Office of the State Auditor: Holding State Government
Download
Report
Transcript Office of the State Auditor: Holding State Government
COLORADO’S
CYBERSECURITY
ASSESSMENT APPROACH
Matt Devlin, CISA, CISM
Deputy State Auditor
September 30, 2014
Overview
Colorado OSA and IT Audit Background
State of Colorado IT and InfoSec
Organizational Structures
OSA’s Cybersecurity Assessment Approach
General description of what we have done in the
past and what we are doing now
Prior VA / Pen Test Audit (Nov. 2010)
Current VA / Pen Test Audit (Dec. 2014 )
Not a detailed or technical “How To” on VA / pen
testing
2
Colorado OSA: Background Info
OSA is under the Legislative Branch
Reports to a nonpartisan Legislative Audit
Committee (LAC)
State Auditor is appointed to a 5 year term
3 Audit Divisions:
Financial, Performance, and IT
Approx. 70 auditors
Produce about 50 to 55 products/reports year
3
Colorado OSA: Organizational Chart
4
Colorado OSA: Statutory Authority
OSA has statutory authority to:
Conduct audits of all state departments and agencies (Sec. 2-3-
103, C.R.S)
“Access at all times…all of the books, accounts, reports,
vouchers, or other records or information in any department,
institution, or agency, including but not limited to records or
information required to be kept confidential or exempt from
public disclosure…” (Sec. 2-3-107(2), C.R.S.)
5
Colorado OSA: IT Audit Division
IT Audit Division:
Est. in February 2006 (8 yrs., 8 mos. young!)
4 IT Audit Staff, Mainly Senior-level Auditors
IT Audit Engagement Types:
1.
Financial Audit Support (Statewide Single Audit)
E.g., Fin. system ITGCs, SSAE 16 reviews, contractor audit
reviews
2.
Performance Audit Support
E.g., MMJ, Vocational Rehab, Health Exchange, etc.
3.
Standalone IT and InfoSec Audits (Technologies /
Systems / Processes / Projects / Org. Unit)
6
FY 2014 Allocation of Audit Staff
Performance Audits
47%
Financial Audits
36%
IT Audits
5%
Other Work Products and
Activities
5%
Local Government
Audit Reviews
7%
7
State of Colorado: IT Org. Structure
Executive Branch
Office of Information Technology (OIT)
Est. in 2008 through legislation (SB 08-155)
Consolidation of IT from a decentralized model
OIT sits under the Governor’s Office
Judicial Branch
Separate IT (i.e., ITS)
Legislative Branch
Separate IT (i.e., LIS)
8
State of Colorado: InfoSec Org. Structure
Executive and Judicial Branch
Office of Information Security (OIS)
Est. in 2006 through legislation (HB 06-1157)
Consolidation of InfoSec (from a decentralized
model?)
OIS sits under OIT (i.e., the Exec. Branch IT Unit)
Legislative Branch & Higher Ed. Institutions
Excluded from OIS oversight, but have info. sec.
reporting requirements
9
State of Colorado: IT & InfoSec Org Charts
10
CYBERSECURITY APPROACH:
THE 2010 PEN TEST AUDIT
Audit Objectives
Objective #1
To review the Governor’s Office of Cyber Security’s
progress in fulfilling the requirements of the
Colorado Cyber Security Program (Section 2437.5-401 through 406, C.R.S.)
12
Audit Objectives
Objective #2
To perform a “covert” penetration test of state
networks, applications, and information systems
Gain unauthorized access to state systems and data
Simulate hacking attempts
Test incident response
13
Audit Scope
14
VA vs. Pen Test
Vulnerability Assessment – assessment approach used to
identify system weaknesses or vulnerabilities.
Penetration Test – assessment approach used to gain
access to systems by exploiting or circumventing system
weaknesses or vulnerabilities.
Hacking vs Pen Test Difference
Get Permission!!!
Authorized by Governor’s Office,
State CISO, and other Dept. Mgt.
15
Audit Methodology
In-house & Contract Audit – OSA Partnered
with 2 Contractors specializing in VA/pen
testing
Nonrisk-Based Approach – Open to all state
networks, applications, and systems
Black Box – no advance information on
systems/networks/departments/agencies,
etc.
All attacks available; Nothing off limits!
16
Audit Methodology (cont.)
Tests performed included:
Network Scans (external /internal) – Ports and Services
Application/DB/OS Scans – Patch Levels,
Configuration Settings/Hardening Standards, Vendor
Defaults, Brute Force,
Website Security - Attacks to gain access to backend
apps and DBs
Social engineering – Spam, Impersonation
Physical-based attacks – gaining unauthorized access
to facilities and DCs
What did we find??
17
Office of Cyber Security
“Overall, the results of the Pen
Test demonstrate that the State
is at high risk of a system
compromise and/or data breach.”
18
Audit Results
Relating to Objective #1:
The Office of Cyber Security failed to successfully
implement the Colorado Cyber Security Program, as
required by statute.
Info Sec Program Governance & Org. Structure
Policy, procedures, and plans lacked definition, implementation, and
enforcement
InfoSec Operations & Controls
InfoSec processes and controls lacked definition, implementation, and
compliance
All findings and recommendations were agreed to (or
partially agreed to).
19
Audit Results (cont.)
Relating to Objective #2:
The State was at high risk of a system compromise and/or
data breach by malicious individuals, including individuals
both internal and external to the State.
Hundreds of vulnerabilities identified
Unnecessary and Insecure Ports, Services, and Utilities
Exposed Management Interfaces
Default and Easily Guessable Usernames and Passwords
Unsecured Web Applications
Lack of Internal Network Security Controls (e.g., network
segmentation, hardening and patching, use of insecure network
protocols, lack of IDS/IPS)
20
Audit Results (cont.)
