IT Security Access Report
IT Security Access Report
on
IT Security Access
January 2010
Contents
Background ............................................................................................................ 3
Introduction ..................................................................................................... 3
IT Security Architecture,Diagram 1................................................................ 4
Terms used....................................................................................................... 5
Providing assurance........................................................................................ 6
Conclusion.......................................................................................................... . 15
Overview ...................................................................................................... 15
Conclusion..................................................................................................... 15
Management Response......................................................................................... 16
Appendix A - Internal Control Criteria......................................................... 17
Page 2 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Background
Introduction
An assessment of the framework under which OSFIs IT security infrastructure & related
applications/systems and controlled/restricted access to OSFIs electronic information (IT Security
Access) is provided and the degree to which the framework is being applied was approved by the Audit
Committee and the Superintendent for inclusion in OSFIs 2009-10 Internal Audit Plan.
In preparing the audit plan, we reviewed security policy, guidance and practices with an emphasis on
access to and protection of electronic information and related practices, measures and tools 1 . As well,
we met with the Assistant Superintendent, Corporate Services, and the Directors of Security and of
Infrastructure Technology Services, Information Management/Information Technology (IM/IT)
division.
OSFI has a comprehensive IT security architecture as illustrated in Diagram 1- IT Security
Architecture providing restricted access to OSFIs electronic information on a need-to know basis.
The IT security architecture has two distinct security zones: Public, Corporate Network, Recovery
Cold Site and Offsite Tape Storage.
The Public Zone is outside OSFIs Corporate Network services. Through the Internet, employees 2 gain
access to OSFIs network using laptops, blackberries and PCs. Public Zone services include access to
OSFIs public website and related databases, and remote access to electronic filing, external e-mail
and Corporate Network services.
Security measures employed include two factor authentication (smart card), firewalls, intrusion
detection prevention, dynamic monitoring and Virtual Private Network devices (VPN services use
specialized hardware to build a private network capability over existing public network lines). VPN
devices allow for a secure connection between two IT environments - workstation to server or server
to server - by encrypting all traffic (data) over that connection.
The Corporate Network Zone has two domains, one each for production and development. Employees
in OSFIs offices gain access to Corporate Network services through LAN and WAN encrypted lines.
Security measures employed include two factor authentication (smart card), Virtual Private Network
(VPN) devices, firewalls, certification authority and controller user profiles, other administrative
practices, and security event monitoring.
1
TBS Operational Security Standard: Management of Information Technology Security (MITS); TBS Policy on
Government Security (PGS); Control Objectives for Information and related Technology (COBIT)
2
Including security cleared non-employees
Page 3 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Page 4 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Terms used
AEG Advisory & Evaluation Group, part of IM/IT change management process
CMP Change Management Process, IM/IT process for managing user requests for change.
The CMP includes the CAB and AEG groups
CAB Change Advisory Board, part of IM/IT change management process
CIO Chief Information Officer, IM/IT
COBIT Control Objectives for Information and related Technology (IT governance and
management control framework)
COSO Committee Of Sponsoring Organizations of Treadway Commission framework
(control framework)
PGS TBS Policy on Government Security
IM/IT Information Management/Information Technology division
IT based assets Business applications, IT infrastructure and related hardware & software, personal
IT devices such as Blackberries, etc. Also, refer to Diagram 1, page 4
IT security SafeNet (smart card) security measure, the IT security architecture design, etc. Also,
based assets refer to Diagram 2, page 9
ITIL Information Technology Infrastructure Library, UK (de facto standards, best
practices for IT service management)
ITS Infrastructure Technology Services, the IT operations group in IM/IT
LAN Local Area Network
MITS TBS Operational Security Standard: Management of Information Technology
Security
PMG Project Management Group, the systems development group in IM/IT
RACI A roles and Responsibilities model: Responsible for task, Accountable, Consulted
& Informed persons
SafeNet Smart card technology/software to provides restricted access to PCs and electronic
information through a specific and controlled User identification and password
IT Security Security and ITS policy, guidance, processes / activities and measures / tools
Access associated with access to and protection of OSFIs electronic information.
Framework
SSU Security Services Unit, the security group in OSFI
TRA Threat and Risk Assessment
Users Supervision, Regulation and Corporate Services Sectors, Pensions Division and
(Applications) Office of the Actuary (applications)
VPN Virtual Private Network
WAN Wide Area Network
Page 5 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Providing assurance
In order to manage its work in a complex and rapidly changing environment, OSFI develops and puts
in place specialized policies, guidance and processes. In general, these are called internal control
frameworks. These frameworks provide assurance to the Superintendent and senior management that
the nature and scope of work required to carry out OSFIs mandate is well defined and that consistency
and quality of the work is maintained.
