IT Audit Methodologies
IT AUDIT
METHODOLOGIES
IT Audit Methodologies
• CobiT
• BS 7799 - Code of Practice (CoP)
• BSI - IT Baseline Protection Manual
• ITSEC
• Common Criteria (CC)
Main Areas of Use
• IT Audits
• Risk Analysis
• Health Checks (Security Benchmarking)
• Security Concepts
• Security Manuals / Handbooks
Security Definition
• Confidentiality
• Integrity
– Correctness
– Completeness
• Availability
CobiT
• Governance, Control & Audit for IT
• Developed by ISACA
• Releases
– CobiT 1: 1996
• 32 Processes
• 271 Control Objectives
– CobiT 2: 1998
• 34 Processes
• 302 Control Objectives
CobiT - Model for IT Governance
• 36 Control models used as basis:
– Business control models (e.g. COSO)
– IT control models (e.g. DTI‘s CoP)
• CobiT control model covers:
– Security (Confidentiality, Integrity, Availability)
– Fiduciary (Effectiveness, Efficiency, Compliance,
Reliability of Information)
– IT Resources (Data, Application Systems,
Technology, Facilities, People)
CobiT - Framework
CobiT - Structure
• 4 Domains
– PO - Planning & Organisation
• 11 processes (high-level control objectives)
– AI - Acquisition & Implementation
• 6 processes (high-level control objectives)
– DS - Delivery & Support
• 13 processes (high-level control objectives)
– M - Monitoring
• 4 processes (high-level control objectives)
PO - Planning and Organisation
• PO 1 Define a Strategic IT Plan
• PO 2 Define the Information Architecture
• PO 3 Determine the Technological Direction
• PO 4 Define the IT Organisation and Relationships
• PO 5 Manage the IT Investment
• PO 6 Communicate Management Aims and Direction
• PO 7 Manage Human Resources
• PO 8 Ensure Compliance with External Requirements
• PO 9 Assess Risks
• PO 10 Manage Projects
• PO 11 Manage Quality
AI - Acquisition and Implementation
• AI 1 Identify Solutions
• AI 2 Acquire and Maintain Application
Software
• AI 3 Acquire and Maintain Technology
Architecture
• AI 4 Develop and Maintain IT Procedures
• AI 5 Install and Accredit Systems
• AI 6 Manage Changes
DS - Delivery and Support
• DS 1 Define Service Levels
• DS 2 Manage Third-Party
Services
• DS 3 Manage Performance and
Capacity
• DS 4 Ensure Continuous Service
• DS 5 Ensure Systems Security
• DS 6 Identify and Attribute Costs
• DS 7 Educate and Train Users
DS 8 Assist and Advise IT
Customers
DS 9 Manage the Configuration
DS 10 Manage Problems and
Incidents
DS 11 Manage Data
DS 12 Manage Facilities
DS 13 Manage Operations
M - Monitoring
• M 1 Monitor the Processes
• M 2 Assess Internal Control Adequacy
• M 3 Obtain Independent Assurance
• M 4 Provide for Independent Audit
CobiT - IT Process Matrix
Information
Criteria
– Effectiveness
– Efficiency
– Confidentiality
– Integrity
– Availability
– Compliance
– Reliability
IT Resources
People
Applications
Technology
Facilities
Data
CobiT - Summary
• Mainly used for IT audits, incl. security aspects
• No detailed evaluation methodology described
• Developed by international organisation (ISACA)
• Up-to-date: Version 2 released in 1998
• Only high-level control objectives described
• Detailed IT control measures are not documented
• Not very user friendly - learning curve!
