PART ONE: The Need for Compliance

CHAPTER 1: The Need for Information Systems Compliance

  • What Is the Difference Between Information System and Information Security Compliance?

    • Difference Between Information System and Information Security
    • Auditing Information Security
  • What Is the Confidentiality, Integrity, and Availability (CIA) Triad?

  • What Is Compliance?

  • Why Are Governance and Compliance Important?

    • Case Study: Cetera and Cambridge
  • What If an Organization Does Not Comply with Compliance Laws?

CHAPTER 2: Overview of U.S. Compliance Laws

  • Introduction to Regulatory Requirements

  • Regulatory Acts of Congress

  • Federal Information Security Management Act

  • Red Flag Rules

  • Cybersecurity Information Sharing Act

  • Sarbanes-Oxley Act

  • Gramm-Leach-Bliley Act

  • Health Insurance Portability and Accountability Act

  • Children’s Internet Protection Act

  • Children’s Online Privacy Protection Act

  • California Consumer Privacy Act

  • Payment Card Industry Data Security Standard (PCI DSS)

CHAPTER 3: What Is the Scope of an IT Compliance Audit?

  • What Must Your Organization Do to Be in Compliance?

  • Business View on Compliance

  • Protecting and Securing Privacy Data

  • Designing and Implementing Proper Security Controls

  • Choosing Between Automated, Manual, and Hybrid Controls

  • What Are You Auditing Within the IT Infrastructure?

  • User Domain

  • Workstation Domain

  • LAN Domain

  • LAN-to-WAN Domain

  • WAN Domain

  • Remote Access Domain

  • System/Application Domain

  • Maintaining IT Compliance

  • Conducting Periodic Security Assessments

  • Performing an Annual Security Compliance Audit

  • Defining Proper Security Controls

  • Creating an IT Security Policy Framework

  • Implementing Security Operations and Administration Management

  • Configuration and Change Management


PART TWO: Auditing for Compliance: Frameworks, Tools, and Techniques

CHAPTER 4: Auditing Standards and Frameworks

  • Difference Between Standards and Frameworks

  • Why Frameworks Are Important for Auditing

  • The Importance of Using Standards in Compliance Auditing

  • Institute of Internal Auditors

  • COBIT

  • Service Organization Control Reports

  • ISO/IEC Standards

  • ISO/IEC 27001 Standard

  • ISO/IEC 27002 Standard

  • NIST 800-53

  • Cybersecurity Framework

CHAPTER 5: Planning an IT Infrastructure Audit for Compliance

  • Defining the Scope, Objectives, Goals, and Frequency of an Audit

  • Identifying Critical Requirements for the Audit

  • Implementing Security Controls

  • Protecting Privacy Data

  • Assessing IT Security

  • Risk Management

  • Threat Versus Vulnerability Versus Risk

  • Vulnerability Analysis

  • Risk Assessment Analysis: Defining an Acceptable Security Baseline Definition

  • Obtaining Information, Documentation, and Resources

  • Existing IT Security Policy Framework Definition

  • Configuration Documentation for IT Infrastructure

  • Interviews with Key IT Support and Management

  • Personnel: Identifying and Planning

  • NIST Standards and Methodologies

  • Mapping the IT Security Policy Framework Definitions to the Seven Domains of a Typical IT Infrastructure

  • Identifying and Testing Monitoring Requirements

  • Identifying Critical Security Control Points That Must Be Verified Throughout the IT Infrastructure

  • Building a Project Plan

CHAPTER 6: Conducting an IT Infrastructure Audit for Compliance

  • Identifying the Minimum Acceptable Level of Risk and Appropriate Security Baseline Definitions

  • Preventive Security Control

  • Detective Security Control

  • Corrective Security Control

  • Organization-Wide

  • Seven Domains of a Typical IT Infrastructure

  • Business Liability Insurance

  • Controlling Risk

  • Gap Analysis for the Seven Domains

  • Identifying All Documented IT Security Policies, Standards, Procedures, and Guidelines

  • Conducting the Audit in a Layered Fashion

  • Performing a Security Assessment for the Entire IT Infrastructure and Individual Domains

  • Incorporating the Security Assessment into the Overall Audit Validating Compliance Process

