SlideShare a Scribd company logo
Avoiding Audit Fatigue: Achieving Compliance In A Multi-Compliance  World In Nine StepsGene Kim, CISA, TOCICO JonahCTO and Founder(Twitter: @RealGeneKim) Gartner 2010
Where Did The High Performers Come From?
AgendaThe problems of compliance du jour and the audit blame cycleHow did the high performing IT organizations make their “good to great” transformations?Nine practical steps overcome audit fatigueWhat does integration of security controls into daily operation feel like?Additional resourcesAuthorsGene Kim, Founder/CTO, Tripwire, Inc.Jennifer Bayuk, Cybersecurity Program Director, Stevens Institute of Technology
“Boss, We Are Ready For The Upcoming Audits…”
“OMG. OMG. The Auditors Are Coming When?!?”
“IT Operations Not Quite As Ready As They Thought…”
“Infosec Must Do Heroics, Generating Reports And Presentations From Scratch…”
“Despite Heroics, The Business Still Fails The Audit…”
“InfosecAs Professional Apologist…’”
Problems: AccountabilityInfosec often discovers too late that business and IT management were not as prepared for the audits as was representedBusiness, IT and infosec must perform heroics to generate proof of compliance, often requiring new documents and presentations from scratch in response to auditor questionsBusiness may fail an audit test, requiring remediation work, audit retests, fines, loss of auditor confidence in the infosecprogram, as well as loss of personal trust in the infosec managerA security breach may occur, and the business must now explain how it occurred despite passing the audit
Problem: OrganizationalInformation security is often organized and designed to minimally interfere with business and IT operations, but creates barriers to meeting compliance goalsInformation security is held accountable, but control effectiveness relies upon other business and IT management to be adequately prepared
Problems: The Real Business CostScheduled value-adding work and projects are delayed because of all the urgent and unplanned audit prep workBusiness continues to implement controls as a part of a one-time audit preparation project to achieve compliance, with little thought on how to maintain compliance over time Next time requires just as much effort, instead of integrating controls into daily business and IT operational processesThe business starts treating audit prep as a legitimate value-adding project, even charging time against itMultiple regulatory and contractual requirements result in IT controls being tested numerous times by numerous parties, requiring management to perform work multiple times
Information Security and Compliance RisksInformation security practitioners are always one change away from a security breachFront page newsRegulatory finesBrand damageHigh profile security failures are increasing external pressures for security and complianceSarbanes-Oxley (SOX) Act of 2002, the Gramm-Leach-Bliley Act, Health Insurance Portability and Accountability Act (HIPAA), emerging privacy laws, and the Payment Card Industry Data Security Standard (PCI DSS)
Going from Good to Great
Desired Outcome: Create A Higher Performing, More Nimble and More Secure IT Organization10,0001000Best in Class Ops and Security100101020406080100120140Operations Metrics Benchmarks:Best in Class: Server/sysadmin ratiosHighest ratio of staff for pre-production processes
Lowest amount of unplanned work
Highest change success rate
Best posture of compliance
Lowest cost of complianceSize of Operation# ServersEfficiency of OperationServer/sysadmin ratioSource: IT Process Institute (2001)
Higher Performing IT Organizations Are More Stable, Nimble, Compliant And Secure High performers maintain a posture of compliance
Fewest number of repeat audit findings
One-third amount of audit preparation effort
High performers find and fix security breaches faster
5 times more likely to detect breaches by automated control
5 times less likely to have breaches result in a loss event
When high performers implement changes…
14 times morechanges
One-half the change failure rate
One-quarter the first fix failure rate
10x fasterMTTR for Sev 1 outages
When high performers manage IT resources…
One-third the amount of unplanned work
8 times moreprojects and IT services
6 times moreapplicationsSource: IT Process Institute, May 2008
Visible Ops:  Playbook of High PerformersThe IT Process Institute has been studying high-performing organizations since 1999What is common to all the high performers?What is different between them and average and low performers?How did they become great?Answers have been codified in the Visible Ops Methodology
Over Ten Years, We Benchmarked 1500+ IT OrgsSource: EMA (2009) Source: IT Process Institute (2008)
2007: Three Controls Predict 60% Of PerformanceTo what extent does an organization define, monitor and enforce the following?Standardized configuration strategyProcess disciplineControlled access to production systemsSource: IT Process Institute, May 2008
Nine Practical Steps To Overcome Audit Fatigue And The Blame Cycle
