• No results found

Third Party Assurance

N/A
N/A
Protected

Academic year: 2021

Share "Third Party Assurance"

Copied!
31
0
0

Loading.... (view fulltext now)

Full text

(1)

Third  Party  Assurance

 

 

ISACA  &  itSMF  IT  Governance  Conference  

Dublin,  11

th

 October    2013  

Saturday  12  October  13   (c)  VigiTrust  2003-­‐2013   1  

Mathieu.gorge@vigitrust.com  

 

(2)

Today’s  

PresentaCon  

• 

SeDng  the  Scene  

• 

Why  should  anyone  care  about  Third  Party  Assurance?  

• 

Focus  on  legal  &  industry  frameworks  requiring  third  party  

assurance  

• 

2013-­‐2015  Outlook  

• 

Q&A  

 

(3)

About

VigiTrust

Compliance as a Service

3

1

2

SECURITY TRAINING & eLEARNING Online training for management and staff COMPLIANCE, READINESS & VALIDATION Comprehensive online programs to achieve and maintain compliance SECURITY & GRC SERVICES Professional services to enable and support your compliance

process

The 5 Pillars of Security Framework™

(4)

eSEC Portfolio US – Existing

•  HIPAA

•  NERC-CIP 101 •  MA 201

•  Understanding Data Breach Notification Requirements

US  

Existing eLearning Portfolio

eSEC Portfolio EMEA - Existing

•  Data Protection Fundamentals

•  Credit Card Security

•  Introduction to PCI DSS

•  Banking & Fraud

•  Green IT & Security

•  ISO IT & SDLC

•  Security During M&A Process

EMEA  

eSEC Portfolio Generic Training - Existing •  Info Security 101

•  Mobility & Security

•  Security of Social Networks

•  Cloud Computing & Security 101

•  Physical Security for Good

Logical Security

GEN.   eSEC Portfolio Technical

Training - Existing •  Secure Coding for PCI DSS

•  Introduction to Secure Printing

•  Log Management & Security

•  Wireless Security

(5)

Mathieu  Gorge    

CEO  &  Founder,  VigiTrust  

Saturday  12  October  13   (c)  VigiTrust  2003-­‐2013  

European PCI DSS Roadshow

(6)
(7)

DefiniFons  –  

Third  Party  Assurance  in  2013  &  Beyond  

• 

Going  Back  to  Basics  

–  Third  ParFes  

•  Suppliers  (any  type:  IT,  legal,  finance,  goods/services)  

•  Partners  

•  Internal    suppliers  or  group  partners  

–  Assurance  

•  Is  the  code  secure?  

•  Is  the  architecture  secure?  

•  Is  the  data  that  the  app  is  transmiVng,  storing  or  processing  at  risk?  

–  Two  sides  of  the  same  coin  

•  Your  organizaFon  is  another’s  third  party  

•  Can  you  demonstrate  your  business  does  not  put  another  one  at  risk  –  security/compliance  

–  2013  

•  Most  organizaFons  outsource  some  IT  

•  Some  organizaFons  are  less  “tangible”  in  that  they  use  BPO  

•  Advent  of  Cloud  CompuFng  

–  And  beyond  

•  Because  threats  evolve  and  the  tradiFonal  business  ecosystem  keeps  involving  third  parFes  

–  Some  trusted  

–  Some  parFally  trusted  

–  Some  untrusted  but  necessary  to  do  business  

(8)

DefiniFons  –  

Third  Party  Assurance  from  an  AccounFng  

PerspecFve  

•  DefiniFons  &  Key  Terms  

–  “The  InternaConal  Standard  for  Assurance  Engagements  No.  3402  (ISAE  3402),  formerly   SAS  70,  is  an  aYestaCon  standard  issued  by  the  InternaConal  AudiCng  and  Assurance   Standards  Board  (IAASB).  Its  aim  is  to  produce  a  formal  report  on  the  design,  

implementaCon  and  operaCng  effecCveness  of  controls  within  a  service  organisaCon”.  

