Access Control
Access Control: read-write execute rights
- Integrity: who may write, or execute?
Organizing access control
- Access control based on individuals
Access control based on groups
Acces control based on individuals
* But: hard to develop, implement and test access control policies
DAC: discretionary access control
leave protection to system operator
MAC: mandatory access control
under control of vendor: protect OS against malware from within
•e.g. Trusted platform modules (TPM): at each stage of booting, hash of previous stage is needed, to retrieve key for next stage; used in Windows Vista from 2006
Role-based Access Control (RBAC)
Confidentiality and thee security properties:
Integrity of Information
Availability
What is audit?
“Auditing is the systematic process of objectively obtaining and evaluating evidence regarding assertions about economic activities and events to ascertain the degree of correspondence between the assertions and established criteria, and communicate the results to interested users” (American Accounting Association, 1972).
“Audit is testing to a norm”
Audit (regulatory supervision): based on a paradox
What is internal control?
“Internal control is a process, effected by an entity’s board of directors, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories: (1) effectiveness and efficiency of operations, (2) reliability of financial reporting, and (3) compliance with applicable laws and regulations’’ (COSO 1992)
5 pillars of COSO
Designing Control Measures
Control measures: measures implemented to prevent, or else to detect and correct a control risk, i.e. an event that might result in not meeting objectives.
Segregation of Duties
Three kinds of IT audits:
Three lines of Defense
1st line of Defense: Management Controls & Internal Control Measures
2nd line of Defense: Financial Control & Security & Risk Management & Quality & Inspection & Compliance
3rd line of Defense: Internal Audit
1-3 have line to Senior Management
3 also has line to Governing Body / Board / Audit Committee
Three feedback loops
Criticism on COSO ERM
Conclusions