The Nine Steps To Avoid Audit FatigueStep 1: Align with tone at the topStep 2: Create a set of merged infosec and compliance/business goalsStep 3: Define ideal information security goal indicatorsStep 4: Gain an end-to-end understanding of the information flowStep 5: Agree upon control ownership, roles and responsibilitiesStep 6: Define the control tests so business process control owners will agree with the resultsStep 7: Schedule and conduct regular control testsStep 8: Organize metrics and remediation reportsStep 9: Detect and respond to significant changes to the control environment
Step 1: Align With Tone At The TopEnsure that compliance activity is clearly managed from the top down.
Step 2: Merge Information Security Into The Compliance/ Business GoalsDocument IT governance goals and the risks to achieving those goalsConfirm that information security and compliance helps achieve those goals.For instance:A manufacturing company must comply with a regulatory requirement that certain chemical toxins are never released into the atmosphere in amounts over 10 particles per second. The manufacturing control system has been designed to ensure that this toxin is released at a rate of only 1 particle per second.
Step 2: Merge Information Security Into The Compliance/ Business GoalsWhat is the business objective?Ensure smooth operation of the manufacturing process, in accordance to the business plan and all associated laws and regulations.What are the information security and compliance risks?The manufacturing control system could fail and release more than the allowed amount of the chemical toxin into the atmosphere.The measurement system may not detect this release. Also, the manufacturing control measurement data could be altered or lost, which would prevent management from validating emissions output compliance.What is my information security goal to address this risk?We must maintain integrity over the particle release measurement process and the measurement data.
Step 2: Merge Information Security Into The Compliance/ Business GoalsWhat control will we implement to meet this goal?An access and measurement testing control process will protect the toxin release measurement software against tampering. The control will alert operations when changes to access are detected and when abnormal variations in the toxin measurements occur. The alert response will include automated and manual procedures that verify that the algorithm installed in the production system is the same as the one that underwent rigorous pre-production system testing.What does plant management (the business process owner) need to do to support this goal?The control process would require the business process owner to configure the production system to minimize the access any given individual needs to change the algorithm and the corresponding data. The control process would also require the business process owner to minimize the job functions that require access to the algorithms and the measurement data.
Step 3: Define Ideal Information Security MeasuresDevelop theoretical ideal indicators that demonstrate that information security goals are being met.Examples# of access roles not validated by management% of accounts not matching management-defined roles% of configurations not pre-approved by management% of changes not approved by management% of systems with centralized logging
Step 4: Gain End-to-End UnderstandingDo an end-to-end business process walk-through to understand and document:Where does sensitive information enter, transit, get stored, and exit the organization?What are the risks to organizational goals and information flow?Where is reliance placed on technology to prevent and detect control failures?
Step 4: Gain End-to-End UnderstandingA merchant has a business process that supports a customer loyalty program. The program includes issuing branded credit cards. The consumer credit information flow starts with a customer filling out an online application form, which is…Sent to the credit calculation application, is then…Sent to a sales application, and…Ends up in an application that runs on the desktop of every customer service representative. What is the business goal?To ensure that customers approved for the credit card services are capable of meeting their obligations, so that any credit extended to the customer is likely to be repaid.
Step 4: Gain End-to-End UnderstandingWhat are the business, information security and compliance risks?Customer information is inaccurateCustomer  information is inadvertently disclosed, violating regulatory requirementsThrough what applications does the information flow?The online application form is delivered through a third-party vendor, The credit calculation is done on cloud computing resourcesThe sales application is run internally by IT operationsThe customer service application is run by a combination of internally developed server software and desktop software on the customer service desktops.
Step 5: Agree Upon Control Ownership, Roles And ResponsibilitiesClearly define roles and responsibilities for audit compliance activities at the process owner level.
Step 6: Define The Control Tests So Control Owners Will Agree With The ResultsMake sure that evidence that demonstrates compliance goals have been met can be generated in an automated manner, upon demand.This will mirror the accountability spreadsheet that the auditors will likely constructThis is what enables information security to not be left holding the bag when IT operations is disorganized or unprepared.

