- Government Finance Officers Association

Transcription

- Government Finance Officers Association
Avoiding Yesterday’s News: Keeping IT Policies
and Procedures Up To Date
May 23, 2016 | 10:30 am – 12:10 pm | 2 CPEs
Deirdre Finneran, Deputy Director of Finance, Fairfax County, VA
Lea Deesing, MPA, PMP, Chief Innovation Officer, City of Riverside, CA
Samuel BowerCraft, MSIS, CISA , Senior Manager, McKonly & Asbury, LLP
Mike Riffel, Senior Manager, Plante Moran
IT Policies: What is At Risk?
Innovation and Technology Department
City of Riverside, California
Presented by Lea Deesing, MPA, PMP
Chief Innovation Officer
RiversideCa.gov
RiversideCa.gov
RIVERSIDE, CALIFORNIA
“CITY OF ARTS AND INNOVATION”
RiversideCa.gov
RIVERSIDE, CALIFORNIA
• 
• 
• 
• 
• 
• 
Inland Southern California
Population 322,000
83 Square Miles
Charter City
Council-Manager based
Full Service City
– Water, Electric, Police, Fire, Trash,
Museum, Libraries
•  Operating budget $696M
•  Total budget $983M RiversideCa.gov
RECENT CITY DESIGNATIONS
– Forbes 8th Coolest City in America
– Forbes Rank #2 “Millennial
Boomtown City”
– California Air Resources Board’s
“Coolest California City”
– CareerBliss.com’s Rank #6 “Nation’s
Happiest Cities for Young
Professionals”
– SBA Startup in a Day Winner $50k
– 2016 Federally designated “Tech
Hire” community
RiversideCa.gov
INNOVATION & TECHNOLOGY DEPARTMENT
•  60 staff members
•  $11M department operating budget
RiversideCa.gov
RECENT IT AWARDS (2014/2015)
Finalist for Best Web Portal in
the Nation from the Center
for Digital Government
(2015)
Award of Excellence from the
Municipal Information Systems
Association of CA (2013, 2014, 2015)
Top 5 Government Website (2014)
Top 7 Best of the Web (2013,
2014, 2015)
Best Office of the CIO Award (2014)
Harvard
Innovation
Award for
Mobile
Applications
(2015)
Top 6 in the Digital
Cities Award for Cities
over 250,000 (2013,
2014, 2015)
RiversideCa.gov
HIGH-RISK IT POLICY AREAS
•  Technology Use and
Security Policy
–  For all City staff
•  Information Systems Security
Policy
–  For IT Staff
RiversideCa.gov
Why We Need Layered
Security, Defense In
Depth, and
Cybersecurity Training
…and a policy or two
RiversideCa.gov
WE ARE AT WAR
Real-time Attack Map
RiversideCa.gov
“There are two kinds of big companies in the
United States.
There are those who've been hacked by the
Chinese…
…and those who don't know they've been
hacked by the Chinese.”
--FBI Director James Comey, October, 2014
RiversideCa.gov
2014: “YEAR OF THE HACK”
RiversideCa.gov
THE THREAT LANDSCAPE
HAS CHANGED
•  Antivirus
•  Server Patches
•  A Rock-Solid
Firewall
•  Periodic Audits
–  Didn’t have time
to look at server
logs proactively
RiversideCa.gov
DEFENSE IN DEPTH
Our policies should reflect these layers
RiversideCa.gov
BREACH TIMELINE
Breach Occurs START 60% of data in breaches is stolen in hours Hours 54% of breaches remain undiscovered for months Months Information of up to 750 million people on the black market over the last three years Years RiversideCa.gov
Graphic provided by Sigmanet EARLY DETECTION IS KEY
•  Complete Prevention is impossible
•  Early detection and remediation is key
–  Detect and stop advanced attacks while they
are happening, or soon thereafter
•  User Cybersecurity Training is critical
RiversideCa.gov
TECHNOLOGY USE AND
SECURITY POLICY
•  For end users
•  Signed by end users, placed into HR manual
•  Requires annual security awareness training
•  Includes:
–  Acceptable Use, Unacceptable Use –  Cybersecurity training requirements –  Password requirements –  Screen saver requirements –  Software requirements –  Remote Access –  Web monitoring/filtering –  List prohibited types of sites –  …much more •  Place “I have read…” upon login screen.
