CISA Domain 4: IT Operations Overview
CISA Domain 4: IT Operations Overview
Business Resilience
1
Pre-assessment
[Link]
2
Section A: Information Systems
Operations
• IT Asset Management
• Job Scheduling and Production Process Automation
• System Interfaces
• End-User Computing
• Data Governance
• Systems Performance Management
• Problem and Incident Management
• Change, Configuration, Release, and Patch Management
• IT Service Level Management
• Database Management
3
IT Components
• Infrastructure
• Network
• Applications and software
• System monitoring and management
• Backup and disaster recovery
• Virtualization and cloud computing
• Documentation and knowledge management
4
OSI Model
5
OSI Model
Layer Name Description
• The physical layer converts bits into voltage for
transmission
Physical
1 • The physical layer is associated with cables and other
layer
hardware for the physical connection of the device to
the network
• The data link layer converts the electrical voltage into a
data packet and it is forwarded to the network layer
Data link
2 • A data packet received from the network layer is
layer
converted into electrical voltage and forwarded to the
physical layer
• The function of the network layer is to insert the IP
Network
3 address into the packet header and route the packet to
layer
its destination.
6
OSI Model
Layer Name Description
• The function of the transport layer is to provide an end-
to-end data transport service and establish a logical
connection between the two devices.
• The transport layer ensures the reliability of the data
Transport
4 transfer to its destination in the proper sequence.
layer
• This layer also manages traffic as per network
congestion. In other words, it reduces data transmission
during periods of high congestion and increases
transmission during periods of low congestion.
• The function of the session layer is to establish a
connection between two applications, maintaining the
connection and terminating the connection when
Session
5 required
layer
• It is similar to a phone call, wherein the first connection
is made and then the message is exchanged, and the
connection is terminated
7
OSI Model
Layer Name Description
• The function of the presentation layer is to translate the
Presentat data as per the format of the application
6
-ion layer • The presentation layer provides services such as
encryption, text compression, and reformatting
• The function of the application layer is to provide an
Applicati-
7 interface and communicate directly with the end user
on layer
• It includes the protocols that support the applications
8
Local Area Network (LAN)
• A LAN covers a small, local area-from a few devices in a single
room to a network across a few buildings.
• Network Physical Media:
o Copper (twisted - pair) circuits
o Fiber-optic systems
o Radio systems (wireless)
9
Twisted Pair (Copper Circuit)
• Copper wires are cheaper than fiber optics
• There are two categories of twisted pair, that is, the shielded
twisted pair (STP) or the unshielded twisted pair (UTP)
• STPs are less prone to EMI and crosstalk and so are more reliable
than UTPs
• A UTP is more sensitive to the effects of EMI and crosstalk (when
one cable interferes with signals from adjacent cables)
• The parallel installation of UTPs should be avoided for long
distances since they are more prone to crosstalk.
10
Fiber-Optic Cables
• Optical fiber is a thin and flexible fiber made of glass or plastic
• These cables carry binary signals as flashes of light
• Fiber-optic cables are more secure than copper wire
• Fiber-optic cables are the preferred choice for managing long-
distance networks and handling high volumes of data
• They are not impacted or affected by electromagnetic interference
(EMI)
• These cables have very marginal transmission loss
11
Radio Systems (wireless)
• Data is communicated between devices using low-powered
systems that broadcast (or radiate) and receive electromagnetic
signals representing data
12
LAN Topologies
13
LAN Components
Component Description
Repeaters • Repeaters are used to address the risk of attenuation
(weakening of the signal)
• A repeater receives the signal from one network and
amplifies and regenerates a strong network
• Repeaters extend the signal so that it can cover longer
distances or be received on the other side of an obstruction
Hubs • Hubs are used to connect different devices for the exchange
of data
• A hub operates at layer 1 (physical layer) of the OSI model
• A hub broadcasts a message to all connected devices
• A hub cannot store Media Access Control (MAC) addresses
14
LAN Components
Component Description
Switches • Switches are used to connect different devices for the
exchange of data
• A switch operates at layer 2 (data link layer) of the OSI model
• A switch is regarded as a more advanced/intelligent version
of a hub
• A switch sends messages only to designated devices
