Audit dan evaluasi ti 7

68
Audit dan Evaluasi Teknologi Informasi Sesi 7 MTI-CIO 2012

description

Materi Kuliah Audit TI pertemuan 7 Pak Dani

Transcript of Audit dan evaluasi ti 7

Page 1: Audit dan evaluasi ti   7

Audit dan EvaluasiTeknologi Informasi

Sesi 7

MTI-CIO2012

Page 2: Audit dan evaluasi ti   7

Key to IT Fraud Initiatives: Tone at the Top

• Standards and literature claim Tone at the Top is key to prevention of IT fraud

• Study of IT audits showed that Tone at the Top is most important criterion in assessing IT security

• Tone at the Top is more important than:– Software– Logical controls– Physical controls

Security Controls and Management ToneT. Kizinian and W. R. Leese, Internal Auditing, March/April 2004

Page 3: Audit dan evaluasi ti   7

Tone at the Top Options

• Culture of fear– Responses triggered by events– Adopts a “fortress” strategy– Compliance is sufficient– CIO or CTO responsibility– Punishment oriented – requires monitoring and systems that may

impede legitimate business• Culture of security

– Motivated by desire for excellence– Holistic understanding of security– Aims to prevent fraud– Compliance is necessary but not sufficient for security– Organizational responsibility– Conscious strategy for Tone at the Top and culture

Page 4: Audit dan evaluasi ti   7

Problems with Culture of Fear

• Fear is a short-term motivator• Responds to failures after the damage is done• Underestimates costs of failures and costs of prevention (e.g.

time lost in dealing with security issues and systems)• Lowers morale and creates “us vs. them” mindset

Page 5: Audit dan evaluasi ti   7

Standards and Assessment Tools

• COSO and SOX• Control Objectives for Information and Related Technology

(COBIT) and Information Technology Control Guidelines (ITCG)• Need management and assessment tool specifically for Tone

at the Top and Culture of Security

Page 6: Audit dan evaluasi ti   7

ACFE Report to the Nation Occupational Fraud and Abuse

• 2 1/2 year study of 2608 Frauds– Fraud costs U.S. organizations more than $400 billion

annually.– Fraud and abuse costs employers an average of $9 a day

per employee– The average organization loses about 6 percent of its total

annual revenue to fraud and abuse admitted to by its own employees

Page 7: Audit dan evaluasi ti   7

Two Types of Fraud

• Fraud on behalf of an organization– Financial statement manipulation to make the company

look better to stockholders– Also called management fraud

• Fraud against an organization– Stealing assets, information, etc.– Also called employee or consumer fraud

Page 8: Audit dan evaluasi ti   7

Ernst & Young Fraud Study 2002 (Europe)

• One in five workers are aware of fraud in their workplace• 80% would be willing to turn in a colleague but only 43% have• Employers lost 20 cents on every dollar to workplace fraud• Types of fraud– Theft of office items—37%– Claiming extra hours worked—16%– Inflating expenses accounts—7%– Taking kickbacks from suppliers—6%

Page 9: Audit dan evaluasi ti   7

Extent of Fraud

• 10% of organizations suffer serious IT fraud each year• Damage to reputation due to IT fraud slices 8% to 13% off

market value of public companies• Every survey shows IT fraud at top or near the top of CFOs

concerns

Page 10: Audit dan evaluasi ti   7

But So Far?

• Each firm seems to have different groups working on fraud detection– No best practices model has emerged

• IT auditors perform control testing on company systems, not fraud detection

Page 11: Audit dan evaluasi ti   7

Why Don’t Auditors Find Fraud?

• Limited time– Our most precious resource is our attention

• History: Lack of historical fraud detection instruction• Lack of fraud symptom expertise• Lack of fraud-specific tools• Lack of analysis skills• Lack of expertise in technology• Auditors do find 20-30 percent of fraud

ACFE 2004 Report to the Nation

Page 12: Audit dan evaluasi ti   7

Common Fraud in USA

• Top Sales VP Sponsors Award Event• High-priced Gifts Bought for Spouses and Guests• Cost Buried in Cost of Overall Event -Gift Items Not Identified• Voucher Meets Budget Projection

Page 13: Audit dan evaluasi ti   7

Ethical Standards Tested Every Day

• Have to Take a Stand Based on Your Personal Ethics• Tested Every Day by Decisions Your People Make• Foreign Corrupt Practice is Rule of Law

Page 14: Audit dan evaluasi ti   7

???

