19.01.2015 Views

Commonwealth of Virginia Single Audit Report for the Year Ended ...

Commonwealth of Virginia Single Audit Report for the Year Ended ...

Commonwealth of Virginia Single Audit Report for the Year Ended ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

details <strong>of</strong> <strong>the</strong>se weaknesses to management in a separate document marked Freedom <strong>of</strong> In<strong>for</strong>mation<br />

Act Exempt under Section 2.2-3705.2 <strong>of</strong> <strong>the</strong> Code <strong>of</strong> <strong>Virginia</strong>, due to <strong>the</strong>ir sensitivity and<br />

description <strong>of</strong> <strong>the</strong> security system.<br />

We recommend that ABC utilizes a compliance validation tool to determine an appropriate<br />

baseline <strong>for</strong> <strong>the</strong> POS server configuration security settings. Additionally, we recommend that ABC<br />

configure all <strong>of</strong> <strong>the</strong>ir remote store servers in accordance with Center <strong>for</strong> Internet Security best<br />

practices and <strong>the</strong> <strong>Commonwealth</strong>’s In<strong>for</strong>mation Security Standard, SEC501-06.<br />

Management Plan <strong>for</strong> Corrective Action <strong>for</strong> Alcoholic Beverage Control<br />

ABC plans to address several outstanding issues as part <strong>of</strong> a current Center <strong>for</strong><br />

Internet Security (CIS) remediation project. All issues that will be addressed are<br />

expected to be completed by March 1, 2012. For <strong>the</strong> remaining issues, ABC has<br />

reviewed <strong>the</strong> server configuration and has legitimate business need <strong>for</strong> most <strong>of</strong> <strong>the</strong><br />

requirements that have not been met. For <strong>the</strong>se, ABC will identify risks <strong>for</strong> <strong>the</strong><br />

business owners to accept, document mitigating controls, and file SEC501 exceptions.<br />

The anticipated date <strong>for</strong> risk documentation and exception filing is March 30, 2012.<br />

Responsible Party: Andrew Hallberg, In<strong>for</strong>mation Security Officer<br />

Estimated Completion Date: March 30, 2012<br />

11-12: Improve Database Security<br />

Applicable to: Department <strong>of</strong> Motor Vehicles<br />

Motor Vehicles does not use minimum database administrator account controls to adequately<br />

detect or prevent possible malicious or unintentional modification or disclosure <strong>of</strong> sensitive data.<br />

The <strong>Commonwealth</strong>’s in<strong>for</strong>mation security standard, SEC 501, and <strong>the</strong> Center <strong>for</strong> Internet Security<br />

(CIS) Oracle best practices recommend organizations to use certain account controls to minimize<br />

risks to sensitive data. Since our recommendations include descriptions <strong>of</strong> security mechanisms,<br />

which are exempt from public disclosure by <strong>the</strong> Code <strong>of</strong> <strong>Virginia</strong>, management received a separate<br />

document containing a detailed description <strong>of</strong> our recommendation. The following is a public<br />

summary <strong>of</strong> our findings.<br />

Database administrator accounts are privileged accounts with direct access to <strong>the</strong> database<br />

and that have rights to add, change, and delete data without restriction normally found in user<br />

applications.<br />

• DMV does not use automated controls to en<strong>for</strong>ce database administrator account<br />

compliance with password policies.<br />

• DMV does not review specific escalated privileges given to database roles.<br />

• DMV does not log and periodically review specific database administrator account<br />

activity.<br />

23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!