Project Report of DISA 3.0 Course: Network Security Audit of Remote Operation Including WFH
Project Report of DISA 3.0 Course: Network Security Audit of Remote Operation Including WFH
Of
DISA 3.0 Course
This is to certify that we have successfully completed the DISA 3.0 course training
conducted at DLH portal from 7 November 2020 to 29 November 2020 and we have the
required attendance. We are submitting the Project titled:-
We hereby confirm that we have adhered to the guidelines issued by DAAB, ICAI for the
project. We also certify that this project report is the original work of our group and each
one of us have actively participated and contributed in preparing this project. We have not
shared the project details or taken help in preparing project report from anyone except
members of our group.
Place: Delhi
Covering Letter
Details of Case Study/Project (Problem)
1 Introduction 6-7
2 Background 8
3 Auditee Environment 8
5 Documents reviewed 9
6 Logistics arrangements 10
8 References 13
10 Conclusion 17
Dear Sir,
In terms of our engagement letter dated November 10, 2020, VNY & Associates, Chartered
Accountants has carried out an independent security audit of Network at remote operations
of Jupiter Capital Services Ltd. This engagement was primarily focused on conducting audit
of Network security as to check the how much the network is secured for operations at
remote location including operations at Work from Home.
We have conducted the audit as per engagement letter. We tried to find out the root cause
of the problem & also given recommendation to the management to follow up. The
information contained herein and our report is confidential. It is intended only for the sole
use and information of the Company, and only in connection with the purpose for which
audit has been done. It is to be noted that any reproduction, copying or otherwise quoting
of this report or any part thereof, can be done only with our prior permission in writing.
In the following report, we have summarized the audit observations together with
recommendations in order to address the control weaknesses and associated risks.
Thanking You,
Yours Faithfully,
Chartered Accountants
1. Introduction
Jupiter Capital Services Ltd is one of the leading NBFC registered under RBI regulation as a
Systemically Important Non-Deposit Accepting Core Investment Company. It has offices in
every major city of the country.
Jupiter Capital Services Ltd provide different types of loan to the customers but major areas
are:-
Commercial loans
Housing loans
Vehicle loans
In addition to the above there are three Strategic Business Units (SBUs): -
Jupiter Capital Services Ltd has head office in Mumbai and 5 regional offices. As it as NBFC,
every business process should be secured at high level.
The Auditing firm of this assignment is VNY & Associates. The firm is established in 2015 and
having an experience of 5 years in the field of Auditing, Taxation, System Audit, etc.
Composing
Partners – 3
No. of employees: 15
No. of Articles: 20
Here in this case audit will be handles by a team leading by CA Vikash Sharma with 8
members including 2 paid employees and 6 articles.
The audit team for this particular assignment consist of the following qualified members
who are as follows:
VNY & Associates Chartered Accountants are one of the famous chartered accountants
firms in India and are engaged in providing Information System Auditing services across
India. We are also recognized as provider of information System Audit services and our core
competences are listed below:
3. Auditee Environment
Networking at remote operation in Jupiter Capital Services Ltd has posed unique
challenges arising out of the need to properly secure the networking at each device.
Each employee has been provided separate laptop for their working and they carry
the devices at client location and upload the data from there. Some of the
employees are working from home to save operational cost.
Company has already implemented the network security policy separately for the
devices used in remote location or employee working from their place.
Communication from the clients about their business insights relevant for loan
should be made through only secured networks as these type of information are
sensitive and needs to be protected.
To comply with relevant standards issued by the ICAI and globally accepted
standards for the purpose of Information System Audit and to establish an
Information Security Framework for assurance that all required aspects of
information security is covered.
5 Documents Reviewed
IT security policy for mobiles devices used on a network
Network Security Policy that lists the rights and responsibilities of all staff,
employees, and consultants.
Acceptable network usage policy.
Signed security agreement with network providers.
Contingency plan in case of network failure or security breach.
Documentation required:
User Manuals and Technical Manuals
Source code of the software
Rules, Regulations, guidelines and circulars issued for the company
Security policies of the company etc.
Network Security Policy that lists the rights and responsibilities of all staff,
employees, and consultants.
Acceptable network usage policy.
4. Audit Log Audit log policy is not consistent Consistent audit log policy should
across servers in terms of be applied across servers and logs
network logging, log file size and should be promptly backed up
retention period. Audit logs and manually cleared to obviate
configurations on all servers allow the need for overwriting.
overwriting on reaching of Wherever required, log size may
defined maximum log size. be suitably increased.
5. VPN Access New employees are getting VPN VPN adds extra layer of security
access but the Old employee by hiding IP addresses, encrypt
working at remote location the data and mask the location of
doesn’t provided VPN access and user. Ensure that all your remote
they are working using normal employees have access to the
public network VPN service. If necessary hold a
meeting or share tutorials on how
to use a VPN efficiently to protect
company network
6. Third party Employees are using Remote IT team should choose the RDS
remote access desktop service to hold meeting very wisely before begin any
without getting adjustment of exchange of information or
7. Multi factor Company doesn’t have multi IT team should set up multi factor
authentication factor authentication, only the authentication systems for each
login id is used to connect to employee who needs to log into
network. their company user profile
remotely. Combination of user ID
along with a one-time-password
(OTP) sent to the user’s personal
registered number.
Although the company has managed to secure their network but there are key areas
which we have identified that are related to authentication for connect to network,
employees are unaware about the security policy of the company, Disaster recovery
plans are not in place, use of third party RDS without consulting IT team, etc. We
have made recommendations regarding our findings which may become helpful to
the management.
There other findings as well which are also important to be solved as soon as
possible. There are guidelines in case of security breach; there are no proper
authorization controls in place for connecting the network, etc. Necessary
recommendations are provided by us to the management to overcome the findings
of us.