No matter which framework your organization uses to determine risks to information assets, understanding vulnerabilities and threats plays an integral role. With the sheer breadth of known vulnerabilities and (potential) threats, not to mention the ever-growing variants of identified malware, it’s important to narrow down information into a usable amount that can be used for risk analysis efforts. Your organization’s vulnerability and threat information needs may vary over time, but it’s good knowing that there are several sources available, including those described below.
Before you can start researching how to fix vulnerabilities in your system, you must identify which ones affect you. Ongoing vulnerability scanning provides a regular, automated review of your system that produces a report of known vulnerabilities you need to address ASAP.
Pratum recommends that you perform vuln scanning at least monthly. If selecting and managing a scanning tool sounds like more than your staff can handle, you can build vuln scans into an information security contract with a provider like Pratum and let dedicated security analysts tailor your scans and review the results.
Once you have a list of vulnerabilities present in your system, you can use the resources below to look up the vulnerability by name and learn best practices for remediating it. (When Pratum reports scan results to clients, we reference the CVE ID for each vulnerability so that clients can go research the details. See the next section for a link to the CVE database.)
We also recommend considering a Managed XDR solution, which brings next-gen threat detection and response to your environment. Managed XDR not only looks for known vulnerabilities, but uses artificial intelligence and machine learning to identify and shut down anomalous activity, providing additional protection against zero-day threats.
Two of the leading resources for understanding vulnerabilities are the National Vulnerability Database provided by NIST and the Common Exposures and Vulnerabilities (CVE) database, which is sponsored by the U.S. Department of Homeland Security and CISA. Both resources let you look up known vulnerabilities and learn from others about each vulnerability’s characteristics and remediations.
The ISACs, organized through the National Council of ISACs, provide sector-specific threat and mitigation information for their member organizations. ISACs started to form after Presidential Decision Directive-63 was signed (May 1998), requesting that each critical infrastructure sector establish organizations for sharing information about threats and vulnerabilities. There are now 25 ISACs, covering a range of sectors, including healthcare, finances, retail, education, and emergency services, among others. This page provides a list of all the ISACs and their descriptions.
Palo Alto’s site is another database that lets you perform detailed searches based on a vulnerability’s name, its severity, products it impacts, etc.
The US-CERT provides a variety of threat information, alerts and tips. This site from the Cybersecurity & Infrastructure Security Agency also provides information about product updates from companies such as Apple, Adobe, Cisco, and VM Ware. In addition, you can find information about other organizations that share vulnerability and threat information on the site.
The Federal Bureau of Investigation partners with members of the private sector to provide an information-sharing organization known as InfraGard, which focuses on protection of critical infrastructure. Chapters nationwide regularly hold InfraGard meetings to present and exchange information about vulnerabilities and threats applicable to national security. All members, regardless of the industry or company they represent, must undergo a background check prior to gaining access to the organization’s portal and meetings.
This site from a well-known cybersecurity training provider describes itself as “a semiweekly executive summary of the most important cyber security news articles published recently. Each news item is annotated with important context provided by respected subject matter experts within the SANS community.” With a free membership, you receive access to the NewsBites newsletter, research, webcasts and more.
Visit this site for updates on security issues related to one of the world’s leading networking platforms.
Several industry associations focus specifically on information security, auditing, and risk. Association chapters provide great opportunities for networking with other information security professionals. Presentations and discussions at chapter meetings can be useful for maintaining awareness across myriad topics, including the latest threats and mitigations measures. This list from Cybercrime Magazine provides a useful list of groups around the country.
No matter which sources you use, your risk analysis efforts can benefit by having multiple choices for vulnerability and threat information. Within our daily schedules, we may not always find time to stay abreast of the latest information, so it’s good to build in various vulnerability and threat assessment activities into your routine. To adequately determine risks, an organization must understand its vulnerabilities and potential threats.
If you need help creating a plan for monitoring and remediating the risks in your environment, contact Pratum to find out how our consultants can support your team.
If your customers want proof that you handle data securely, a SOC 2® report provides one of your best options. This industry standard continues to gain momentum as a way for companies to ensure that every vendor in their supply chain maintains proper security controls. For many companies, a SOC 2® report has become a requirement to win and keep contracts with key clients.
Getting your SOC 2® report isn’t a quick decision or process, so you’ll have to make a plan for how you will prepare for a SOC 2® exam. SOC 2® Type II represents a significant investment of time and resources, as the process typically takes at least a year, culminating with an audit by a Certified Public Account (CPA) firm. (If you’re unfamiliar with the overall SOC 2® process, read this blog for a summary.)
As you consider how to prepare for a SOC 2® exam, you have a couple of key decisions to make:
Should you hire a readiness consultant or try to prepare for the exam on your own?
Should you take the auditing firm’s offer to handle both readiness and the actual audit?
After helping dozens of companies prepare for their SOC 2® exams, Pratum has seen all the possible scenarios for handling this critical process. Here are several key points to keep in mind.
