Unit 8-IT Security Management, Risk Assessment and Security Auditing
Unit 8-IT Security Management, Risk Assessment and Security Auditing
It’s obvious that virtually every organization has information they wouldn’t want to be
exposed to or wouldn’t want to fall into the wrong hands.
Governance
Governance is the combination of procedures supported and implemented by the executives
to guarantee that all organizational tasks, such as managing IT operations, are managed, and
Risk Management
Risk management involves forecasting and dealing with risks or opportunities linked to your
organization’s activities, which could hold back your organization from suitably realizing its
aim in uncertain situations. In the cybersecurity environment, risk management is applying
a comprehensive IT risk management methodology incorporated into your organization’s
enterprise risk management functions.
Compliance
Cyber Regulation and Compliance are the yardsticks that ensure you meet the numerous
controls, typically endorsed by the law, a regulatory authority, or industry group, to
safeguard the CIA Triad (confidentiality, integrity, and availability) of data.
Internal Audit
Internal audits analyze an organization’s internal controls, such as its accounting processes
and corporate governance. They ensure that organizations comply with relevant laws and
regulations and that financial reporting and data collection are executed in an accurate and
timely fashion.
External Audit
This is an independent assessment of the company’s financial statements and is often
executed for statutory reasons since the law mandates it. The external audit is performed by
a registered firm of accountants with established professional qualifications, including ACCA,
ACA, and CPA.
Third-Party Audit
A third-party audit happens when an organization determines to construct a quality
management system (QMS) that corresponds to the standard set of requirements, like the
ISO9001 and utilizes an independent auditing firm’s services to conduct an audit to
authenticate that the organization has thrived in meeting these standards.
Audit Management
This involves the process of ensuring that board-permitted audit directives are executed.
Audit management simplifies and organizes the collaboration and workflow process of
collecting audits. It manages the internal, external. And third-party audit employees hire and
train suitable audit professionals and establishes audit programs.
Risk management
Security architecture
Regulatory risk: You could pay the price if a vendor violates the law or organizational
policy
When you take a careful look at how these components are interconnected, you’ll find it
easier to determine which security controls you should apply for each of them. You should
also note that business functions will depend on IT assets, IT assets will produce data, and
data will provide business functions.
The organizational security policy is the document that defines the scope of a utility’s
cybersecurity efforts. It serves as the repository for decisions and information generated by
other building blocks and a guide for making future cybersecurity decisions. The
organizational security policy should include information on goals, responsibilities,
structure of the security program, compliance, and the approach to risk management that
will be used.
The organizational security policy serves as a reference for employees and managers tasked
with implementing cybersecurity. What has the board of directors decided regarding
funding and priorities for security? What new security regulations have been instituted by
the government, and how do they affect technical controls and record keeping? Which
approach to risk management will the organization use? How will the organization address
situations in which an employee does not comply with mandated security policies?
The organizational security policy serves as the “go-to” document for many such questions.
It expresses leadership’s commitment to security while also defining what the utility will do
to meet its security goals.
A security risk assessment is a process that identifies, evaluates, and prioritizes potential
vulnerabilities to various information assets (i.e., systems, hardware, applications, and data)
and then prioritizes the various risks that could affect those vulnerabilities. The primary
purpose of a risk assessment is to inform decision-makers about vulnerabilities in corporate
systems, allowing them to take preemptive defensive actions and prepare effective risk
responses.
The assessment also provides an executive summary to help executives make informed
decisions about ongoing security efforts. Security risk assessments also indicate to
management areas where employees need training to help minimize attack surfaces.
A risk assessment is primarily proactive. It involves testing your current infrastructure and
identifying weaknesses and vulnerabilities. Risk assessment is an important prerequisite for
effective risk management.
The primary goal of risk management is to reduce risk by continuously applying best
practices. Risk management includes a wide range of activities from managing and updating
infrastructure to applying identity management policies to training employees on proper
password hygiene.
Unfortunately, even with strong risk assessment and proactive risk management, some
attacks are likely to succeed. Reactive risk management focuses on minimizing the damage
of these successful exploits and facilitating rapid recovery.
2. Assessment. Administer an approach to assess the identified security risks for critical
assets. After careful evaluation and assessment, determine how to effectively and
efficiently allocate time and resources towards risk mitigation. The assessment approach
or methodology must analyze the correlation between assets, threats, vulnerabilities, and
mitigating controls.
3. Mitigation. Define a mitigation approach and enforce security controls for each risk.
4. Prevention. Implement tools and processes to minimize threats and vulnerabilities from
occurring in your firm’s resources.
Physical security assessments, including physical penetration testing, evaluate the ease with
which a malicious actor can gain physical access to your critical systems.
IT Security Assessment
What is the state of your IT infrastructure?
What network level security protocols do you have in place?
How are you ensuring compliance with shared security responsibilities in cloud
services?
IT security assessments investigate the overall health over your IT infrastructure and
communications pathways. They identify broad system vulnerabilities that are not specific
to particular applications or data storage facilities, as well as misconfiguration issues that
frequently leave companies open to attack.
