There are occasions where organization implements good technology in bad ways, which results in poor implementation. For example, the best firewall poorly configured by the user will not stop undesirable traffic. This generally can lead to false sense of security and lull the organization into complacency.
Technical Audit is comprehensive analysis and review of the security of the Information Systems from the perspective of working of the internal controls. This analysis is essential to determine the adequacy and effectiveness of the controls, which are in place, to the organization.
TA key benefits:
Determine the effectiveness of internal controls.
Detect gaps or failures of your existing security systems.
Give clients confidence that their data is well protected.
Reduce security risk and liability.
Prevent confidential information from leaking
Protect intellectual property
Abate Financial loss and negative publicity
Technical Audit is comprehensive analysis and review of the security of the Information Systems from the perspective of working of the internal controls.
The security is assessed at all the four layers. The layers consist of
(a) network perimeter
(b) the networkitself
(c) access to server system and
(d) application level securi
Wireless Access Points & Routers –review of logical boundaries, access points, configuration, determine access control & authentication weakness, discover IP scheme along with MAC addresses of access point and clients, probe wireless client MAC addresses, card vendor, OS details, MAC spoofing, gaining access and Intercepting the wireless traffic (sniffing).
Systems – Servers & workstations
Authentication Server - review of configuration, OS patch management, User Management, default accounts, Passwords management, Access and authentication mechanism, Change management& backup
Web-server - review of security of the OS, actual server application &Server configuration
Mail Server - review of configuration, Information leakage, Web interface, Susceptibility of Open Relay, Mail header parsing errors, Buffer overrun, Administrator Interface, Patch management, User & password management
DNS Server - check for unauthorized DNS Zone transfer, Buffer overrun, cache poisoning, hi-jacking & DNS cache snooping
Database Server Security - review OS security, Patch, Check for Weak accounts, configuration, Auditing and logging, Password policy, Account lockout policy, Database recovery procedure.