Book description
The third edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure business and consumer privacy data. Using examples and exercises, this book incorporates hands-on activities to prepare readers to skillfully complete IT compliance auditing.
Table of contents
- Cover
- Title Page
- Copyright Page
- Contents
- Dedication Page
- Preface
- Acknowledgments
- About the Author
-
CHAPTER 1 The Need for Information Systems Compliance
- What Is the Difference Between Information System and Information Security Compliance?
- What Is the Confidentiality, Integrity, and Availability (CIA) Triad?
- What Is Compliance?
- Why Are Governance and Compliance Important?
- What If an Organization Does Not Comply with Compliance Laws?
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 1 ASSESSMENT
-
CHAPTER 2 Overview of U.S. Compliance Laws
- Introduction to Regulatory Requirements
- Federal Information Security Management Act
- Red Flag Rules
- Cybersecurity Information Sharing Act
- Sarbanes-Oxley Act
- Gramm-Leach-Bliley Act
- Health Insurance Portability and Accountability Act
- Children’s Internet Protection Act
- Children’s Online Privacy Protection Act
- California Consumer Privacy Act
- Payment Card Industry Data Security Standard
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 2 ASSESSMENT
- CHAPTER 3 What Is the Scope of an IT Compliance Audit?
- CHAPTER 4 Auditing Standards and Frameworks
-
CHAPTER 5 Planning an IT Infrastructure Audit for Compliance
- Defining the Scope, Objectives, Goals, and Frequency of an Audit
- Identifying Critical Requirements for the Audit
- Assessing IT Security
- Obtaining Information, Documentation, and Resources
- Mapping the IT Security Policy Framework Definitions to the Seven Domains of a Typical IT Infrastructure
- Identifying and Testing Monitoring Requirements
- Identifying Critical Security Control Points That Must Be Verified Throughout the IT Infrastructure
- Building a Project Plan
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 5 ASSESSMENT
-
CHAPTER 6 Conducting an IT Infrastructure Audit for Compliance
- Identifying the Minimum Acceptable Level of Risk and Appropriate Security Baseline Definitions
- Identifying All Documented IT Security Policies, Standards, Procedures, and Guidelines
- Conducting the Audit in a Layered Fashion
- Performing a Security Assessment for the Entire IT Infrastructure and Individual Domains
- Incorporating the Security Assessment into the Overall Audit Validating Compliance Process
- Using Audit Tools to Organize Data Capture
- Using Automated Audit Reporting Tools and Methodologies
- Reviewing Configurations and Implementations
- Auditing Change Management
- Verifying and Validating Proper Configuration and the Implementation of Security Controls and Countermeasures
- Identifying Common Problems When Conducting an IT Infrastructure Audit
- Validating Security Operations and Administration Roles, Responsibilities, and Accountabilities Throughout the IT Infrastructure
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 6 ASSESSMENT
-
CHAPTER 7 Writing the IT Infrastructure Audit Report
- Anatomy of an Audit Report
- Audit Report Ratings
- Audit Report Opinion
- Summary of Findings
- IT Security Assessment Results: Risk, Threats, and Vulnerabilities
- Reporting on Implementation of IT Security Controls and Frameworks
- Per Documented IT Security Policy Framework
- IT Security Controls and Countermeasure Gap Analysis
- Compliance Assessment Throughout the IT Infrastructure
- Presenting Compliance Recommendations
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 7 ASSESSMENT
-
CHAPTER 8 Compliance Within the User Domain
- User Domain Business Drivers
- Anatomy of a User Domain
- Items Commonly Found in the User Domain
- Separation of Duties
- Least Privilege
- Confidentiality Agreements
- Employee Background Checks
- Acknowledgment of Responsibilities and Accountabilities
- Security Awareness and Training for New Employees
- Information Systems Security Accountability
- Best Practices for User Domain Compliance
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 8 ASSESSMENT
-
CHAPTER 9 Compliance Within the Workstation Domain
- Compliance Law Requirements and Business Drivers
- Devices and Components Commonly Found in the Workstation Domain
- Access Rights and Access Controls in the Workstation Domain
- Maximizing C-I-A
- Workstation Vulnerability Management
- Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines
- Best Practices for Workstation Domain Compliance