–  What  is  the  ISAE  3402?  ISAE:  

•  “is  a  formal  report  on  the  design,  implementaEon  and  effecEveness  of  controls   within  a  service  organisaCon,  usually  covering  a  period  of  six  months  or  longer  

•  is  primarily  used  to  support  the  financial  audit  process  of  enEEes  that  use  external  

service  organisaEons  

•  contains  an  independent  accountant’s  opinion  and  management  asserEon  on  the   design,  implementaCon  and  effecCveness  of  controls  within  a  service  organisaCon   for  the  audit  period  

•  contains  a  descripCon  of  the  service  organisaEon’s  control  environment,  its  control  

objecEves  and  the  key  controls  put  in  place  to  achieve  these  objecCves  

•  contains  tests  of  operaEng  effecEveness  performed  by  the  independent  

accountant,  and  the  results  of  those  tests  (type  II)  

•  contains  control  consideraEons  that  should  be  employed  at  enEEes  that  use  the  

service  organisaEon  

•  is  intended  for  use  by  the  service  organisaEon,  its  customers  and  the  independent  

accountants  of  its  customers”  

(9)

DefiniFons  –  

Third  Party  Assurance  from    

non  financial  perspecFves  

• 

Business  Process  Outsourcing    

• 

Supply  chain  risk  management    

• 

Contract  compliance    

• 

Cloud  compuFng    

• 

DigiFzaFon  of  Business  Processes  

• 

Privacy  and  security    

• 

Regulatory  compliance  and  reporFng    

• 

Asset  &  IP  Risk  Management  

• 

Green  IT  

• 

Suppliers  of  Key  3

rd

 Party  ApplicaFons?    

• 

ApplicaFon  Security  should  be  an  integral  part  of  3

rd

 Party  Assurance  

(10)

 Quick  Focus  on  ApplicaFon  Security  for  good  3

rd

 

Party  Assurance  

-­‐  Aspect  Security  2013  Global  

ApplicaFon  Security  Risk  Report  

• 

98%  of  applicaCons  presented  at  least  one  applicaCon  security  risk,  

while  the  average  applicaCon  registered  22.4  risks  

• 

AuthenCcaCon  and  Session  Management  risks  affect  93%  of  

applicaCons  and  comprise  34%  of  applicaCon  vulnerabiliCes,  by  far  

the  most  prevalent  applicaCon  security  risk  

• 

Compared  to  automated  tools,  manual  code  review  and  penetraCon  

tesCng  idenCfy  significantly  more  serious  authenCcaCon,  access  

control,  and  encrypCon  risks  

• 

Secure  coding  training  and  eLearning  cause  a  significant  

improvement  in  prevalence  and  severity  of  the  risks  discovered  in  

applicaCons  

• 

ApplicaCon  security  risk  profiles  are  remarkably  similar  across  

different  industry  sectors  

• 

Yet,  applicaCons  are  rarely  part  of  the  3

rd

 Party  Assurance  process!  

(11)
(12)

Big  

Data  

(13)

Understanding  

Database  Risks  Cloud  Risk  

for  3

rd

 Party  Assurance  

• 

Technology  Risk  –  StaFng  the  Obvious  

–  Virtual  Servers     –  Database  /  Storage   –  The  Internet  

• 

Infrastructure  Risks  

–  choosing  a  private  cloud  infrastructure  means  that    network  security  is   effecCvely  under  your  control  –  Risk  is  “miCgated”  

–  With  a  public  cloud  infrastructure,  the  operaConal  responsibility  for   security  rests  with  the  provider,  legal  responsibility  is  with  you  

–  ImplicaCon:  you  plan  to  process,  transmit  or  store  sensiCve  data,  you   need  to  clearly  understand  your  service  providers  stance  on  the  

following:  

•  Transparency   •  Privacy  

•  Compliance  

•  Trans-­‐border  informaCon  flow  

(14)

• 

Cloud   Providers   must   be   capable   of  

demonstraFng  the  existence  of  effecFve  and  

robust   security   controls,   assuring   that  

customer   data   is   properly   secured   against  

unauthorized  access,  change  and  destrucFon.  

