SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
Auditing the
                       IT Enterprise
                       Chris Rich
                       NetWrix Corporation




                       Corporate Headquarters: 12 N State Rt 17, Suite 104, Paramus, NJ 07652
www.netwrix.com        Office: (201) 490-8840, Toll-Free: (888) 638-9749, E-mail: sales@netwrix.com


facebook.com/NetWrix          twitter.com/NetWrix                     youtube.com/NetWrix


netwrix.com/LinkedIn          spiceworks.com/NetWrix                  netwrix.com/GooglePlus
White Paper:
    Auditing the IT Enterprise




    Table of Contents




3   ....... Changes ahead: IT Enterprise Auditing
3   ....... The need to audit the enterprise
4   ....... Planning
5   ....... Implementation and what to expect
6   ....... Scope of challenges
7   ....... Solutions
8   ....... Valuable Resources
White Paper:                                                             3
                         Auditing the IT Enterprise




       Changes ahead: IT Enterprise Auditing

The way in which IT provides value to the organization is rapidly changing. New requirements
and challenges are everywhere. From compliance, security, mobile innovations to employees
bringing personal equipment into the workplace, IT has now more than any other time been
pushed to the limits. Compounding these problems are threats arguably more advanced than
the commercially available defenses on the market today as well as threats from trusted
individuals from within the organization even including human errors that can cost
organizations their reputations, trust and money. CIOs and senior leadership everywhere are
beginning to acknowledge that the traditional way of doing business as an IT organization needs
to change with the times to reflect these realities. Those organizations and their leadership that
are prepared to take the necessary steps to revise the dynamics between them and the
organizations they serve stand to benefit and thrive in the years ahead. Enterprise auditing is a
strategic and cultural shift that when implemented successfully can help satisfy regulatory
compliance, improve overall security and promote efficient infrastructure oversight in the face
of all these changes and challenges.




       The need to audit the enterprise

IT professionals from the helpdesk to the CIO have been charged with implementing
mechanisms both native and 3rd-party to address their enterprise IT auditing needs. This task
up close appears daunting to many and with good reason. The enterprise of today operates
24x7x365 and is subject to stresses of access and modifications invoked by hundred and
sometimes hundreds of thousands of people each day. This growing need to audit the
enterprise should come as no surprise to anyone who has been in an IT role for the past 5-10
years. Knowing who changed what, when and where throughout the organization can save
hours of troubleshooting, satisfy compliance needs, better secure the environment and permit
administrators to manage multiple resources that frequently outnumber staff that are now at
the critical core of operations. What’s most challenging is the diversity of platforms, systems and
tools employed over the years just to sustain these daily operations. Now, various regulatory
entities combined with a heightened awareness on IT security, the demands presented by
auditing all of these systems around the clock in all corners of the enterprise may seem as
though it were a perfect storm. Adding to this challenge are IT operations that are required to
function on tight budgets under constant watch even more so than revenue-generating
functions of an organization. Leaders keep asking for more while tightening budgets and the
only way to successfully secure, manage and maintain the infrastructure is to implement
enterprise-wide IT auditing.
White Paper:                                                             4
                        Auditing the IT Enterprise




       Planning

To successfully audit the enterprise, there needs to be a priority list and a methodical approach
to implementation that takes into account the various aspects to be addressed along the way. IT
security and compliance auditing are perhaps at the top of the organizational IT priority list and
therefore can expect to have some degree of senior management support. This can greatly help
transform the organization because there will likely be changes that need this support to be
successful. IT departments can use these follow steps to achieve their IT enterprise auditing
goals:


       1. Take an inventory and establish preliminary priorities
Start with an inventory of systems and hardware that are owned and managed by IT including
computers, servers, mobile devices, file storage platforms and even network appliances such as
firewalls, switches, and routers. During the inventory, place a value on the data which they store
or the role they serve and place a value on their need. Your goal here is to quickly give an
estimated assessment of risk to each asset for further evaluation later. Involve Human
Resources and Legal early in the process throughout to help identify those key areas that need
ongoing auditing. This helps to further gain support and increase awareness across the
organization. Document everything for future reference as this will form the foundation of
your written plans and efforts auditors will want to see.


       2. Eliminate waste, consolidate and replace assets
Find opportunities to retire or replace aging equipment and platforms. These decisions will be
tied to the existing budget and may be cost-prohibitive. Estimate the time required to implement
any replacements or consolidations in the context of the final objective which is to audit your
environment. The benefit of this assessment will be to provide awareness of what can readily be
audited versus what assets may require additional effort to facilitate ongoing auditing.
Document everything to measure progress and have a reference as you move forward
which will also serve to satisfy auditors.