• Evaluation results not shown in graphic form
BS 7799 - Security Baseline Controls
• 10 control categories
• 32 control groups
• 109 security controls
• 10 security key controls
BS 7799 - Control Categories
• Information security policy
• Security organisation
• Assets classification & control
• Personnel security
• Physical & environmental security
• Computer & network management
BS 7799 - Control Categories
• System access control
• Systems development & maintenance
• Business continuity planning
• Compliance
BS7799 - 10 Key Controls
• Information security policy document
• Allocation of information security
responsibilities
• Information security education and training
• Reporting of security incidents
• Virus controls
BS7799 - 10 Key Controls
• Business continuity planning process
• Control of proprietary software copying
• Safeguarding of organizational records
• Data protection
• Compliance with security policy
BS7799 - Summary
• Main use: Security Concepts & Health Checks
• No evaluation methodology described
• British Standard, developed by UK DTI
• Certification scheme in place (c:cure)
• BS7799, Part1, 1995 is being revised in 1999
• Lists 109 ready-to-use security controls
• No detailed security measures described
• Very user friendly - easy to learn
BSI - Structure
• IT security measures
– 7 areas
– 34 modules (building blocks)
• Safeguards catalogue
– 6 categories of security measures
• Threats catalogue
– 5 categories of threats
BSI - Security Measures (Modules)
• Protection for generic components
• Infrastructure
• Non-networked systems
• LANs
• Data transfer systems
• Telecommunications
• Other IT components
BSI - Generic Components
• 3.1 Organisation
• 3.2 Personnel
• 3.3 Contingency Planning
• 3.4 Data Protection
BSI - Infrastructure
• 4.1 Buildings
• 4.2 Cabling
• 4.3 Rooms
• 4.3.1 Office
• 4.3.2 Server Room
• 4.3.3 Storage Media Archives
• 4.3.4 Technical Infrastructure Room
• 4.4 Protective cabinets
• 4.5 Home working place
BSI - Non-Networked Systems
• 5.1 DOS PC (Single User)
• 5.2 UNIX System
• 5.3 Laptop
• 5.4 DOS PC (multiuser)
• 5.5 Non-networked Windows NT computer
• 5.6 PC with Windows 95
• 5.99 Stand-alone IT systems
BSI - LANs
• 6.1 Server-Based Network
• 6.2 Networked Unix Systems
• 6.3 Peer-to-Peer Network
• 6.4 Windows NT network
• 6.5 Novell Netware 3.x
• 6.6 Novell Netware version 4.x
• 6.7 Heterogeneous networks
BSI - Data Transfer Systems
• 7.1 Data Carrier Exchange
• 7.2 Modem
• 7.3 Firewall
• 7.4 E-mail
BSI - Telecommunications
• 8.1 Telecommunication system
• 8.2 Fax Machine
• 8.3 Telephone Answering Machine
• 8.4 LAN integration of an IT system via
ISDN
BSI - Other IT Components
• 9.1 Standard Software
• 9.2 Databases
• 9.3 Telecommuting
BSI - Module „Data Protection“ (3.4)
• Threats - Technical failure:
– T 4.13 Loss of stored data
• Security Measures - Contingency planning:
– S 6.36 Stipulating a minimum data protection concept
– S 6.37 Documenting data protection procedures
– S 6.33 Development of a data protection concept (optional)
– S 6.34 Determining the factors influencing data protection (optional)
– S 6.35 Stipulating data protection procedures (optional)
– S 6.41 Training data reconstruction
• Security Measures - Organisation:
– S 2.41 Employees' commitment to data protection
– S 2.137 Procurement of a suitable data backup system
BSI - Safeguards (420 safeguards)
• S1 - Infrastructure ( 45 safeguards)
• S2 - Organisation (153 safeguards)
• S3 - Personnel ( 22 safeguards)
• S4 - Hardware & Software ( 83 safeguards)
• S5 - Communications ( 62 safeguards)
• S6 - Contingency Planning ( 55 safeguards)
BSI - S1-Infrastructure (45 safeguards)
• S 1.7 Hand-held fire extinguishers
• S 1.10 Use of safety doors
• S 1.17 Entrance control service
• S 1.18 Intruder and fire detection devices
• S 1.27 Air conditioning
• S 1.28 Local uninterruptible power supply [UPS]
• S 1.36 Safekeeping of data carriers before and
after dispatch
BSI - Security Threats (209 threats)
• T1 - Force Majeure (10 threats)
• T2 - Organisational Shortcomings (58
threats)
• T3 - Human Errors (31 threats)
• T4 - Technical Failure (32 threats)
• T5 - Deliberate acts (78 threats)
IT Audit Methodoloies
BSI - T3-Human Errors (31 threats)
• T 3.1 Loss of data confidentiality/integrity as a result of IT
user error
• T 3.3 Non-compliance with IT security measures
• T 3.6 Threat posed by cleaning staff or outside staff
• T 3.9 Incorrect management of the IT system
• T 3.12 Loss of storage media during transfer
• T 3.16 Incorrect administration of site and data access rights
• T 3.24 Inadvertent manipulation of data
• T 3.25 Negligent deletion of objects
BSI - Summary
• Main use: Security concepts & manuals
• No evaluation methodology described
• Developed by German BSI (GISA)
• Updated version released each year
• Lists 209 threats & 420 security measures
• 34 modules cover generic & platform specific
security requirements
BSI - Summary
