Pki Ecommerce
Pki Ecommerce
Pki Ecommerce
eCommerce Security
PKI, Digital Certificates in E-commerce
AUDIT PROGRAM
&
INTERNAL CONTROL QUESTIONNAIRE
The Information Systems Audit and Control Association & Foundation
With more than 23,000 members in over 100 countries, the Information Systems Audit and Control Association® (ISACA™) is a
recognized global leader in IT governance, control and assurance. Founded in 1969, ISACA sponsors international conferences,
administers the globally respected CISA® (Certified Information Systems Auditor™) designation earned by more than 25,000
professionals worldwide, and develops globally applicable information systems (IS) auditing and control standards. An affiliated
foundation undertakes the leading-edge research in support of the profession. The IT Governance Institute, established by the
association and foundation in 1998, is designed to be a "think tank" offering presentations at both ISACA and non-ISACA
conferences, publications and electronic resources for greater understanding of the roles and relationship between IT and enterprise
governance.
Disclaimer
The topics developed for these Audit Programs and Internal Control Questionnaires have been prepared for the
professional development of ISACA members and others in the IS Audit and Control community. Although we
trust that they will be useful for that purpose, ISACA cannot warrant that the use of this material would be
adequate to discharge the legal or professional liability of members in the conduct of their practices.
September 2001
1
2
Audit Program
Public Key Infrastructure - Technical Reference Guide
PKI, Digital Certificates in E-commerce
Introduction
This document is offered as a supplement to the e-commerce technical reference guide:
E-commerce—Public Key Infrastructure (Good Practices for Secure Communications).
One of the primary building blocks for security in e-commerce is cryptography, the
theoretical basis for encryption. A given cryptographic technique may be based on either
private keys or public/secret key pairs. Public key infrastructure (PKI) rests atop
encryption and in turn supports e-commerce. Asymmetric cryptographic systems (public
key) have key pairs that are uniquely associated to individuals. Therefore these key pairs
are used as identifiers in authentication. Security implies protection, safeguards to ensure
that data in transit are not tampered with or disclosed before delivery to the intended
recipient. The intended recipient is known by the possession of the corresponding secret
key that allows him or her to decrypt the transmission. A PKI gives the sender of the
message confidence that the person receiving it, the person with the secret key is, who he
or she says he or she is. The usage and PKI certificate authority (CA) can be internal or
external. This program assumes that the usage of CA is an internal activity. If using an
external CA, the steps can be applied from a third-party perspective and reviewed
accordingly. An external CA requires the addition of the typical activities that would be
reviewed in a third-party agreement.
Audit Objectives
Within both the audit program and the internal control questionnaire, the primary C OBIT
control objectives have been listed for reference purposes.
3
AI3 – Acquire and Maintain Technology Infrastructure
AI3.3 – System Software Security
AI3.6 – System Software Change Controls
DS5 – Ensure Systems Security
DS5.1 – Manage Security Measures
DS5.8 – Data Classification
DS5.16 – Trusted Path
DS5.21 – Protection of Electronic Value
DS11 – Manage Data
DS11.17 – Protection of Sensitive Information During Transmission and Transport
DS11.27 – Protection of Sensitive Messages
DS11.28 – Authentication and Integrity
DS11.29 – Electronic Transaction Integrity
M1 – Monitor the Process
Functional Objectives
1. Infrastructure supporting the PKI and encryption technologies has adequate internal
controls.
2. Certificate authority activity is appropriate and effective to support the business
efforts.
3. Business transactions are safely completed between intended and authenticated
recipients.
Obtain: PO2
-Information architecture model PO3
for the organization PO6
-Organization chart PO8
-Data classification policy
-Network infrastructure
documentation
-Inventory of operating
systems, applications and
operating systems impacting
4
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
classified data and need for
PKI
-Specifications of
authentication and encryption
requirements
-Understanding of external
requirements
-Understanding of
authentication requirements
-Applicable certification policy
-Applicable certification
practices statement
-Applicable registration
authority information
Planning
5
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
Determine level of compliance
6
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
CA’s responsibilities?
Intermediate CA’s
responsibilities (if
hierarchy exists)?
End-user
responsibilities?
Outside parties’
responsibilities and
consequences for failure
to comply?
Definition of proper
usage of issued
certificates?
Supporting Infrastructure
7
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
Certificate Activity
8
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
Keys are stored properly
Keys are made into
parts, and the same
processes apply for all
parts
9
Completed Test Results, Remarks, Auto. COBIT
Audit Step By/Date W/P Ref. Tool Reference
Review the expiration process DS11
and test for compliance
Business Transactions
10
Internal Control Questionnaire
PKI, Digital Certificates in E-commerce
The usage of a PKI certificate authority (CA) can be internal or external. This program
assumes that the usage of CA is an internal activity. If using an external CA, the steps can be
applied from a third-party perspective and reviewed accordingly. An external CA requires the
addition of the typical activities that would be reviewed in a third-party agreement.
Response Primary
Question No. Question Description COBIT
YES NO N/A
Reference
General M1, M2
11
Response Primary
Question No. Question Description
YES NO N/A COBIT
Is there a risk measure performed regarding the PO9
need for public key infrastructure?
12
Response Primary
Question No. Question Description
YES NO N/A COBIT
Are all classes of CAs reflected in the certificate DS5
practice statement (CPS)?
13
Response Primary
Question No. Question Description
YES NO N/A COBIT
Are keys cut into parts and are they properly DS5
controlled?
14