Security & Network Audits

You may see the phrase “penetration test” used interchangeably with the phrase “computer security audit”. They are not the same thing. A penetration test (also known as a pen-test) is a very narrowly focused attempt to look for security holes in a critical resource, such as a firewall or Web server. Penetration testers may only be looking at one service on a network resource. They usually operate from outside the firewall with minimal inside information in order to more realistically simulate the means by which a hacker would attack the site.

On the other hand, a computer security audit is a systematic, measurable technical assessment of how the organization’s security policy is employed at a specific site. Computer security auditors work with the full knowledge of the organization, at times with considerable inside information, in order to understand the resources to be audited.

Security audits do not take place in a vacuum; they are part of the on-going process of defining and maintaining effective security policies. This is not just a conference room activity. It involves everyone who uses any computer resources throughout the organization. Given the dynamic nature of computer configurations and information storage, some managers may wonder if there is truly any way to check the security ledgers, so to speak. Security audits provide such a tool, a fair and measurable way to examine how secure a site really is.

Computer security auditors perform their work though personal interviews, vulnerability scans, examination of operating system settings, analysis of network shares, and historical data. They are concerned primarily with how security policies – the foundation of any effective organizational security strategy – are actually used. There are a number of key questions that security audits should attempt to answer:

* Are passwords difficult to crack?
* Are there access control lists (ACLs) in place on network devices to control who has access to shared data?
* Are there audit logs to record who accesses data?
* Are the audit logs reviewed?
* Are the security settings for operating systems in accordance with accepted industry security practices?
* Have all unnecessary applications and computer services been eliminated for each system?
* Are these operating systems and commercial applications patched to current levels?
* How is backup media stored? Who has access to it? Is it up-to-date?
* Is there a disaster recovery plan? Have the participants and stakeholders ever rehearsed the disaster recovery plan?
* Are there adequate cryptographic tools in place to govern data encryption, and have these tools been properly configured?
* Have custom-built applications been written with security in mind?
* How have these custom applications been tested for security flaws?
* How are configuration and code changes documented at every level? How are these records reviewed and who conducts the review?

These are just a few of the kinds of questions that can and should be assessed in a security audit. In answering these questions honestly and rigorously, an organization can realistically assess how secure its vital information is.

Strategy >> We can show you how to use new solutions and software in your organization to increase reliability while significantly reducing your costs. Once you have your strategy in place, don’t worry, we will be there every step of the way when you decide to implement your strategy.
Infrastructure >> We can design and implement your technical infrastructure solution, leveraging many technologies. Intranets, file & print servers, e-mail servers, databases, application servers, web servers, secure firewalls, domain servers, etc. – these are all core services that can be implemented using robust technology.
Turn Key Solution >> We have an ability to offer a vast array for strategic services to our customers. We are committed to providing solutions for our customers’ needs by leveraging the many open solutions available today, and adding specific functionality to meet the demands of a very diverse customer base.
Customized for You >> We offer a remote, extremely secure, network and back-office management solution. Web-server down? We’ll know before you do. Not getting your e-mail? We’re on it before we get a call. Our system monitoring capabilities allow us to manage your network remotely, limiting your need for in-house expertise.