SlideShare una empresa de Scribd logo
1 de 14
Prioritizing an Audit Program
Using the Consensus Audit
Guidelines (CAG)
                                                           James Tarala




     © 2010 James Tarala - Prioritizing an Audit Program             1
Issue Statement #1

  Traditionally the focus of audit groups has not been to
   audit for information security
  Historical progression of audit focuses:
    – Accounting
    – Fraud
    – Compliance
    – Security / Assurance*




                                                                       2
                 © 2010 James Tarala - Prioritizing an Audit Program       2
Issue Statement #2




                                                                 3
           © 2010 James Tarala - Prioritizing an Audit Program       3
Other Issues to Consider

   Today there are no “Generally Accepted” practices for IS
    Audit
   It is difficult to find agreement on what’s important to
    audit as well as how to perform an audit
   Risk measurements are mostly subjective in
    organizations
   Metrics are not generally used when evaluating IS
    security
   We are too reliant on “paperwork reviews” to evaluate
    information security programs



                                                                       4
                 © 2010 James Tarala - Prioritizing an Audit Program       4
One Reason This is Important

  Here are some data breaches that were reported in 2009
   (most were not)
  Just a small sample (organization/records breached):
    –   Heartland Payment Systems (130+ million – 1/2009)
    –   Oklahoma Dept of Human Services (1 million – 4/2009)
    –   Oklahoma Housing Finance Agency (225,000 – 4/2009)
    –   University of California (160,000 – 5/2009)
    –   Network Solutions (573,000 – 7/2009)
    –   U.S. Military Veterans Administration (76 million – 10/2009)
    –   BlueCross BlueShield Assn. (187,000 – 10/2009)




                                                                          5
                    © 2010 James Tarala - Prioritizing an Audit Program       5
Another Reason This is Important

  The threats are becoming more serious and more
   difficult to stop




                                                                     6
               © 2010 James Tarala - Prioritizing an Audit Program       6
How Do the 20 Critical Controls Fit?

   For auditors:
     – They prioritize critical controls
     – They instruct how to truly audit for information
       assurance
     – They help set audit strategy
     – They can automate testing
     – They can facilitate meaningful reporting

   For auditors, they answer the question, what’s really
    important


                                                                        7
                  © 2010 James Tarala - Prioritizing an Audit Program       7
A Few of the Document Contributors
  Blue team members inside the Department of Defense
  Blue team members who provide services for non-DoD government
   agencies
  Red & blue teams at the US National Security Agency
  US-CERT and other non-military incident response teams
  DoD Cyber Crime Center (DC3)
  Military investigators who fight cyber crime
  The FBI and other police organizations
  US Department of Energy laboratories
  US Department of State
  Army Research Laboratory
  US Department of Homeland Security
  Plus over 100 other contributors


                                                                        8
                  © 2010 James Tarala - Prioritizing an Audit Program       8
The 20 Critical Controls
  Inventory of Authorized and Unauthorized             Continuous Vulnerability Assessment
   Devices                                               and Remediation
  Inventory of Authorized and Unauthorized             Account Monitoring and Control
   Software                                             Malware Defenses
  Secure Configurations for Hardware and               Limitation and Control of Network
   Software on Laptops, Workstations, and                Ports, Protocols, and Services
   Servers
                                                        Wireless Device Control
  Secure Configurations for Network Devices
   such as Firewalls, Routers, and Switches             Data Loss Prevention
  Boundary Defense                                     Secure Network Engineering
  Maintenance, Monitoring, and Analysis of             Penetration Tests and Red Team
   Audit Logs                                            Exercises
  Application Software Security                        Incident Response Capability
  Controlled Use of Administrative Privileges          Data Recovery Capability
  Controlled Access Based on Need to Know              Security Skills Assessment and
                                                         Appropriate Training to Fill Gaps




                                                                                               9
                         © 2010 James Tarala - Prioritizing an Audit Program                       9
CAG Core Evaluation Steps

  Defined in the latest version of the 20 Critical Controls
   (after version 2.1)
  One or two tests which can be performed to determine if
   the business goal of the control has been met
  Mental Goal:
    – It’s all about meeting a business goal
    – Don’t over-think the controls as a technician
  Each test is technical in nature (no paperwork reviews)




                                                                       10
                 © 2010 James Tarala - Prioritizing an Audit Program        10
Sample Test for Control #1

   Place ten unauthorized devices on various portions of
    the organization’s network unannounced to see how long
    it takes for them to be detected
      – They should be placed on multiple subnets
      – Two should be in the asset inventory database
      – Devices should be detected within 24 hours
      – Devices should be isolated within 1 hour of detection
      – Details regarding location, department should be
        recorded




                                                                       11
                 © 2010 James Tarala - Prioritizing an Audit Program        11
Sample Metrics for Control #1

 ID                  Testing / Reporting Metric                                  Response

 1a   How long does it take to detect new devices added to the                 Time in Minutes
      organization’s network?

