Pki Ecommerce

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 14

The Information Systems Audit and

Control Association & Foundation


www.isaca.org

eCommerce Security
PKI, Digital Certificates in E-commerce

AUDIT PROGRAM
&
INTERNAL CONTROL QUESTIONNAIRE
The Information Systems Audit and Control Association & Foundation
With more than 23,000 members in over 100 countries, the Information Systems Audit and Control Association® (ISACA™) is a
recognized global leader in IT governance, control and assurance. Founded in 1969, ISACA sponsors international conferences,
administers the globally respected CISA® (Certified Information Systems Auditor™) designation earned by more than 25,000
professionals worldwide, and develops globally applicable information systems (IS) auditing and control standards. An affiliated
foundation undertakes the leading-edge research in support of the profession. The IT Governance Institute, established by the
association and foundation in 1998, is designed to be a "think tank" offering presentations at both ISACA and non-ISACA
conferences, publications and electronic resources for greater understanding of the roles and relationship between IT and enterprise
governance.

Purpose of These Audit Programs and Internal Control Questionnaires


One of the goals of ISACA’s Education Board is to ensure that educational products developed by ISACA support member and
industry information needs. Responding to member requests for useful audit programs, the Education Board has recently released
audit programs and internal control questionnaires on various topics for member use through the member-only web site and K-NET.
These products are intended to provide a basis for audit work.
E-business audit programs and internal control questionnaires were developed from material recently released in ISACA’s e-
Commerce Security Technical Reference Series. These technical reference guides were developed by Deloitte & Touche and ISACA’s
Research Board and are recommended for use with these audit programs and internal control questionnaires.
Audit programs and internal questionnaires on other subjects were developed by ISACA volunteers and reviewed and edited by the
Education Board. The Education Board cautions users not to consider these audit programs and internal control questionnaires to be
all-inclusive or applicable to all organizations. They should be used as a starting point to build upon based on an organization’s
constraints, policies, practices and operational environment.

Control Objectives for Information and related Technology (COBIT®)


COBIT has been developed as a generally applicable and accepted standard for good Information Technology (IT) security and control
practices that provides a reference framework for management, users, and IS audit, control and security practitioners.
This program has been developed and reviewed using COBIT Third Edition as a model. Audit objectives and steps are included.

Disclaimer
The topics developed for these Audit Programs and Internal Control Questionnaires have been prepared for the
professional development of ISACA members and others in the IS Audit and Control community. Although we
trust that they will be useful for that purpose, ISACA cannot warrant that the use of this material would be
adequate to discharge the legal or professional liability of members in the conduct of their practices.

September 2001
1
2
Audit Program
Public Key Infrastructure - Technical Reference Guide
PKI, Digital Certificates in E-commerce
Introduction
This document is offered as a supplement to the e-commerce technical reference guide:
E-commerce—Public Key Infrastructure (Good Practices for Secure Communications).

One of the primary building blocks for security in e-commerce is cryptography, the
theoretical basis for encryption. A given cryptographic technique may be based on either
private keys or public/secret key pairs. Public key infrastructure (PKI) rests atop
encryption and in turn supports e-commerce. Asymmetric cryptographic systems (public
key) have key pairs that are uniquely associated to individuals. Therefore these key pairs
are used as identifiers in authentication. Security implies protection, safeguards to ensure
that data in transit are not tampered with or disclosed before delivery to the intended
recipient. The intended recipient is known by the possession of the corresponding secret
key that allows him or her to decrypt the transmission. A PKI gives the sender of the
message confidence that the person receiving it, the person with the secret key is, who he
or she says he or she is. The usage and PKI certificate authority (CA) can be internal or
external. This program assumes that the usage of CA is an internal activity. If using an
external CA, the steps can be applied from a third-party perspective and reviewed
accordingly. An external CA requires the addition of the typical activities that would be
reviewed in a third-party agreement.

Audit Objectives

Referenced COBIT Control Objectives (If there is a sub-objective listed, it means


that special emphasis should be noted. All sub-objectives within each referenced
objective should be considered and related procedures performed where applicable.)

Within both the audit program and the internal control questionnaire, the primary C OBIT
control objectives have been listed for reference purposes.