Such management frameworks and their application are essential to the Superintendent and the Audit
Committee to enable them to fulfil their responsibilities under the Treasury Board Policy for Internal
Audit regarding OSFIs governance, risk and control processes. Under the Policy, Audit & Consulting
Services is to conduct assurance audits of OSFIs operations and supporting corporate services
reporting on how well they are designed (internal control framework design) and how they are
working (the application of the frameworks in meeting business objectives).
Audit objectives
The objectives are:
To provide an assessment of the internal control framework (IT Security Access) under which
OSFIs security and IT security infrastructure provides restricted access to and protection of its
electronic information
To provide an assessment on how well and the degree to which the smart card (SafeNet) security
measure is being applied
Identify potential areas for improvement, as appropriate
Audit scope
The audit covers the IT Security Access internal control framework (Security and ITS policies,
guidance, processes and practices associated with restricted access to and protection of OSFIs
electronic information) for the 2009-10 fiscal period as at December 2009 as well as any
improvements underway in the 3rd Quarter 2009-10 and planned looking forward. The work will
include testing use of the SafeNet security measure, during the period from 1st Qtr to end of 2nd Qtr
ending September 2009.
Matters outside of the scope of this review are:
An assessment of the degree to which IT security access measures are applied in the Office, except
for a walkthrough of existing and planned structures, activities, processes and tools associated with
IT security access and detailed testing of network security as noted above.
A review of OSFIs infrastructure technology architecture except as it is related to the IT security
architecture
A review of application/system development practices except as they are related to administration
of IT security restricted access to the development environment.
A review of non-IT safeguards such as premises and facilities, information classification, and
employee and contractor security screening
Page 6 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Audit approach
The audit was conducted according to the Institute of Internal Auditors International Standards for the
Professional Practice of Internal Auditing, consistent with the Treasury Board Policy on Internal
Audit. The audit was conducted to provide high assurance on the audit findings, analysis, and
observations, and recommendations.
The IT security access audit work included:
A review and walkthrough of existing, underway and planned structures, activities, processes and
measures/tools as they are related to the design of the IT security access internal control
framework including security monitoring, analysis, assessment and reporting including outsourced
network perimeter monitoring and incident response
A review and walkthrough of the IT security architecture and related structures, activities,
processes and measures/tools
A review and a walkthrough of existing, underway and planned structures, activities, processes and
measures/tools as they are related to use of SafeNet across the Office and testing of employees use
of SafeNet in carrying out their work. A representative sample of 20 to 40 business and IT users
will be selected for reviewing the use of SafeNet
Interviews with Security Services Unit and ITS management and staff as well as a selection of
business and IT user of OSFIs IT services.
An identification and application of comparable practices and methodologies associated with IT
security access to and protection of electronic information including MITS, PGS, ITIL, Project
Management Institute - Project Management Book of Knowledge, and information and
assessments available through leading associations such as ISACA
3
These criteria are drawn from and aligned with the control frameworks: COSO (COmmittee of Sponsoring
Organizations of Treadway Commission, MITS (TBS Operational Security Standard: Management of
Information Technology Security), and COBIT (Control OBjectives for Information and related Technology).
Page 7 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Overview Our audit covered the IT Security Access internal control framework as at
December 2009 and improvements implemented and underway in the 3rd Quarter
2009-10 and forward, and a review of the application the SafeNet smart card
security measure (restricted access to IT information) for the period from April
2009 to the end of September 2009.
The audit work was conducted on a collaborative basis as security and IT
improvements were implemented and underway while conducting the audit work.
There were ongoing discussions with the Director of Security Services and
Director of Infrastructure Technology Services, IM/IT and key staff maintaining
and providing security and IT security services.
We observed and examined all components of the IT Security Access internal
control framework. We found that OSFI has a robust IT security architecture,
Diagram 1 - IT Security Architecture. To follow the audit observations,
assessment and recommendations refer to Diagram 2 IT Security Management
that illustrates the interaction of the Security Services Group with key groups in
the Office as well as the frameworks/activities involved in managing IT security.
As appropriate, we recognized the number of improvements implemented and
undertaken during our audit. These actions will require a focused co-ordinated
effort between Security Services Unit and IM/IT, business and functional
managers and management.