 1b   How long does it take the scanners to alert the                          Time in Minutes
      organization’s administrators that an unauthorized device
      is on the network?

 1c   How long does it take to isolate / remove unauthorized                   Time in Minutes
      devices from the organization’s network?


 1d   Are the scanners able to identify the location, department,                  Yes/No
      and other critical details about the unauthorized system
      that is detected?




                                                                                                 12
                         © 2010 James Tarala - Prioritizing an Audit Program                          12
Case Study: Large Retirement Fund

  We have already started using the controls as
   the foundation of an assurance audit program
  Large financial services company




                                                                    13
              © 2010 James Tarala - Prioritizing an Audit Program        13
Where to Learn More:

  Center for Strategic & International Studies
   (http://csis.org/program/commission-cybersecurity-44th-
   presidency)
  The SANS Institute
   (http://www.sans.org/critical-security-controls/)
  James Tarala
    – E-mail: james.tarala@enclavesecurity.com
    – Twitter: @isaudit & @jamestarala
    – Blog: http://enclavesecurity.com/blogs/




                                                                      14
                © 2010 James Tarala - Prioritizing an Audit Program    14

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
The CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for DefenseThe CIS Critical Security Controls the International Standard for Defense
The CIS Critical Security Controls the International Standard for Defense
 
Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Federal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practicesFederal Cybersecurity: The latest challenges, initiatives and best practices
Federal Cybersecurity: The latest challenges, initiatives and best practices
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the Cloud
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 

Similar a Prioritizing an audit program using the 20 critical controls

Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
Roger Hagedorn
 
A summary of gao’s review of information security (naba barkakati)
A summary of gao’s review of information security (naba barkakati)A summary of gao’s review of information security (naba barkakati)
A summary of gao’s review of information security (naba barkakati)
Naba Barkakati
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docx
anhlodge
 
Compliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM iCompliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM i
taford
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
Surendhar57
 

Similar a Prioritizing an audit program using the 20 critical controls (20)

Why Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfWhy Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdf
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
A summary of gao’s review of information security (naba barkakati)
A summary of gao’s review of information security (naba barkakati)A summary of gao’s review of information security (naba barkakati)
A summary of gao’s review of information security (naba barkakati)
 
Cybersecurity Compliance in Government Contracts
Cybersecurity Compliance in Government ContractsCybersecurity Compliance in Government Contracts
Cybersecurity Compliance in Government Contracts
 
SANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docxSANS 2013 Critical Security Controls Survey Moving From A.docx
SANS 2013 Critical Security Controls Survey Moving From A.docx
 
Analyzing Your GovCon Cybersecurity Compliance
Analyzing Your GovCon Cybersecurity ComplianceAnalyzing Your GovCon Cybersecurity Compliance
Analyzing Your GovCon Cybersecurity Compliance
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
CIO IT Audit Survival TNS07
CIO IT Audit Survival TNS07CIO IT Audit Survival TNS07
CIO IT Audit Survival TNS07
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
Analyzing Your Government Contract Cybersecurity Compliance
Analyzing Your Government Contract Cybersecurity ComplianceAnalyzing Your Government Contract Cybersecurity Compliance
Analyzing Your Government Contract Cybersecurity Compliance
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
Module 6.pptx
Module 6.pptxModule 6.pptx
Module 6.pptx
 
SanerNow Asset Management
SanerNow Asset ManagementSanerNow Asset Management
SanerNow Asset Management
 
Compliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM iCompliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM i
 
Mobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the UglyMobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the Ugly
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 

Más de EnclaveSecurity

An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security Assessments
EnclaveSecurity
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
EnclaveSecurity
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
EnclaveSecurity
 

Más de EnclaveSecurity (9)

Automating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShellAutomating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShell
 
Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security Assessments
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security Assessments
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security Assessments
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Benefits of web application firewalls
Benefits of web application firewallsBenefits of web application firewalls
Benefits of web application firewalls
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Prioritizing an audit program using the 20 critical controls

