STATE OF NORTH CAROLINA

Similar documents
STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY

UNIVERSITY OF NORTH CAROLINA CHARLOTTE

UNIVERSITY OF NORTH CAROLINA CHAPEL HILL

Review of the Feasibility Plan for Coordinating Operations of the North Carolina Research and Education Network and the State Network Infrastructure

STATE OF NORTH CAROLINA

Office of MN.IT Services Data Centers

Statewide Information Technology Contingency Planning

STATE OF NORTH CAROLINA

Judiciary Judicial Information Systems

REPORT Bill Bradbury, Secretary of State Cathy Pollino, Director, Audits Division

REPORT 2015/010 INTERNAL AUDIT DIVISION

FOLLOW-UP REPORT Industrial Control Systems Audit

Judiciary Judicial Information Systems

Postal Inspection Service Mail Covers Program

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

REPORT 2015/149 INTERNAL AUDIT DIVISION

New Jersey State Legislature Office of Legislative Services Office of the State Auditor. November 16, 2015 to November 30, 2017

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

Subject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento

General Information Technology Controls Follow-up Review

Information Technology Audit

Information Technology General Control Review

Subject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno

Overview of Court Information Technology

AUDIT REPORT. Network Assessment Audit Audit Opinion: Needs Improvement. Date: December 15, Report Number: 2014-IT-03

Information Technology Disaster Recovery Planning Audit Redacted Public Report

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

Title of Nomination: Security Policies and Standards Project/System Manager: Donna Crutcher Title: State Security Manager Agency: Department:

SECURITY & PRIVACY DOCUMENTATION

General Information System Controls Review

DISASTER PREPAREDNESS IN THE COUNTY: IMPROVEMENTS NEEDED

Subject: University Information Technology Resource Security Policy: OUTDATED

COUNTY OF LOS ANGELES DEPARTMENT OF AUDITOR-CONTROLLER

Department of Public Safety and Correctional Services Information Technology and Communications Division

2017 LEGISLATIVE recommendations cyber security

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

Office of Internal Audit

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

TxDOT Internal Audit Materials and Testing Audit Department-wide Report

North Carolina Visit and Assessment Tom Clarke Vice President for Research and Technology National Center for State Courts

Position Description IT Auditor

Prevention of Identity Theft in Student Financial Transactions AP 5800

Internal Audit Follow-Up Report. Multiple Use Agreements TxDOT Office of Internal Audit

REPORT 2015/186 INTERNAL AUDIT DIVISION

NCSC Study on Court Reporters

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

The City of Mississauga may install Closed Circuit Television (CCTV) Traffic Monitoring System cameras within the Municipal Road Allowance.

Mission Statement & Company Overview

Physical and Environmental Security Standards

Data Processing Agreement

Judicial Department Statewide IT Operations

DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, DOMINGUEZ HILLS. Audit Report June 15, 2012

Information Security Policy

DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, LONG BEACH. Audit Report July 24, 2012

Criminal Case Information System for Public Defenders [Section 18B.10 of S. L , as amended by Section 18A.2 of S.L.

North Carolina Department of State Treasurer

TEL2813/IS2820 Security Management

Florida Supervisor of Elections Conference May 22, 2018 Patricia R. Gleason Special Counsel for Open Government Attorney General Pam Bondi

Office of Inspector General Office of Professional Practice Services

Standard for Security of Information Technology Resources

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

N.C. COURT INTERPRETER CERTIFICATION INFORMATION January 2015

The Director reports to the Board of Supervisors and manages the Department. ISD is organized into four distinct business operations:

Response to Santa Barbara County Grand Jury Reports (1) Santa Barbara County Emergency Operations Center (2) Emergency Public Information

manner. IOPA conducts its reviews in conformance with Government Auditing Standards issued by the Comptroller General of the United States.

User Guide for Conflict of Interest Individual Filers

01.0 Policy Responsibilities and Oversight

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager.