• Switches can store MAC addresses in a lookup table
Bridges • Bridges have the same functionality as switches
• Bridges are software-based, and they are less efficient than
similar hardware based devices, such as switches
• A bridge identifies the MAC address and directs the packet to
its destination
• It also has the ability to store the frame and can act as a
storage and forwarding device
15
LAN Components
Component Description
Routers • A router is regarded as a more advanced/intelligent version of
a switch
• It operates at layer 3 (the network layer) of the OSI model
• A router can monitor, control, and block network traffic
• It can be considered a very basic level of firewall
• Routers can connect two different networks and each
network remains logically separate and can function as an
independent network
• A router identifies the IP address, whereas a switch operates
by identifying MAC addresses
Gateway • A gateway has the capability to translate and connect
different protocols and networks
• It operates at layer 7 (the application layer) of the OSI model
• A gateway can perform much more complex tasks than
connection devices such as switches and routers
16
Network Devices and the OSI Layer
Device Layer
Hub Physical Layer (1st Layer)
Switch Data Link Layer (2nd Layer)
Bridge Data Link Layer (2nd Layer)
Router Network Layer (3rd Layer)
Gateway Application (7th Layer)
17
LAN Risk
18
LAN Risk
19
LAN Security
20
WAN
21
WAN Transmission Media
22
Network Performance Metrics
23
Internet Protocol Networking
24
Network Address Translation (NAT)
25
Network Address Translation (NAT)
• Benefits:
o Cost reduction
o Improved privacy
o Increased security
o Boundary enforcement
26
Computer Hardware Components
• Processing Components:
o Central Processing Unit (CPU)
o Input/Output: Touchscreen
28
Types of Computers
Type Description
Thin-client Thin-client PCs are generally configured with minimal
computers hardware (e.g., diskless workstation), with the intent being that
most processing occurs at the server level using software
Laptop computers Lightweight personal computers are easily transportable and
powered by a normal AC connection or a rechargeable battery
pack
Next unit of The NUC is a small form device or computer element that
computing (NUC) delivers a full desktop PC experience, gaming experience or
edge device experience
Single-board A SBC is a complete functioning computer with the
computer (SBC) microprocessor, input/output (I/O) functions, memory and
other features all built on a single circuit board (e.g.,
Raspberry Pi)
Smartphones, Handheld devices enable users to substitute a small
tablets and other computing device for a laptop computer
handheld devices 29
Enterprise Back-End Devices
• Print servers
• File servers
• Application (program) servers
• Web servers
• Proxy servers
• Database servers
• Data loss prevention (DLP) gateway
• Appliances (specialized devices): Firewalls, IDS/IPS, Switches,
Routers, VPNs, Load balancers
30
Proxy Servers
31
Universal Serial Bus
o Data theft
o Corruption of data
o Compatibility issues
o Loss of confidentiality
32
Universal Serial Bus
o Granular control
o Antivirus policy
33
Wireless Communication Technologies
o Mobility
o Scalability
34
Hardware Maintenance Program
• To ensure proper operation, hardware must be routinely cleaned
and serviced. Maintenance requirements vary based on complexity
and performance workloads (e.g. processing requirements, terminal
access and number of applications running). Maintenance should
be scheduled to closely coincide with vendor-provided
specifications
• When performing an audit of this area, the IS auditor should:
o Verify that the program covers the scope and objectives in
alignment with business requirements, and indicate gaps where
present
o Ensure that a formal maintenance plan has been developed and
approved by management and is being followed
o Identify maintenance costs that exceed the budget or are
excessive
35
Hardware Maintenance Program
• Hardware Monitoring Reports and Procedures:
o Availability reports
o Hardware error reports
o Asset management reports
o Utilization reports
36
Hardware Reviews
• During audits of infrastructure and operations, hardware reviews
should include the following areas:
o Hardware acquisition plan
o Acquisition of hardware
o IT asset management
o Capacity management and monitoring
o Preventive maintenance schedule
o Hardware availability and utilization reports
o Problem logs and job accounting system reports
37
IT Asset Management
• A job schedule is typically created that lists the jobs that must be
run and the order in which they are run, including any
dependencies
• The advantages of using job scheduling software include:
o Job information is setup only once, reducing reliance on
operators and error probability
o Job dependencies are defined so that if a job fails, subsequent
jobs relying on its output will not be processed