Page 15: Audit dan evaluasi ti   7

What Next in IT Audit?

• Prosecute??• Apply short-term solutions to contain an intrusion• Eliminate all means of intruder access • Return systems to normal operation • Identify and implement security lessons learned

Page 16: Audit dan evaluasi ti   7

What is a security audit?

• Policy based • Assessment of risk • Examines site methodologies and practices • Dynamic • Communication

"The world isn’t run by weapons anymore, or energy, or money. It’s run by little ones and zeros, little bits of data... There’s a war out there... and it’s not about who’s got the most bullets. It’s about who controls the information.“

Federation of American Scientists - Intelligence Resource Program

Page 17: Audit dan evaluasi ti   7

Why and What IT Security Audits?

Why?• Information is power • Check and measure policy compliance • Assessing risk and security level or other specific information• Assessing potential damage and vulnerable areas• Security incident response to allow remediation• Ensure ongoing security and efficient system• Change management • Expectations

What?• Host • Firewall • Networks • Large networks

Page 18: Audit dan evaluasi ti   7

Who Needs IT Security Auditing?

• A security audit is necessary for every organization, especial with the utilization of Internet.

• A ongoing process that must be tried and improved to cope up with the ever changing and challenging threats.

• Should not be feared of being audited. Audit is good practice.

Page 19: Audit dan evaluasi ti   7

When to audit?

• Emergency! • Before prime time • Scheduled/maintenance• Example schedules– Individual Host 12 -24 months – Large Networks 12- 24 months – Network 12 months – Firewall 6 months

Page 20: Audit dan evaluasi ti   7

IT Specific Audit Phases

• External Audit– Public information collection– External Penetration

• Non-destructive test• Destructive test

• Internal Audit– Confidential information collection– Security policy reviewing– Interviews– Environment and Physical Security– Internal Penetration – Change Management

• Reporting

Page 21: Audit dan evaluasi ti   7

Important Notes on External Audit

• Do not make ANY changes to the systems or networks• Do not impact processing capabilities by running scanning/

testing tools during business hours or during peak or critical periods

• Always get permission before testing• Be confidential and trustworthy• Do not perform unnecessary attacks

Page 22: Audit dan evaluasi ti   7

External Audit-Penetration Test

• Plan the penetration process– Search for vulnerabilities for information gathered and obtain the

exploits– Conduct vulnerabilities assessments (ISO 17799)

• Non-destructive test– Scans / test to confirm vulnerabilities– Make SURE not harmful

• Destructive test– Only for short term effect (DDOS….)– Done from various locations– Done only off-peak hours to confirm effect

• Record everything– Save snapshots and record everything for every test done even it

returned false result– Watch out for HONEYPOTS

Page 23: Audit dan evaluasi ti   7

Internal Audit

• Conducted at the premises• A process of hacking with full knowledge of the network

topology and other crucial information. • Also to identify threats within the organization • Should be 100% accurate.• Must be cross checked with external penetration report.

Page 24: Audit dan evaluasi ti   7

Internal Audit-Policy review

• Everything starts with the security policy

• If there is no policy, there is not need of security audit?

• Policies are studied properly and classified

• Identify any security risk exist within the policy

• Interview IT staffs to gain proper understanding of the policies

• Also to identify the level of implementation of the policies.

Policy

Standards

Procedures, Guidelines & Practices

Page 25: Audit dan evaluasi ti   7

Internal Audit-Information gathering

• Discussion of the network topology• Placement of perimeter devices of routers and firewalls• Placement of mission critical servers• Existence of IDS • Logging• Always cross-check with security policy

Page 26: Audit dan evaluasi ti   7

Internal Audit-Environment and Physical Security

– Locked / combination / card swipe doors– Temperature / humidity controls– Neat and orderly computing rooms– Sensitive data or papers laying around?– Fire suppression equipment– UPS (Uninterruptible power supply)– Always cross-check with security policy

Section 8.1 of the ISO 17799 document defines the concepts of secure area, secure perimeter and controlled access to such areas.