More Related Content

PPT
3 2006 06 cs6 4 gait principles v3a
PDF
Audit Sample Report
PPT
Itpi metricon 0906a final
PPT
Information systems audit and control
DOCX
IS Audits and Internal Controls
PPTX
Information Systems Audit-Related Designations
PPTX
Hp It Performance Suite Customer Presentation
PPT
Sap security compliance tools_PennonSoft
3 2006 06 cs6 4 gait principles v3a
Audit Sample Report
Itpi metricon 0906a final
Information systems audit and control
IS Audits and Internal Controls
Information Systems Audit-Related Designations
Hp It Performance Suite Customer Presentation
Sap security compliance tools_PennonSoft

What's hot (20)

PPT
Ais Romney 2006 Slides 19 Ais Development Strategies
PPTX
IT Audit For Non-IT Auditors
PPT
SDLC Control
PPT
Data Protection Governance IT
PPTX
Continous Audit and Controls with Brainwave GRC
PPTX
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
PPTX
Information System Audit and Control
PDF
Active Directory Change Auditing in the Enterprise
PPTX
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
PDF
Why so many SIEM Implmentations Fail
PPT
How much does it cost to be Secure?
PPTX
Security at velocity dc cap one
PPT
Info Security & PCI(original)
PDF
How to Effectively Audit your IT Infrastructure
PPTX
Information system control and audit
PPT
Information Systems Security Review 2004
PPTX
Role management
PDF
Maceo Wattley Contributor Infosec
PDF
Avoiding the Data Compliance "Hot Seat"
PDF
How to measure your cybersecurity performance
Ais Romney 2006 Slides 19 Ais Development Strategies
IT Audit For Non-IT Auditors
SDLC Control
Data Protection Governance IT
Continous Audit and Controls with Brainwave GRC
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Information System Audit and Control
Active Directory Change Auditing in the Enterprise
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
Why so many SIEM Implmentations Fail
How much does it cost to be Secure?
Security at velocity dc cap one
Info Security & PCI(original)
How to Effectively Audit your IT Infrastructure
Information system control and audit
Information Systems Security Review 2004
Role management
Maceo Wattley Contributor Infosec
Avoiding the Data Compliance "Hot Seat"
How to measure your cybersecurity performance
Ad

Viewers also liked (17)

PPTX
HR Processes - Internal Audit
DOCX
Tugas Transmisi Daya Listrik
PPTX
Kherson Steering Group
DOC
Avsorchards
PPTX
Winnipeg ISACA Security is Dead, Rugged DevOps
PPT
Introducing Euclid Network2
PPT
Lifehacking in het onderwijs
PDF
ABA Environmental Technologies
PPTX
Proactol Afiliate Presentation
PDF
Afstudeeronderzoek Annemiek Van Den Bosch
PPTX
Centius training 081410
PDF
ABA Business Location Austria
PPT
SEO Ranking Factors
PPTX
Cisco Live 2010
PPT
TicketForEvent для спортивных мероприятий
PPT
4. removing risk from affiliate marketing
DOC
Fore! (-teen below)
HR Processes - Internal Audit
Tugas Transmisi Daya Listrik
Kherson Steering Group
Avsorchards
Winnipeg ISACA Security is Dead, Rugged DevOps
Introducing Euclid Network2
Lifehacking in het onderwijs
ABA Environmental Technologies
Proactol Afiliate Presentation
Afstudeeronderzoek Annemiek Van Den Bosch
Centius training 081410
ABA Business Location Austria
SEO Ranking Factors
Cisco Live 2010
TicketForEvent для спортивных мероприятий
4. removing risk from affiliate marketing
Fore! (-teen below)
Ad

Similar to 2010 06 gartner avoiding audit fatigue in nine steps 1d (20)