• User friendly with a lot of security details
• Not suitable for security risk analysis
• Results of security coverage not shown in
graphic form
• Manual in HTML format on BSI web server
• Manual in Winword format on CD-ROM
(first CD free, additional CDs cost DM 50.-- each)
• Paper copy of manual: DM 118.--
• Software ‚BSI Tool‘ (only in German): DM 515.--
ITSEC, Common Criteria
• ITSEC: IT Security Evaluation Criteria
• Developed by UK, Germany, France, Netherl. and
based primarily on USA TCSEC (Orange Book)
• Releases
– ITSEC: 1991
– ITSEM: 1993 (IT Security Evaluation Manual)
– UK IT Security Evaluation & Certification scheme:
1994
ITSEC, Common Criteria
• Common Criteria (CC)
• Developed by USA, EC: based on ITSEC
• ISO International Standard
• Releases
– CC 1.0: 1996
– CC 2.0: 1998
– ISO IS 15408: 1999
ITSEC - Methodology
• Based on systematic, documented approach for
security evaluations of systems & products
• Open ended with regard to defined set of
security objectives
– ITSEC Functionality classes; e.g. FC-C2
– CC protection profiles
• Evaluation steps:
– Definition of functionality
– Assurance: confidence in functionality
ITSEC - Functionality
• Security objectives (Why)
– Risk analysis (Threats, Countermeasures)
– Security policy
• Security enforcing functions (What)
– technical & non-technical
• Security mechanisms (How)
• Evaluation levels
ITSEC - Assurance
• Goal: Confidence in functions & mechanisms
• Correctness
– Construction (development process & environment)
– Operation (process & environment)
• Effectiveness
– Suitability analysis
– Strength of mechanism analysis
– Vulnerabilities (construction & operation)
CC - Security Concept
CC - Evaluation Goal
CC - Documentation
CC Part 1
Introduction and Model
Introduction to
Approach
Terms and Model
Requirements for
Protection Profiles (PP)
and Security Targets (ST)
CC Part 2
Functional Requirements
Functional Classes
Functional Families
Functional
Components
Detailed Requirements
CC Part 3
Assurance Requirements
Assurance Classes
Assurance Families
Assurance Components
Detailed Requirements
Evaluation Assurance
Levels (EAL)
CC - Security Requirements
Functional Requirements
for defining security behavior of the
IT product or system:
implemented requirements
become security functions
Assurance Requirements
for establishing confidence in Security
Functions:
correctness of implementation
effectiveness in satisfying
objectives
CC - Security Functional Classes
Name
Audit
Communications
Cryptographic Support
User Data Protection
Identification & Authentication
Security Management
Privacy
Protection of TOE Security Functions
Resource Utilization
TOE (Target Of Evaluation) Access
Trusted Path / Channels
Class
FAU
FCO
FCS
FDP
FIA
FMT
FPR
FPT
FRU
FTA
FTP
CC - Security Assurance Classes
Name
Configuration Management
Delivery & Operation
Development
Guidance Documents
Life Cycle Support
Tests
Vulnerability Assessment
Protection Profile Evaluation
Security Target Evaluation
Maintenance of Assurance
Class
ACM
ADO
ADV
AGD
ALC
ATE
AVA
APE
ASE
AMA
CC - Eval. Assurance Levels (EALs)
*TCSEC = “Trusted Computer Security Evaluation Criteria” --”Orange Book”
Name
Functionally Tested
Structurally Tested
Methodically Tested & Checked
Methodically Designed, Tested & Reviewed
Semiformally Designed & Tested
Semiformally Verified Design & Tested
Formally Verified Design & Tested
EAL
EAL1
EAL2
EAL3
EAL4
EAL5
EAL6
EAL7
*TCSEC
C1
C2
B1
B2
B3
A1
ITSEC, CC - Summary
• Used primarily for security evaluations and not
for generalized IT audits
• Defines evaluation methodology
• Based on International Standard (ISO 15408)
• Certification scheme in place
• Updated & enhanced on a yearly basis
• Includes extensible standard sets of security
requirements (Protection Profile libraries)
Comparison of Methods - Criteria
• Standardisation
• Independence
• Certifiability
• Applicability in practice
• Adaptability
Comparison of Methods - Criteria
• Extent of Scope
• Presentation of Results
• Efficiency
• Update frequency
• Ease of Use
Comparison of Methods - Results
CobiT
3.4
3.3
2.7
2.8
3.3
3.1
1.9
3.0
3.1
2.3
Standardisation
Independence
Certifyability
Applicability in practice
Adaptability
Extent of Scope
Presentation of Results
Efficiency
Update frequency
Ease of Use
BS 7799
3.3
3.6
3.3
3.0
2.8
2.9
2.2
2.8
2.4
2.7
BSI
3.1
3.5
3.0
3.1
3.3
2.7
2.6
3.0
3.4
2.8
ITSEC/CC
3.9
3.9
3.7
2.5
3.0
2.6
1.7
2.5
2.8
2.0
Scores between 1 (low) and 4 (high) - Scores for CobiT, BS7799, BSI from ISACA Swiss chapter; score for ITSEC/CC form H.P. Winiger
CobiT - Assessment
BS 7799 - Assessment
BSI - Assessment
ITSEC/CC - Assessment
Use of Methods for IT Audits
• CobiT: Audit method for all IT processes
• ITSEC, CC: Systematic approach for evaluations
• BS7799, BSI: List of detailed security measures
to be used as best practice documentation
• Detailed audit plans, checklists, tools for
technical audits (operating systems, LANs, etc.)