  • 1. Prioritizing an Audit Program Using the Consensus Audit Guidelines (CAG) James Tarala © 2010 James Tarala - Prioritizing an Audit Program 1
  • 2. Issue Statement #1  Traditionally the focus of audit groups has not been to audit for information security  Historical progression of audit focuses: – Accounting – Fraud – Compliance – Security / Assurance* 2 © 2010 James Tarala - Prioritizing an Audit Program 2
  • 3. Issue Statement #2 3 © 2010 James Tarala - Prioritizing an Audit Program 3
  • 4. Other Issues to Consider  Today there are no “Generally Accepted” practices for IS Audit  It is difficult to find agreement on what’s important to audit as well as how to perform an audit  Risk measurements are mostly subjective in organizations  Metrics are not generally used when evaluating IS security  We are too reliant on “paperwork reviews” to evaluate information security programs 4 © 2010 James Tarala - Prioritizing an Audit Program 4
  • 5. One Reason This is Important  Here are some data breaches that were reported in 2009 (most were not)  Just a small sample (organization/records breached): – Heartland Payment Systems (130+ million – 1/2009) – Oklahoma Dept of Human Services (1 million – 4/2009) – Oklahoma Housing Finance Agency (225,000 – 4/2009) – University of California (160,000 – 5/2009) – Network Solutions (573,000 – 7/2009) – U.S. Military Veterans Administration (76 million – 10/2009) – BlueCross BlueShield Assn. (187,000 – 10/2009) 5 © 2010 James Tarala - Prioritizing an Audit Program 5
  • 6. Another Reason This is Important  The threats are becoming more serious and more difficult to stop 6 © 2010 James Tarala - Prioritizing an Audit Program 6
  • 7. How Do the 20 Critical Controls Fit?  For auditors: – They prioritize critical controls – They instruct how to truly audit for information assurance – They help set audit strategy – They can automate testing – They can facilitate meaningful reporting  For auditors, they answer the question, what’s really important 7 © 2010 James Tarala - Prioritizing an Audit Program 7
  • 8. A Few of the Document Contributors  Blue team members inside the Department of Defense  Blue team members who provide services for non-DoD government agencies  Red & blue teams at the US National Security Agency  US-CERT and other non-military incident response teams  DoD Cyber Crime Center (DC3)  Military investigators who fight cyber crime  The FBI and other police organizations  US Department of Energy laboratories  US Department of State  Army Research Laboratory  US Department of Homeland Security  Plus over 100 other contributors 8 © 2010 James Tarala - Prioritizing an Audit Program 8
  • 9. The 20 Critical Controls  Inventory of Authorized and Unauthorized  Continuous Vulnerability Assessment Devices and Remediation  Inventory of Authorized and Unauthorized  Account Monitoring and Control Software  Malware Defenses  Secure Configurations for Hardware and  Limitation and Control of Network Software on Laptops, Workstations, and Ports, Protocols, and Services Servers  Wireless Device Control  Secure Configurations for Network Devices such as Firewalls, Routers, and Switches  Data Loss Prevention  Boundary Defense  Secure Network Engineering  Maintenance, Monitoring, and Analysis of  Penetration Tests and Red Team Audit Logs Exercises  Application Software Security  Incident Response Capability  Controlled Use of Administrative Privileges  Data Recovery Capability  Controlled Access Based on Need to Know  Security Skills Assessment and Appropriate Training to Fill Gaps 9 © 2010 James Tarala - Prioritizing an Audit Program 9
  • 10. CAG Core Evaluation Steps  Defined in the latest version of the 20 Critical Controls (after version 2.1)  One or two tests which can be performed to determine if the business goal of the control has been met  Mental Goal: – It’s all about meeting a business goal – Don’t over-think the controls as a technician  Each test is technical in nature (no paperwork reviews) 10 © 2010 James Tarala - Prioritizing an Audit Program 10
  • 11. Sample Test for Control #1  Place ten unauthorized devices on various portions of the organization’s network unannounced to see how long it takes for them to be detected – They should be placed on multiple subnets – Two should be in the asset inventory database – Devices should be detected within 24 hours – Devices should be isolated within 1 hour of detection – Details regarding location, department should be recorded 11 © 2010 James Tarala - Prioritizing an Audit Program 11
  • 12. Sample Metrics for Control #1 ID Testing / Reporting Metric Response 1a How long does it take to detect new devices added to the Time in Minutes organization’s network? 1b How long does it take the scanners to alert the Time in Minutes organization’s administrators that an unauthorized device is on the network? 1c How long does it take to isolate / remove unauthorized Time in Minutes devices from the organization’s network? 1d Are the scanners able to identify the location, department, Yes/No and other critical details about the unauthorized system that is detected? 12 © 2010 James Tarala - Prioritizing an Audit Program 12
  • 13. Case Study: Large Retirement Fund  We have already started using the controls as the foundation of an assurance audit program  Large financial services company 13 © 2010 James Tarala - Prioritizing an Audit Program 13
  • 14. Where to Learn More:  Center for Strategic & International Studies (http://csis.org/program/commission-cybersecurity-44th- presidency)  The SANS Institute (http://www.sans.org/critical-security-controls/)  James Tarala – E-mail: james.tarala@enclavesecurity.com – Twitter: @isaudit & @jamestarala – Blog: http://enclavesecurity.com/blogs/ 14 © 2010 James Tarala - Prioritizing an Audit Program 14