PPTX
2016 Risk Management Workshop
PDF
A Guide To IT Compliance Assessment And Management
PPTX
2011 09 18 United "Platitudes, reality and promise"
PPT
Information Security Program & PCI Compliance Planning for your Business
PDF
Credit Union Cyber Security
PDF
Continuous Control Monitoring_ Ensuring Business Security and Compliance.pdf
PDF
How to Secure your Fintech Solution - A Whitepaper by RapidValue
PPT
IT System & Security Audit
DOCX
Building Information System
PPT
Chap001
PPTX
How to Make Your Enterprise Cyber Resilient
PPT
gray_audit_presentation.ppt
PDF
Introduction to IT compliance program and Discuss the challenges IT .pdf
PPTX
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
PDF
CISA (1).pdf
PDF
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
PDF
Event Monitoring: Use Powerful Insights to Improve Performance and Security
PDF
Facility Environmental Audit Guidelines
PDF
Information systems and its components iii
PDF
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
2016 Risk Management Workshop
A Guide To IT Compliance Assessment And Management
2011 09 18 United "Platitudes, reality and promise"
Information Security Program & PCI Compliance Planning for your Business
Credit Union Cyber Security
Continuous Control Monitoring_ Ensuring Business Security and Compliance.pdf
How to Secure your Fintech Solution - A Whitepaper by RapidValue
IT System & Security Audit
Building Information System
Chap001
How to Make Your Enterprise Cyber Resilient
gray_audit_presentation.ppt
Introduction to IT compliance program and Discuss the challenges IT .pdf
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
CISA (1).pdf
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Facility Environmental Audit Guidelines
Information systems and its components iii
IT Governance and Compliance: Its Importance and the Best Practices to Follow...

More from Gene Kim (20)

PPTX
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
PPTX
The Unicorn Project and The Five Ideals (Updated Dec 2019)
PPTX
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
PPTX
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
PPTX
The Unicorn Project and The Five Ideals (older: see notes for newer version)
PPTX
2019 Top Lessons Learned Since the Phoenix Project Was Released
PPTX
Leading A DevOps Transformation: Lessons Learned
PPTX
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
PPTX
2014 State Of DevOps Findings! Velocity Conference
PPTX
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
PDF
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
PPTX
How Can We Better Sell DevOps?
PPTX
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
PDF
Kevin Behr: Integrating Controls and Process Improvement
PPTX
SecureWorld - Communicating With Your CFO
PPT
2012 Velocity London: DevOps Patterns Distilled
PPTX
PuppetConf2012GeneKim
PPTX
United2012 Rugged DevOps Rocks
PPTX
Infosec at Ludicrous Speeds - Rugged DevOps
PPTX
When IT Fails The Business Fails...
Speaker Recording Tips For Virtual DevOps Enterprise (And Why We're Pre-Recor...
The Unicorn Project and The Five Ideals (Updated Dec 2019)
2019 12 Clojure/conj: Love Letter To Clojure, and A Datomic Experience Report
GitHub Universe: 2019: Exemplars, Laggards, and Hoarders A Data-driven Look a...
The Unicorn Project and The Five Ideals (older: see notes for newer version)
2019 Top Lessons Learned Since the Phoenix Project Was Released
Leading A DevOps Transformation: Lessons Learned
Keeping The Auditor Away: DevOps Audit Compliance Case Studies
2014 State Of DevOps Findings! Velocity Conference
DevOps: Who Will Create $2.6 Trillion In Business Value Per Year?
2013 Velocity DevOps Metrics -- It's Not Just For WebOps Any More!
How Can We Better Sell DevOps?
Why Everyone Needs DevOps Now: 15 Year Study Of High Performing Technology Orgs
Kevin Behr: Integrating Controls and Process Improvement
SecureWorld - Communicating With Your CFO
2012 Velocity London: DevOps Patterns Distilled
PuppetConf2012GeneKim
United2012 Rugged DevOps Rocks
Infosec at Ludicrous Speeds - Rugged DevOps
When IT Fails The Business Fails...

Recently uploaded (20)

PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PPT
Chapter four Project-Preparation material
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
Lecture 3 - Risk Management and Compliance.pdf
PDF
A Brief Introduction About Julia Allison
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
Types of control:Qualitative vs Quantitative
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Business model innovation report 2022.pdf
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
The FMS General Management Prep-Book 2025.pdf
PDF
Hindu Circuler Economy - Model (Concept)
PPTX
Lecture (1)-Introduction.pptx business communication
DOCX
Euro SEO Services 1st 3 General Updates.docx
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
Starting the business from scratch using well proven technique
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Chapter four Project-Preparation material
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Lecture 3 - Risk Management and Compliance.pdf
A Brief Introduction About Julia Allison
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Types of control:Qualitative vs Quantitative
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Roadmap Map-digital Banking feature MB,IB,AB
Business model innovation report 2022.pdf
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Power and position in leadershipDOC-20250808-WA0011..pdf
The FMS General Management Prep-Book 2025.pdf
Hindu Circuler Economy - Model (Concept)
Lecture (1)-Introduction.pptx business communication
Euro SEO Services 1st 3 General Updates.docx
Belch_12e_PPT_Ch18_Accessible_university.pptx
Starting the business from scratch using well proven technique
unit 1 COST ACCOUNTING AND COST SHEET