       3. Categorize remaining resources from most auditable to least
Looking at the systems that remain and keeping in mind what those resources represent in terms
of data storage or access control, look to categorize these based on expected capacity for
auditing. Some systems and hardware will more readily facilitate auditing. Best case scenario, the
more auditable systems will contain the information most at-risk. Strategically, consider shifting
at-risk information and resources to systems that will more readily permit auditing. Some
adjustments to the environment may be justifiable before implementing any auditing solution so
as to audit the most resources in the least amount of time accurately and effectively.
White Paper:                                                                 5
                        Auditing the IT Enterprise




A good example is Windows Servers. These have limited native auditing built in and this can be
quickly enabled to start auditing events such as file access and logon/logoff events. Many storage
appliances also have some form of built-in auditing capabilities. Again, document everything so
that everyone involved in IT and these goals begin to become intrinsically aware of the
cultural changes that are taking place as a result of auditing the enterprise.


       4. Look for an auditing solution that will cover the most assets
       in the least amount of time
Implementing enterprise auditing is an ongoing, long term effort. It will become an integral part
of daily IT life once the transition has been made from little or no auditing to widespread
auditing. Expectations should be balanced with what can be done in the allotted time frame
versus what will need to be done over the longer term. The objective when starting out or
improving upon existing efforts is to make measurable progress. The absolutely most critical
goal here is to select a reputable vendor with a broad set of tools that has a good record of
helping customers and a proven track-record of delivering product enhancements and updates
to service the constantly changing nature and requirements of enterprise auditing. Doing so will
require fewer contacts, support arrangements, and licenses to maintain and manage moving
forward. This will also require flexible licensing, scalability and centralized long-term data
storage as your needs and environment change over time. Auditing will need to be flexible, easy
to setup and operate in parallel to most major IT initiatives moving forward. The audit store will
also need to be equally flexible and reportable for as long as 7 years per certain regulatory
requirements. A solution that can move with rapid change will save time, money and reduce
overall stress. Document and expect needs will change quickly as more information is
gathered and weighed against priorities and timelines.




       Implementation and what to expect

The amount of time to implement an effective IT auditing solution in the enterprise will vary.
It’s difficult to quantify time and every environment is different. Some may have equipment
that is many years old and may present special challenges to auditing while others may have a
narrow assortment of technologies. These considerations will need to be mapped out in
advanced and documented. To deliver auditing to the enterprise could result in 50% of the
total time taking inventory and consolidating, 25% prioritization, and system/platform
preparation, and 25% implementation. Don’t forget to account for documentation as this will
be a measurable part of the overall effort. Starting out with the end result in mind will help
establish realistic, attainable short term goals that will roll up into larger, longer term goals.
Keeping a balance will help the IT department and those involved in the project including
Human Resources and legal staff looking forward to each stage of the implementation while
building the cultural and behavioral competencies that will be required to sustain auditing and
compliance as well as security practices for the long term. Be prepared to be flexible and
adjust as conditions change.
White Paper:                                                          6
                        Auditing the IT Enterprise




       Scope of challenges

Implementing enterprise auditing in diverse IT environments is common. Most IT departments
have a wide array of platforms and services to serve end-users and customers. Here is a typical
list of critical resources IT departments must consider and the types of information and access
control they represent:

      • Windows Active Directory (2000-2008R2, 32 and 64-bit platforms) –
      Manages access control, permissions, and serves as the central directory for
      the organization.
      • Windows Group Policies – Access control mechanisms critical to security of
      information and to limit risks to systems and servers bound to Active
      Directory.
      • MS Exchange Servers – Messaging data contains confidential information
      from senior management, product management, marketing, production,
      engineering, human resources, legal, etc. Many regulations speak directly to
      monitoring access to messaging services.
      • MS SQL Servers – Primary data storage for customer data including credit
      card information, patient data, social security numbers, banking
      information, web applications, sales data and more. Like, messaging,
      database access will need auditing to comply with regulations.
      • File servers and storage appliances – Data storage for financial statements,
      trade records, contracts, legal documents, agreements, business and
      marketing plans, proprietary information, reports, collateral. These can
      include Windows file servers with DFS shares and clustering as well as
      platforms such as NetApp Filer and EMC Cellera.
      • VMware – Virtualized systems require equal protection to that of physical
      systems that store data, SQL servers, Domain Controllers all serving file and
      data storage as well as access control systems.
      • SharePoint – Document and data sharing across business groups,
      departments and units similar to SQL and file server systems and storage
      devices.
      • Servers – Physical systems with local access controls, services and business
      critical applications and web services for sites both internal and external also
      to be considered a sub-requirement to all of the above.
      • System Center Virtual Machine Manager – Virtualized systems performing
      access control and file storage as well as SQL storage functions.