o Logs are maintained of all job successes and failures
o Security over access to production data is available
o The burden on manual tasks is reduced or eliminated
39
System Interfaces
40
System Interfaces Risks
41
System Interfaces Controls
42
End User Computing
43
End User Computing
• Results in:
o May contain errors and give incorrect results
o Are not subject to change management or release management,
resulting in multiple, perhaps different, copies
o Are not secured
o Are not backed up
44
End User Computing Security
Risks
Risk Description
Authorization There may be no security mechanism to authorize access
to the system
Authentication There may be no security mechanism to authenticate
users to the system
Audit logging Logging may not be available on standard EUC solutions
(e.g. Microsoft Excel and Access)
Encryption The application may contain sensitive data that has not
been encrypted or otherwise protected
Data loss Applications may not be properly backed up
Compliance risk Applications may store sensitive or private information
Monitoring / auditing Applications may not be captured within IT inventories,
challenges hindering any monitoring processes
Maintenance / Applications and databases may not be included in IT
security patching maintenance and security patching schedules
45
Shadow IT
46
Shadow IT Controls
Control Description
Shadow IT policy A shadow IT policy that aligns with business objectives
and supports security requirements
IT department as a A culture that encourages and rewards the achievement
service-delivery of a strong and supportive relationship between the IT
organization department and business units, with IT functioning in a
consultative way
IT budgeting and A requirement that the IT department review and approve
procurement all IT-related purchases
IT system limiting the number of service providers, networks,
consolidation platforms, devices and/or media used to store, process or
transmit data, and consolidating applications to facilitate
data management and consolidation of environments
(e.g., data centers) to reduce overall technology footprint
47
Shadow IT Controls
Control Description
User access and User administration rights or data access rights that are
administrative rights explicitly assigned. Unassigned users cannot freely install
or adopt new applications
User education A formal IT user education program targeted at personnel
in all business units
User activity Recording and monitoring user activity
monitoring
User data exchange Establishing strong end-point controls
48
Operating Systems
o Windows
o Unix
o Linux
49
Operating Systems Reviews
50
Software Licensing
51
Free Software Licensing Types
Type Description
Open source This software can be listed, modified, and redistributed as
required. However, this should be done in accordance
with the terms and conditions mentioned in the software
license
Freeware Software is free but source code cannot be redistributed,
for example, Adobe Reader
Trial (Shareware) Software is available for free for a trial period and has
limited functionality compared to the full version
52
Paid Software Licensing Types
Type Description
Per central Depends on the power of the server, specifically the number of
processing unit the CPUs, and could include the number of CPU cores
(CPU)
Per seat Depends on the number of unique users of the system
Concurrent Depends on the total number of software users within a
users predefined period
Utilization Depends on how busy the CPU is or the number of users that
are active at any particular time
Per device Depends on the number of individual devices (NOT users) that
connect to the software
Enterprise Usually allows unlimited use of the software throughout an
organization without the need to apply any aforementioned
rules, although there may be some restrictions
Mixed A mix of the previous license types (e.g. a per seat license that
allows only a certain number of devices for each user) 53
Other Software Licensing Types
Type Description
Transaction Calculated based on the number of transactions, such as API
volume call volume
Data volume Based on gigabytes sent or minutes processed
Revenue Calculated as a percentage of revenue or transaction fees
share
54
IS Auditor in detecting Software
Licensing Violations
• Review the listing of all standard, used and licensed application and
system software.
• Obtain copies of all software contracts to determine the nature of
the license agreements (e.g. , an unlimited enterprise license, per-
seat license or individual copies).
• Scan the network to produce a list of installed software by
leveraging software inventory capabilities offered by asset and
vulnerability management solutions to identify rogue equipment and
to catalog installed software.
• Review a list of server specifications, including CPUs and cores, if
required.
• Compare the license agreements with the installed software, noting
any violations.
