0% found this document useful (0 votes)
38 views9 pages

Ecommerce Security Public Key Infrastructure Symmetrical (Private) Key Encryption

Uploaded by

Fares Salman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views9 pages

Ecommerce Security Public Key Infrastructure Symmetrical (Private) Key Encryption

Uploaded by

Fares Salman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 9

The Information Systems Audit and

Control Association & Foundation


www.isaca.org

eCommerce Security
Public Key Infrastructure
Symmetrical (Private) Key Encryption
AUDIT PROGRAM
&
INTERNAL CONTROL QUESTIONNAIRE
The Information Systems Audit and Control Association & Foundation
With more than 23,000 members in over 100 countries, the Information Systems Audit and Control Association® (ISACA™) is a
recognized global leader in IT governance, control and assurance. Founded in 1969, ISACA sponsors international conferences,
administers the globally respected CISA® (Certified Information Systems Auditor™) designation earned by more than 25,000
professionals worldwide, and develops globally applicable information systems (IS) auditing and control standards. An affiliated
foundation undertakes the leading-edge research in support of the profession. The IT Governance Institute, established by the
association and foundation in 1998, is designed to be a "think tank" offering presentations at both ISACA and non-ISACA
conferences, publications and electronic resources for greater understanding of the roles and relationship between IT and enterprise
governance.

Purpose of These Audit Programs and Internal Control Questionnaires


One of the goals of ISACA’s Education Board is to ensure that educational products developed by ISACA support member and
industry information needs. Responding to member requests for useful audit programs, the Education Board has recently released
audit programs and internal control questionnaires on various topics for member use through the member-only web site and K-NET.
These products are intended to provide a basis for audit work.
E-business audit programs and internal control questionnaires were developed from material recently released in ISACA’s e-
Commerce Security Technical Reference Series. These technical reference guides were developed by Deloitte & Touche and ISACA’s
Research Board and are recommended for use with these audit programs and internal control questionnaires.
Audit programs and internal questionnaires on other subjects were developed by ISACA volunteers and reviewed and edited by the
Education Board. The Education Board cautions users not to consider these audit programs and internal control questionnaires to be
all-inclusive or applicable to all organizations. They should be used as a starting point to build upon based on an organization’s
constraints, policies, practices and operational environment.

Control Objectives for Information and related Technology (COBIT®)


COBIT has been developed as a generally applicable and accepted standard for good Information Technology (IT) security and control
practices that provides a reference framework for management, users, and IS audit, control and security practitioners.
This program has been developed and reviewed using COBIT Third Edition as a model. Audit objectives and steps are included.

Disclaimer
The topics developed for these Audit Programs and Internal Control Questionnaires have been prepared for the
professional development of ISACA members and others in the IS Audit and Control community. Although we
trust that they will be useful for that purpose, ISACA cannot warrant that the use of this material would be
adequate to discharge the legal or professional liability of members in the conduct of their practices.

September 2001
1
Audit Program
Public Key Infrastructure—Technical Reference Guide
Symmetrical (Private) Key Encryption

Introduction

This document is offered as a supplement to the e-commerce technical reference guide:


E-commerce—Public Key Infrastructure (Good Practices for Secure Communications).

One of the primary building blocks for security in e-commerce is cryptography, the
theoretical basis for encryption. A given cryptographic technique may be based on either
private keys or public/secret key pairs. Public key infrastructure (PKI) rests atop
encryption and in turn supports e-commerce. Cryptography is the provider of security
and protection of data in public networks and PKI provides trust. The encryption needed
for secure communications among a small number of endpoints or nodes is different from
that needed for communication among a large number of unknown, anonymous nodes.
This program specifically addresses the small group of endpoints and the management
around the processes for control over private key (symmetrical) encryption.

Audit Objectives

Referenced Control Objectives for Information and related Technology


(COBIT) Control Objectives (If there is a sub-objective listed, it means that special
emphasis should be noted. All sub-objectives within each referenced objective should be
considered and related procedures performed where applicable.)

Within both the audit program and the internal control questionnaire, the primary C OBIT
control objectives have been listed for reference purposes.

PO2 – Define the Information Architecture


PO2.3 – Data Classification Scheme
PO2.4 – Security Levels
PO3 – Determine Technological Direction
PO 3.5 – Technology Standards
PO4 – Define the Information Technology Organization and Relationships
PO6 – Communicate Management Aims and Directions
PO6.8 – Security and Internal Control Framework Policy
PO8 – Ensure Compliance with External Requirements
PO9 – Assess Risks
AI1 – Identify Automated Solutions
AI3 – Acquire and Maintain Technology Infrastructure
AI3.3 – System Software Security
AI3.6 – System Software Change Controls
DS5 – Ensure Systems Security
DS5.1 – Manage Security Measures
DS5.8 – Data Classification

2
DS5.16 – Trusted Path
DS5.21 – Protection of Electronic Value
DS11 – Manage Data
DS11.17 – Protection of Sensitive Information During Transmission and
Transport
DS11.27 – Protection of Sensitive Messages
DS11.29 – Electronic Transaction Integrity
M1 – Monitor the Process

Functional Objectives

1. Assure proper administration and applicable infrastructure controls exist around the
selection, implementation, maintenance and usage of private key encryption.
2. Key management, including generation, maintenance, distribution and expiration, is
appropriately controlled.
3. Evaluation of the selection of private key alternative methods take into consideration
organizational position on need for security as it relates to the assets (data and/or
information) as well as cost benefit.