2010 06 gartner avoiding audit fatigue in nine steps 1d

  • 1. Avoiding Audit Fatigue: Achieving Compliance In A Multi-Compliance World In Nine StepsGene Kim, CISA, TOCICO JonahCTO and Founder(Twitter: @RealGeneKim) Gartner 2010
  • 2. Where Did The High Performers Come From?
  • 3. AgendaThe problems of compliance du jour and the audit blame cycleHow did the high performing IT organizations make their “good to great” transformations?Nine practical steps overcome audit fatigueWhat does integration of security controls into daily operation feel like?Additional resourcesAuthorsGene Kim, Founder/CTO, Tripwire, Inc.Jennifer Bayuk, Cybersecurity Program Director, Stevens Institute of Technology
  • 4. “Boss, We Are Ready For The Upcoming Audits…”
  • 5. “OMG. OMG. The Auditors Are Coming When?!?”
  • 6. “IT Operations Not Quite As Ready As They Thought…”
  • 7. “Infosec Must Do Heroics, Generating Reports And Presentations From Scratch…”
  • 8. “Despite Heroics, The Business Still Fails The Audit…”
  • 10. Problems: AccountabilityInfosec often discovers too late that business and IT management were not as prepared for the audits as was representedBusiness, IT and infosec must perform heroics to generate proof of compliance, often requiring new documents and presentations from scratch in response to auditor questionsBusiness may fail an audit test, requiring remediation work, audit retests, fines, loss of auditor confidence in the infosecprogram, as well as loss of personal trust in the infosec managerA security breach may occur, and the business must now explain how it occurred despite passing the audit
  • 11. Problem: OrganizationalInformation security is often organized and designed to minimally interfere with business and IT operations, but creates barriers to meeting compliance goalsInformation security is held accountable, but control effectiveness relies upon other business and IT management to be adequately prepared
  • 12. Problems: The Real Business CostScheduled value-adding work and projects are delayed because of all the urgent and unplanned audit prep workBusiness continues to implement controls as a part of a one-time audit preparation project to achieve compliance, with little thought on how to maintain compliance over time Next time requires just as much effort, instead of integrating controls into daily business and IT operational processesThe business starts treating audit prep as a legitimate value-adding project, even charging time against itMultiple regulatory and contractual requirements result in IT controls being tested numerous times by numerous parties, requiring management to perform work multiple times
  • 13. Information Security and Compliance RisksInformation security practitioners are always one change away from a security breachFront page newsRegulatory finesBrand damageHigh profile security failures are increasing external pressures for security and complianceSarbanes-Oxley (SOX) Act of 2002, the Gramm-Leach-Bliley Act, Health Insurance Portability and Accountability Act (HIPAA), emerging privacy laws, and the Payment Card Industry Data Security Standard (PCI DSS)
  • 14. Going from Good to Great
  • 15. Desired Outcome: Create A Higher Performing, More Nimble and More Secure IT Organization10,0001000Best in Class Ops and Security100101020406080100120140Operations Metrics Benchmarks:Best in Class: Server/sysadmin ratiosHighest ratio of staff for pre-production processes
  • 16. Lowest amount of unplanned work
  • 18. Best posture of compliance
  • 19. Lowest cost of complianceSize of Operation# ServersEfficiency of OperationServer/sysadmin ratioSource: IT Process Institute (2001)
  • 20. Higher Performing IT Organizations Are More Stable, Nimble, Compliant And Secure High performers maintain a posture of compliance
  • 21. Fewest number of repeat audit findings
  • 22. One-third amount of audit preparation effort
  • 23. High performers find and fix security breaches faster
  • 24. 5 times more likely to detect breaches by automated control
  • 25. 5 times less likely to have breaches result in a loss event
  • 26. When high performers implement changes…
  • 28. One-half the change failure rate
  • 29. One-quarter the first fix failure rate
  • 30. 10x fasterMTTR for Sev 1 outages
  • 31. When high performers manage IT resources…
  • 32. One-third the amount of unplanned work
  • 33. 8 times moreprojects and IT services
  • 34. 6 times moreapplicationsSource: IT Process Institute, May 2008
  • 35. Visible Ops: Playbook of High PerformersThe IT Process Institute has been studying high-performing organizations since 1999What is common to all the high performers?What is different between them and average and low performers?How did they become great?Answers have been codified in the Visible Ops Methodology