55
Source Code Management
56
Capacity Management
58
Problem and Incident Management
60
Network Management Tools
Tool Description
Simple Network A TCP/IP-based protocol to monitor, control, and manage
Management configuration. It collects statistics on performance and
Protocol (SNMP) security
Internet Control is a network monitoring protocol specially designed for error
Message Protocol reporting
(ICMP)
61
Change Management Process
62
Change Management Process
63
Patch Management
64
Release Management
65
Configuration Management
66
Operational Log Management
68
Log Management Cycle
69
IT Service-Level Management
o Completeness
o Timeliness
o Security
70
IT Service-Level Management
71
Database Management
73
Hierarchical Database Model
74
Network Database Model
75
Relational Database Model
76
Relational Database Model
77
Object-Oriented Database Model
78
Not Only SQL (NoSQL)
79
Database Checks and Controls
81
Database Checks and Controls
82
Database Normalization
83
Segregation of Duties
84
Segregation of Duties
85
Section B: Business Resilience
86
Section B: Business Resilience
87
Application Resiliency – Clustering
88
Application Resiliency – Clustering
89
Telecommunication Network Resiliency
90
Telecommunication Network Resiliency
• Redundancy:
o Providing extra capacity with a plan to use the surplus capacity if
the normal primary transmission capability is unavailable. For a
LAN, a second cable can be installed through an alternate route
if the primary cable is damaged.
o Providing multiple paths between routers
91
Telecommunication Network Resiliency
• Alternative Routing:
o This is a method of routing the information through some
alternative cables such as copper or fiber-optic cables.
o Other examples include cellular and microwave communication
as alternatives to land circuits and couriers as alternatives to
electronic transmissions.
• Last-mile Circuit Protection
o Last-mile circuit protection is used to create redundancy for local
communication.
92
Telecommunication Network Resiliency
93
Telecommunication Network Resiliency
• Satellite Connectivity:
o In some locations, certain telecommunication options are not
available.
o Broadband satellite service and temporary satellite options can
provide connectivity in distinguishable from cellular networks
that depend on towers.
94
Data Storage Resiliency
95
Data Backup and Restoration
96
Offsite Library Controls
• Secure physical access to library contents, ensuring only
authorized personnel have access.
• Encrypt backup media, especially in transit.
• Ensure that physical construction can withstand fire, heat, water,
etc.
• Locate the library away from the data center preferably in a facility
not subject to the same disaster event to avoid the risk of a disaster
affecting both facilities.
• Ensure an inventory of all storage media and files stored in the
library is maintained for the specified retention time.
• Ensure a record of all storage media and files moved into and outof
the library is maintained for the specified retention/expiration time.
• Ensure that a catalog of information regarding the versions and
location of data files is maintained for the specified retention time
and protected against unauthorized disclosure. 97
Cloud Backup
• Encrypt the data-in-transit as it traverses the Internet to reach the
remote data center.
• Ensure that encrypted data is stored in the cloud library and that
access to the encryption keys is granted on a need-to-know basis.
• Verify that backup and restore times are appropriate to ensure the
RTOs and RPOs. While a typical restore test generally is performed
only on samples.
98
Types of Media
99
Types of Disk-Based Backup Systems
• Virtual tape library (VTL) systems consist of disk storage and
software that control backup and recovery data sets. For an
external user (backup and recovery software), VTLs behave like a
conventional tape library; however, data is stored on a disk array.
• Host-based replication is executed at the host (server) level by
special software running on the host server and on the target
server.
• Disk-array-based replication is the same as host-based
replication; however, the replication is performed at the disk array
level, completely hidden from servers and applications.
• Snapshot technology is flexible, allowing different momentary
copies of volumes or file systems. Depending upon the types of
snapshots, either a full copy is created each time or only the
changed blocks of data or files are replicated.
100
Backup Schemes
Scheme Description
Full Backup • the entire database is backed up every time, regardless of
previous backups.
• A full backup consumes a lot of time and space.
Differential • This type of backup covers only the new data created since
Backup the last full backup.
• This type of backup is faster, requires less media capacity
than a full backup and requires only the last full and
differential backup sets to make a full restoration. It requires
less time to restore than incremental backups but is slower
and requires more media capacity than incremental backups
because backed-up data is cumulative.