RiversideCa.gov
IT SECURITY POLICY
•  For IT Department
•  Signed by all IT Employees (technical staff)
•  Includes:
– Internal security procedures – Ethics – must have a business need to access systems or data – External security audit requirements – Account audit requirements RiversideCa.gov
HIGH-RISK IT POLICY AREAS
•  Data Loss Prevention
•  Data Management
•  Data Hygiene
RiversideCa.gov
DATA LOSS PREVENTION
•  Data Loss Prevention (DLP)
• 
• 
• 
• 
You can’t protect what you don’t know you have You can’t afford all the layers you need You can’t afford a breach (average $200 per record) You need to prioritize layers around protecting your crown jewels •  Detection/Scanning of PII
RiversideCa.gov
PERSONALLY IDENTIFIABLE
INFORMATION (PII) SCANNING
RiversideCa.gov
DATA MANAGEMENT
•  Data management policy for good data
hygiene
–  Guidelines on where to store confidential data
–  Guidelines on where confidential data may be
printed (hardcopy)
–  When NOT to store data
–  Frequency of routine scans
–  Department’s active involvement on
maintaining good data hygiene
–  Records retention schedules should be up-todate
RiversideCa.gov
HIGH-RISK IT POLICY AREAS
•  Physical Security
RiversideCa.gov
ADDITIONAL SECURITY INITIATIVES
•  Physical security Policy
–  Employee Access/Photo Badges
•  Require employee to wear badges
•  Audit badge security access—need based only
•  “No tailgating” rule
–  Require Inventory of all IT facilities
•  Training for those who service data centers
•  Assess and document security equipment,
Uninterruptable Power Supplies (UPS), cable
management, door locks, HVAC, ventilation
•  What else is stored in these locations?
•  Take measures to improve
RiversideCa.gov
ADDITIONAL IT POLICY AREAS
•  Equipment Inventory
•  Software Licensing
Inventory
•  Internal Controls & Audits
•  Mobile Device Policy
RiversideCa.gov
EQUIPMENT INVENTORY
•  Inventory Anything
over $100?
–  Hold someone
accountable for
items
–  Sign check-out
sheet, store in HR
files
–  Pull these forms
during HR outprocessing
RiversideCa.gov
SOFTWARE INVENTORY
•  Annual Inventory
or Audit of
Software
Licensing
–  Understand what
types of licensing
you have
employed
–  How is an
accurate count
being tracked?
RiversideCa.gov
SOFTWARE INVENTORY
•  Software Licensing
–  Operating Systems,
Databases,
Backups, Virtual
Servers
–  Mobile Software
–  Utilities
–  Clip art
RiversideCa.gov
INTERNAL CONTROLS & AUDITS
•  Tight Controls over
Approval Routing Security
–  What if someone moves to
another department?
–  Audit! Ask IT Department for
monthly reports showing who
can approve what and
when
RiversideCa.gov
MOBILE DEVICE MANAGEMENT
•  Mobile Device Policy
Addresses:
–  Remote management
–  Safety issues
–  Security issues
–  Privacy issues
–  Who must have Mobile
Device Management
(MDM) Software installed?
•  Stipend devices?
•  City-owned devices?