Page 27: Audit dan evaluasi ti   7

Internal Audit-Penetration

For Internal penetration test, it can divided to few categories– Network – Perimeter devices– Servers and OS– Application and services– Monitor and response– Cross-check with security policy

Page 28: Audit dan evaluasi ti   7

Internal Audit-Network

• Location of devices on the network• Redundancy and backup devices• Staging network• Management network• Monitoring network• Other network segmentation• Cabling practices• Remote access to the network• Cross-check with security policy

Page 29: Audit dan evaluasi ti   7

Internal Audit-Perimeter Devices

Check configuration of perimeter devices like– Routers– Firewalls– Wireless AP/Bridge– RAS servers– VPN servers– Perform test

• Egress and ingress communication• Firewall rules• Configuration access method• Logging methods

– Cross-check with security policy

Page 30: Audit dan evaluasi ti   7

Internal Audit-Server and OS

• Identify mission critical servers like DNS,Email and others..• Examine OS and the patch levels• Examine the ACL on each servers• Examine the management control-account and password • Placement of the servers• Backup and redundancy• Cross-check with security policy

Page 31: Audit dan evaluasi ti   7

Internal Audit-Application and Services

Identify services and application running on the critical mission servers.Check vulnerabilities for the versions running.Remove unnecessary services/application

– DNS• Name services(BIND)

– Email• Pop3,SMTP

– Web/Http– SQL– Others– Cross-check with security policy

Page 32: Audit dan evaluasi ti   7

Internal Audit-Monitor and Response

Check for procedures on• Event Logging and Audit

– What are logged?– How frequent logs are viewed?– How long logs are kept?

• Network monitoring– What is monitored?– Response Alert?

• Intrusion Detection– IDS in place?– What rules and detection used?

• Incident Response– How is the response on the attack?– What is recovery plan?– Follow up?

Page 33: Audit dan evaluasi ti   7

Internal Audit-Analysis and Report

• Analysis result – Check compliance with security policy– Identify weakness and vulnerabilities– Cross check with external audit report

• Report- key to realizing value– Must be 2 parts

• Not technical (for management use)• Technical (for IT staff)

– Methodology of the entire audit process– Separate Internal and External– State weakness/vulnerabilities – Suggest solution to harden security

Page 34: Audit dan evaluasi ti   7

Security Policies and Documentation

What is a security policy?• Components • Who should write it? • How long should it be? • Dissemination • It walks, it talks, it is alive..• RFC 1244 • What if a written policy doesn't exist? • Other documentation

Page 35: Audit dan evaluasi ti   7

Components of a Security Policy

• Who can use resources • Proper use of the resources • Granting access and use • System Administrator privileges • User rights and responsibilities • What to do with sensitive information • Desired security configurations of systems

Page 36: Audit dan evaluasi ti   7

RFC 1244 ``Site Security Handbook''

• Defines security policies & procedures • Policy violations • Interpretation • Publicizing • Identifying problems • Incident response • Updating

Page 37: Audit dan evaluasi ti   7

Other Documentation

• Hardware/software inventory • Network topology • Key personnel • Emergency numbers • Incident logs

Page 38: Audit dan evaluasi ti   7

How to do a Security Audit

• Pre audit: verify your tools and environment • Audit/review security policy • Gather audit information • Generate an audit report • Take actions based on the report's findings • Safeguard data and report

Page 39: Audit dan evaluasi ti   7

The Golden Rule of Auditing

• Verify ALL tools used for the audit are untampered with.– Write them yourself – Find a trusted source (person, place) – Verify them with a digital signature (MD5)

• If the results of the auditing tools cannot be trusted, the audit is useless• Platform

– Should have extraordinary security – Submit it to a firewall+ type of audit – Physical access should be required to use – No network services running – Portable mobile secured and trusted hardware– Software: Secured OS, Audit tools, Development tools

Page 40: Audit dan evaluasi ti   7

Audit Tools the Hall of Fame

• SAINT/SATAN/ISS • Nessus• lsof /pff • Nmap, tcpdump, ipsend • MD5/DES/PGP • COPS/Tiger • CrackWeb security specific• Acunetix: http://www.acunetix.com • Web Sleuth: http://www.sandsprite.com/Sleuth • Paros Proxy: http://www.parosproxy.org • Web Inspect: http://www.spidynamics.com/products/webinspect • nikto: /http://www.cirt.net/code/nikto.shtml • XSS NASL plugin for Nessus: http://www.cirt.net/code/nessus.shtml • JMeter: http://www.jakarta.apache.org/jmeter

Page 41: Audit dan evaluasi ti   7

Audit/Review Security Policy

• Utilize existing or use ``standard'' policy • Treat the policy as a potential threat • Does it have all the basic components? • Are the security configurations comprehensive? • Examine dissemination procedures

Page 42: Audit dan evaluasi ti   7

Security policy

• Treat the policy as a potential threat • Bad policies are worse than none at all • Good policies are very rare • Look for clarity and completeness • Poor grammar and spelling are not tolerated

Page 43: Audit dan evaluasi ti   7

Does it Have All the Basic Components?