All of the above systems likely represent what most organizations will face when implementing
auditing in the enterprise. Each asset behaves in a unique way and depending on the types of
information stored on them or the extent to which these systems facilitate access control will
carry individual priorities with regards to auditing.
White Paper:                                                             7
                        Auditing the IT Enterprise




       Solutions

Solutions exist to address these challenges quickly and easily. These come in a wide variety of
options to suit a wide range of needs. NetWrix Change Reporter Suite is a solution that can
address all of these auditing needs and help sustain compliance in the enterprise quickly, easily
and cost-effectively. NetWrix has a reputation for building innovative tools purpose-built for
each of these concentrations. Frequent updates and product enhancements are rolled out often
to meet changing needs and to support its customers providing these updates at no additional
cost while on maintenance. Experienced development and technical support staff outnumber
non-technical roles by 10-to-1 and NetWrix is the only provider solely focused on delivering IT
auditing solutions organizations need today and in the future.

Installation of NetWrix Change Reporter Suite is fast and easy. Using a two-tiered data storage
model with SQL for short-term repository and flat file long term storage, audit data is centrally
stored and can be maintained for seven years or more. NetWrix Change Reporter Suite easily
scales to serve a broad range of organizations from small businesses with few servers to larger
international corporations with as many as 100,000 Active Directory users. Environment
changes are facilitated using easy point-and-click management with most components
managed from a single Microsoft Management Console where modules plug-in and can be
organized to match the network topology or any specific needs.

One of its’ many strengths is in automatic reporting and alert capabilities. By leveraging SQL
Advanced Reporting services and nearly 200 predefined snapshot and best practice reports
geared towards the types of information auditors request provides a ready-to-use library of
reports. Also included are report subscription capabilities to automatically deliver reports to
auditors, managers and anyone else who needs to be a part of the enterprise IT auditing efforts.
Reports can be generated into seven different formats such as TIFF, XLS(S) and CSV. Alerts can
be configured to e-mail or SMS text message when critical events take place.

Also included in NetWrix Change Reporter Suite is a powerful Active Directory Object Restore
Wizard that can restore Active Directory and Group Policy changes down to even individual
attribute-level changes. It is also capable of restoring file and folder permission changes. These
capabilities far surpass even Microsoft Windows 2008 R2 restore functionality. At the heart of
NetWrix products are the AuditAssurance™ and AuditIntelligence™ technologies for collecting
audit information from multiple streams of information using accepted Microsoft practices
without any risky shoe-horn techniques into the operating system APIs which can interrupt or
terminate auditing altogether. Information gathered is lightweight and storage is only done for
information that is necessary when extracted and stored either from event logs, tracing logs,
APIs and other available sources to ensure no audit information is omitted.

These technologies and capabilities combined translate into having the opportunity to
implement enterprise IT auditing quickly and affordably from a single reputable source
committed to delivering outstanding tools for organizations of all sizes and needs.

Download a trial of NetWrix Change Reporter Suite: netwrix.com/cr-free-trial
White Paper:                                                                             8
                              Auditing the IT Enterprise




         Valuable Resources

www.netwrix.com – NetWrix provides purpose-built change auditing and compliance solutions,
and free tools to help secure and maintain the IT enterprise.

www.infosecisland.com – Compliance and security professionals present today’s most
compelling arguments and solutions for network security and compliance issues facing
organizations today.

www.petri.co.il - The Petri IT Knowledgebase community of experienced IT professionals with
articles, reviews, how-to instructions and technology updates.

www.itil-officialsite.com - Information Technology Infrastructure Library provides best practices
for IT service management focusing on aligning IT services with business needs.

www.4sysops.com – Great online resource geared towards windows administrators with
articles, how-to instructions, technology reviews and coverage of issues related to managing
Windows environments.

www.windowsitpro.com – Website dedicated to the Windows IT professional. Site includes
how-to documentation, articles on technology and topics of interest to Windows
administrators.

www.spiceworks.com – Vibrant and growing IT professional community and a free software
toolkit for helpdesk and network monitoring.