  • 36. Over Ten Years, We Benchmarked 1500+ IT OrgsSource: EMA (2009) Source: IT Process Institute (2008)
  • 37. 2007: Three Controls Predict 60% Of PerformanceTo what extent does an organization define, monitor and enforce the following?Standardized configuration strategyProcess disciplineControlled access to production systemsSource: IT Process Institute, May 2008
  • 38. Nine Practical Steps To Overcome Audit Fatigue And The Blame Cycle
  • 39. The Nine Steps To Avoid Audit FatigueStep 1: Align with tone at the topStep 2: Create a set of merged infosec and compliance/business goalsStep 3: Define ideal information security goal indicatorsStep 4: Gain an end-to-end understanding of the information flowStep 5: Agree upon control ownership, roles and responsibilitiesStep 6: Define the control tests so business process control owners will agree with the resultsStep 7: Schedule and conduct regular control testsStep 8: Organize metrics and remediation reportsStep 9: Detect and respond to significant changes to the control environment
  • 40. Step 1: Align With Tone At The TopEnsure that compliance activity is clearly managed from the top down.
  • 41. Step 2: Merge Information Security Into The Compliance/ Business GoalsDocument IT governance goals and the risks to achieving those goalsConfirm that information security and compliance helps achieve those goals.For instance:A manufacturing company must comply with a regulatory requirement that certain chemical toxins are never released into the atmosphere in amounts over 10 particles per second. The manufacturing control system has been designed to ensure that this toxin is released at a rate of only 1 particle per second.
  • 42. Step 2: Merge Information Security Into The Compliance/ Business GoalsWhat is the business objective?Ensure smooth operation of the manufacturing process, in accordance to the business plan and all associated laws and regulations.What are the information security and compliance risks?The manufacturing control system could fail and release more than the allowed amount of the chemical toxin into the atmosphere.The measurement system may not detect this release. Also, the manufacturing control measurement data could be altered or lost, which would prevent management from validating emissions output compliance.What is my information security goal to address this risk?We must maintain integrity over the particle release measurement process and the measurement data.
  • 43. Step 2: Merge Information Security Into The Compliance/ Business GoalsWhat control will we implement to meet this goal?An access and measurement testing control process will protect the toxin release measurement software against tampering. The control will alert operations when changes to access are detected and when abnormal variations in the toxin measurements occur. The alert response will include automated and manual procedures that verify that the algorithm installed in the production system is the same as the one that underwent rigorous pre-production system testing.What does plant management (the business process owner) need to do to support this goal?The control process would require the business process owner to configure the production system to minimize the access any given individual needs to change the algorithm and the corresponding data. The control process would also require the business process owner to minimize the job functions that require access to the algorithms and the measurement data.
  • 44. Step 3: Define Ideal Information Security MeasuresDevelop theoretical ideal indicators that demonstrate that information security goals are being met.Examples# of access roles not validated by management% of accounts not matching management-defined roles% of configurations not pre-approved by management% of changes not approved by management% of systems with centralized logging
  • 45. Step 4: Gain End-to-End UnderstandingDo an end-to-end business process walk-through to understand and document:Where does sensitive information enter, transit, get stored, and exit the organization?What are the risks to organizational goals and information flow?Where is reliance placed on technology to prevent and detect control failures?