Investigating Insider Threats

1997 Minna Laws Chap. February 1, The Honorable Jesse Ventura Governor 130 State Capitol Building

Internal Audit Report DATA CENTER LOGICAL SECURITY

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

ART CENTER AND SATELLITE PLANT

Division of Customer Assistance

Audit and Compliance Committee - Agenda

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

LEVEL I - BRONZE STANDARD

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit

National Defense University and IRMC. National Defense University

Records Retention 101 for Maryland Clerks

{(. }.) Ordinance Fact Sheet 'P..o... ~~

Internal Audit Report. Electronic Bidding and Contract Letting TxDOT Office of Internal Audit

Transcription:

STATE OF NORTH CAROLINA AUDIT OF THE INFORMATION SYSTEMS GENERAL CONTROLS ADMINISTRATIVE OFFICE OF THE COURTS MAY 2004 OFFICE OF THE STATE AUDITOR RALPH CAMPBELL, JR. STATE AUDITOR

AUDIT OF THE INFORMATION SYSTEMS GENERAL CONTROLS ADMINISTRATIVE OFFICE OF THE COURTS MAY 2004

STATE OF NORTH CAROLINA Office of the State Auditor Ralph Campbell, Jr. State Auditor 2 S. Salisbury Street 20601 Mail Service Center Raleigh, NC 27699-0601 Telephone: (919) 807-7500 Fax: (919) 807-7647 Internet http://www.osa.state.nc.us AUDITOR S TRANSMITTAL The Honorable Michael F. Easley, Governor Members of the North Carolina General Assembly Mr. John M. Kennedy, Director of AOC Ladies and Gentlemen: We have completed our audit of the Administrative Office of the Courts (AOC). This audit was conducted during the period from November 4, 2003 through March 24, 2004. The audit was conducted in accordance with Government Auditing Standards and Information Systems Audit Standards. The primary objective of this audit was to evaluate IS general controls at the AOC. The scope of our IS general controls audit included general security, access controls, program maintenance, systems software, systems development, physical security, operations procedures, and disaster recovery. We also followed up on the resolution of several previous audit findings and recommendations and determined the corrective action taken. Other IS general control topics were reviewed as considered necessary. This report contains an executive summary and audit results which detail the areas where the AOC has performed satisfactorily relevant to our audit scope, where improvements should be made, and where further study is necessary. We wish to express our appreciation to the staff of the AOC for the courtesy, cooperation and assistance provided to us during this audit. North Carolina General Statutes require the State Auditor to make audit reports available to the public. Copies of audit reports issued by the Office of the State Auditor may be obtained through one of the options listed in the back of this report. Respectfully submitted, Ralph Campbell, Jr. State Auditor

TABLE OF CONTENTS PAGE EXECUTIVE SUMMARY... 1 AUDIT OBJECTIVES, SCOPE, AND METHODOLOGY... 3 BACKGROUND INFORMATION... 5 AUDIT RESULTS AND AUDITEE RESPONSES... 6 DISTRIBUTION OF AUDIT REPORT..11

EXECUTIVE SUMMARY We conducted an Information Systems (IS) audit at the Administrative Office of the Courts (AOC) from November 4, 2003 through March 24, 2004. The primary objective of this audit was to evaluate the IS general controls in place during that period. Based on our objective, we report the following conclusions. General security involves the establishment of a reasonable security program that addresses the general security of information resources. We did not identify any significant weaknesses in general security during our audit. The access control environment consists of access control software and information security policies and procedures. We noted several weaknesses in access controls. The procedures to administer RACF user ids were not completely developed. See Audit Finding 1, The AOC User Administration Procedures Manual Is Incomplete And Has Not Been Approved By Management, for additional information. See Audit Finding 2, Central Management of RACF Access Needs Improvement, for additional information. Other weaknesses were identified. Due to the sensitive nature of the conditions found in these weaknesses, we have conveyed these findings to management in a separate letter pursuant to the provision of North Carolina General Statute. 147-64.6(c)(18). Program maintenance primarily involves enhancements or changes needed to existing systems. We did not identify any significant weaknesses in program maintenance during our audit. Systems software is the collection of programs that drive the computer. The selection of systems software should be properly approved and the software should be maintained by the computer center. We did not identify any significant weaknesses in systems software during our audit. Systems development includes the creation of new application systems or significant changes to existing systems. Our audit did not identify any significant weaknesses in systems development. Physical security primarily involves the inspection of the agency s computer center for the controls that should reasonably secure the operations of the computer center from foreseeable and preventable threats from fire, water, electrical problems, and vandalism. We found that the AOC computer room is susceptible to damage from fire and/or water. See Audit Finding 3, Computer Room Deficiencies, for additional information. The operations procedures of the computer center include all of the activities associated with running application systems for users. We did not note any significant weaknesses in operations procedures during our audit. A complete disaster recovery plan that is tested periodically is necessary to enable the Agency to recover from an extended business interruption due to the destruction of the computer center or other Agency assets. We did not note any significant weaknesses in disaster recovery procedures during our audit. 1