                             Corporate Headquarters: 12 N State Rt 17, Suite 104, Paramus, NJ 07652
   www.netwrix.com           Office: (201) 490-8840, Toll-Free: (888) 638-9749, E-mail: sales@netwrix.com


   facebook.com/NetWrix             twitter.com/NetWrix                     youtube.com/NetWrix


  netwrix.com/LinkedIn              spiceworks.com/NetWrix                  netwrix.com/GooglePlus


©2012 All rights reserved. NetWrix is trademark of NetWrix Corporation and/or one or more of its subsidiaries and may be
registered in the U.S. Patent and Trademark Office and in other countries.
All other trademarks and registered trademarks are the property of their respective owners.

Más contenido relacionado

Destacado

ROMEX Płońsk
ROMEX PłońskROMEX Płońsk
ROMEX PłońsksalonyVi
 
Social Impact Games - 7 Lesson Learned
Social Impact Games - 7 Lesson LearnedSocial Impact Games - 7 Lesson Learned
Social Impact Games - 7 Lesson Learnedmayurhpatel
 
Service Marketing-New Service Design
Service Marketing-New Service DesignService Marketing-New Service Design
Service Marketing-New Service Designcharindu sanjeeva
 
SANPROD PLUS Ostrołęka
SANPROD PLUS OstrołękaSANPROD PLUS Ostrołęka
SANPROD PLUS OstrołękasalonyVi
 
Intoduction virtualbox khmer
Intoduction virtualbox khmerIntoduction virtualbox khmer
Intoduction virtualbox khmerKichiemon Adachi
 
Extending Change Auditing to Exchange Server
Extending Change Auditing to Exchange ServerExtending Change Auditing to Exchange Server
Extending Change Auditing to Exchange ServerNetwrix Corporation
 
Euskal mitologiaren aurkezpena egin ziguten 6
Euskal  mitologiaren aurkezpena egin ziguten 6Euskal  mitologiaren aurkezpena egin ziguten 6
Euskal mitologiaren aurkezpena egin ziguten 6ELIZALDE
 
URAREKIN JOLASEAN
URAREKIN JOLASEANURAREKIN JOLASEAN
URAREKIN JOLASEANELIZALDE
 
Hokkaido scenery in_japan
Hokkaido scenery in_japanHokkaido scenery in_japan
Hokkaido scenery in_japanKevin Ng
 
W.R. SILVER SYSTEM Warszawa
W.R. SILVER SYSTEM WarszawaW.R. SILVER SYSTEM Warszawa
W.R. SILVER SYSTEM WarszawasalonyVi
 
Report card rp2 process update 1
Report card rp2 process update 1Report card rp2 process update 1
Report card rp2 process update 1Adam Caplan
 
MAKO Sobótka
MAKO SobótkaMAKO Sobótka
MAKO SobótkasalonyVi
 

Destacado (18)

Entrepreneur
EntrepreneurEntrepreneur
Entrepreneur
 
Mps
MpsMps
Mps
 
ROMEX Płońsk
ROMEX PłońskROMEX Płońsk
ROMEX Płońsk
 
Social Impact Games - 7 Lesson Learned
Social Impact Games - 7 Lesson LearnedSocial Impact Games - 7 Lesson Learned
Social Impact Games - 7 Lesson Learned
 
Service Marketing-New Service Design
Service Marketing-New Service DesignService Marketing-New Service Design
Service Marketing-New Service Design
 
SANPROD PLUS Ostrołęka
SANPROD PLUS OstrołękaSANPROD PLUS Ostrołęka
SANPROD PLUS Ostrołęka
 
Intoduction virtualbox khmer
Intoduction virtualbox khmerIntoduction virtualbox khmer
Intoduction virtualbox khmer
 
Om Xpress Print Pack Pvt. Ltd. CRISIL Rating report
Om Xpress Print Pack Pvt. Ltd. CRISIL Rating reportOm Xpress Print Pack Pvt. Ltd. CRISIL Rating report
Om Xpress Print Pack Pvt. Ltd. CRISIL Rating report
 
Leadership development to drive buisness success
Leadership development to drive buisness successLeadership development to drive buisness success
Leadership development to drive buisness success
 
Extending Change Auditing to Exchange Server
Extending Change Auditing to Exchange ServerExtending Change Auditing to Exchange Server
Extending Change Auditing to Exchange Server
 
Euskal mitologiaren aurkezpena egin ziguten 6
Euskal  mitologiaren aurkezpena egin ziguten 6Euskal  mitologiaren aurkezpena egin ziguten 6
Euskal mitologiaren aurkezpena egin ziguten 6
 