Data security assessments consider the ease and breadth of access to corporate data.They
identify areas where companies should apply new controls to restrict access to data on an as
needed basis.
Application security assessments consider application vulnerabilities at every level from the
code itself to who has access to the applications. They allow companies to strengthen their
applications and limit access to that needed for employees to perform their jobs.
First of all, insider threats are not limited to people. They can include unapproved hardware
that is not subject to a BYOD policy. They can also include outdated hardware. Insider threats
also need be neither intentional nor malicious. Negligence and unintentional threats can
cause just as much harm as intentional ones. A perfect example is using “password” as your
password.
An increasingly common insider threat that many companies do not recognize is the
advanced persistent threat (APT). APTs, which are often used by state-sponsored
cybercriminals or corporate espionage professionals, are long-term, targeted network
insertions. Often, careless or uninformed employees are the attack vector for an APT, with
phishing emails being one of the most common ways attackers get access to company
networks. Essentially, the APT remains undetected in company systems for so long that it
becomes an insider.
Risk analysis refers to the review of risks associated with the particular action or event. The
risk analysis is applied to information technology, projects, security issues and any other
event where risks may be analysed based on a quantitative and qualitative basis. Risks are
part of every IT project and business organizations. The analysis of risk should be occurred
on a regular basis and be updated to identify new potential threat
• Provide a level of assurance concerning the proper operation of the computer with respect
to security.
• Generate data that can be used in after-the-fact analysis of an attack, whether successful or
unsuccessful.
Security Audit
An independent review and examination of a system’s records and activities to determine
the adequacy of system controls, ensure compliance with established security policy and
procedures, detect breaches in security services, and recommend any changes that are
indicated for countermeasures.
The basic audit objective is to establish accountability for system entities that initiate or
participate in security-relevant events and actions. Thus, means are needed to generate and
record a security audit trail and to review and analyze the audit trail to discover and
investigate attacks and security compromises.
• Event discriminator: This is logic embedded into the software of the system that monitors
system activity and detects security-related events that it has been configured to detect.
• Audit recorder: For each detected event, the event discriminator transmits the information
to an audit recorder. The model depicts this transmission as being in the form of a message.
The audit could also be done by recording the event in a shared memory area.
• Alarm processor: Some of the events detected by the event discriminator are defined to be
alarm events. For such events an alarm is issued to an alarm processor. The alarm processor
takes some action based on the alarm. This action is itself an auditable event and so is
transmitted to the audit recorder.
• Security audit trail: The audit recorder creates a formatted record of each event and stores
it in the security audit trail.
• Audit analyzer: The security audit trail is available to the audit analyzer, which, based on a
pattern of activity, may define a new auditable event that is sent to the audit recorder and
may generate an alarm.
• Audit archiver: This is a software module that periodically extracts records from the audit
trail to create a permanent archive of auditable events.
• Archives: The audit archives are a permanent store of security-related events on this
system.
• Audit provider: The audit provider is an application and/or user interface to the audit trail.
• Audit trail examiner: The audit trail examiner is an application or user who examines the
audit trail and the audit archives for historical trends, for computer forensic purposes, and
for other analysis.
• Security reports: The audit trail examiner prepares human-readable security reports.
Audit trails maintain a record of system activity. The choice of data to collect is determined
by a number of requirements. One issue is the amount of data to collect, which is determined
by the range of areas of interest and by the granularity of data collection. There is a trade-off
here between quantity and efficiency. The more data are collected, the greater is the
performance penalty on the system. Larger amounts of data may also unnecessarily burden
the various algorithms used to examine and analyze the data. Further, the presence of large
amounts of data creates a temptation to generate security reports excessive in number or
length.
With these cautions in mind, the first order of business in security audit trail design is the
selection of data items to capture. These may include:
• Any events that are collected for use by the various security detection and prevention
mechanisms. These include items relevant to intrusion detection and items related to
firewall operation
• Remote access.
As the security administrator designs an audit data collection policy, it is useful to organize
the audit trail into categories for purposes of choosing data items to collect.
A user-level audit trail can record user interactions with the system, such as commands
issued, identification and authentication attempts, and files and resources accessed. The
audit trail can also capture the user’s use of applications
File system logging is relatively easy to configure and is the least resource intensive. Records
can be accessed instantly, which is useful for countering an ongoing attack. However, this
approach is highly vulnerable. If an attacker gains privileged access to a system, then the
audit trail is vulnerable to modification or deletion.
A CD-ROM or similar storage method is far more secure but less convenient. A steady supply
of recordable media is needed. Access may be delayed and not available immediately. Printed
logs do provide a paper trail, but are impractical for capturing detailed audit data on large
systems or networked systems. RFC 2196 suggests that the paper log can be useful when a
permanent, immediately available log is required even with a system crash.
Protection of the audit trail involves both integrity and confidentiality. Integrity is
particularly important because an intruder may attempt to remove evidence of the intrusion
by altering the audit trail. For file system logging, perhaps the best way to ensure integrity is
the digital signature. Write-once devices, such as CD-ROM or paper, automatically provide
integrity. Strong access control is another measure to provide integrity.