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 9 ASSESSMENT
-
CHAPTER 10 Compliance Within the LAN Domain
- LAN Domain Business Drivers
- Devices and Components Commonly Found in the LAN Domain
- LAN Traffic and Performance Monitoring and Analysis
- LAN Configuration and Change Management
- LAN Management, Tools, and Systems
- Maximizing C-I-A
- Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines
- Best Practices for LAN Domain Compliance
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 10 ASSESSMENT
-
CHAPTER 11 Compliance Within the LAN-to-WAN Domain
- Compliance Law Requirements and Protecting Data Privacy
-
Devices and Components Commonly Found in the LAN-to-WAN Domain
- Routers
- Firewalls
- Proxy Servers
- DMZ
- Virtual Private Network Concentrator
- Network Address Translation (NAT)
- Internet Service Provider Connections and Backup Connections
- Cloud Services
- Intrusion Detection Systems/Intrusion Prevention Systems
- Data Loss/Leak Security Appliances
- Web Content Filtering Devices
- Traffic-Monitoring Devices
- LAN-to-WAN Traffic and Performance Monitoring and Analysis
- LAN-to-WAN Configuration and Change Management
- LAN-to-WAN Management, Tools, and Systems
- Access Rights and Access Controls in the LAN-to-WAN Domain
- Maximizing C-I-A
- Penetration Testing and Validating LAN-to-WAN Configuration
- Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines
- Best Practices for LAN-to-WAN Domain Compliance
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 11 ASSESSMENT
-
CHAPTER 12 Compliance Within the WAN Domain
- Compliance Law Requirements and Business Drivers
- Devices and Components Commonly Found in the WAN Domain
- WAN Traffic and Performance Monitoring and Analysis
- WAN Configuration and Change Management
- WAN Management Tools and Systems
- Incident Response Management Tools
- Access Rights and Access Controls in the WAN Domain
- Maximizing C-I-A
- WAN Service Provider SOC Compliance
- Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines
- Best Practices for WAN Domain Compliance
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 12 ASSESSMENT
-
CHAPTER 13 Compliance Within the Remote Access Domain
- Remote Access Business Drivers
- Devices and Components Commonly Found in the Remote Access Domain
- Remote Access and VPN Tunnel Monitoring
- Remote Access Traffic and Performance Monitoring and Analysis
- Remote Access Configuration and Change Management
- Remote Access Management, Tools, and Systems
- Access Rights and Access Controls in the Remote Access Domain
- Remote Access Domain Configuration Validation
- Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines
- Best Practices for Remote Access Domain Compliance
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 13 ASSESSMENT
-
CHAPTER 14 Compliance Within the System/Application Domain
- Compliance Law Requirements and Business Drivers
- Devices and Components Commonly Found in the System/Application Domain
- System and Application Configuration and Change Management
- System and Application Management, Tools, and Systems
- Access Rights and Access Controls in the System/Application Domain
- Maximizing C-I-A
- System/Application Server Vulnerability Management
- Adherence to Documented IT Security Policies, Standards, Procedures, and Guidelines
- Best Practices for System/Application Domain Compliance
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 14 ASSESSMENT
-
CHAPTER 15 Ethics, Education, and Certification for IT Auditors
- Professional Associations and Certifications
- Professional Ethics, Code of Conduct, and Integrity of IT Auditors
- Codes of Conduct for Employees and IT Auditors
- Certification and Accreditation for Information Security
- Certification and Accreditation for Auditors
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 15 ASSESSMENT
- APPENDIX A Answer Key
- APPENDIX B Standard Acronyms
- Glossary of Key Terms
- References
- Index
Product information
- Title: Auditing IT Infrastructures for Compliance, 3rd Edition
- Author(s):
- Release date: October 2022
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9781284236613
You might also like
book
Auditing IT Infrastructures for Compliance, 2nd Edition
The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent …
book
The Basics of IT Audit
The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet …
book
Mastering Information Security Compliance Management
Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based …
book
IT Security Risk Control Management: An Audit Preparation Plan
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of …