101
Backup Schemes
Scheme Description
Incremental • This type of backup covers only the new data created since
Backup the last backup (which could be either a full backup or
another incremental backup).
• Incremental backup is a faster method of backup. It requires
less media capacity, but all backup sets must restore all
changes since a full backup and restoration will take more
time.
102
Business Continuity Plan
• The objective of a BCP process is to manage and mitigate the risk
of disaster to ensure the continuity of business operations. It is
important that the BCP is reviewed and approved by senior
management.
• This will ensure that the BCP is aligned with the business goals.
103
BCP Life Cycle
104
Business Continuity Policy
• A business continuity policy is a document approved by top
management that defines the extent and scope of the
organization’s business continuity effort (a project or an ongoing
program).
105
Risk Assessment
• It is recommended to review the BCP in terms of its adequacy
every time a risk assessment is conducted in order to ensure that
the BCP is aligned with the findings of the organization’s latest risk
assessment.
• Based on the risk assessment, the worst-case scenarios and
corresponding strategies can be incorporated into the BCP.
106
Business Impact Analysis
107
Business Impact Analysis
108
Business Impact Analysis
109
Business Impact Analysis
• Once the critical assets have been determined through the BIA, the
next step is to develop a recovery strategy that ensures the
recovery of critical assets as soon as possible to minimize the
impact of the disaster. A recovery strategy is primarily influenced by
the BIA.
• The BIA and risk assessment have almost the same elements,
except for a downtime analysis, which is an additional component
in the BIA. A downtime analysis determines the acceptable system
downtime.
• The primary criterion for determining the severity of service
disruption is the period during which the system will remain down.
The higher the system downtime, the higher the disruption severity.
110
Classification of Systems
Classification Description
These functions cannot be performed unless they are replaced
by identical capabilities. Critical applications cannot be replaced
Critical
by manual methods. Tolerance to interruption is very low;
therefore, the cost of interruption is very high
These function s can be performed manually, but only for a brief
period. There is a higher tolerance to interruption than critical
Vital systems and, therefore, somewhat lower interruption costs,
provided that functions are restored within a certain time frame
(usually five days or less)
These functions can be performed manually, at a tolerable cost
and for an extended period. While they can be performed
Sensitive
manually, it is usually a difficult process that requires additional
staff
These functions may be interrupted for an extended period, at
Nonsensitive little or no cost to the company, and require little or no catching
up when restored 111
Contents of BCP Plan
112
Plan Testing
113
Plan Testing
114
Auditing Business Continuity
o Plan testing
115
BCP Requirements from the
Perspective of an IS Audit
116
Disaster Recovery Plans (DRP)
117
The BCP versus the DRP
118
RTO/ RPO
119
Other Parameters
120
Recovery Alternatives
121
Recovery Alternatives
• Mirrored Site:
o A fully redundant site with real-time data replication from the
production site.
o Mirrored sites are fully equipped and staffed and can assume
critical processing with no interruption perceived by the users.
o The cost of maintaining a mirrored site is very high compared to
the other alternatives.
• Hot Site:
o A facility with space and basic infrastructure and all the IT and
communications equipment required to support critical
applications, along with office furniture and equipment for use by
the staff.
o Hot sites usually maintain installed versions of the programs
required to support critical applications.
122
Recovery Alternatives
• Mobile Site:
o A packaged, modular processing facility mounted on
transportable vehicles and kept ready to be delivered and set up
at a location that may be specified upon activation.
• Reciprocal Agreements:
o Agreements between separate but similar companies to
temporarily share their IT facilities if one company loses
processing capability.
o A reciprocal agreement is the least expensive as it relies solely
on an arrangement between two firms.
• Reciprocal Agreements with Other Organizations:
o Agreements between two or more organizations with unique
equipment or applications.
124
Recovery Alternatives Summary
125
Organization and Assignment of
Responsibilities
• The DRP should identify the teams with their assigned
responsibilities in the event of an incident/ disaster.
126
Disaster Recovery Testing
127
Disaster Recovery Testing
128
Disaster Recovery Testing
129
Post-assessment
[Link]
130
131
Thank You!
132