Ais Chapter 8
Ais Chapter 8
Ais Chapter 8
The Trust Service Framework was developed jointly by the AICPA and
the CICA to provide guidance for assessing the reliability of information
systems.
The Trust Service Framework organizes IT-related controls into five
principles that jointly contribute to systems reliability:
1. Security- access both physical and logical to the system and its
data is controlled and restricted to legitimate users.
2. Confidentiality- sensitive organizational information is protected
from unauthorized disclosure (examples: marketing plans, trade
secrets)
3. Privacy-personal information about customers, employees,
suppliers, or business partners is collected, used, disclosed, and
maintained only in compliance with internal policies and external
regulatory requirements and is protected from unauthorized
disclosure.
4. Processing integrity-data are processed accurately, completely, in a
timely manner, and only with proper authorization.
5. Availability- the system and its information are available to meet
operational and contractual obligations.
Two fundamental information security concepts
Security is a management issue, not just a technology issue
Step 1: in the security life cycle is to assess the information security
related threats that the organization faces and selects an appropriate
response. Information professionals possess the expertise to identify
potential threats and to estimate their likelihood and impact.
Step 2: involves developing information security policies and
communicating them to all employees.
Senior management must be involved, periodic reminders about
security policies and training on how to comply with them are
necessary.
Step 3: involves the acquisition or building of specific technological
tools.
Senior management must authorize investing the necessary
resources to mitigate the threats identified and achieve the desired
level of security.
Step 4: entails regular monitoring of performance to evaluate the
effectiveness of the organizations information security program.
Therefore, management must periodically reassess the
organization’s risk response and, when necessary, make changes to
information security policies and invest in new solutions to ensure
that the organization’s information security efforts support its
business strategy in a manner that is consistent with management’s
risk appetite.
Anti-malware
Protection
Network access controls (firewalls,
intrusion prevention sys- tems, etc.)
Encryption
People: Training
Employees must understand how to follow the organizations
security policies. Training is especially needed to educate
employees about social engineering attacks.
Role-playing exercises are particularly effective for increasing
sensitivity to and skills for dealing with social engineering attacks.
Security awareness is important for senior management too
because spear phishing have been targeted at them.
Information security professionals must keep up to date with new
developments in technology.
An organizations investment is security training will be effective
only if management clearly demonstrates that it supports
employees who follow prescribed security policies.
Especially important in combating social engineering attacks
Top management also needs to support the enforcement of
sanctions, up to and including dismissal, against employees who
willfully violate security policies.
Process: User access controls
An employee may also become a threat to an organizations security.
To accomplish that objective, COBIT 5 management practices
DSS05.04 stressed the need for controls to manage user identity and
logical access so that it is possible to uniquely identify everyone who
accesses the organization’s information system and track the actions that
they perform. Implementing DSS05.04 involves the use of two related
but distinct types of user access controls: authentication and
authorization