If you’re considering how to prepare for a SOC 2® exam, contact Pratum today to learn more about how we can help you plan an engagement that’s efficient and effective in growing your business.
The audit process can vary from engagement to engagement, company to company, or even auditor to auditor. But you should find that IT auditors take a consistent approach, even if the phases have different names based on the environment. It’s very important for you to fully understand the phases of your audit to ensure that you have the appropriate resources and input available at each stage. Just like in the Software Development Life Cycle (SDLC), it’s much easier and less costly to get all requirements for the project upfront so no future work has to be scrapped..
In this blog, we’ll cover these phases:
For each phase, we’ll describe the phase’s purpose and the role of IT management during that phase.
This is simply a time for the auditors to announce their intentions to audit a group, function, system, etc. Most internal audit departments try to plan their work in advance just as you do. They may even know their anticipated schedule a full year in advance. They probably won’t release any details other than a name for the audit, the audit manager or team leader, and a preliminary date. The longer the lead time, the more fluid plan will be. As in any other operational group, audit timelines slip due to personnel, weather, technology and other business drivers.
The timing of audit announcements can be brutal. Sometimes audits are on a cycle, and you know to expect them every quarter, every other year, etc. These audits are much easier to plan for. The associated workload is known, and you’ll have a staffing plan to deal with the resources the audit will require. Sometimes, however, the auditors show up without warning. That usually happens when something doesn’t go as planned. You might not have known the timing of the audit, but because of whatever happened, you probably expected an audit.
The announcement phase is the key time for you as an IT manager to begin preparing. This is also the phase that most of us ignore, which costs us dearly. Once an audit is announced, you should have ample time to begin getting ready. Take advantage of this time because once the auditors arrive, they will expect you to have your prep work done. Here are a few key ways to start preparing:
Audit teams use engagement letters to spell out their specific objectives for an engagement. Perhaps they want to assess HIPAA compliance or review the effectiveness of your identity and access management controls. They should clearly define their intentions along with proposed timelines for each phase of the engagement. This is also a time for the audit team to introduce themselves to the business unit. Knowing the audit team and everyone’s role will help the entire engagement flow more smoothly.
Along with stating the audit objectives, the engagement letter summarizes the audit’s scope. This entails determining which systems can be reviewed and the look back period (date range for review) among other details. The scoping information is often just a best guess from the audit staff, as they probably don’t have the specific system knowledge to know if this scope is too big or too small to accomplish the stated objectives.
You should scrutinize the details of the engagement letter. Are the dates as expected? Is the objective clear? Has the objective changed from the initial announcement? Is the scope too broad or too narrow?
This is the time for you to drive the engagement. You have 4 key action items during the engagement process:
Confirm the overall timeline for each phase of the audit. Auditors are famous for trying to get in and get out as fast as possible, so you’ll need to review the timeline in light of the operational impact on your systems. Perhaps you’ll need to run 10 reports, which take 4 hours each to generate and can be run only in your evening maintenance windows after the backup runs. This might mean you can only run one per night, which means you need 10 days just to run the reports. If the auditor expects to finish gathering evidence in 5 days, you need to explain why this is unrealistic and negotiate a different timeline.
Don’t drag things out just to play it safe, though. Remember that the longer the auditor has to review and look over things, the more they uncover and the more they want to probe. This could expand the audit’s scope.
Set clear objectives for the engagement. Understanding the auditor’s goals will help you in the upcoming scoping phase. This is no different from getting business requirements from an operational unit before you begin coding their application. Another key in this step is understanding definitions. Even within the same company, acronyms and abbreviations may be used differently by different business units. Agree upfront on how you’ll communicate these items. Also, make sure to clarify what someone means when talking in technical terms. For example, people often throw around the terms “authorized” and “authenticated” interchangeably when discussing access controls. Make sure the term someone says is the term they mean.
Find out if the auditors have any pre-existing concerns about your organization or the systems. Unless you like being blindsided during the reporting phase, this is your time to get all the cards on the table. Auditors should tell you upfront about anything they are looking for. It’s not fair for you to be judged on criteria you don’t know about. You may also find you have some perception issues to work through to make this a successful engagement.
Take time to gain visibility into your problem areas. Do you have any gap remediation that management just hasn’t been willing to fund? When that gap becomes an issue in the auditor’s opinion report, management’s opinion is sure to change. Be careful, though. Your management may view this as an underhanded trick to get your pet project pushed through. Or if it becomes a big issue in the audit report, you might be on the hook for not having responded to it earlier. It takes some experience to balance getting visibility into known problem areas and just continuing to work on them in the background. We don’t recommend trying it on your first pass.
During the scoping activity, auditors tell you what systems they plan to review, what the lookback period will be, how many samples they plan to take, what the sample sizes will be, etc. Some of this information will be based on their previous experience with your organization or system. If this is an internal group that has performed the same audit several years in a row, their initial scope may be right on. If, however, this is the first time the audit has been performed, the team membership has changed, or the system has gone through a major revision, this might not be the case.