• What is needed in addition:
– Audit concept (general aspects, infrastructure
audits, application audits)

More Related Content

PPT
Introduction to it auditing
PPTX
It audit methodologies
PPTX
Auditing SOX ITGC Compliance
PPTX
Conducting an Information Systems Audit
PDF
Steps in it audit
PPT
IT System & Security Audit
PDF
Basics in IT Audit and Application Control Testing
PDF
SOC 2: Build Trust and Confidence
Introduction to it auditing
It audit methodologies
Auditing SOX ITGC Compliance
Conducting an Information Systems Audit
Steps in it audit
IT System & Security Audit
Basics in IT Audit and Application Control Testing
SOC 2: Build Trust and Confidence

What's hot (20)

PPT
Security audit
PDF
SOC 2 and You
PDF
IT General Controls Presentation at IIA Vadodara Audit Club
PPTX
SOC 2 Compliance and Certification
PDF
Control and audit of information System (hendri eka saputra)
PPTX
Patch Management Best Practices 2019
PPTX
03.1 general control
PDF
Privacy in the Cloud- Introduction to ISO 27018
PPT
The information security audit
PPTX
IS Audit Checklist- by Software development company in india
PDF
Auditing application controls
PPTX
IT General Controls
PPT
5.4 it security audit (mauritius)
PPTX
IT Audit For Non-IT Auditors
PDF
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
PDF
Vulnerability and Patch Management
PPTX
NIST CyberSecurity Framework: An Overview
PPTX
Introduction to COBIT 2019 and IT management
PDF
IT infrastructure security 101
PDF
System audit questionnaire
Security audit
SOC 2 and You
IT General Controls Presentation at IIA Vadodara Audit Club
SOC 2 Compliance and Certification
Control and audit of information System (hendri eka saputra)
Patch Management Best Practices 2019
03.1 general control
Privacy in the Cloud- Introduction to ISO 27018
The information security audit
IS Audit Checklist- by Software development company in india
Auditing application controls
IT General Controls
5.4 it security audit (mauritius)
IT Audit For Non-IT Auditors
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
Vulnerability and Patch Management
NIST CyberSecurity Framework: An Overview
Introduction to COBIT 2019 and IT management
IT infrastructure security 101
System audit questionnaire
Ad

Similar to IT Audit Methodologies (20)

PPT
IT Audit methodologies
PPT
Metholodogies and Security Standards
PPTX
Welingkar Presentation On Cobit And Iso 1799 And Bs 7799
PDF
113505 6969-ijecs-ijens
PDF
Chapter 10 security standart
PPT
Audit of it infrastructure
PPT
Info Security & PCI(original)
PPTX
security of information systems
PPT
Feb 26 NETP Slide Deck
PPTX
Access Control Models Methodology Practices
PPT
COBIT and IT Policy Presentation
PPT
Information Security Program & PCI Compliance Planning for your Business
PPTX
Comparison of it governance framework-COBIT, ITIL, BS7799
PPT
PPTX
17 info sec_ma_imt_27_2_2012
PDF
PPT
Lecture3.ppt
PPT
Information security Lecture slides .ppt
PPTX
21. Government, technologies' audit and information systems
IT Audit methodologies
Metholodogies and Security Standards
Welingkar Presentation On Cobit And Iso 1799 And Bs 7799
113505 6969-ijecs-ijens
Chapter 10 security standart
Audit of it infrastructure
Info Security & PCI(original)
security of information systems
Feb 26 NETP Slide Deck
Access Control Models Methodology Practices
COBIT and IT Policy Presentation
Information Security Program & PCI Compliance Planning for your Business
Comparison of it governance framework-COBIT, ITIL, BS7799
17 info sec_ma_imt_27_2_2012
Lecture3.ppt
Information security Lecture slides .ppt
21. Government, technologies' audit and information systems
Ad

More from SALIH AHMED ISLAM (20)

PPTX
10 advice for ia executives
PPTX
8 moves to becoming an agile internal audit
PPTX
7 musts to establish a strategic plan
PPTX
6 implications of internal audit
PPTX
6 benefits of internal auditing
PPTX
5 benefits of a whistleblower hotline
PPTX
What is risk management
PDF
5 critical tasks of Internal Audit
PDF
5 fraud tips
PDF
What do internal auditors do?