PO2 – Define the Information Architecture


PO2.1 – Information Architecture Model
PO2.3 – Data Classification Scheme
PO2.4 – Security Levels
PO3 – Determine Technological Direction
PO 3.5 – Technology Standards
PO4 – Define the IT Organization and Relationships
PO6 – Communicate Management Aims and Directions
PO6.8 – Security and Internal Control Framework Policy
PO8 – Ensure Compliance with External Requirements
PO9 – Assess Risks
AI1 – Identify Automated Solutions

3
AI3 – Acquire and Maintain Technology Infrastructure
AI3.3 – System Software Security
AI3.6 – System Software Change Controls
DS5 – Ensure Systems Security
DS5.1 – Manage Security Measures
DS5.8 – Data Classification
DS5.16 – Trusted Path
DS5.21 – Protection of Electronic Value
DS11 – Manage Data
DS11.17 – Protection of Sensitive Information During Transmission and Transport
DS11.27 – Protection of Sensitive Messages
DS11.28 – Authentication and Integrity
DS11.29 – Electronic Transaction Integrity
M1 – Monitor the Process

Functional Objectives

1. Infrastructure supporting the PKI and encryption technologies has adequate internal
controls.
2. Certificate authority activity is appropriate and effective to support the business
efforts.
3. Business transactions are safely completed between intended and authenticated
recipients.

Completed Test Results, Remarks, Auto. COBIT


Audit Step By/Date W/P Ref. Tool Reference
A. Prior Audit/Examination
Report Follow-Up

Review prior report and verify M1


completion of any agreed-
upon corrections. Note
remaining deficiencies

B. Preliminary Audit Steps

Obtain: PO2
-Information architecture model PO3
for the organization PO6
-Organization chart PO8
-Data classification policy
-Network infrastructure
documentation
-Inventory of operating
systems, applications and
operating systems impacting

4
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
classified data and need for
PKI
-Specifications of
authentication and encryption
requirements
-Understanding of external
requirements
-Understanding of
authentication requirements
-Applicable certification policy
-Applicable certification
practices statement
-Applicable registration
authority information

Obtain or perform risk PO9


assessment on information
needed for authentication
Consider future e-business
requirements

Obtain infrastructure software AI1


acquisition procedures AI3

C. Detailed Audit Steps

Planning

Identify the security PO4


responsibilities within the
organization. Determine the
level of involvement in the
encryption processes by the
security staff

Review the data requirements PO2


for authentication for the e- DS11
commerce environment

Review the regulatory PO8


requirements for encryption
and authentication within the
country, industry and
organization

5
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
Determine level of compliance

Determine level of risk existing PO9


considering the level of
encryption and authentication
processes and implementation
status
Identify acceptable risk and
determine if any residual risk
exceeds the acceptable level

Review the decision process for AI3


selection of PKI usage (public
key)

Review the tools selection PO3


process relative to
compatibility with existing
technologies

Review the certificate policy PO2


(CP). Does it include a
statement of:
 Organizational business
objectives?
 Value placed on
information?
 Responsibilities of
issuer in protecting the
certificate and the data
to which it allows
access?
 Usage for PKI
(encryption, secure
authentication or
electronic signature)?

Review the certificate practices PO1


statement (CPS). Does it PO2
include:
 Legal responsibilities?
 Financial
responsibilities?

6
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
 CA’s responsibilities?
 Intermediate CA’s
responsibilities (if
hierarchy exists)?
 End-user
responsibilities?
 Outside parties’
responsibilities and
consequences for failure
to comply?
 Definition of proper
usage of issued
certificates?

Compare the CPS to the PO2


certificate policy
Assure all elements of the CP
are included appropriately

For any registration authority PO2


used, compare registration
information (its CPS) to the
CP to assure compliance

Review all certificates and note PO2


the levels and review for
appropriate requirements of
revocation, expiration

Supporting Infrastructure

Review the inventory of AI3


systems, applications and
operating systems using (or to
use) PKI

Review the network AI3


environment for adequate
internal controls

Review controls around all AI3


systems administration DS5
functions

7
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference

If directory services are used for DS5


security profiling, review the
profiles against authorizing
documentation, and compare
access capabilities to need

Review the acquisition process AI3


by which the PKI either has
been or will be obtained, and
determine validity to needs
requirements