Relating to Objective #2 (cont.):
Compromised or gained unauthorized access to:
Numerous State Networks and Systems
Lots of Sensitive and Confidential Information:
Usernames and passwords (belonging to state employees and others non-state
individuals)
state employee records
SSNs
income levels
birth dates
contact information—i.e., phone numbers and physical addresses.
A data breach of this magnitude would have cost the State between $7
and $15 million to remediate (based on national averages at the time).
All findings and recommendations were agreed to (or partially agreed
to).
21
Audit Results (cont.)
State of Colorado Penetration Test Results Risk Ranking by Network/System
Network/System Component Tested
Risk Ranking
External Network Testing
HIGH
Internal Network Testing
HIGH
Physical Security Testing
HIGH
Web Application Testing
HIGH
Social Engineering
HIGH
Modem Testing
LOW
Wireless Network Testing
LOW
Source: Office of the State Auditor penetration test results.
22
Audit Results (cont.)
Vulnerabilities by Severity
400
300
200
100
0
High
Medium
Low
Source: Colorado Office of the State Auditor.
Key Vulnerability Areas
28.66%
Web Apps
52.12%
5.48%
Web Server
Systems
Other
13.74%
Source: Colorado Office of the State Auditor.
23
Challenges
“First of It’s Kind” Audit
OSA Authority to Conduct Pen Test? -Not “specific”
Communication/Coordination
All Business Management (as well as IT/InfoSec Mgt.)
Very Complex IT Org, Systems, and Technologies
Took a lot to plan, execute, and report
Reporting
Public vs. Private Info
Diff. contractors partnering with OSA
24
Successes
Information Security Posture – Identified a Baseline!
Raised Information Security Awareness – within State Ops, the
Legislature, and Public
Increased OSA Authority – new statute was created to allow our office to
conduct ongoing VA’s, pen tests, and technical security assessments…
after consultation and in coordination with, but not requiring the
approval of, the CIO (Sec. 2-3-103(1.5) et al, C.R.S.)
25
CYBERSECURITY APPROACH:
CURRENT VA/PEN TEST AUDIT
(TO BE RELEASED DEC. 2014)
Audit Objectives
Objective #1: To conduct a vulnerability assessment,
penetration test, and technical information security
evaluation on state networks, applications, and
systems.
Objective #2: To gain an understanding of the root
cause of identified information system security
vulnerabilities.
27
Key Differences (vs. Prior Audit)
Scope Size & Complexity
Risk-based/Targeted (vs. Statewide/All-inclusive)
White/Grey Box (vs. Black Box)
Resulted in Fewer Networks, Systems, & Depts.
No InfoSec Program Review
Root Cause Analysis Focus
Shorter Timeline
One Contractor (vs. 2 Prior)
Simplified with 2 Entrance Meetings with IT/InfoSec Mgt. (vs. Business Mgt.)
Reporting
Simplify Communications & Processes
Reports to Match OSA Style
Communication With Management
Mar.-Dec. 2014 (vs. more than 12 mos.)
Public vs. Private Content
Evaluation vs. Audit – did not have to follow Yellow Book standards
28
Audit Scope
Left Scope and Schedule Open in RFP
The engaged contractor was required to work with us (OSA) to:
1.
2.
Define the networks, applications, and/or systems to be included in
the scope, , based on risk;
Develop the audit schedule (working backwards from our LAC date).
List of Scope Areas
External Network (89,614 IP addresses)
Internal Network (3, across diff. departments)
Firewalls (10, mix of external & internal)
Enterprise Apps (2, across diff. depts.)
Web Apps (5, across diff. depts.)
Social Engineering (spam email to all Executive and Judicial
Branch agencies)
29
Audit Results
TBD – Report to be released in December!!!
Generalization:
Lots of very similar findings as last time, indicating
slow progress in maturing the state’s info sec
program
30
Outcomes (Expected)
TBD…but we’re hoping to:
Issue Two Reports Again:
Management-level Report (Public )
Technical-level Report (Private)
Provide Transparency & Value
Identify System Vulnerabilities/Findings
Identify Root Causes
Raise Awareness of InfoSec Posture
Provide Accountability
Track Audit Findings & Recs
Annual Report on Recommendations not Fully Implemented
31
Challenges
New (and few) IT audit staff – 1 contract
monitor
Independence – Concern due to prior audit
deputy moving into the CISO role
New Contractor – Get up to speed!
Risk-based Scoping - Very complex IT organization
and systems:
Outdated technologies and systems
Redundant systems
New system developments
32
Challenges (cont.)
Lots of Staff Turnover/Reorgs.
Significant IT management turnover during the
review, including:
Secretary of Technology & State Chief Information
Officer (CIO)
Chief Technology Officer (CTO)
Chief Operating Officer (COO)
Chief Information Security Officer (CISO)
Chief Customer Officer
Director of HR
Director of Enterprise Applications
Communication/Coordination with appropriate
management and staff
33
Challenges (cont.)
Authority to conduct Pen Test Evaluations
2 separate but similar “Rules of Engagement” (for
Exec. And Judicial Branch agencies/systems
subject to our evaluation)
Obtaining access to systems for credential
testing
Despite statutory authority (to access all state
information and records)
34
Improvement Opportunities
Tie Current Results to Prior Results – to analyze
trends about whether InfoSec is improving over
time
Multi-year Plan – Continue risk-based coverage?
Simplify Further – smaller audits, dept.-specific
Incident Response Testing
Contractor Consistency – to improve efficiencies
in coordination of planning, fieldwork and
reporting
Develop In-house Expertise – perform VA/pen
tests using available tools and techniques
35
Questions?
Contact me:
[email protected]
303-869-2800
www.state.co.us/auditor
36