• 

The  key  quesCons  that  should  be  asked  when  

choosing  a  service  provider  include:  

   

Understanding  

Transparency  

•  How will my data be protected?

•  Which (provider) employees will have access to customer information? •  How is customer information segregated?

•  What controls are in place to detect and prevent security breaches? •  Technical Controls

•  Policies & Procedures •  User Awareness

(15)

Cloud  Storage  

ConsideraCons  

• 

Storage  as  a  Service  =  Storage  in  the  Cloud  

–  Your  organizaCons  data  is  stored  in  the  Cloud  whether  you  are  aware   of  it  or  not  

• 

Data  ClassificaFon  is  key  for  Cloud,  understanding  your  risk  

surface  &  performing  assurance  audits  

–  Do  you  have  a  data  classificaCon  policy  staCng  what  can  make  it  to  the   Cloud  and  what  cannot?  

–  Are  you  encrypCng  data  the  right  way  –  remember  PCI  DSS  

•  If  you  don’t  need  it  don’t  store  it  

•  If  you  need  it  –  encrypt  it  according  to  Requirement  3.4  –  good  benchmark  for   storage  technical  security  

•  Consider  tokenizing  more  than  payment  data  

–  Ensure  data  is  tagged  so  you  can  retrieve  it  easily  

•  DR  consideraCons   •  E-­‐Discovery  requests  

–  What  about  data  held  in  the  Cloud  –  do  you  know  which  is  in  the  Cloud  and  where?  Can   you  access  it?  

(16)

Focon  us  Payments  Industry  –  

a  DefiniFon    

Payment  security  entails  

managing

 and  

securing

 

payment  data  

across  

an   organizaCon’s   full   order  

lifecycle

,   from   the   point   of  

payment  

acceptance

,  through  

fraud

 management,  fulfilment,  customer  service,  

funding  and  

financial  reconciliaFon

,  and  transacCon  

record  storage

.    

 

The   presence   of   payment   data  

at   any   of   these   points,   whether   on  

organizaCon   systems,   networks   or   visible   to   staff,  

exposes   the  

organizaFon  to  risk

.  

The  presence  of  payment  data  ….  exposes  the  organizaFon  to  risk.  

 

Therefore  you  need  to  fully  understand  your  own  ecosystem  and  payments  data   flow  

(17)

PCI  DSS  

Lifecycle  

(18)

Why  ApplicaCon  Security  

MaYers  for  the  Payments  Industry

 

Lifecycle  of  a  

Credit  Card  TransacCon  

 

Five  Brands   Banks   Payment  Service  

Providers   Merchants   Customers  

(19)

PCI  DSS  

Structure    

•  Install & maintain a firewall configuration to protect data

•  Do NOT use vendor supplied defaults for passwords or

other security parameter

1.  

12

R

eq

u

ir

em

en

ts

o

f

PC

I D

SS

2.  

3.  

4.  

5.  

6.  

•  Protect stored data

•  Encrypt the transmission of cardholder data •  Use & regularly update anti-virus software

•  Develop & maintain secure systems & applications

•  Restrict access to data by business need-to-know

•  Assign a unique ID to each person with computer access •  Restrict physical access to cardholder data

•  Track & monitor ALL access to network resources & cardholder data

•  Regularly test security systems & processes

•  Maintain a policy that addresses information security

Build  &  Maintain   a  Secure   Network   Protect   Cardholder  data   Maintain  a   Vulnerability   Management   Programme   Implement  strong   Access  Control   Measures   Regularly   monitor  &  Test  

(20)

Understanding  

PCI  DSS  Controls  

•  Available  through  

–  Risk  based  approach  

•  Internal  or  12  Requirements  Approach  

–  PrioriCzed  approach  

•  PCI  DSS  Controls  can  be  categorized  as  follows  

–  Technical  Controls   –  Policies  &  Procedures   –  User  Awareness  &  Training  