URAREKIN JOLASEAN
URAREKIN JOLASEANURAREKIN JOLASEAN
URAREKIN JOLASEAN
 
Ogd, ict and ge gm
Ogd, ict and ge gmOgd, ict and ge gm
Ogd, ict and ge gm
 
Hokkaido scenery in_japan
Hokkaido scenery in_japanHokkaido scenery in_japan
Hokkaido scenery in_japan
 
W.R. SILVER SYSTEM Warszawa
W.R. SILVER SYSTEM WarszawaW.R. SILVER SYSTEM Warszawa
W.R. SILVER SYSTEM Warszawa
 
Report card rp2 process update 1
Report card rp2 process update 1Report card rp2 process update 1
Report card rp2 process update 1
 
MAKO Sobótka
MAKO SobótkaMAKO Sobótka
MAKO Sobótka
 
Q2
Q2Q2
Q2
 

Más de Netwrix Corporation

File system auditing who accessed what files and where
File system auditing who accessed what files and whereFile system auditing who accessed what files and where
File system auditing who accessed what files and whereNetwrix Corporation
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureNetwrix Corporation
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsNetwrix Corporation
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryNetwrix Corporation
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureNetwrix Corporation
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetwrix Corporation
 
Auditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsAuditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsNetwrix Corporation
 
Auditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases AuditorsAuditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases AuditorsNetwrix Corporation
 
Automated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users AccountsAutomated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users AccountsNetwrix Corporation
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceNetwrix Corporation
 
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingHow the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingNetwrix Corporation
 
Ensuring Data Protection by controlling the Use of Removable Media
Ensuring Data Protection by controlling the Use of Removable MediaEnsuring Data Protection by controlling the Use of Removable Media
Ensuring Data Protection by controlling the Use of Removable MediaNetwrix Corporation
 
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...Netwrix Corporation
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseNetwrix Corporation
 
Staying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesStaying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesNetwrix Corporation
 
The Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementThe Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementNetwrix Corporation
 
Exchange Auditing in the Enterprise
Exchange Auditing in the EnterpriseExchange Auditing in the Enterprise
Exchange Auditing in the EnterpriseNetwrix Corporation
 

Más de Netwrix Corporation (18)

File system auditing who accessed what files and where
File system auditing who accessed what files and whereFile system auditing who accessed what files and where
File system auditing who accessed what files and where
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructure
 
Top 5 identity management challenges and solutions
Top 5 identity management challenges and solutionsTop 5 identity management challenges and solutions
Top 5 identity management challenges and solutions
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directory
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don Jones
 
Auditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal RegulationsAuditing Active Directory to Comply with State and Federal Regulations
Auditing Active Directory to Comply with State and Federal Regulations
 
Auditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases AuditorsAuditing Solution Enables Coaching of Staff and Pleases Auditors
Auditing Solution Enables Coaching of Staff and Pleases Auditors
 
Automated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users AccountsAutomated De-provisioning of Inactive Users Accounts
Automated De-provisioning of Inactive Users Accounts
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server AuditingHow the World's Largest Date Agriculture Company "Planted" File Server Auditing
How the World's Largest Date Agriculture Company "Planted" File Server Auditing
 
Ensuring Data Protection by controlling the Use of Removable Media
Ensuring Data Protection by controlling the Use of Removable MediaEnsuring Data Protection by controlling the Use of Removable Media
Ensuring Data Protection by controlling the Use of Removable Media
 
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
Leading Emergency Software Solution Provider Automates HIPAA and SOX Complian...
 
Active Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the EnterpriseActive Directory Change Auditing in the Enterprise
Active Directory Change Auditing in the Enterprise
 
Staying Abreast of Group Policy Changes
Staying Abreast of Group Policy ChangesStaying Abreast of Group Policy Changes
Staying Abreast of Group Policy Changes
 
The Business Case for Account Lockout Management
The Business Case for Account Lockout ManagementThe Business Case for Account Lockout Management
The Business Case for Account Lockout Management
 
Exchange Auditing in the Enterprise
Exchange Auditing in the EnterpriseExchange Auditing in the Enterprise
Exchange Auditing in the Enterprise
 
File auditing on NetApp Filer
File auditing on NetApp Filer File auditing on NetApp Filer
File auditing on NetApp Filer
 

Último

南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证kbdhl05e
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)oannq
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
integrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfintegrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfAmitRout25
 
Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi OneDay18
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...JeylaisaManabat1
 
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Mikko Kangassalo
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 

Último (8)

南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
integrity in personal relationship (1).pdf
integrity in personal relationship (1).pdfintegrity in personal relationship (1).pdf
integrity in personal relationship (1).pdf
 
Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi Spiritual Life Quote from Shiva Negi
Spiritual Life Quote from Shiva Negi
 
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
Module-2-Lesson-2-COMMUNICATION-AIDS-AND-STRATEGIES-USING-TOOLS-OF-TECHNOLOGY...
 
