Presentation is loading. Please wait.

Presentation is loading. Please wait.

Application Review and Auditing Databases Quinn Gaalswyk, CISA Ted Wallerstedt, CISA, CIA Office of Internal Audit University of Minnesota.

Similar presentations


Presentation on theme: "Application Review and Auditing Databases Quinn Gaalswyk, CISA Ted Wallerstedt, CISA, CIA Office of Internal Audit University of Minnesota."— Presentation transcript:

1 Application Review and Auditing Databases Quinn Gaalswyk, CISA Ted Wallerstedt, CISA, CIA Office of Internal Audit University of Minnesota

2 Application Controls - Agenda Introduction & Ice Breaker - 9:00 App. Best Practices - 9:10 App. Reports - 9:25 App. Control Recap – 9:30 Database Security – 9:45 Timesheets Scenario – 10:45 Adjourn – 11:30

3 Where were you in 1991?

4 Best Practices Apply defense-in-depth. Use a positive security model. Fail safely. Run with least privilege. Avoid security by obscurity.

5 Best Practices Keep security simple. Detect intrusions and keep logs. Never trust infrastructure and services. Establish secure defaults. Use open standards

6 Application Security – Reports Overview Quinn Gaalswyk, CISA Senior Information Systems Auditor University of Minnesota

7 Report Overview Reports should support functional activities o Management reports – tie to business need o Exception reports Pragmatic and useful

8 Report Auditing Confirm activity is writing to report o Test data and test environment o Obtain reports from production Interview functional user to confirm reports serve needs Confirm reports are reviewed

9 Application Reports and Controls Recap Quinn Gaalswyk, CISA Senior Information Systems Auditor University of Minnesota

10 Application Input Controls #1 REVIEW AND EVALUATE DATA INPUT CONTROLS Prevent #2 DETERMINE THE NEED FOR ERROR/EXCEPTION REPORTS RELATED TO DATA INTEGRITY, AND EVALUATE WHETHER THIS NEED HAS BEEN FULFILLED Detect

11 Application Interface Controls #3 REVIEW AND EVALUATE THE CONTROLS IN PLACE OVER DATA FEEDS TO AND FROM INTERFACING SYSTEMS.

12 Data Synchronization #4 IN CASES WHERE THE SAME DATA ARE KEPT IN MULTIPLE DATABASES AND/OR SYSTEMS, PERIODIC 'SYNC' PROCESSES SHOULD BE EXECUTED TO DETECT ANY INCONSISTENCIES IN THE DATA.

13 Authentication #7. DOES AN AUTHENTICATION METHOD EXIST? Way to access application #12. ARE THERE STRONG PASSWORD CONTROLS IN PLACE? Two Factor Single Sign-on

14 Session Timeout #14. ARE USERS LOGGED OUT WHEN INACTIVE?

15 User Provisioning & De- Provisioning #13. IS BUSINESS NEED VERIFIED BEFORE ACCESS IS GRANTED? Approval #11. ARE RIGHTS REMOVED WHEN NO LONGER NEEDED? Automated Removal

16 Authorization #8. IS AUTHENTICATION AND AUTHORIZATION REQUIRED FOR ACCESS? Type of access provided #10. IS THERE TRANSACTION APPROVAL IN THE APPLICATION? #16. CAN DEVELOPERS CHANGE PRODUCTION SYSTEMS?

17 Application Administration #9. IS THE ADMIN FUNCTION ADEQUATE? User Admin System Admin

18 Data Encryption #15. IS DATA PROTECTED IN TRANSIT AND AT REST? -Encrypted in all states

19 Application Audit Trail #5 REVIEW AND EVALUATE THE AUDIT TRAILS PRESENT IN THE SYSTEM AND THE CONTROLS OVER THOSE AUDIT TRAILS.

20 Data Traceability #6 THE SYSTEM SHOULD PROVIDE A MEANS TO TRACE A TRANSACTION OR PIECE OF DATA FROM THE BEGINNING TO THE END OF THE PROCESS ENABLED BY THE SYSTEM.


Download ppt "Application Review and Auditing Databases Quinn Gaalswyk, CISA Ted Wallerstedt, CISA, CIA Office of Internal Audit University of Minnesota."

Similar presentations


Ads by Google