RiversideCa.gov
HIGH-RISK IT POLICY AREAS
•  Technology Procurement
Policy
RiversideCa.gov
SOFTWARE PROCUREMENT
•  Cloud-based software vs. Onpremise
•  Cloud “Software As A
Service” (SaaS)
–  Slick Factor/Ease of procurement
–  Often result in rogue purchases
•  Important to have purchasing
controls, policy, & training around
this issue
•  We have a checklist – we need a
policy
RiversideCa.gov
SOFTWARE PROCUREMENT
•  Once cloud software is in
use by a number of
employees, it is often too
late to ask these questions
•  Have procurement
policies in place up front
RiversideCa.gov
ADDITIONAL INFORMATION
•  Exception Management
•  Build a process into your policy for
exceptions - multiple signatures
•  Evaluate risks associated with
exceptions
•  Periodically Review Proposed
Policies
•  Agency-wide Departments
•  Human Resources Department
•  Unions
RiversideCa.gov
THANK YOU
RiversideCa.gov
The Importance of Policy and Process Setting the Bar –  Senior Manager in the Internal Audit and Management Consulting Group. –  Security consulting related to financial data, information systems, and assets. Samuel BowerCraft –  Experience with strategic oversight and planning; management; operations and installation of technical infrastructure; software; and systems. –  M.S., Information Systems –  B.S., Engineering –  Certified Information Systems Auditor (CISA) Agenda –  Purpose of IT –  Governance, Policy, and Communicating Expectations –  Policy / Procedure Basics The Illusion of Transparency –  What is your philosophy? Philosophy of Technology –  How do you view technology? –  How do you perceive technology for: –  Getting personal things achieved? –  An organization and how they achieve their required objectives? –  Getting things done? Data drives decisions… Decisions drive behavior… The Age of Data Behavior drives consequences… Consequences determine our happiness. Who cares about their happiness? –  IT is central to <blank> in your organization. –  If it is central, it must be important. IT Plays a Role –  We [should] protect what is important http://www.xkcd.com/1215/
10 Reasons People Don’t Exercise 1. 
You hate to do it. 2. 
You tried, but quit. 3. 
6. 
You want to, but you have other priorities. You can’t afford it. 7. 
You lose motivation. 4. 
You don’t see a change. 8. 
It is hard (ouch). 5. 
You don’t know how. 9. 
Maintaining the routine is difficult. 10.  No time! 10 Reasons People Don’t Focus On IT Security / Policies 1. 
You hate to do it. 2. 
You tried, but quit. 3. 
6. 
You want to, but you have other priorities. You can’t afford it. 7. 
You lose motivation. 4. 
You don’t see a change. 8. 
It is hard (ouch). 5. 
You don’t know how. 9. 
Maintaining the routine is difficult. 10.  No time! Communication How will you practice? –  Clarity –  Consistency –  Purpose Governance –  A policy is a deliberate system of principles to guide decisions and achieve rational outcomes. –  A policy is a statement of intent, and is implemented as a procedure or protocol. Objectives Role of Policy in Your Organization Policy & Procedures Risks, Processes, & Controls Application Controls Information Technology IT governance is defined as: ITGI (ISACA) Definition – …governance is the responsibility of the board of directors and executive management. IT is an integral part of enterprise governance and consists of the leadership and organizational structures and processes that ensure that the organization's IT sustains and extends the organization's strategies and objectives. 48 –  There is a need for greater accountability for decision-­‐making around the use of IT in the best interest of all stakeholders. Governance & Policies –  IT capability is directly related to the choices made by management with long term consequences for various stakeholders. –  There should be clear accountability for respective responsibilities in the decision making processes affecting IT (execs, mgmt., users, IT). –  Communication is VITAL! –  Define, establish and align expectations with the overall enterprise and control environment. Objectives & Purpose of Policies –  Use a framework from a suitable IT process and control model (e.g. COBIT) – helps to cover your bases (checklist). –  Confirm the framework ensures compliance. –  Aligned with and confirms delivery of enterprise strategies and objectives. –  Regular reporting is required and delivered… as expected based on policy. Policy and Processes Knowledge Requirements Identified Why So Important? Communication and Training Performed –  How can one be successful without the proper