PPTX
Code of Conduct
PDF
CORRUPTION PERCEPTIONS INDEX 2020
PPTX
Fraud awareness training
PDF
Cpi 2020 - main -infographic
PDF
Cpi 2020-western-europe-and-european-union-infographic
PDF
Cpi 2020-sub-saharan-africa-infographic v2
PDF
Cpi 2020-middle-east-and-north-africa-infographic
PDF
Cpi 2020-eastern-europe-and-central-asia-infographic
PDF
Cpi 2020-asia-pacific-infographic
PDF
CPI 2020 - Americas - Info-graphic
10 advice for ia executives
8 moves to becoming an agile internal audit
7 musts to establish a strategic plan
6 implications of internal audit
6 benefits of internal auditing
5 benefits of a whistleblower hotline
What is risk management
5 critical tasks of Internal Audit
5 fraud tips
What do internal auditors do?
Code of Conduct
CORRUPTION PERCEPTIONS INDEX 2020
Fraud awareness training
Cpi 2020 - main -infographic
Cpi 2020-western-europe-and-european-union-infographic
Cpi 2020-sub-saharan-africa-infographic v2
Cpi 2020-middle-east-and-north-africa-infographic
Cpi 2020-eastern-europe-and-central-asia-infographic
Cpi 2020-asia-pacific-infographic
CPI 2020 - Americas - Info-graphic

Recently uploaded (20)

PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
PPTX
chapter 2 entrepreneurship full lecture ppt
PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
PDF
533158074-Saudi-Arabia-Companies-List-Contact.pdf
PDF
Booking.com The Global AI Sentiment Report 2025
PDF
Daniels 2024 Inclusive, Sustainable Development
PPT
Lecture notes on Business Research Methods
DOCX
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PDF
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PPTX
basic introduction to research chapter 1.pptx
PDF
Introduction to Generative Engine Optimization (GEO)
PPTX
operations management : demand supply ch
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
income tax laws notes important pakistan
PDF
Chapter 2 - AI chatbots and prompt engineering.pdf
PPTX
Project Management_ SMART Projects Class.pptx
NEW - FEES STRUCTURES (01-july-2024).pdf
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
chapter 2 entrepreneurship full lecture ppt
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
533158074-Saudi-Arabia-Companies-List-Contact.pdf
Booking.com The Global AI Sentiment Report 2025
Daniels 2024 Inclusive, Sustainable Development
Lecture notes on Business Research Methods
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Slide gioi thieu VietinBank Quy 2 - 2025
basic introduction to research chapter 1.pptx
Introduction to Generative Engine Optimization (GEO)
operations management : demand supply ch
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
income tax laws notes important pakistan
Chapter 2 - AI chatbots and prompt engineering.pdf
Project Management_ SMART Projects Class.pptx

IT Audit Methodologies

  • 3. IT Audit Methodologies • CobiT • BS 7799 - Code of Practice (CoP) • BSI - IT Baseline Protection Manual • ITSEC • Common Criteria (CC)
  • 4. Main Areas of Use • IT Audits • Risk Analysis • Health Checks (Security Benchmarking) • Security Concepts • Security Manuals / Handbooks
  • 5. Security Definition • Confidentiality • Integrity – Correctness – Completeness • Availability
  • 6. CobiT • Governance, Control & Audit for IT • Developed by ISACA • Releases – CobiT 1: 1996 • 32 Processes • 271 Control Objectives – CobiT 2: 1998 • 34 Processes • 302 Control Objectives
  • 7. CobiT - Model for IT Governance • 36 Control models used as basis: – Business control models (e.g. COSO) – IT control models (e.g. DTI‘s CoP) • CobiT control model covers: – Security (Confidentiality, Integrity, Availability) – Fiduciary (Effectiveness, Efficiency, Compliance, Reliability of Information) – IT Resources (Data, Application Systems, Technology, Facilities, People)
  • 9. CobiT - Structure • 4 Domains – PO - Planning & Organisation • 11 processes (high-level control objectives) – AI - Acquisition & Implementation • 6 processes (high-level control objectives) – DS - Delivery & Support • 13 processes (high-level control objectives) – M - Monitoring • 4 processes (high-level control objectives)