•  Controls  may  include  several  control  points  

–  Mix  of  the  above  e.g  technical  control  +  policy  

•  Some  controls  are  inherently  requiring  recurring  tasks,  e.g.:  

–  Quarterly  Scans   –  Log  Analysis  

–  Yearly  training  

•  What  about  controls  relaFng  to  Third  Party  Assurance  

–  3rd  Party  Assurance  idenCfied  as    one  of  the  Key  Change  Drivers  

–  Requirement  12.8  

–  Third  Party  Assurance    SIG  

–  Logging  &  audiCng  controls  throughout  the  standard  

(21)

Required  

DocumentaCon  

•  Diagrams  and  Data  Flows   –  Ecosystem  Diagrams   –  Data  Flow  Diagrams     –  Network  Diagrams   •  Asset  Inventory    

•  Acceptable  Usage  Policy  for  staff   •  Access  Control  Policy  

•  Firewall  Rules  and  Business  JusCficaCon  for  Rules    

•  AV,  AnC-­‐Spam  and  Intrusion  DetecCon-­‐PrevenCon  Policy    

•  Hardening,  Log  and  Patch  Management  Policy    

•  Back-­‐Up  and  Media  Storage  Policy    

•  Security  Assessment,  ApplicaFon  Security  &  Vulnerability  Management  Policy  

•  Incident  Response  Plan    

•  Management  of  Third  ParFes  Policy    

(22)

Changes  to  

Data  ProtecCon  in  the  EU  

•  Not  a  direcCve  but  a  single  regulaCon  in  the  EU  

–  HarmonizaCon  at  European  level…but  with  challenges  

•  Applies  to  companies  based  outside  in  the  EU  if  personal  data  is  handled   abroad  by  companies  that  are  acCve  in  the  EU  and  offer  services  to  EU   ciCzens  

•  Right  to  be  forgoYen  

•  Controllers  responsibiliCes  

–  Policies  &  procedures   –  Staff  Training  

•  Data  processing  impact  assessment    

–  If  any  data  is  likely  to  present  risks  to  individuals  

•  Security  

–  Both  processor  and  controllers  must  put  security  measures  in  place  

•  Data  Breach  NoCficaCon  

–  Within  24  hours  of  noCcing  the  breach  

•  Data  Portability  (service  providers)  &  Data  Transfers   •  Data  ProtecCon  Officers  

(23)

HIPAA  /    

HITECH  

(24)

ISO  2700  series  –

 Risk  Assurance  &  Security  

PerspecFves

 

 

• 

Based  on  the  ISMS  

• 

4  Levels  of  documentaFon  work  

–  Policies  

–  Procedures  

–  Work  InstrucFons  

–  Records  Documents  

• 

Where  is  Risk  Assurance  MenFoned  &  How:  

–  CommunicaFon  &  OperaFons  Management  (10)  

•  ProtecCon  Against  Malicious  &  Mobile  Code   •  Security  &  Network  Services  

•  Audit  Logging  

–  Access  Control  (11)  

•  ApplicaCon  &  InformaCon  Access  Control  

–  InformaFon  Systems  AcquisiFon,  Development  &  Maintenance  (12)  

•  Cryptographic  controls  

•  Security  In  development  &  support  

–  InformaFon  Security  Incident  Management  (13)  

•  ReporCng  &  Management  of  Security  events,  weaknesses  &  incidents  

–  Compliance  (15)  

•  Legal  Requirements  &  Audit  ConsideraCons  

(25)

Security  &  

GRC  Process

 

(c) VigiTrust 2003-2013

SOX   ISO  27000  series   ProtecFon  EU  Data   PCI  DSS   HIPAA   Others  

Regulatory, Legal & Corporate Governance Frameworks

Education, Security & Awareness Self-Governed Pre-Assessment Security Blueprint for Remediation Work Policies  &   Procedures   Network  &   Hardware  Security  

Pen-­‐  TesFng  &   ApplicaFon   Security   Specialized  Skills   Transfer   Official Assessors & Auditors

(26)