Confidentiality is important if the audit trail contains user information that is sensitive and
should not be disclosed to all users, such as information about changes in a salary or pay
grade status. Strong access control helps in this regard. An effective measure is symmetric
encryption (e.g., using AES [Advanced
Encryption Standard] or triple DES [Data Encryption Standard]). The secret key must be
protected and only available to the audit trail software and subsequent audit analysis
software.
Note that integrity and confidentiality measures protect audit trail data not only in local
storage but also during transmission to a central repository.
The foundation of a security auditing facility is the initial capture of the audit data. This
requires that the software include hooks, or capture points, that trigger the collection and
storage of data as preselected events occur. Such an audit collection or logging function is
dependent on the nature of the software and will vary depending on the underlying
operating system and the applications involved.
• System event log: Used by applications running under system service accounts (installed
system services), drivers, or a component or application that has events that relate to the
health of the computer system.
• Application event log: Events for all user-level applications. This log is not secured and it is
open to any applications. Applications that log extensive information should define an
application-specific log.
• Security event log: The Windows Audit Log. This event log is for exclusive use of the
Windows Local Security Authority. User events may appear as audits if supported by the
underlying application.
For all of the event logs, or audit trails, event information can be stored in an XML format.
Other vulnerabilities exploit errors in application logic. For example, a privileged application
may be designed to read and print a specific file. An error in the application might allow an
attacker to exploit an unexpected interaction with the shell environment to force the
application to read and print a different file, which would result in a security compromise.
Auditing at the system level does not provide the level of detail to catch application logic
error behavior. Further, intrusion detection systems look for attack signatures or anomalous
behavior that would fail to appear with attacks based on application logic errors. For both
detection and auditing purposes, it may be necessary to capture in detail the behavior of an
application, beyond its access to system services and file systems. The information needed
to detect application-level attacks may be missing or too difficult to extract from the low-
level information included in system call traces and in the audit records produced by the
operating system.
Programs and procedures for audit trail analysis vary widely, depending on the system
configuration, the areas of most concern, the software available, the security policy of the
organization, and the behavior patterns of legitimate users and intruders.
Preparation
To perform useful audit analysis, the analyst or security administrator needs an
understanding of the information available and how it can be used.
unreliable entries, such as from a security package that is known to generate frequent false
positives when looking for malicious activity.
Timing
Audit trails can be used in multiple ways. The type of analysis depends, at least in part, on
when the analysis is to be done. The possibilities include the following:
• Audit trail review after an event: This type of review is triggered by an observed event, such
as a known system or application software problem, a known violation of existing security
policy by a user, or some unexplained system or user problem. The review can gather
information to elaborate on what is known about the event, to diagnose the cause or the
problem, and to suggest remedial action and future countermeasures. This type of review
focuses on the audit trail entries that are relevant to the specific event.
• Periodic review of audit trail data: This type of review looks at all of the audit trail data or
at defined subsets of the data and has many possible objectives.
Examples of objectives include looking for events or patterns that suggest a security
problem, developing a profile of normal behavior and searching for anomalous behavior, and
developing profiles by individual user to maintain a permanent record by user.
• Real-time audit analysis: Audit analysis tools can also be used in a real-time or near-real-
time fashion. Real-time analysis is part of the intrusion detection function.
Audit Review
Distinct from an analysis of audit trail data using data reduction and analysis tools is the
concept of audit review. An audit review capability enables an administrator to read
information from selected audit records. The Common Criteria specification [CCPS12a] calls
for a capability that allows prestorage or poststorage audit selection and includes the ability
to selectively review the following:
•The actions of one or more users (e.g., identification, authentication, system entry, and
access control actions)
• Actions associated with a specific system or security attribute Audit review can be focused
on records that match certain attributes, such as user or user group, time window, type of
record, and so forth. One automated tool that can be useful in audit review is a prioritization
of audit records based on input from the administrator. Records can be prioritized based on
a combination of factors. Examples include the following:
• Newness of the entry type (i.e., has this type of entry appeared in the logs before?)
• Log source
• Time of day or day of the week (e.g., an entry might be acceptable during certain times but
not permitted during others)
There may be a number of possible purposes for this type of audit review. Audit review can
enable an administrator to get a feel for the current operation of the system and the profile
of the users and applications on the system, the level of attack activity, and other usage and
security-related events. Audit review can be used to gain an understanding after the fact of
an attack incident and the system’s response to it, leading to changes in software and
procedures.
References
Organizational Security Policy. (n.d.). Retrieved from Power Sector Cybersecurity Building
Blocks: https://resilient-energy.org/cybersecurity-resilience/building-
blocks/organizational-security-
policy#:~:text=The%20organizational%20security%20policy%20should,managem
ent%20that%20will%20be%20used.
Stallings, W., & Brown, L. (2015). Computer Security Principles and Practice. New Jersey:
Pearson Education.
What is Information Security Management. (2024, March 11). Retrieved from eccouncil
cybersecurity exchange: https://www.eccouncil.org/cybersecurity-
exchange/executive-management/what-is-information-security-management/