• Who can use resources • Proper use of the resources • Granting access and use • System Administrator privileges • User rights and responsibilities • What to do with sensitive information

Page 44: Audit dan evaluasi ti   7

Security Configs Comprehensive?

• Details are important! • Addresses specific technical problems

(COPS like tests, network services run, etc.) • Allowable trust must be clearly outlined • Should specify specific tools (The TCP wrappers, S/Key, etc.)

that are used • Must have explicit time schedules of security • Audits and/or tools used • Logfiles must be regularly examined!

Page 45: Audit dan evaluasi ti   7

Examine Dissemination Procedures

• Policies are worthless unless people read and understand them

• Ideally it is distributed and addressed when people join organization

• E mail is useful for updates, changes • Written user acknowledgment necessary

Page 46: Audit dan evaluasi ti   7

Gather Audit Information

• Talk to/Interview people • Review Documentation • Technical Investigation

Page 47: Audit dan evaluasi ti   7

Talk to/Interview people

• Difficult to describe, easy to do • Usually ignored • Users, operators, sysadmins, janitors, managers…• Usage & patterns • Have they seen/read the security policy?• What can/can't they do, in own words • Could they get root/system privileges? • What are systems used for? • What are the critical systems? • How do they view the security audit?

Page 48: Audit dan evaluasi ti   7

Review Documentation

• Hardware/software inventory • Network topology • Key personnel • Emergency numbers • Incident logs

Page 49: Audit dan evaluasi ti   7

Technical Investigation

• Run static tools (COPS, Crack, etc.) • Check system logs • Check system against known vulnerabilities (CERT, bugtraq, CIAC

advisories, etc.) • Follow startup execution • Check static items (config files, etc.) • Search for privileged programs (SUID, SGID, run as root) • Examine all trust • Check extra network services (NFS, news, httpd, etc.) • Check for replacement programs (wu ftpd, TCP wrappers, etc.) • Code review ``home grown'' programs (CGI's, finger FIFO's, etc.) • Run dynamic tools (ps, netstat, lsof, etc.) • Actively test defenses (packet filters, TCP wrappers, etc.)

Page 50: Audit dan evaluasi ti   7

Test, Execution, and Check

Static tools• Nmap• SAINT/SATAN/ISS • Crack • Nessus• COPS/TigerStartup execution/program• Boot (P)ROMS • init • Startup programs (rc.* like files)Check• Examine all config files of running processes (inetd.conf, sendmail.cf,

etc.) • Examine config files of programs that can start up dynamically (ftpd, etc.)

Page 51: Audit dan evaluasi ti   7

Search for privileged programs

• Find all SUID/SGID programs • Look at all programs executed as root • Examine:

– Environment – Paths to execution – Configuration files

• Examine all trust– rhosts, hosts.equiv – NFS, NIS – DNS – Windowing systems – User traffic and interactive flow

Page 52: Audit dan evaluasi ti   7

Check Network Services

• NFS/AFS/RFS • NIS • News • WWW/httpd • Proxy (telnet, ftp, etc.) • Authentication (Kerberos, security tokens, special services) • Management Protocols (SNMP, etc.)

Page 53: Audit dan evaluasi ti   7

Check for Replacement Programs

• wu ftpd • TCP wrappers • Logdaemon • Xinetd • GNU fingerd

Page 54: Audit dan evaluasi ti   7

Code Review ``Home Grown''/Non Standard Programs/Custom

• Network daemons • Anything SUID, SGID • Programs run as system account • CGI's• Bad signs:

– external commands (system, shell, etc.) – /usr/ucb/mail – large size – No documentation – No comments in code – No source code available

Page 55: Audit dan evaluasi ti   7

Actively Test Defenses

• Packet filtering• TCP wrappers • Other defense programs

Page 56: Audit dan evaluasi ti   7

Safeguard Data and Report

• Save for the next audit • Do not keep on line • Use strong encryption if stored electronically • Limit distribution to those who ``need to know'' • Print out report, sign, and number copies

Page 57: Audit dan evaluasi ti   7

Incident Response-Purpose

Minimize overall impact

• Hide from public scrutiny

• Stop further progression

• Involve Key personnel

• Control situation

Recover Quickly and Efficiently

• Respond as if going to prosecute

• If possible replace system with new one

• Priority one, business back to normal

• Ensure all participants are notified

Secure System

• Lock down all known avenues of attack

• Assess system for unseen vulnerabilities

• Implement proper auditing

• Implement new security measures

Follow-up (A continuous process)

• Ensure that all systems are secure.