  • 46. Step 4: Gain End-to-End UnderstandingA merchant has a business process that supports a customer loyalty program. The program includes issuing branded credit cards. The consumer credit information flow starts with a customer filling out an online application form, which is…Sent to the credit calculation application, is then…Sent to a sales application, and…Ends up in an application that runs on the desktop of every customer service representative. What is the business goal?To ensure that customers approved for the credit card services are capable of meeting their obligations, so that any credit extended to the customer is likely to be repaid.
  • 47. Step 4: Gain End-to-End UnderstandingWhat are the business, information security and compliance risks?Customer information is inaccurateCustomer information is inadvertently disclosed, violating regulatory requirementsThrough what applications does the information flow?The online application form is delivered through a third-party vendor, The credit calculation is done on cloud computing resourcesThe sales application is run internally by IT operationsThe customer service application is run by a combination of internally developed server software and desktop software on the customer service desktops.
  • 48. Step 5: Agree Upon Control Ownership, Roles And ResponsibilitiesClearly define roles and responsibilities for audit compliance activities at the process owner level.
  • 49. Step 6: Define The Control Tests So Control Owners Will Agree With The ResultsMake sure that evidence that demonstrates compliance goals have been met can be generated in an automated manner, upon demand.This will mirror the accountability spreadsheet that the auditors will likely constructThis is what enables information security to not be left holding the bag when IT operations is disorganized or unprepared.
  • 50. Step 7: Schedule And Conduct Regular Control TestsConduct tests of controls effectiveness frequently enough be able to rely on their effectiveness regardless of variances in audit scope and timing.Ensure that sample size is safely larger than the auditor’sYou will find unprepared IT control owners long before the audits“Hope is not a strategy. Trust is not a control.”
  • 51. Step 8: Organize Metrics And Remediation ReportsTrack the completion of required remediation work, ideally to be completed well in advance of the audit.By compliance objectiveBy business processBy control ownerThis will look like a PMO status report
  • 52. Step 9: Detect And Respond To Significant Changes To The Control EnvironmentHave the situational awareness to know when the information flow or control environment has significantly changed, requiring these steps to be redoneFor example, when an application is changed to allow consumer data to be downloaded to desktops instead of being viewed through pre-defined application reports).
  • 53. What Does Integration Of Security Controls Into Daily Operations Look Like?
  • 54. Find What’s Most Important First
  • 55. Quickly Find What Is Different…
  • 56. Before Something Bad Happens…
  • 60. Based On Objective Evidence…
  • 63. Show Value To The Business…
  • 64. Be Recognized For Contribution…
  • 65. And Do More With Less…
  • 66. Higher Performing IT Organizations Are More Stable, Nimble, Compliant And Secure High performers maintain a posture of compliance
  • 67. Fewest number of repeat audit findings
  • 68. One-third amount of audit preparation effort
  • 69. High performers find and fix security breaches faster
  • 70. 5 times more likely to detect breaches by automated control
  • 71. 5 times less likely to have breaches result in a loss event
  • 72. When high performers implement changes…
  • 74. One-half the change failure rate
  • 75. One-quarter the first fix failure rate
  • 76. 10x fasterMTTR for Sev 1 outages
  • 77. When high performers manage IT resources…
  • 78. One-third the amount of unplanned work
  • 79. 8 times moreprojects and IT services
  • 80. 6 times moreapplicationsSource: IT Process Institute, May 2008
  • 81. It’s The Way…Automate ComplianceProtect Sensitive DataEliminateOutagesTAKE CONTROL.Tripwire VIAVIATMTMTripwire
  • 82. Tripwire VIA™IT Security & Compliance Automation Suite Tripwire VIATMVISIBILITY  INTELLIGENCE  AUTOMATIONFile Integrity MonitoringSecurityEvent ManagerCompliance Policy ManagerLog ManagerTripwire Enterprise Tripwire Log CenterConfiguration Remediation
  • 83. ResourcesFrom the IT Process Institute www.itpi.orgBoth Visible Ops HandbooksITPI IT Controls Performance StudyStop by the Tripwire booth for a copy of Visible Ops Security“Avoiding Audit Fatigue: Nine Steps To Achieve Compliance In A Multi-Compliance World ” white paperFollow Gene KimOn Twitter: @RealGeneKimgenek@tripwire.comBlog: http://www.tripwire.com/blog/?cat=34

Editor's Notes

  • #6: There are many ways to react to this: like, fear, horror, trying to become invisible… All understandable, given the circumstances…