[ This Page Left Blank Intentionally ] 2

AUDIT OBJECTIVES, SCOPE, AND METHODOLOGY OBJECTIVES Under the North Carolina General Statutes Chapter 147-64.6, the State Auditor is responsible for examining and evaluating the adequacy of operating and administrative procedures and practices, systems of accounting, and other elements of State agencies. IS general control audits are examinations of controls which effect the overall organization and operation of the IS function. This IS audit was designed to ascertain the effectiveness of general controls at the Administrative Office of the Courts. SCOPE General controls govern the operation and management of computer processing activities. The scope of our IS general controls audit was to review general security issues, access controls, program maintenance, systems software, systems development, physical security, operations procedures, and disaster recovery which directly affect the agency s computing operations. Other IS general control topics were reviewed as considered necessary. Our audit was limited to the general controls for which the Administrative Office of the Courts has responsibility. METHODOLOGY We audited policies and procedures, interviewed key administrators and other personnel, examined system configurations, toured the computer facility, tested on-line system controls, reviewed appropriate technical literature, reviewed computer generated reports, and used security evaluation software in our audit of application controls. We conducted our audit in accordance with the standards applicable to performance audits contained in Government Auditing Standards issued by the Comptroller General of the United States and Information Systems Audit Standards issued by the Information Systems Audit and Control Association. 1 1 In 1992 the State created the Information Resource Management Commission to provide statewide coordination of information technology resources planning. The IRMC provides state enterprise IT leadership including increased emphasis and oversight for strategic information technology planning and management; policy development; technical architecture; and project certification. Pursuant to North Carolina General Statute 147-33.78 numerous state officials serve on the IRMC including four members of the Council of State who are appointed by the Governor. The State Auditor has been appointed a member of the IRMC and elected as chair of the IRMC by its members. 3

[ This Page Left Blank Intentionally ] 4

BACKGROUND INFORMATION AOC Court Administration The Administrative Office of the Courts (AOC) is the agency responsible for administrative support of the North Carolina Judicial Department. Its overall mission is to provide administrative leadership, deliver efficient, effective, and equitable administrative support and direct client services, and advance sound business practices and solutions to the trial courts. AOC provides statewide support services for the courts in North Carolina s 100 counties, the North Carolina Supreme Court, and the Court of Appeals, including information technology, field support, personnel, financial, legal, research, and purchasing services. Information Technology One of AOC s major responsibilities is providing information technology (IT) resources to the court system. The Technology Services Division provides information technology support and services for 6,000 judicial employees who work in the 100 courthouses across the state. Judges, clerks of superior court, district attorneys, public defenders, trial court administrators, and magistrates rely on the information systems to track and monitor the 2.5 million cases filed each year in the state's court system. This role includes development and maintenance of new information systems; procurement, maintenance and support of all computer hardware and software; maintenance and development of AOC s statewide network for voice and data communications; and operation of AOC s data center. The AOC also supports the State Highway Patrol (SHP) Computer Aided Dispatch (CAD) application 5