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
Virtue ethics & Effective Altruism: What can EA learn from virtue ethics?
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 

IT Auditing of the Enterprise

  • 1. Auditing the IT Enterprise Chris Rich NetWrix Corporation Corporate Headquarters: 12 N State Rt 17, Suite 104, Paramus, NJ 07652 www.netwrix.com Office: (201) 490-8840, Toll-Free: (888) 638-9749, E-mail: sales@netwrix.com facebook.com/NetWrix twitter.com/NetWrix youtube.com/NetWrix netwrix.com/LinkedIn spiceworks.com/NetWrix netwrix.com/GooglePlus
  • 2. White Paper: Auditing the IT Enterprise Table of Contents 3 ....... Changes ahead: IT Enterprise Auditing 3 ....... The need to audit the enterprise 4 ....... Planning 5 ....... Implementation and what to expect 6 ....... Scope of challenges 7 ....... Solutions 8 ....... Valuable Resources
  • 3. White Paper: 3 Auditing the IT Enterprise Changes ahead: IT Enterprise Auditing The way in which IT provides value to the organization is rapidly changing. New requirements and challenges are everywhere. From compliance, security, mobile innovations to employees bringing personal equipment into the workplace, IT has now more than any other time been pushed to the limits. Compounding these problems are threats arguably more advanced than the commercially available defenses on the market today as well as threats from trusted individuals from within the organization even including human errors that can cost organizations their reputations, trust and money. CIOs and senior leadership everywhere are beginning to acknowledge that the traditional way of doing business as an IT organization needs to change with the times to reflect these realities. Those organizations and their leadership that are prepared to take the necessary steps to revise the dynamics between them and the organizations they serve stand to benefit and thrive in the years ahead. Enterprise auditing is a strategic and cultural shift that when implemented successfully can help satisfy regulatory compliance, improve overall security and promote efficient infrastructure oversight in the face of all these changes and challenges. The need to audit the enterprise IT professionals from the helpdesk to the CIO have been charged with implementing mechanisms both native and 3rd-party to address their enterprise IT auditing needs. This task up close appears daunting to many and with good reason. The enterprise of today operates 24x7x365 and is subject to stresses of access and modifications invoked by hundred and sometimes hundreds of thousands of people each day. This growing need to audit the enterprise should come as no surprise to anyone who has been in an IT role for the past 5-10 years. Knowing who changed what, when and where throughout the organization can save hours of troubleshooting, satisfy compliance needs, better secure the environment and permit administrators to manage multiple resources that frequently outnumber staff that are now at the critical core of operations. What’s most challenging is the diversity of platforms, systems and tools employed over the years just to sustain these daily operations. Now, various regulatory entities combined with a heightened awareness on IT security, the demands presented by auditing all of these systems around the clock in all corners of the enterprise may seem as though it were a perfect storm. Adding to this challenge are IT operations that are required to function on tight budgets under constant watch even more so than revenue-generating functions of an organization. Leaders keep asking for more while tightening budgets and the only way to successfully secure, manage and maintain the infrastructure is to implement enterprise-wide IT auditing.
  • 4. White Paper: 4 Auditing the IT Enterprise Planning To successfully audit the enterprise, there needs to be a priority list and a methodical approach to implementation that takes into account the various aspects to be addressed along the way. IT security and compliance auditing are perhaps at the top of the organizational IT priority list and therefore can expect to have some degree of senior management support. This can greatly help transform the organization because there will likely be changes that need this support to be successful. IT departments can use these follow steps to achieve their IT enterprise auditing goals: 1. Take an inventory and establish preliminary priorities Start with an inventory of systems and hardware that are owned and managed by IT including computers, servers, mobile devices, file storage platforms and even network appliances such as firewalls, switches, and routers. During the inventory, place a value on the data which they store or the role they serve and place a value on their need. Your goal here is to quickly give an estimated assessment of risk to each asset for further evaluation later. Involve Human Resources and Legal early in the process throughout to help identify those key areas that need ongoing auditing. This helps to further gain support and increase awareness across the organization. Document everything for future reference as this will form the foundation of your written plans and efforts auditors will want to see. 2. Eliminate waste, consolidate and replace assets Find opportunities to retire or replace aging equipment and platforms. These decisions will be tied to the existing budget and may be cost-prohibitive. Estimate the time required to implement any replacements or consolidations in the context of the final objective which is to audit your environment. The benefit of this assessment will be to provide awareness of what can readily be audited versus what assets may require additional effort to facilitate ongoing auditing. Document everything to measure progress and have a reference as you move forward which will also serve to satisfy auditors. 3. Categorize remaining resources from most auditable to least Looking at the systems that remain and keeping in mind what those resources represent in terms of data storage or access control, look to categorize these based on expected capacity for auditing. Some systems and hardware will more readily facilitate auditing. Best case scenario, the more auditable systems will contain the information most at-risk. Strategically, consider shifting at-risk information and resources to systems that will more readily permit auditing. Some adjustments to the environment may be justifiable before implementing any auditing solution so as to audit the most resources in the least amount of time accurately and effectively.