knowledge to succeed? Processes Performed The MAIN Risk –  Lack of clarity of: –  Purpose –  Objectives –  Expectations –  Which leads to: –  Wasted time –  Wasted resources –  Policy’s Function The Basics –  What needs to be done. –  Statement of intent. Policy’s Purpose –  Communication –  Expectations and responsibilities –  Consequences –  Consistency The Basics –  Influence behavior –  Simplify decision making –  Improve productivity –  Meet requirements –  Checklists work –  Specific as needed –  Avoid problems –  Procedure’s Function –  What needs to be done and how. –  Statement of process to achieve an intended result. The Basics Procedure’s Purpose –  Communication –  Expectations and responsibilities –  Detailed steps –  Consequences –  Consistency The Basics –  Influence behavior –  Simplify decision making –  Improve productivity –  Meet requirements –  Checklists work –  Specific as needed –  Avoid problems Policy: What to do. The Basics Procedure: How to do it. Policies: The Universe –  All IT Policies –  Scoping Policies for your Environment –  Developing Policies Policies: The Universe –  Mike Riffel 1.  Stakeholders Policies: The Universe Communication 2.  Overview 16.  Computer Resources 3.  Scope 17.  Employee -­‐ Email Use 4.  Compliance 18.  Smart Mobile Devices 5.  Maintenance 19.  Remote Access 6.  Security Responsibilities 20.  Traveling with Devices 7.  Violations 21.  Security Program 8.  Governance 22.  Risk Management 9.  Roles and Responsibilities 23.  Security Training and Awareness 10.  Enterprise Information Model and Data Classification 11.  Confidential Information 12.  Production Information 13.  Personal Information 14.  Employee -­‐ Acceptable Use 15.  Monitoring of Electronic 24.  Incident Reporting and Response 25.  Security Practices 26.  Network Security and Perimeter 27.  General 28.  Modems Policies: The Universe 29.  Firewalls 37.  Audit Policy 38.  Antivirus Policy 39.  Physical and Environment Security 40.  Backup and Recovery 41.  Patch Management 42.  Change Management 43.  Monitoring and Evaluation 30.  Vulnerability and Penetration Testing 31.  Wireless Security 32.  Applications and Database Security 33.  Access Control 34.  Service Accounts 35.  Default, Guest, and Vendor Accounts 36.  Password Policy Policies: The Universe SANS Version https://www.sans.org/security-resources/policies/
Policy Components –  Use a framework to guide you. –  You are building a governance structure – this requires planning. –  Management principles are being memorialized. –  These are decisions made now regarding how to act later. Policies: Scoping –  Begin with: –  An overview of your environment; –  Inventory of systems and hardware; and –  Documentation of responsibilities. –  Define the purpose and intent of the policies required: –  Setting expectations on what must be done to achieve goals, and –  To ensure continued business operations. –  Review your objectives for information technology: –  How does IT support the business? –  What does IT need to do in the normal course of operations? How to Scope –  IT General Controls –  Review your policy requirements: –  Regulatory requirements for policies. –  Communication requirement: what should be written down? –  Expectation requirement: what must be written down? Business How to Scope Information Systems Regulatory Individuals with IT Responsibilities –  CEO –  CFO Roles To Review –  CIO –  CSO (security) –  CRO (risk) –  IT Governance Committee members –  IT Resources –  IT Users Area How to Scope Policy Area Policy Owner Business User Access Process Data Backup Business Owner w/ IT IT IT IT w/ Business Owners General IT Controls Incident Response Regulato Regulatory Specifics ry Personal Information Security CIO, Director –  Tools are available to help structure and communicate policies. Developing Policies –  GRC toolsets –  Can be helpful –  You must have a process that will be supported by the software! –  A list: http://www.capterra.com/policy-­‐management-­‐software/ –  Boilerplate language will help you get started, but… –  YOU MUST STILL REVIEW THE POLICY TO CONFIRM ITS ACCURACY. –  Which is worse: –  Having a policy and not following it? –  Not having a policy in place? 1.  Use a consistent structure -­‐ template. 2.  Identify common information to include: title, date created, date updated/version, purpose, owner (one person), contributors (many people). Developing Policies Key Steps 3.  Identify dates for next review and who should receive the policy. 4.  Keep the policy clear and simple: 1. 
