated properly  Unauthorized changes applied, resulting in compromised security and unauthorized access to corporate information AI6.3 Emergency changes 29

 Control objective—Establish a tracking and reporting system to document rejected changes, communicate the status of approved and in-process changes, and complete changes. Make certain that approved changes are implemented as planned.  Value drivers:  An agreed-upon and standardized approach for managing changes in an efficient and effective manner  Formally defined expectations and performance measurement  Consistent change procedure  Risk drivers:  Insufficient allocation of resources  Changes not recorded and tracked  Undetected unauthorized changes to the production environment AI6.4 Change status tracking and reporting 30

 Control objective—Whenever changes are implemented, update the associated system and user documentation and procedures accordingly.  Value drivers:  An agreed-upon and standardized approach for documenting changes  Formally defined expectations  Consistent change and documentation procedures  Risk drivers:  Increased dependence on key individuals  Configuration documentation failing to reflect the current system configuration  Lack of documentation of business processes  Failure of updates for hardware and software changes AI6.5 Change closure and documentation 31

Sample Change Management Audit Program from ISACA Change Management Audit Program 32

 Patch Management  Release Management  Configuration Management Related Topics 33