In this article, I am going to share a small checklist that will help auditors and testers to provide assurance on remote access processes and procedures for any company. This is not a technical article but controls defined in this list can be well-reviewed by managers and to be discussed with clients. For each part, if they want to go in-depth, they can.
Administration
Authorisation and access management
Software and hardware used in the remote access process
Security
Administration
- Review policies, procedures and access controls
- Review procedures for remote access including guidelines for receiving access
- Obtain and review documentation of design including DMZ and authentication servers
- Obtain or create a flowchart of traffic flow for remote access
Authorisation and access management
- How Client manages access management and authorization. Are there any procedure that includes:
- approval by an appropriate department manager
- approval by IT management
- Client to verify background checking done for employees of Third Party who are involved in remote access and administrative rights on Client systems
- a user is a current employee of Third Party
- duration of remote access given or Remote access can be allowed from any devices on the Internet with valid login credentials?
- account removal upon Third Party's notice to Client if an employee leaves an organization (What if Third Party does not inform Client that the employee left the Third-Party before or not)
- A user must be able to authenticate from the authorized system only
- does Client has the list of approved Third-Party devices from where remote access is allowed?
- An automatic disconnect of sessions for remote-access technologies after a specific period of inactivity configuration set or not
- Following should be prohibited while accessing data through remote connection:
- Copying, moving, and storage of data - If allowed by Client, it must be documented and approved in prior; also audit trial of such activity must be logged
Software and hardware used in the remote access process
- Check whether the remote access software is well-known, updated to the latest version and patched against all public vulnerabilities
- Check the type of authentication and encryption being performed with the help of software
- Review the latest encryption standard for the software
- Ensure testing of fail-over devices is performed periodically
- Verify that fail-over tests are performed periodically for VPN authentication devices.
Security
- Management should monitor security incidents and the extent of compliance with information security procedures.
- Verify through inquiry with the IT Infrastructure Manager that security events such as multiple failed login attempt, username enumeration, numerous failed 2FA/MFA attempts are appropriately identified, investigated, escalated, and resolved after notification.
- Ensure that audit trails exist, are properly managed and historical data exists.
No comments:
Post a Comment