  • Using Audit Tools to Organize Data Capture

  • Reviewing Configurations and Implementations

  • Using Automated Audit Reporting Tools and Methodologies

  • Auditing Change Management

  • Verifying and Validating Proper Configuration and the Implementation of Security Controls and Countermeasures

  • Identifying Common Problems When Conducting an IT Infrastructure Audit

  • Validating Security Operations and Administration Roles, Responsibilities, and Accountabilities Throughout the IT Infrastructure

  • Separation of Duties

CHAPTER 7: Writing the IT Infrastructure Audit Report

  • Anatomy of an Audit Report

  • Audit Report Ratings

  • Audit Report Opinion

  • Summary of Findings

  • IT Security Assessment Results: Risk, Threats, and Vulnerabilities

  • Controls and Frameworks

  • Reporting on Implementation of IT Security

  • Per Documented IT Security Policy Framework

  • Privacy Data

  • IT Security Controls and Countermeasure Gap Analysis

  • Compliance Requirement

  • Compliance Assessment Throughout the IT Infrastructure

  • Presenting Compliance Recommendations

CHAPTER 8: Compliance Within the User Domain

  • User Domain Business Drivers

  • Social Engineering

  • Human Mistakes

  • Insiders

  • Anatomy of a User Domain

  • Items Commonly Found in the User Domain

  • Protecting Privacy Data

  • Implementing Proper Security Controls for the User Domain

  • Separation of Duties

  • Least Privilege

  • System Administrators

  • Confidentiality Agreements

  • Employee Background Checks

  • Acknowledgment of Responsibilities and Accountabilities

  • Security Awareness and Training for New Employees

  • Information Systems Security Accountability

  • Organization’s Right to Monitor User Actions and Traffic

  • Incorporating Accountability into Annual Employee Performance Reviews

  • Best Practices for User Domain Compliance

CHAPTER 9: Compliance Within the Workstation Domain

  • Compliance Law Requirements and Business Drivers

  • Importance of Policies

  • Protecting Private Data

  • Management Systems

  • Implementing Proper Security Controls for the Workstation Domain

  • Devices and Components Commonly Found in the Workstation Domain

  • Uninterruptible Power Supplies

  • Desktop Computers

  • Laptops/Tablets/Smartphones

  • Local Printers

  • Wireless Access Points

  • Fixed Hard Disk Drives

  • Removable Storage Devices

  • Access Rights and Access Controls in the Workstation Domain

  • Maximizing C-I-A

  • Maximizing Availability

  • Maximizing Integrity

  • Maximizing Confidentiality

  • Workstation Vulnerability Management

  • Operating System Patch Management

  • Application Software Patch Management

  • Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines

  • Best Practices for Workstation Domain Compliance

CHAPTER 10: Compliance Within the LAN Domain

  • LAN Domain Business Drivers

  • Data Leakage Protection

  • Encryption of Mobile Devices

  • Implementing Proper Security Controls for the LAN Domain

  • Devices and Components Commonly Found in the LAN Domain

  • Connection Media

  • Common Network Server and Service Devices

  • Networking Services Software

  • LAN Traffic and Performance Monitoring and Analysis

  • LAN Configuration and Change Management

  • LAN Domain Policies

  • Control Standards

  • Baseline Standards

  • Guidelines

  • LAN Management, Tools, and Systems

  • Maximizing C-I-A

  • Maximizing Confidentiality

  • Maximizing Integrity

  • Maximizing Availability

  • Patch Management

  • Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines

  • Best Practices for LAN Domain Compliance

CHAPTER 11: Compliance Within the LAN-to-WAN Domain

  • Compliance Law Requirements and Protecting Data Privacy

  • Implementing Proper Security Controls for the LAN-to-WAN Domain

  • Devices and Components Commonly Found in the LAN-to-WAN Domain

  • Routers

  • Firewalls

  • Proxy Servers

  • DMZ

  • Virtual Private Network Concentrator

  • Network Address Translation (NAT)