Understanding  Your  Ecosystem  

ACME   France   EU   Accountants   For  ACME   ACME   UK   EU  Lawyers   for  ACME   Partner  1   ACME   EU  HQ   ACME   LA   ACME   NYC   Internet (Including ISPs) Key

High Security Zone: CC Data

Suppliers

(27)
(28)

Chief Security Officer

Project leader for all Security Related Matters

DATA   Sec   PPL   Sec   PHYSICAL SECURITY •  Access to Building •  Physical Assets •  IT Hardware •  Vehicle Fleet PEOPLE SECURITY •  Permanent & Contract Staff •  Partners •  3rd Party Employees •  Visitors •  Special Events Security DATA SECURITY •  Trade Secrets •  Employee Data •  Database •  Customer Data

5 Pillars of Security Framework™

PHYS.   Sec   INFRA   Sec   INFRASTRUCTURE SECURITY •  Networks •  Remote Sites •  Remote Users •  Application Security •  Website •  Intranet CRISIS   Mgt   CRISIS MANAGEMENT •  Documentation & Work Procedures •  Emergency Response Plans •  Business Continuity Plans •  Disaster Recovery Plans OperaFons  Manager,  

Security  Staff   HR,  Security  Staff   HR,  IT  Team  &  Manager   IT  Team  &  Manager   OperaFons  Manager,  IT  Team,  HR  

(29)

Corporate  Culture  &  Risk  Management  –  The  

overall  Picture  

Residual  Risk  Surface  which  needs  to  be  managed  by  your  

OrganizaFon  

Risk   Management   &  Safeguards   Corporate   Values   Corporate   Ecosystem  

Risk Management Strategy for Internal and/or external

Risk Management Teams

(30)

Best  PracFces  for  

Third  Party  Assurance  

• 

Own  your  Ecosystem  by:  

–  Performing  an  asset  inventory,  network  &  applicaCon  architecture  review   –  Mapping  out  ecosystem  actors  &  data  flow  –  including  3rd  parFes!  

• 

Data  Management    &  ClassificaFon  

–  Ensure  you  have  up  to  date  data  flow  diagrams  

–  Classify  all  data  that  comes  from  or  goes  to  3rd  parCes    

–  Protect  client’s  personal  data  and  all  sensiCve  data  at  rest,  in  transit  and  in  use  

• 

Use  Compliance  as  a  driver  for  3

rd

 party  assurance  

–  Good  guidelines  –  basic  benchmark    

–  Not  the  end  game  though  –  security  &  good  governance  is  the  goal   –  Make  it  business  as  usual  –  conCnuous  process  

(31)

Third  Party  Assurance

 

 

ISACA  &  itSMF  IT  Governance  Conference  

Dublin,  11

th

 October    2013  

Saturday  12  October  13   (c)  VigiTrust  2003-­‐2013   31  

Mathieu.gorge@vigitrust.com  

 

References

Related documents

Growing out of the failure of the New World Information and Communications Order (UNESCO, 1980; Mosco, 1996; Singh, 2011), the cultural turn in development studies (as generally in

Notes: (1) Organic growth = excluding exchange rate effects and effects from the (de)consolidation and discontinuation of operations; (2) Operational EBIT net of the financial

Solving the E-Waste Problem (StEP) Initiative White Paper 5 E-waste Take-Back System Design and Policy Approaches.. E-waste Take-Back System Design and

* If you wish to enable Rapid Fire along with Drop Shot or Jump Shot, you just need to simply tap in the button combination that you used to enable that particular feature in

This study aimed to determine the influence of attitude, subjective norm and perceived behavioral control (PBC) on the intention to report and determine relation between PBC and

Ingrid Robeyns, “Ideal Theory in Theory and Practice.” The main idea of ideal theorizing which persists in each different conceptualization is to identify moral principles that

Progress in removing barriers SMEs face when bidding for contracts 12 The government has introduced initiatives to reduce the barriers faced by SMEs when bidding for public

The purpose of this study was to evaluate the impact of an international fieldwork placement on occupational therapy doctoral (OTD) students’ cultural competence,