Although we found key components of an effective internal control framework,
we identified other areas where key improvements in the internal control
framework for IT security are needed Our comments and recommendations focus
on:
Formalizing and strengthening IT security policies and procedures into an
overarching IT security program
Establishing a security risk management process at an operational level
Strengthening the IT security procedural framework between Security
Services Unit, and Infrastructure Technology Services and other IM/IT
groups
Page 8 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Page 9 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Page 10 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Risk and risk tolerance OSFIs Enterprise Risk Management policy and processes are used for the identification,
is consistent with the assessment and mitigation of potential risk at the Sector and Group levels. At the
ERM practices Corporate Services Sector level security and IT security risks are identified, evaluated,
Determination of IT and, as appropriate, incorporated into ERM action plans.
security requirements
Security related risks are incorporated into OSFIs ERM risk assessments. There is not a
are based on the
specific security risk management process for the identification, assessment, mitigation
assessment of the IT
and management of operational security and IT security risks. A security risk
environment
management process, shaped by PGS and MITS and aligned with ERM, is essential so
IT security risks are
that security requirements and potential IT risks are identified, assessed and reported on a
identified, assessed and
consolidated basis to ERM and management. Such a risk management process would be
mitigation controls are
aligned with key IM/IT functions and processes such as portfolio management, system
implemented
development, IT operations, application / system release, and incident and version/ patch
update management.
Recommendation SSU conducts regular IT security risk assessments (vulnerability assessments, threat/risk
Establish a security risk assessments) as well as independent IT security threat and risk Assessments (TRAs) with
management process at reporting to management on key issues and concerns. The results of such assessments are
an operational level that assessed in respect of the impact on OSFI and actions/recommendations are proposed.
incorporates IT security Actions are prioritized and resources are identified. In addition, ITS conducts ongoing
requirements, monitoring of the external and internal environments, and performs daily vulnerability
identification & and risk assessments. The process for sharing the results of these assessments should be
assessment of IT security formalized.
risk, security risk SSU makes queries of and does follow up on SSU assessments and ITS IT operations risk
management and assessments such as potential denial of service and penetration attacks. There is not a
reporting consistent with process for inventorying, tracking and reporting to determine whether these security
ERM practices issues/concerns have been addressed. Such a process for follow up on IT security
assessments/recommendations is essential to maintaining OSFIs IT security environment.
According to recent IT security assessments, external risks are controlled by stringent
perimeter controls. However, internal IT security monitoring processes are less robust.
There are informal processes and inconsistent practices related to version/security patch,
vulnerability and incident management. ITS has begun the process of implementing
security patches at the IT operating system level.
Along with our recommendation that OSFI formalize and strengthen IT security policies
and procedures into an overarching security program under Governance and
Accountability section, we recommend that SSU establish an operational security risk
management process to shape IT risk management and underlying security and IT
security policy and measures as key input into an IT security program. The security risk
management process would provide valuable information and assessments of IT security
risk for input in setting overall OSFIs risk tolerance, design of OSFIs IT security
environment, and design of business applications security policy and measures.
Page 11 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Control Processes
Security planning & The TBS Management of IT Security standard (MITS) specifically asks departments and
resources incorporate agencies to adopt an active defence strategy that includes prevention, detection, response
IT security and recovery. An OSFI security protection program exists along with a robust IT security
requirements architecture, Diagram 1 - IT Security Architecture. The IT security architecture provides
Establish a security for restricted access to electronic information through security measures including two
protection program factor authentication to OSFIs internal IT environment (corporate network), encrypted
that includes IT virtual private network communications, firewalls, certification authority and access
security measures privileges, as well as full laptop and PC data encryption. Active monitoring of IT risks
There is incident and safeguards are in place. IT staff have two access accounts, a user account for normal
management administrative tasks and a separate supervisory / administrative account reserved for
System development & operational tasks.
change management
OSFI has in place many of the components of a security procedural framework. However,
incorporates IT
they are informal, limited in scope, and the work of SSU and ITS is not well integrated in
security requirements
forming an IT security posture. For example, although the network is monitored by IT
Continuity / recovery
staff, security information, issues and assessments are provided to SSU on an ad hoc
planning includes IT
basis. Based on RACI, the groups are putting in place operational policy, guidance and
security requirements
underlying processes that designate IT security roles and responsibilities between the two
groups. IT security assessment criteria and a process for bringing IT security issues and
assessments to SSUs attention are under development in the spirit of the two groups
Recommendation
working side by side.