Your announcement phase should have included a self-assessment and gap analysis. That exercise may have resulted in some remediation plans. Most auditors will allow you to provide them with information regarding known gaps upfront. If you have an action plan and have made significant process on the plan, this can help improve your audit rating. Auditors are more concerned with ensuring things are done right than with who gets credit for finding the gap and making the changes. The scoping phase is a good time to disclose self-identified gaps. Some auditors prefer that this happens during the engagement negotiations, so be sure to check their expectations.
If negotiation isn’t one of your strong suits, you either need to develop your skills in this area or have someone on your team who can do it for you. Auditors are driven by best practices and repeatable processes. If the auditor feels you’re trying to get around these during the process, they will certainly push back. If you need to change the scope of your audit for any reason, you need to be prepared to justify your reasoning.
Simply thinking something will work better probably won’t sway an auditor. You and your team need to utilize your specific knowledge of the system architecture and operation to explain why the scope needs to be modified. For example, maybe the audit scope includes reviewing any authentication process for users of a web application. The architecture diagram provided to the auditor includes a proxy or load balancer in the middle. With your expert knowledge, you could explain how these devices have no direct impact on the authentication process and the logs can be excluded from this audit. The auditors will rely on your knowledge to help drive the scope. They don’t want to review meaningless data any more than you want to collect it for them.
This is where most of the heavy lifting will take place. One of the first things an auditor will ask for is information relating to your process and procedures. They want to see how well these accomplish the successful implementation of your policy and related control standards. They will also be looking for whether all your controls are documented.
Auditors will interview system administrators to determine how they perform their duties daily and then check for supporting documentation. Written operating procedures are always best. Even if you’re doing the right things, if it’s not documented, you can probably expect that issue to be noted on your final review. Without the written documentation, there is no level of assurance that the process will be repeated the same each time. Staff transition or a disaster could prevent the regular administrator from performing their duties and cause the process to be changed if not documented.
Once the auditor has identified all the controls, they will review for effectiveness.
Before even looking at the system, the auditor will try to ascertain if a control can meet a policy objective. They will look at the control and assume it has been implemented correctly and consistently. They will also consider the technology aspect of the control and the system it was meant to protect. If there is a significant chance a policy could be violated even with the control in place, it probably isn’t going to be considered an effective control and will need to be reviewed. Sometimes this just means modifying the written documentation for the control to better reflect its design. Sometimes you’ll need to scrap the control and start over.
Once the auditors consider the control’s effectiveness, they will review it for efficiency. This is the point we see how well something works. While the control may be deemed effective, it may not be working well in the actual implementation. Perhaps it was implemented incorrectly or the process isn’t being followed. Many things can impact a control’s efficiency.
Since fieldwork is where the auditors begin to dive into your technology environment, you have home field advantage. Nobody knows the environment like you, so take advantage of that. Assigning a senior staff member as the POC assures the auditor that you take this engagement seriously and want to do everything you can to make it a smooth process. You also get the benefit that if the auditor tried to exceed the scope of the audit, your staff member will know the system well enough to catch and adjust the auditor’s focus.
Some auditors come with prepackaged or predetermined testing scenarios. Make sure you review these to ensure they are appropriate for the way your environment is designed.
Databases and directory services are prime examples. Both can be customized to the point that they almost seem like in-house developed solutions. The standard fields an auditor tests may not be in use or may be used in vastly different ways by your organization. It’s important that both of you understand this before going through the laborious process of pulling data. Don’t be afraid to suggest scenarios you think will yield the results the auditor is looking for.
Many times, auditors ask for a report without any idea of what the report’s result will be. In one company, an auditor wanted to see information related to every Active Directory account in the company. Once it was explained that the company had over 210,000 accounts, that this would take about two days to run and that it would print out on about 30,000 pages, they changed their tune. The company was allowed to run smaller samples from several business units and finished with about 40 managers, 200 accounts and 5 pages. This was a statistically valid sample of the accounts, which would indicate whether the control was efficient. Work with your auditors to find valid samples instead of testing the entire environment.
Reports typically have two main sections:
Auditor’s reports begin with their opinion statements on the overall effectiveness and efficiency of your organization’s controls. If all goes well and there are no major issues to report, this should be succinct.
In an internal audit, this will usually be no more than a couple of paragraphs and high level in nature, depending on the system complexity and audience for the report. External or regulatory audits are typically much longer. In most cases, there will be an executive summary section if the opinion section is more than a few pages. If your auditor has uncovered multiple deficiencies, the report will be as long as it needs to be to accurately describe the impact.
The report’s second section offers recommendations. Auditors can’t be too specific here, as this would cause a conflict of interest when they go on to review the control. If they tell you step-by-step how to fix a control and then sign off on it in the next round, their motives would be suspect. If they again failed the control, you’d be none too happy with them. For this reason, they will tell you what needs to be fixed but not how to fix it.
As the audited organization, you have several key rights and responsibilities when it comes to the final report.
To read the rest of the articles in our series on IT audits, download the complete paper here.
And if you need help planning or conducting an IT audit, contact us today.