Completed Auto. COBIT


Test Results, Remarks,
Audit Step By/Date
W/P Ref.
Tool Reference

A. Prior Audit/Examination Report


Follow-Up

Review prior report and verify M1


completion of any agreed-upon
corrections. Note remaining
deficiencies

B. Preliminary Audit Steps

Obtain: PO2
-Organization chart PO3
-Information architecture model for PO6
the organization PO8
-Data classification policy
-Network infrastructure documentation
-Inventory of operating systems,
applications, and operating systems
impacting classified data
-Specifications of encryption tool(s)
-Understanding of external
requirements (consider international
encryption laws)

3
Completed Auto. COBIT
Test Results, Remarks,
Audit Step By/Date
W/P Ref.
Tool Reference

Obtain or perform risk assessment on PO9


the information need for encryption

Obtain infrastructure software AI1


acquisition procedures AI3

Obtain maintenance history of all AI3


encryption tools in use

C. Detailed Audit Steps

Planning

Identify the security responsibilities PO4


within the organization.
Determine the level of involvement in
the encryption processes by the
security staff

Review the data requirements for PO2


encryption for the e-commerce DS11
environment

Review the regulatory requirements for PO8


encryption within the country,
industry and organization and
determine level of compliance

Determine level of risk existing PO9


considering the level of encryption
implementation status.
Identify acceptable risk and determine
if any residual risk exceeds the
acceptable level

Review the decision process for AI3


selection of symmetrical (private
key) usage

Review the tools selection process PO3


relative to compatibility with
existing technologies

Acquisition, Implementation,

4
Completed Auto. COBIT
Test Results, Remarks,
Audit Step By/Date
W/P Ref.
Tool Reference

Maintenance of Encryption

Review the acquisition process by AI3


which the encryption either has been
or will be obtained, and determine
validity to needs requirements

Review the implementation AI1


procedures for encryption tools

Determine access controls over keys DS5


during the acquisition/development
process

Review the change control processes AI3


over infrastructure software
(encryption tools)

Review the inventory of systems, AI3


applications and operating systems
using (or to use) this encryption
technique

Assess effectiveness of the encryption DS5


output compliance to external
regulations and organizational
policies

Key Management

Determine the access over keys is DS5


appropriate

Review the processes by which keys DS5


are/will be disseminated, maintained
and cancelled

Review the key’s expiration process DS5

Miscellaneous

Review control around meta-data over DS5

5
Completed Auto. COBIT
Test Results, Remarks,
Audit Step By/Date
W/P Ref.
Tool Reference

keys, key management, encryption


processes and related infrastructure
resources

6
Internal Control Questionnaire
Symmetrical (Private) Key Encryption
Response
Question No. Question Description
YES NO N/A
General

Have all items from prior audits been M1, M2


cleared?
Do business objectives clearly PO1
define e-commerce requirements of
the organization?
Is there an information architecture PO3
model that reflects current business
needs?
Does the information architecture PO2
model support e-commerce data
requirements?
Are sufficient policies in place and PO6
communicated to define
data/information as an asset?

Either by policy or precedent, is PO1,


information required to have the PO11,
following characteristics: DS11
- Efficiency?
- Effectiveness?
- Integrity?
- Availability?
- Confidentiality?
- Compliance?
- Reliability?

Is there a risk measure performed on PO9


an organizational need for
encryption?
Has a concept of acceptable risk PO9
been adopted?

Is there a compliance “watch” M1


function?

Does the current hardware PO3

7
Response
Question No. Question Description
YES NO N/A
infrastructure support the e-
commerce
plan?
Does the current software PO2
infrastructure support the e-
commerce data requirements?
If the current infrastructure does not PO3
support the e-commerce plan, are
there sufficient hardware and
software planning initiatives that will
provide the appropriate support to
obtain the necessary tools and will
not present unacceptable risk?
Planning

Is there an IT security function DS5


involved in security tool
recommendations?

Are there detailed procedures for DS1


private key management? DS5
DS13
Do they include: DS5
- Generation?
- Dissemination?
- Implementation?
- Expiration?

Do the current or planned encryption DS5


tools work with existing
infrastructure?
Acquisition, Implementation,
Maintenance of Encryption

Do current tools meet all PO1


requirements? DS5

Do all systems that require DS5


encryption use it?

8
Response
Question No. Question Description
YES NO N/A
Do infrastructure programs AI6
(encryption) follow established DS5
change control procedures?
Are encryption practices compliant PO8
with all applicable regulatory DS5
entities?
Key Management

Are appropriate controls in place DS5


over encryption keys?

You might also like