  • 5. White Paper: 5 Auditing the IT Enterprise A good example is Windows Servers. These have limited native auditing built in and this can be quickly enabled to start auditing events such as file access and logon/logoff events. Many storage appliances also have some form of built-in auditing capabilities. Again, document everything so that everyone involved in IT and these goals begin to become intrinsically aware of the cultural changes that are taking place as a result of auditing the enterprise. 4. Look for an auditing solution that will cover the most assets in the least amount of time Implementing enterprise auditing is an ongoing, long term effort. It will become an integral part of daily IT life once the transition has been made from little or no auditing to widespread auditing. Expectations should be balanced with what can be done in the allotted time frame versus what will need to be done over the longer term. The objective when starting out or improving upon existing efforts is to make measurable progress. The absolutely most critical goal here is to select a reputable vendor with a broad set of tools that has a good record of helping customers and a proven track-record of delivering product enhancements and updates to service the constantly changing nature and requirements of enterprise auditing. Doing so will require fewer contacts, support arrangements, and licenses to maintain and manage moving forward. This will also require flexible licensing, scalability and centralized long-term data storage as your needs and environment change over time. Auditing will need to be flexible, easy to setup and operate in parallel to most major IT initiatives moving forward. The audit store will also need to be equally flexible and reportable for as long as 7 years per certain regulatory requirements. A solution that can move with rapid change will save time, money and reduce overall stress. Document and expect needs will change quickly as more information is gathered and weighed against priorities and timelines. Implementation and what to expect The amount of time to implement an effective IT auditing solution in the enterprise will vary. It’s difficult to quantify time and every environment is different. Some may have equipment that is many years old and may present special challenges to auditing while others may have a narrow assortment of technologies. These considerations will need to be mapped out in advanced and documented. To deliver auditing to the enterprise could result in 50% of the total time taking inventory and consolidating, 25% prioritization, and system/platform preparation, and 25% implementation. Don’t forget to account for documentation as this will be a measurable part of the overall effort. Starting out with the end result in mind will help establish realistic, attainable short term goals that will roll up into larger, longer term goals. Keeping a balance will help the IT department and those involved in the project including Human Resources and legal staff looking forward to each stage of the implementation while building the cultural and behavioral competencies that will be required to sustain auditing and compliance as well as security practices for the long term. Be prepared to be flexible and adjust as conditions change.
  • 6. White Paper: 6 Auditing the IT Enterprise Scope of challenges Implementing enterprise auditing in diverse IT environments is common. Most IT departments have a wide array of platforms and services to serve end-users and customers. Here is a typical list of critical resources IT departments must consider and the types of information and access control they represent: • Windows Active Directory (2000-2008R2, 32 and 64-bit platforms) – Manages access control, permissions, and serves as the central directory for the organization. • Windows Group Policies – Access control mechanisms critical to security of information and to limit risks to systems and servers bound to Active Directory. • MS Exchange Servers – Messaging data contains confidential information from senior management, product management, marketing, production, engineering, human resources, legal, etc. Many regulations speak directly to monitoring access to messaging services. • MS SQL Servers – Primary data storage for customer data including credit card information, patient data, social security numbers, banking information, web applications, sales data and more. Like, messaging, database access will need auditing to comply with regulations. • File servers and storage appliances – Data storage for financial statements, trade records, contracts, legal documents, agreements, business and marketing plans, proprietary information, reports, collateral. These can include Windows file servers with DFS shares and clustering as well as platforms such as NetApp Filer and EMC Cellera. • VMware – Virtualized systems require equal protection to that of physical systems that store data, SQL servers, Domain Controllers all serving file and data storage as well as access control systems. • SharePoint – Document and data sharing across business groups, departments and units similar to SQL and file server systems and storage devices. • Servers – Physical systems with local access controls, services and business critical applications and web services for sites both internal and external also to be considered a sub-requirement to all of the above. • System Center Virtual Machine Manager – Virtualized systems performing access control and file storage as well as SQL storage functions. All of the above systems likely represent what most organizations will face when implementing auditing in the enterprise. Each asset behaves in a unique way and depending on the types of information stored on them or the extent to which these systems facilitate access control will carry individual priorities with regards to auditing.