  • 10. PO - Planning and Organisation • PO 1 Define a Strategic IT Plan • PO 2 Define the Information Architecture • PO 3 Determine the Technological Direction • PO 4 Define the IT Organisation and Relationships • PO 5 Manage the IT Investment • PO 6 Communicate Management Aims and Direction • PO 7 Manage Human Resources • PO 8 Ensure Compliance with External Requirements • PO 9 Assess Risks • PO 10 Manage Projects • PO 11 Manage Quality
  • 11. AI - Acquisition and Implementation • AI 1 Identify Solutions • AI 2 Acquire and Maintain Application Software • AI 3 Acquire and Maintain Technology Architecture • AI 4 Develop and Maintain IT Procedures • AI 5 Install and Accredit Systems • AI 6 Manage Changes
  • 12. DS - Delivery and Support • DS 1 Define Service Levels • DS 2 Manage Third-Party Services • DS 3 Manage Performance and Capacity • DS 4 Ensure Continuous Service • DS 5 Ensure Systems Security • DS 6 Identify and Attribute Costs • DS 7 Educate and Train Users DS 8 Assist and Advise IT Customers DS 9 Manage the Configuration DS 10 Manage Problems and Incidents DS 11 Manage Data DS 12 Manage Facilities DS 13 Manage Operations
  • 13. M - Monitoring • M 1 Monitor the Processes • M 2 Assess Internal Control Adequacy • M 3 Obtain Independent Assurance • M 4 Provide for Independent Audit
  • 14. CobiT - IT Process Matrix Information Criteria – Effectiveness – Efficiency – Confidentiality – Integrity – Availability – Compliance – Reliability IT Resources People Applications Technology Facilities Data
  • 15. CobiT - Summary • Mainly used for IT audits, incl. security aspects • No detailed evaluation methodology described • Developed by international organisation (ISACA) • Up-to-date: Version 2 released in 1998 • Only high-level control objectives described • Detailed IT control measures are not documented • Not very user friendly - learning curve! • Evaluation results not shown in graphic form
  • 16. BS 7799 - Security Baseline Controls • 10 control categories • 32 control groups • 109 security controls • 10 security key controls
  • 17. BS 7799 - Control Categories • Information security policy • Security organisation • Assets classification & control • Personnel security • Physical & environmental security • Computer & network management
  • 18. BS 7799 - Control Categories • System access control • Systems development & maintenance • Business continuity planning • Compliance
  • 19. BS7799 - 10 Key Controls • Information security policy document • Allocation of information security responsibilities • Information security education and training • Reporting of security incidents • Virus controls
  • 20. BS7799 - 10 Key Controls • Business continuity planning process • Control of proprietary software copying • Safeguarding of organizational records • Data protection • Compliance with security policy
  • 21. BS7799 - Summary • Main use: Security Concepts & Health Checks • No evaluation methodology described • British Standard, developed by UK DTI • Certification scheme in place (c:cure) • BS7799, Part1, 1995 is being revised in 1999 • Lists 109 ready-to-use security controls • No detailed security measures described • Very user friendly - easy to learn
  • 22. BSI - Structure • IT security measures – 7 areas – 34 modules (building blocks) • Safeguards catalogue – 6 categories of security measures • Threats catalogue – 5 categories of threats
  • 23. BSI - Security Measures (Modules) • Protection for generic components • Infrastructure • Non-networked systems • LANs • Data transfer systems • Telecommunications • Other IT components
  • 24. BSI - Generic Components • 3.1 Organisation • 3.2 Personnel • 3.3 Contingency Planning • 3.4 Data Protection
  • 25. BSI - Infrastructure • 4.1 Buildings • 4.2 Cabling • 4.3 Rooms • 4.3.1 Office • 4.3.2 Server Room • 4.3.3 Storage Media Archives • 4.3.4 Technical Infrastructure Room • 4.4 Protective cabinets • 4.5 Home working place