• Continue prosecution.

• Securely store all evidence and notes.

• Distribute lessons learned.

Page 58: Audit dan evaluasi ti   7

Incident Verification

• How are we certain that an incident occurred?• Verify the Incident! • Where to find information?– Intrusion Logs– Firewall Logs– Interviews• Emails, Network Admin, Users, ISP, etc…

Page 59: Audit dan evaluasi ti   7

Verification: What do we know?

• Three situations– 1. Verification without touching the system– 2. Verification by touching the system minimally. You have a clue or

two where to look.– 3. Verification by full analysis of live system to find any evidence that

an incident has occurred.

Page 60: Audit dan evaluasi ti   7

Secure Incident Scene

• What exactly does this mean?– Limit the amount of activity on the system to as little as

possible• Limit damage by isolating• ONE person perform actions• Limit affecting the crime environment• Record your actions

Page 61: Audit dan evaluasi ti   7

Preserve Everything!

• Anything and everything you do will change the state of the system– POWER OFF? Changes it.– Leave it plugged in? Changes it.– Obtaining a backup will change the system– Unplug the network? Changes it.– Even Doing Nothing will ALSO change the state of the

system.

Page 62: Audit dan evaluasi ti   7

Incident Scene Snapshot

• Record state of computer– Photos, State of computer, What is on the screen?– What is obviously running on the screen?• Xterm?• X-windows?

– Should you port scan the affected computer?• Pros: You can see all active and listening ports• Cons: It affects the computer and some backdoors log

how many connections come into them and could tip off the bad guy

Page 63: Audit dan evaluasi ti   7

Unplug Power from System?

• This method may be the most damaging to effective analysis though there are some benefits as well– Benefits include that you can now move the system to a

more secure location and that you can physically remove the hard drive from the system

– Cons… you lose evidence of all running processes and memory

Page 64: Audit dan evaluasi ti   7

Unplug from Network?

• Unplug from the network?– Unplug it from the network and plug the distant end into a

small hub that is not connected to anything else.– Most systems will write error messages into log files if not

on a network. – If you make the computer think it is still on a network, you

will succeed in limiting the amount of changes to that system.

Page 65: Audit dan evaluasi ti   7

Intrusion Detection

• Intrusion Detection is the process of monitoring computer networks and systems for violations of security.

• An Intrusion – any set of actions that attempt to compromise the integrity, confidentially or availability of a resource.

• All intrusion are defined relative to a security policy– Security policy defines what is permitted and what is

denied on a network/system– Unless you know what is and is not permitted, its pointless

to attempt to catch intrusion

Page 66: Audit dan evaluasi ti   7

Intrusion Detection Systems

• Goal– To detect intrusion real time and respond to it

• False positive– No intrusion but alarm– Too many make your life miserable

• False negative– Intruder not detected– System is compromised

Page 67: Audit dan evaluasi ti   7

Intrusion Detection - Detection Schemes

• Misuse Detection– The most common technique, where incoming/outgoing traffic is

compared against well-known 'signatures'. For example, a large number of failed TCP connections to a wide variety of ports indicate somebody is doing a TCP port scan

• Anomaly Detection– Uses statistical analysis to find changes from baseline behavior (such

as a sudden increase in traffic, CPU utilization, disk activity, user logons, file accesses, etc.). This technique is weaker than signature recognition, but has the benefit that can catch attacks for which no signature exists. Anomaly detection is mostly a theoretical at this point and is the topic of extensive research

Page 68: Audit dan evaluasi ti   7

Intrusion Detection - Detection • Misuse Detection

• Detect Known Attack Signatures• Advantage:

• Low False Positive Rate• Drawbacks:

• Only Known Attacks• Costs for Signature Management

• Anomaly Detection• Learn Normal Profiles from User and System Behavior• Detect Anomaly• Advantage

• Detect Unknown Attacks• Drawbacks

• Difficulty of Profiling• Profile can be controlled by intruders• High false positive rate