CURRENT AUDIT RESULTS AND AUDITEE RESPONSES The following audit results reflect the areas where the agency has performed satisfactorily and where recommendations have been made for improvement. GENERAL SECURITY ISSUES General security issues involve the maintenance of a sound security management structure. A sound security management structure should include a method of classifying and establishing ownership of resources, proper segregation of duties, a security organization and resources, policies regarding access to the computer systems and a security education program. Our audit did not identify any significant weaknesses in general security. ACCESS CONTROLS The most important information security safeguard that the agency has is its access controls. The access controls environment consists of the agency s access control software and information security policies and procedures. An individual or a group with responsibility for security administration should develop information security policies, perform account administration functions and establish procedures to monitor and report any security violations. AUDIT FINDING 1: THE AOC USER ADMINISTRATION PROCEDURES MANUAL IS INCOMPLETE AND HAS NOT BEEN APPROVED BY MANAGEMENT During our RACF Review, we reviewed the AOC User Administration Procedures Manual in order to determine if management has established procedures to ensure the timely action relating to requesting, establishing, issuing, and closing RACF user accounts. AOC has procedures in place for RACF user accounts administration. However, they have not been fully documented. Therefore, the procedures manual that we received is incomplete and has not been approved by management. An incomplete User Administration Procedures Manual may cause the administration of RACF user accounts to be mismanaged and may result in inappropriate access. Management should establish procedures to ensure timely action relating to requesting, establishing, issuing, suspending and closing of user accounts. A formal approval procedure outlining the data or system owner granting the access privileges should be included. Recommendation: AOC should completely document the AOC User Administration Procedures Manual and have it formally approved by management. Agency Response: As noted, AOC has procedures in place for RACF user accounts administration. However they have not been fully documented. The formal documentation of these procedures has been hindered by a critical lack of resources due to an extended hiring freeze within the judicial branch. The TSD recently received permission to recruit several positions in its security administration group and when the new hires have been trained, this task will be assigned a top priority for completion and formal adoption by TSD management. 6

CURRENT AUDIT RESULTS AND AUDITEE RESPONSES (CONTINUED) AUDIT FINDING 2: CENTRAL MANAGEMENT OF RACF ACCESS NEEDS IMPROVEMENT From our review of RACF access, we noted the following: 1) System access request forms (or its equivalent) for six users could not be located. 2) One user account was created on 6/17/99 while the access request form for that user is dated 11/16/99. 3) One account was created even though the person making the request to have the account created did not have the authority to do so. 4) The access request form for one userid did not have the signature of the requester, date, and contact information for the hiring authority. 5) Written notification of separation for 6 employees could not be located. As a result, user accounts may not be properly administered. Management s intentions may not be followed when establishing user accounts. Also, unauthorized use of terminated employees accounts may occur. The AOC User Administration Procedures Manual establishes policies and procedures for administering user computer accounts. Section 2.3 Request Format states Requests for access to AOC systems may come in three formats: hard copy forms (AOC-A-151), e-mail messages, or voice requests (generally via telephone). Section 2.2.1.1 Security Request Designees states A security request designee is any employee of an agency designated by the agency s hiring authority to make security requests on behalf of the hiring authority. Section 2.5 Request Contents states Every request for access to AOC systems must include the following minimum information. Request that lack any part of this information will be returned to the requestor to provide it. Agency information (County/District name, for the trial division) Hiring authority name and title Contact information for the hiring authority User name, job title, Social Security Number and mother s maiden name The access to be added, changed or removed A separation date, for separation notices Section 2.2.1.3 Requestor Authority for Separation Notices states that Due to the need to protect the court s records from unauthorized access by former employees, a notice of a user s separation will be accepted and processed (terminating all systems access for the separated user) when received from: AOC s Human Resources Division; or Any employee of the separated user s agency. 7

CURRENT AUDIT RESULTS AND AUDITEE RESPONSES (CONTINUED) Recommendation: Although incomplete and not formally approved, AOC has established policies and procedures relating to requesting, establishing, issuing, suspending and closing of user accounts. Management should take action to ensure that these policies and procedures are followed in order to prevent the deficiencies noted. Agency Response: The AOC agrees to enforce the policies and procedures to prevent future deficiencies relating to requesting, establishing, issuing, suspending, and closing of RACF user accounts. Other weaknesses were identified. Due to the sensitive nature of the conditions found in these weaknesses, we have conveyed these findings to management in a separate letter pursuant to the provision of North Carolina General Statute. 147-64.6(c)(18). PROGRAM MAINTENANCE Program maintenance consists of making changes to existing application systems. Programmers should follow program change procedures to ensure that changes are authorized, made according to specifications, properly tested, and thoroughly documented. Application programmers should be restricted to a test environment to ensure that all changes to production resources are tested and approved before moving the changes into production. Changes to application system production programs should be logged and monitored by management. Our audit did not identify any significant weaknesses in program maintenance. SYSTEMS SOFTWARE Systems software is the collection of programs that the computer center uses to run the computer and support the application systems. This software includes the operating system, utility programs, compilers, database management systems and other programs. The systems programmers have responsibility for the installation and testing of upgrades to the system software when received. Systems software changes should be properly documented and approved. Our audit did not identify any significant weaknesses in systems software. 8