Strengthen the IT security
procedural framework to An anticipated new TBS policy on security planning focuses on pulling all components of
incorporate procedures security (including IT security) into an overall security plan as input to corporate planning
for incident management, and resource identification. Such a plan would include policy, security requirements,
version / patch updates, guidance, administrative and IT support, and employee awareness and technical training
technology certification for both overall security and its component, IT security. It will be necessary to integrate
and accreditation & security plans into business & IT plans, and operations and supporting functions.
continuity / recovery Establishing a security risk management process (refer to Risk Management section of the
planning, and related observations) and developing a security procedural framework are essential in enabling
security and resource such a planning effort. As a member of the TBS development group, SSU has early
planning knowledge of these requirements and is, therefore, well positioned to design and
implement the new planning policy. OSFI plans to implement the new policy during
2010-11.
A key component of putting in place a security management program, as outlined in
Governance & Accountability, is knowing who owns and is responsible for IT based
assets (business applications, IT infrastructure, personal IT devices such as Blackberries,
etc.). As only about half of the business applications have a designated owner it is
difficult to know if security policy and measures meet the business needs, and whether
there is the right balance between IT risk and business needs. Lack of owner participation
in security policy, IT risk tolerance, and the selection of security measures could have an
impact on the design of their business applications and whether the measures are user
friendly.
Under the RACI initiative, SSU is now the designated owner of OSFIs IT security based
Page 12 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Page 13 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Page 14 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Conclusion
Overview
Our audit covered the IT Security Access internal control framework as at December 2009 and
improvements implemented and underway in the 3rd Quarter 2009-10 and forward, and a review of the
application the SafeNet smart card security measure (restricted access to OSFI IT information) for the period
from April 2009 to the end of September 2009.
The audit work was conducted on a collaborative basis involving information gathering and assessments,
interviews with Security Services Unit and Infrastructure Technology Services, IM/IT, management and
staff, and the use of SafeNet across the Office. We found that OSFI has a robust IT security architecture,
Diagram 1 - IT Security Architecture. We also observed a commitment to establishing a comprehensive IT
security access internal control framework on a consolidated collaborative basis
Conclusion
Our audit conclusion based on our assessment of the IT Security Access internal control
framework is that:
Many components of the internal control framework are in place. There are key areas
where improvements are required. The Office has undertaken initiatives and steps in
establishing a comprehensive IT security access internal control framework. We
recognize the effort undertaken in this regard.
Our audit team wishes to recognize the excellent exchange of views and support received
throughout this audit.
_____________________________ _______________________________
Senior Director, Date
Audit & Consulting Services
Page 15 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Management Response
Both SSU and ITS view the audit as a positive contribution to our mandates. We thank the audit team for
both their collaborative approach and depth of review. We are in full agreement with the findings. They
reflect an unbiased indication of the progress we have made so far and paint an accurate picture what is left
to accomplish. While there are solid core IT Security components in place, management recognizes that
improvements in the IT Security Access internal control framework are necessary.
As set out in the report, OSFI has a comprehensive IT security architecture, as indicated in Diagram 1- IT
Security Architecture, providing restricted access to OSFIs electronic information through security
measures such as two factor authentication (i.e. SafeNet Smart Card), and communications, full laptop and
PC data encryption. Independent threat and risk assessments, ongoing monitoring of OSFIs IT environment
and daily vulnerability and risk assessments confirm that this is the case. Management is of the view that in
light of the foregoing and the fact that, to date, no unauthorized access to OSFI electronic information has
been brought to our attention, OSFI has a good IT security foundation in place.
We also note that the report recommendations highlight challenges ahead in further strengthening OSFIs IT
Security Access internal control framework. A number of initiatives have already been undertaken to
address these challenges and others are now underway such as establishing a working group to further
developing the RACI matrix and building on the existing elements of the internal control framework
We are committed to a balanced approach of strengthening the security program at OSFI within an
acceptable level of risk, so that it can be held up as a model of efficiency and effectiveness to other federal
organizations. All recommendations are to be addressed during the 14 months from now through to the end
of the 2010-2011 fiscal year.
Page 16 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Control Processes Office-wide security planning and resources incorporate the requirements for
providing security access to and protection of electronic information
There is a security protection program that includes monitoring of and supporting for
security measures/tools such as smartcard, firewall, encryption, application security,
and virus and malicious code protection, self-assessments and independent security
audits/checks, access control and physical security measures
There is incident management for detecting and managing IT security incidents that
access, modify, disrupt or circumvent security measures
Security requirements are incorporated into system development and over the life
cycle of the application/system or service
Continuity/ Recovery planning and plans incorporate the requirements for providing
security access to and protection of electronic information
Page 17 of 18
Office of the Superintendent of Financial Institutions Canada
A&CS Audit & Consulting Services A&CS
IT Security Access
Page 18 of 18