Review the implementation AI1


procedures for PKI

Determine access controls over DS5


asymmetric encryption keys
during the acquisition/
development process

Review the change control AI3


processes over infrastructure
software and identify impacts
to PKI usage

Assess effectiveness of the PKI DS5


output compliance to external
regulations and organizational
policies

Certificate Activity

Review the key generation AI3


process and determine:
 Sufficient capability
exists
 It is done in a secure
environment
 Responsibilities during
the process
 Storage of data about
the keys is proper

8
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
 Keys are stored properly
 Keys are made into
parts, and the same
processes apply for all
parts

Determine proper information is DS5


used for registration by taking
a sample of certificates and
tracing the information back
to registration data

Review distribution processes DS11


over certificates to assure only
the recipient and intended user
accesses it

Review usage and determine: DS11


 Who retains the keys
 How the keys are to be
used
 Limitation of validity
periods for keys and
certificates
 How keys and
certificates are to be
revoked
 Who is responsible for
remedies for failure or
compromise of
cryptography

Compare to certificate practice


statement (CPS); assess
completeness of CPS and
compliance to CPS

Review the revocation process DS11


and test for compliance

9
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
Review the expiration process DS11
and test for compliance

Assess effectiveness of the PKI DS5


output compliance to external M1
regulations and organizational
policies

Review control around meta- DS5


data over PKI and certificates DS11

Business Transactions

Assess effectiveness of the PKI DS5


output compliance to external
regulations and organizational
policies

10
Internal Control Questionnaire
PKI, Digital Certificates in E-commerce

The usage of a PKI certificate authority (CA) can be internal or external. This program
assumes that the usage of CA is an internal activity. If using an external CA, the steps can be
applied from a third-party perspective and reviewed accordingly. An external CA requires the
addition of the typical activities that would be reviewed in a third-party agreement.

Response Primary
Question No. Question Description COBIT
YES NO N/A
Reference
General M1, M2

Have all items from prior audits been cleared?


Do business objectives clearly define the PO1
organization’s e-commerce requirements?

Is there an information architecture model that PO1


reflects current business needs and objectives?

Does the information architecture model support PO2


e-commerce data requirements?

Are sufficient policies in place and PO6


communicated to define data/information as an
asset?

Either by policy or precedent, is information PO1


required to have the following characteristics: PO11
- Efficiency? DS11
- Effectiveness?
- Integrity?
- Availability?
- Confidentiality?
- Compliance?
- Reliability?

Has a concept of acceptable risk been adopted? PO9

11
Response Primary
Question No. Question Description
YES NO N/A COBIT
Is there a risk measure performed regarding the PO9
need for public key infrastructure?

Is there a compliance “watch” function? M3


M4

Does the current hardware infrastructure support PO3


the e-commerce plan?

Does the current software infrastructure support PO2


the e-commerce data requirements?

If the current infrastructure does not support the PO3


e-commerce plan, are there sufficient hardware
and software planning initiatives in place?
Will these initiatives provide the appropriate
support to obtain the necessary tools and not
present unacceptable risk?
Is there an IT security function involved in DS5
security tool recommendations?

Are there detailed procedures for public key DS5


management?
Do the detailed procedures for public key DS5
management include:
- Generation?
- Dissemination?
- Implementation?
- Expiration?

Do the current or planned PKI tools work with DS5


existing infrastructure? PO3

Does the organization issue certificates of DS5


authority (CA) to both employees and external
entities?
Are multiple classes of CAs manageable? DS5

12
Response Primary
Question No. Question Description
YES NO N/A COBIT
Are all classes of CAs reflected in the certificate DS5
practice statement (CPS)?

Is the CPS protected as sensitive information? DS5

Do current tools meet all organizational PO1


requirements?

Do all systems that require encryption and DS5


authentication use it?

Do infrastructure programs (encryption) follow AI6


established change control procedures?

Are encryption practices compliant with all PO8


applicable regulatory entities?

Does the organization have sufficient capability DS13


to generate keys?

Does the key generation take place in a secure DS5


environment?

Is the organization trusted to generate keys DS5


securely?

Is the key generation process properly M1


supervised and properly witnessed?

Are key generation records properly controlled? DS11

Once generated, are keys stored properly? DS5

13
Response Primary
Question No. Question Description
YES NO N/A COBIT
Are keys cut into parts and are they properly DS5
controlled?

Is information complete that is used in DS11


registration?

Are all registration attempts maintained? DS11

Are certificates distributed properly? DS11

14

You might also like