Ecommerce Security Public Key Infrastructure Symmetrical (Private) Key Encryption
Ecommerce Security Public Key Infrastructure Symmetrical (Private) Key Encryption
eCommerce Security
Public Key Infrastructure
Symmetrical (Private) Key Encryption
AUDIT PROGRAM
&
INTERNAL CONTROL QUESTIONNAIRE
The Information Systems Audit and Control Association & Foundation
With more than 23,000 members in over 100 countries, the Information Systems Audit and Control Association® (ISACA™) is a
recognized global leader in IT governance, control and assurance. Founded in 1969, ISACA sponsors international conferences,
administers the globally respected CISA® (Certified Information Systems Auditor™) designation earned by more than 25,000
professionals worldwide, and develops globally applicable information systems (IS) auditing and control standards. An affiliated
foundation undertakes the leading-edge research in support of the profession. The IT Governance Institute, established by the
association and foundation in 1998, is designed to be a "think tank" offering presentations at both ISACA and non-ISACA
conferences, publications and electronic resources for greater understanding of the roles and relationship between IT and enterprise
governance.
Disclaimer
The topics developed for these Audit Programs and Internal Control Questionnaires have been prepared for the
professional development of ISACA members and others in the IS Audit and Control community. Although we
trust that they will be useful for that purpose, ISACA cannot warrant that the use of this material would be
adequate to discharge the legal or professional liability of members in the conduct of their practices.
September 2001
1
Audit Program
Public Key Infrastructure—Technical Reference Guide
Symmetrical (Private) Key Encryption
Introduction
One of the primary building blocks for security in e-commerce is cryptography, the
theoretical basis for encryption. A given cryptographic technique may be based on either
private keys or public/secret key pairs. Public key infrastructure (PKI) rests atop
encryption and in turn supports e-commerce. Cryptography is the provider of security
and protection of data in public networks and PKI provides trust. The encryption needed
for secure communications among a small number of endpoints or nodes is different from
that needed for communication among a large number of unknown, anonymous nodes.
This program specifically addresses the small group of endpoints and the management
around the processes for control over private key (symmetrical) encryption.
Audit Objectives
Within both the audit program and the internal control questionnaire, the primary C OBIT
control objectives have been listed for reference purposes.
2
DS5.16 – Trusted Path
DS5.21 – Protection of Electronic Value
DS11 – Manage Data
DS11.17 – Protection of Sensitive Information During Transmission and
Transport
DS11.27 – Protection of Sensitive Messages
DS11.29 – Electronic Transaction Integrity
M1 – Monitor the Process
Functional Objectives
1. Assure proper administration and applicable infrastructure controls exist around the
selection, implementation, maintenance and usage of private key encryption.
2. Key management, including generation, maintenance, distribution and expiration, is
appropriately controlled.
3. Evaluation of the selection of private key alternative methods take into consideration
organizational position on need for security as it relates to the assets (data and/or
information) as well as cost benefit.
Obtain: PO2
-Organization chart PO3
-Information architecture model for PO6
the organization PO8
-Data classification policy
-Network infrastructure documentation
-Inventory of operating systems,
applications, and operating systems
impacting classified data
-Specifications of encryption tool(s)
-Understanding of external
requirements (consider international
encryption laws)
3
Completed Auto. COBIT
Test Results, Remarks,
Audit Step By/Date
W/P Ref.
Tool Reference
Planning
Acquisition, Implementation,
4
Completed Auto. COBIT
Test Results, Remarks,
Audit Step By/Date
W/P Ref.
Tool Reference
Maintenance of Encryption
Key Management
Miscellaneous
5
Completed Auto. COBIT
Test Results, Remarks,
Audit Step By/Date
W/P Ref.
Tool Reference
6
Internal Control Questionnaire
Symmetrical (Private) Key Encryption
Response
Question No. Question Description
YES NO N/A
General
7
Response
Question No. Question Description
YES NO N/A
infrastructure support the e-
commerce
plan?
Does the current software PO2
infrastructure support the e-
commerce data requirements?
If the current infrastructure does not PO3
support the e-commerce plan, are
there sufficient hardware and
software planning initiatives that will
provide the appropriate support to
obtain the necessary tools and will
not present unacceptable risk?
Planning
8
Response
Question No. Question Description
YES NO N/A
Do infrastructure programs AI6
(encryption) follow established DS5
change control procedures?
Are encryption practices compliant PO8
with all applicable regulatory DS5
entities?
Key Management