  • 26. BSI - Non-Networked Systems • 5.1 DOS PC (Single User) • 5.2 UNIX System • 5.3 Laptop • 5.4 DOS PC (multiuser) • 5.5 Non-networked Windows NT computer • 5.6 PC with Windows 95 • 5.99 Stand-alone IT systems
  • 27. BSI - LANs • 6.1 Server-Based Network • 6.2 Networked Unix Systems • 6.3 Peer-to-Peer Network • 6.4 Windows NT network • 6.5 Novell Netware 3.x • 6.6 Novell Netware version 4.x • 6.7 Heterogeneous networks
  • 28. BSI - Data Transfer Systems • 7.1 Data Carrier Exchange • 7.2 Modem • 7.3 Firewall • 7.4 E-mail
  • 29. BSI - Telecommunications • 8.1 Telecommunication system • 8.2 Fax Machine • 8.3 Telephone Answering Machine • 8.4 LAN integration of an IT system via ISDN
  • 30. BSI - Other IT Components • 9.1 Standard Software • 9.2 Databases • 9.3 Telecommuting
  • 31. BSI - Module „Data Protection“ (3.4) • Threats - Technical failure: – T 4.13 Loss of stored data • Security Measures - Contingency planning: – S 6.36 Stipulating a minimum data protection concept – S 6.37 Documenting data protection procedures – S 6.33 Development of a data protection concept (optional) – S 6.34 Determining the factors influencing data protection (optional) – S 6.35 Stipulating data protection procedures (optional) – S 6.41 Training data reconstruction • Security Measures - Organisation: – S 2.41 Employees' commitment to data protection – S 2.137 Procurement of a suitable data backup system
  • 32. BSI - Safeguards (420 safeguards) • S1 - Infrastructure ( 45 safeguards) • S2 - Organisation (153 safeguards) • S3 - Personnel ( 22 safeguards) • S4 - Hardware & Software ( 83 safeguards) • S5 - Communications ( 62 safeguards) • S6 - Contingency Planning ( 55 safeguards)
  • 33. BSI - S1-Infrastructure (45 safeguards) • S 1.7 Hand-held fire extinguishers • S 1.10 Use of safety doors • S 1.17 Entrance control service • S 1.18 Intruder and fire detection devices • S 1.27 Air conditioning • S 1.28 Local uninterruptible power supply [UPS] • S 1.36 Safekeeping of data carriers before and after dispatch
  • 34. BSI - Security Threats (209 threats) • T1 - Force Majeure (10 threats) • T2 - Organisational Shortcomings (58 threats) • T3 - Human Errors (31 threats) • T4 - Technical Failure (32 threats) • T5 - Deliberate acts (78 threats)
  • 35. IT Audit Methodoloies BSI - T3-Human Errors (31 threats) • T 3.1 Loss of data confidentiality/integrity as a result of IT user error • T 3.3 Non-compliance with IT security measures • T 3.6 Threat posed by cleaning staff or outside staff • T 3.9 Incorrect management of the IT system • T 3.12 Loss of storage media during transfer • T 3.16 Incorrect administration of site and data access rights • T 3.24 Inadvertent manipulation of data • T 3.25 Negligent deletion of objects
  • 36. BSI - Summary • Main use: Security concepts & manuals • No evaluation methodology described • Developed by German BSI (GISA) • Updated version released each year • Lists 209 threats & 420 security measures • 34 modules cover generic & platform specific security requirements
  • 37. BSI - Summary • User friendly with a lot of security details • Not suitable for security risk analysis • Results of security coverage not shown in graphic form • Manual in HTML format on BSI web server • Manual in Winword format on CD-ROM (first CD free, additional CDs cost DM 50.-- each) • Paper copy of manual: DM 118.-- • Software ‚BSI Tool‘ (only in German): DM 515.--
  • 38. ITSEC, Common Criteria • ITSEC: IT Security Evaluation Criteria • Developed by UK, Germany, France, Netherl. and based primarily on USA TCSEC (Orange Book) • Releases – ITSEC: 1991 – ITSEM: 1993 (IT Security Evaluation Manual) – UK IT Security Evaluation & Certification scheme: 1994
  • 39. ITSEC, Common Criteria • Common Criteria (CC) • Developed by USA, EC: based on ITSEC • ISO International Standard • Releases – CC 1.0: 1996 – CC 2.0: 1998 – ISO IS 15408: 1999
  • 40. ITSEC - Methodology • Based on systematic, documented approach for security evaluations of systems & products • Open ended with regard to defined set of security objectives – ITSEC Functionality classes; e.g. FC-C2 – CC protection profiles • Evaluation steps: – Definition of functionality – Assurance: confidence in functionality