2. 
3. 
Longer policies are not necessarily better. Focus on the purpose of the policy: to communicate expectations and principles. Reference process documents in the policy as needed. 5.  Group policies together as appropriate. 1. 
2. 
One file with 50 related policies versus, 50 policy files. Common information to include: –  Title –  Date created –  Date updated/version, next review date Developing Policies Key Steps –  Owner (one person) –  Contributors (many people) –  Overview/Background (context) –  Purpose –  Scope (what is in, what is out) –  Policy –  Policy Compliance (consequences, exceptions) –  Related Standards (other policies, procedures) –  Definitions/Terms Developing Policies Example Developing Policies Developing Policies Developing Policies Communicating Policies Have a plan for: –  Reviewing policies (note who owns a policy and who has input). –  Re-­‐issuing / re-­‐communicating policies: –  Where is your timeline? –  What is your plan? –  Hope is not a plan. –  “I will remember” is not a good plan.
–  A tool (software) can support this process, but only if you have a process for it to support. Common information to include: –  Title –  Date created Developing Procedures Key Steps –  Date updated/version, next review date –  Owner (one person) –  Contributors (many people) –  Overview/Background (context) –  Purpose –  Procedures (checklist) –  Related Standards (other policies, procedures) –  Definitions/Terms Maturity Model –  Policies (& procedures) can be at different levels of maturity –  Levels with management response: Maturity Model –  COBIT 4.1 – has detailed explanations for each process and maturity level (great resource). –  COBIT 5 – new view of maturity; similar… but different. Figure 1: COBIT Focus, Volume 3, July 2012
“Why Using Visual Maturity Scoring Is an Added Value for Any Auditor”, Marc Vael
Maturity Model –  Definitions of Levels: Figure 12: COBIT 4.1; 2007
Policy / Document Review Tip –  I highlight the entire document in yellow… –  And un-­‐highlight as I go. –  I then know what is reviewed and what is pending. Sharpen Ourselves “Through readiness and discipline we are masters of our fate.” –  Master Sergeant Farell Knowledge Levels –  http://www.psia-­‐nw.org/newsletter-­‐articles/blooms-­‐taxonomy-­‐levels-­‐of-­‐understanding/?doing_wp_cron=1406400452.1632280349731445312500 Keep Calm and Carry On –  SANS 20 Critical Controls –  https://www.sans.org/media/critical-­‐security-­‐controls/CSC-­‐5.pdf –  SANS Policies –  https://www.sans.org/security-­‐resources/policies/ References –  Article on Working Across Business Groups –  https://hbr.org/2015/09/jack-­‐welchs-­‐approach-­‐to-­‐breaking-­‐down-­‐silos-­‐
still-­‐works –  Great Book: The Checklist Manifesto –  http://atulgawande.com/book/the-­‐checklist-­‐manifesto/ –  Go see Zootopia (it was amazing) –  http://www.imdb.com/title/tt2948356/ Questions? Samuel BowerCraft sbowercraft@macpas.com
Implementing Policies: Taming the Dragon Thank you. Avoiding Yesterday's News: Keeping
IT Policies and Procedures Up to Date
2016 GFOA CONFERENCE
Influences of Technology Evolution
• 
External influences will
impact your future
direction as much as or
more than maintaining
the existing
environment.
• 
Will drive future
technology policy,
planning and
investments.