  • 7. White Paper: 7 Auditing the IT Enterprise Solutions Solutions exist to address these challenges quickly and easily. These come in a wide variety of options to suit a wide range of needs. NetWrix Change Reporter Suite is a solution that can address all of these auditing needs and help sustain compliance in the enterprise quickly, easily and cost-effectively. NetWrix has a reputation for building innovative tools purpose-built for each of these concentrations. Frequent updates and product enhancements are rolled out often to meet changing needs and to support its customers providing these updates at no additional cost while on maintenance. Experienced development and technical support staff outnumber non-technical roles by 10-to-1 and NetWrix is the only provider solely focused on delivering IT auditing solutions organizations need today and in the future. Installation of NetWrix Change Reporter Suite is fast and easy. Using a two-tiered data storage model with SQL for short-term repository and flat file long term storage, audit data is centrally stored and can be maintained for seven years or more. NetWrix Change Reporter Suite easily scales to serve a broad range of organizations from small businesses with few servers to larger international corporations with as many as 100,000 Active Directory users. Environment changes are facilitated using easy point-and-click management with most components managed from a single Microsoft Management Console where modules plug-in and can be organized to match the network topology or any specific needs. One of its’ many strengths is in automatic reporting and alert capabilities. By leveraging SQL Advanced Reporting services and nearly 200 predefined snapshot and best practice reports geared towards the types of information auditors request provides a ready-to-use library of reports. Also included are report subscription capabilities to automatically deliver reports to auditors, managers and anyone else who needs to be a part of the enterprise IT auditing efforts. Reports can be generated into seven different formats such as TIFF, XLS(S) and CSV. Alerts can be configured to e-mail or SMS text message when critical events take place. Also included in NetWrix Change Reporter Suite is a powerful Active Directory Object Restore Wizard that can restore Active Directory and Group Policy changes down to even individual attribute-level changes. It is also capable of restoring file and folder permission changes. These capabilities far surpass even Microsoft Windows 2008 R2 restore functionality. At the heart of NetWrix products are the AuditAssurance™ and AuditIntelligence™ technologies for collecting audit information from multiple streams of information using accepted Microsoft practices without any risky shoe-horn techniques into the operating system APIs which can interrupt or terminate auditing altogether. Information gathered is lightweight and storage is only done for information that is necessary when extracted and stored either from event logs, tracing logs, APIs and other available sources to ensure no audit information is omitted. These technologies and capabilities combined translate into having the opportunity to implement enterprise IT auditing quickly and affordably from a single reputable source committed to delivering outstanding tools for organizations of all sizes and needs. Download a trial of NetWrix Change Reporter Suite: netwrix.com/cr-free-trial
  • 8. White Paper: 8 Auditing the IT Enterprise Valuable Resources www.netwrix.com – NetWrix provides purpose-built change auditing and compliance solutions, and free tools to help secure and maintain the IT enterprise. www.infosecisland.com – Compliance and security professionals present today’s most compelling arguments and solutions for network security and compliance issues facing organizations today. www.petri.co.il - The Petri IT Knowledgebase community of experienced IT professionals with articles, reviews, how-to instructions and technology updates. www.itil-officialsite.com - Information Technology Infrastructure Library provides best practices for IT service management focusing on aligning IT services with business needs. www.4sysops.com – Great online resource geared towards windows administrators with articles, how-to instructions, technology reviews and coverage of issues related to managing Windows environments. www.windowsitpro.com – Website dedicated to the Windows IT professional. Site includes how-to documentation, articles on technology and topics of interest to Windows administrators. www.spiceworks.com – Vibrant and growing IT professional community and a free software toolkit for helpdesk and network monitoring. Corporate Headquarters: 12 N State Rt 17, Suite 104, Paramus, NJ 07652 www.netwrix.com Office: (201) 490-8840, Toll-Free: (888) 638-9749, E-mail: sales@netwrix.com facebook.com/NetWrix twitter.com/NetWrix youtube.com/NetWrix netwrix.com/LinkedIn spiceworks.com/NetWrix netwrix.com/GooglePlus ©2012 All rights reserved. NetWrix is trademark of NetWrix Corporation and/or one or more of its subsidiaries and may be registered in the U.S. Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are the property of their respective owners.