  • 41. ITSEC - Functionality • Security objectives (Why) – Risk analysis (Threats, Countermeasures) – Security policy • Security enforcing functions (What) – technical & non-technical • Security mechanisms (How) • Evaluation levels
  • 42. ITSEC - Assurance • Goal: Confidence in functions & mechanisms • Correctness – Construction (development process & environment) – Operation (process & environment) • Effectiveness – Suitability analysis – Strength of mechanism analysis – Vulnerabilities (construction & operation)
  • 43. CC - Security Concept
  • 45. CC - Documentation CC Part 1 Introduction and Model Introduction to Approach Terms and Model Requirements for Protection Profiles (PP) and Security Targets (ST) CC Part 2 Functional Requirements Functional Classes Functional Families Functional Components Detailed Requirements CC Part 3 Assurance Requirements Assurance Classes Assurance Families Assurance Components Detailed Requirements Evaluation Assurance Levels (EAL)
  • 46. CC - Security Requirements Functional Requirements for defining security behavior of the IT product or system: implemented requirements become security functions Assurance Requirements for establishing confidence in Security Functions: correctness of implementation effectiveness in satisfying objectives
  • 47. CC - Security Functional Classes Name Audit Communications Cryptographic Support User Data Protection Identification & Authentication Security Management Privacy Protection of TOE Security Functions Resource Utilization TOE (Target Of Evaluation) Access Trusted Path / Channels Class FAU FCO FCS FDP FIA FMT FPR FPT FRU FTA FTP
  • 48. CC - Security Assurance Classes Name Configuration Management Delivery & Operation Development Guidance Documents Life Cycle Support Tests Vulnerability Assessment Protection Profile Evaluation Security Target Evaluation Maintenance of Assurance Class ACM ADO ADV AGD ALC ATE AVA APE ASE AMA
  • 49. CC - Eval. Assurance Levels (EALs) *TCSEC = “Trusted Computer Security Evaluation Criteria” --”Orange Book” Name Functionally Tested Structurally Tested Methodically Tested & Checked Methodically Designed, Tested & Reviewed Semiformally Designed & Tested Semiformally Verified Design & Tested Formally Verified Design & Tested EAL EAL1 EAL2 EAL3 EAL4 EAL5 EAL6 EAL7 *TCSEC C1 C2 B1 B2 B3 A1
  • 50. ITSEC, CC - Summary • Used primarily for security evaluations and not for generalized IT audits • Defines evaluation methodology • Based on International Standard (ISO 15408) • Certification scheme in place • Updated & enhanced on a yearly basis • Includes extensible standard sets of security requirements (Protection Profile libraries)
  • 51. Comparison of Methods - Criteria • Standardisation • Independence • Certifiability • Applicability in practice • Adaptability
  • 52. Comparison of Methods - Criteria • Extent of Scope • Presentation of Results • Efficiency • Update frequency • Ease of Use
  • 53. Comparison of Methods - Results CobiT 3.4 3.3 2.7 2.8 3.3 3.1 1.9 3.0 3.1 2.3 Standardisation Independence Certifyability Applicability in practice Adaptability Extent of Scope Presentation of Results Efficiency Update frequency Ease of Use BS 7799 3.3 3.6 3.3 3.0 2.8 2.9 2.2 2.8 2.4 2.7 BSI 3.1 3.5 3.0 3.1 3.3 2.7 2.6 3.0 3.4 2.8 ITSEC/CC 3.9 3.9 3.7 2.5 3.0 2.6 1.7 2.5 2.8 2.0 Scores between 1 (low) and 4 (high) - Scores for CobiT, BS7799, BSI from ISACA Swiss chapter; score for ITSEC/CC form H.P. Winiger
  • 55. BS 7799 - Assessment
  • 58. Use of Methods for IT Audits • CobiT: Audit method for all IT processes • ITSEC, CC: Systematic approach for evaluations • BS7799, BSI: List of detailed security measures to be used as best practice documentation • Detailed audit plans, checklists, tools for technical audits (operating systems, LANs, etc.) • What is needed in addition: – Audit concept (general aspects, infrastructure audits, application audits)