• 
Not every IT “buzzword”
should be immediately
actionable
Mobile Green IT Current
Gov IT
Operations
Cloud Others 89
Digital Government
Ci4zen Experience Enhanced Control Data Analy4cs Connec4vity Automa4on Innova4on Big Data Service Innova4on Service Delivery 90
Technology Project Portfolio
• 
• 
• 
• 
Align projects with strategic vision
Determine priority/timing
Identify Policy ‘Gaps’ Proactively
2015-2016 Popular Initiatives
- 
- 
- 
- 
- 
- 
Workforce Mobility
Cloud
Collaboration
eCommerce
Strategic Sourcing
Big Data
91
Aligning Policy with Vision
Workforce Mobility
•  Computer and Internet Usage Policy/
Acceptable Use Policy
•  Remote Access Policy
•  Data Back-Up Policy
•  Mobile and Personal Device Policy
•  Portable Storage Policy
‘Cloud’
• 
• 
• 
• 
Cloud Computing Policy
User Access Policy
Compliance Policy
Exit strategy
Collaboration
•  Social Media Policy
•  Acceptable Use Policy
•  Compliance Policy
Strategic Sourcing
•  IT Asset Management Policy
•  IT Service Catalog
•  Service Level Agreements
IT Services Catalog
IT Governance IT Strategy and Leadership IT Planning and Project Management Infrastructure Network / Telecom. General Support Applica3ons Help Desk Applica4on Development Desktop Support Applica4on Maintenance Database Administra4on Applica4on Support & Deployment Fiber Infrastructure Radio / Wireless Data Center Opera4ons Phone System Security Disaster Recovery Provided In-­‐House Par4ally Outsourced Fully Outsourced 97
Business Intelligence/‘Big Data’
• 
• 
• 
• 
Data management and retention policy
Data back-up policy
Compliance policy
Performance metrics
E-commerce
•  Security penetration testing policy
•  Compliance policy
•  Help desk policy
IT Policy Building Blocks
• 
• 
• 
• 
• 
• 
Disaster Recovery Plan
Password Policy
Email Usage Policy
Change Management Policy
Infrastructure Refresh Policy
Patch Management Policy
Incident Response
101
Incident Response Plan
•  Communication
•  Continuity of Operations
•  Recovery
Keeping Policy Current
103
Updating Policy
•  Who makes IT policy?
•  Who identifies policy requirements prior to a
project?
•  IT Governance is imperative
IT Governance
Implement an IT Governance Model that
encompasses:
- 
- 
- 
- 
- 
- 
IT policy
IT procedures
IT standards
Annual technology budgeting
Project portfolio management
Return on investment (ROI)
Sample IT Governance Structure
Administrator/Manager/CEO Approve IT Policies and Procedures IT Steering Commi9ee IT Standards IT Leadership Team/CIO Technology Standards Commi9ee Assistant Manager Support Review IT Administrator Central IT Staff Departmental Stakeholders Annual Technology Planning Annual Technology Budget Dept. and Line of Business Projects Create Enterprise Projects 106
Sample IT Governance Functions
IT Policies & Procedures IT Standards Annual Technology Planning Annual Technology Budget Departmental and Line of Business Projects Enterprise Projects ExecuJve/CIO Approve Approve Support Approve Support Approve IT Steering Commi9ee Approve Approve Approve Approve Support Support Review Approve Review Review Support Support CFO 107
IT Steering Committee
ResponsibiliJes IT Policies & Procedures •  Approve IT procedures IT Standards •  Approve IT standards Annual Technology Planning •  Approve, as needed, the strategic technology impera4ves in terms of relevance and priority Annual Technology Budget •  Approve ROI model •  Review and approve project priori4za4on criteria and weigh4ng •  Review, rank and priori4ze ad-­‐hoc commiSee, CIP and non-­‐CIP project requests Departmental and Line of Business Projects •  Provide oversight to major projects Enterprise Projects •  Give life to poten4al Enterprise-­‐wide ini4a4ves that may originate from mul4ple sources •  Ini4ate subcommiSee to evaluate Enterprise-­‐wide ini4a4ve feasibility •  Conduct periodic monitoring of Enterprise-­‐wide projects 108
Influences of Technology Evolution
• 
External influences will
impact your future
direction as much as or
more than refinements
to the existing
environment.
• 
Will drive future
technology planning
and investments.
• 
Not every IT “buzzword”
will be immediately
actionable
Mobile Green IT Current
Gov IT
Operations
Cloud Others 109
Questions
Thank You
Mike Riffel
Mike.Riffel@plantemoran.com