  • Internet Service Provider Connections and Backup Connections

  • Cloud Services

  • Intrusion Detection Systems/Intrusion Prevention Systems

  • Data Loss/Leak Security Appliances

  • Web Content Filtering Devices

  • Traffic-Monitoring Devices

  • LAN-to-WAN Traffic and Performance Monitoring and Analysis

  • LAN-to-WAN Configuration and Change Management

  • LAN-to-WAN Management, Tools, and Systems

  • FCAPS

  • Network-Management Tools

  • Access Rights and Access Controls in the LAN-to-WAN Domain

  • Maximizing C-I-A

  • Minimizing Single Points of Failure

  • Dual-Homed ISP Connections

  • Redundant Routers and Firewalls

  • Web Server Data and Hard Drive Backup and Recovery

  • Use of VPN for Remote Access to Organizational Systems and Data

  • Penetration Testing and Validating LAN-to-WAN Configuration

  • External Attacks

  • Internal Attacks

  • Intrusive Versus Nonintrusive Testing

  • Configuration Management Verification

  • Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines

  • Best Practices for LAN-to-WAN Domain Compliance

CHAPTER 12: Compliance Within the WAN Domain

  • Compliance Law Requirements and Business Drivers

  • Protecting Data Privacy

  • SD-WAN

  • Implementing Proper Security Controls for the WAN Domain

  • Devices and Components Commonly Found in the WAN Domain

  • WAN Service Providers

  • Dedicated Lines/Circuits

  • WAN Layer 2/Layer 3 Switches

  • MPLS/VPN WAN or Metro Ethernet

  • WAN Backup and Redundant Links

  • WAN Traffic and Performance Monitoring and Analysis

  • WAN Configuration and Change Management

  • WAN Management Tools and Systems

  • Incident Response Management Tools

  • Access Rights and Access Controls in the WAN Domain

  • Maximizing C-I-A

  • WAN Service Availability SLAs

  • WAN Traffic Encryption/VPNs

  • WAN Service Provider SOC Compliance

  • Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines

  • Best Practices for WAN Domain Compliance

CHAPTER 13: Compliance Within the Remote Access Domain

  • Remote Access Business Drivers

  • Protecting Data Privacy

  • Implementing Proper Security Controls for the Remote Access Domain

  • Devices and Components Commonly Found in the Remote Access Domain

  • Remote Users

  • Remote Workstations or Laptops

  • Remote Access Controls and Tools

  • Authentication Servers

  • ISP WAN Connections

  • Remote Access and VPN Tunnel Monitoring

  • Remote Access Traffic and Performance Monitoring and Analysis

  • Remote Access Configuration and Change Management

  • Remote Access Management, Tools, and Systems

  • Access Rights and Access Controls in the Remote Access Domain

  • Remote Access Domain Configuration Validation

  • VPN Client Definition and Access Controls

  • TLS VPN Remote Access via a Web Browser

  • VPN Configuration Management Verification

  • Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines

  • Best Practices for Remote Access Domain Compliance

CHAPTER 14: Compliance Within the System/Application Domain

  • Compliance Law Requirements and Business Drivers

  • Application Software Versus System Software

  • Protecting Data Privacy

  • Implementing Proper Security Controls for the System/Application Domain

  • Software Development Life Cycle (SDLC)

  • Devices and Components Commonly Found in the System/Application Domain

  • Computer Room/Data Center

  • Redundant Computer Room/Data Center

  • Uninterruptible Power Supplies and Diesel Generators to Maintain Operations

  • Mainframe Computers

  • Minicomputers

  • Server Computers

  • Data Storage Devices

  • Applications

  • Source Code

  • Databases and Privacy Data

  • Secure Coding

  • System and Application Configuration and Change Management

  • System and Application Management, Tools, and Systems

  • Access Rights and Access Controls in the System/Application Domain

  • System Account and Service Accounts

  • Maximizing C-I-A

  • Access Controls

  • Database and Drive Encryption

  • System/Application Server Vulnerability Management

  • Operating System Patch Management

  • Application Software Patch Management

  • Data Loss Protection

  • Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines

  • Best Practices for System/Application Domain Compliance


PART THREE: Beyond Audits

CHAPTER 15: Ethics, Education, and Certification for IT Auditors

  • Professional Associations and Certifications

  • Professional Ethics, Code of Conduct, and Integrity of IT Auditors

  • Ethical Independence

  • Codes of Conduct for Employees and IT Auditors

  • Employer-/Organization-Driven Codes of Conduct

  • Employee Handbook and Employment Policies

  • Certification and Accreditation for Information Security

  • Certification and Accreditation for Auditors

  • IIA