At Cisa Domain 4 - 23.8.19
At Cisa Domain 4 - 23.8.19
At Cisa Domain 4 - 23.8.19
• 4.0 INTRODUCTION
• IT service management practices are important to
provide assurance to users and to management that the
expected level of service will be delivered.
The IS auditor should ensure that the organization has a program that tracks and manages
all system interfaces and data transfers, whether internal or external, in line with the
business needs and goals.
IS auditors should ensure that the program is able to:
• Manage multiple file transfer mechanisms.
• Use multiple protocols.
• Automatically encrypt, decrypt and electronically sign data files.
• Compress/decompress data files.
• Connect to common database servers.
• Send and retrieve files via email and secure email.
• Automatically schedule regular data transfers.
• Analyze, track and report any attributes of the data being transferred.
• Ensure compliance with appropriate regulatory laws and mandates.
• Offer a checkpoint or restart capability for interruptions.
• Integrate with back-office applications to automate data transfers as much as feasible.
4.5 END-USER COMPUTING
• The IS auditor should ensure that the policies for use of EUC
exist.
• An inventory of all such applications should be in place.
• Those deemed critical enough should be subject to the same
controls of any other application.
4.5 END-USER COMPUTING(cont’d)
• Lack of IT department involvement in EUC also brings associated risk, because the applications may not be
subject to an independent review and, frequently, are not created in the context of a formal development
methodology.
4.6 DATA GOVERNANCE
Build/ Use/
Plan Design Monitor Dispose
Acquire Operate
• Source code is the language in which a program is written. It is translated into object code
by assemblers and compilers and tells the computer what to do . By its very
nature, source code may contain intellectual property and should be protected, and access
should be restricted.
• The actual source code should be managed using a version control system (VCS), often
called revision control software (RCS). A VCS provides the ability to synchronize source
changes with changes from other developers, including conflict resolution when changes
have been made to the same section of source.
4.7.8 CAPACITY MANAGEMENT
Capacity planning and monitoring includes the elements listed in figure 4.8.
4.8 PROBLEM AND INCIDENT MANAGEMENT
Diverse
Redundancy Alternative routing
routing
Last-mile
Long-haul network Voice
circuit
diversity recovery
protection
BC
Awareness
Training
Risk Assessment
and Analysis
BC
Plan
Development
Business
BC Strategy
Impact
Development Strategy
Analysis
Execution (Risk
Countermeasures
Implementation)
Infrastructure
Monitoring
Backup and
Capacity Detective Recovery
Management Controls
Incident
Management (Help BCP or IT
Desk) DRP
Controls (Risk Corrective
Countermeasure) Controls Special Clauses
Spare Processing in
Site Vendor/Supplier
Contracts
Risk Preventive
Management Controls UPS or Power
Generator
Configuration
Management
Occupant Emergency
Evacuation plan
emergency plan relocation plan
Plan Testing
Evaluate offsite
Evaluate key
Evaluate prior test storage facilities,
personnel through
results including security
interviews
controls
Evaluate the
alternative Evaluate insurance
processing coverage
contract
• The IS auditor should ensure that all plans are regularly tested and
be aware of the testing schedule and tests to be conducted for all
critical functions.
• Test documentation should be reviewed by the IS auditor to
confirm that tests are fully documented with pre-test, test and
post-test reports.
• It is also important that information security is validated to
ensure that it is not compromised during testing.
RPO and RTO Defined
• Determined based on the acceptable • The amount of time allowed for the
data loss in case of a disruption of recovery of a business function or
operations. It indicates the earliest resource after a disaster occurs.
point in time that is acceptable to
recover the data.
• The RPO effectively quantifies the
permissible amount of data loss in
case of interruption.
4-24 hrs 1-4 hrs 0-1 hr 0-1 hr 1-4 hrs 4-24 hrs
• Tape backups • Disk-based • Mirroring • Active-active • Active-passive • Cold standby
• Log shipping backups • Real-time clustering clustering
• Snapshots replication • Hot standby
• Delayed
replication
• Log shipping
Hot sites
Warm sites
• A complete infrastructure, partially configured for IT, usually with
network connections and essential peripheral equipment. Current
versions of programs and data would likely need to be installed before
operations could resume at the recovery site.
Cold sites
Mirrored sites
• A fully redundant site with real-time data replication from the production
site.
Mobile sites
Reciprocal arrangements