CURRENT AUDIT RESULTS AND AUDITEE RESPONSES (CONTINUED) SYSTEMS DEVELOPMENT Systems development includes the creation of new application systems or significant changes to existing systems. Systems development projects can be expensive and affect the operations of the agency in significant ways. Consequently, the agency should have a strategic or master plan for systems development. Each development project should be managed using project management techniques and should adhere to a clearly defined systems development methodology. When a project is completed, the finished product should include a comprehensive set of documentation so that the users, operators and programmers each have the information they need to do their jobs. Our audit did not identify any significant weaknesses in systems development. PHYSICAL SECURITY Controls over physical security are designed to protect a computer center from service interruptions resulting from fire, water, electrical problems, vandalism, and other causes. The Agency s physical security controls ensure that the computer service center is reasonably secure from foreseeable and preventable threats to its physical continuity. AUDIT FINDING 3: COMPUTER ROOM DEFICIENCIES The following weaknesses were noted in physical security of the computer room which houses the Mainframe and the WAN/LAN equipment: 1. There are no smoke detectors in the tape library, supply storage areas, rooms adjacent to the computer room, heating and air conditioning vents, and under raised floors. 2. There is no fire alarm system in the computer room. 3. There are no water detectors under the raised floor and the building is susceptible to flooding due to its location in a low-lying area. 4. There is no emergency power off switch. As a result, continuity of operations may be affected. Recommendation: IT management should assure that sufficient measures are put in place and maintained for protection against environmental factors (e.g., fire, dust, power, excessive heat and humidity). The agency should perform a risk assessment and evaluate the risk of fire and water damage to the agency. The agency should then use the risk assessment to justify taking the necessary actions to ensure protection of its computer equipment. Agency Response: AOC s data center in Raleigh is in full compliance with local fire regulations. The AOC intends, over time, to consolidate its Raleigh-based offices including its data center. We do not have funding at this time to relocate the data center but will undertake a risk assessment to explore possible way to mitigate risks at our current location. 9

CURRENT AUDIT RESULTS AND AUDITEE RESPONSES (CONCLUDED) OPERATIONS PROCEDURES The operations of the computer center include all of the activities associated with running application systems for users. Procedures should be in place to control the scheduling and running of production jobs, restarting production jobs when problems occur, storing, handling and mounting of tapes, and maintaining computer equipment. We did not note any significant weakness in the operations procedures of the computer center during our review. DISASTER RECOVERY Disasters such as fire and flood can destroy a computer service center and leave its users without computer processing support. Without computer processing, many agency services would grind to a halt. To reduce this risk, computer service centers develop disaster recovery plans. Disaster recovery procedures should be tested periodically to ensure the recoverability of the data center. We did not note any significant weakness in disaster recovery planning during our review. 10

DISTRIBUTION OF AUDIT REPORT In accordance with General Statute 147-64.5 and. General Statute 147-64.6(c)(14), copies of this report have been distributed to the public officials listed below. Additional copies are provided to other legislators, state officials, the press, and the general public upon request. EXECUTIVE BRANCH The Honorable Michael F. Easley The Honorable Beverly M. Perdue The Honorable Richard H. Moore The Honorable Roy A. Cooper, III Mr. David T. McCoy Mr. Robert L. Powell Mr. John M. Kennedy Governor of North Carolina Lieutenant Governor of North Carolina State Treasurer Attorney General State Budget Officer State Controller Director Administrative Office of the Courts LEGISLATIVE BRANCH Appointees to the Joint Legislative Commission on Governmental Operations President Pro Tempore Senator Marc Basnight, Co-Chair Senator Charles W. Albertson Senator Patrick J. Ballantine Senator Daniel G. Clodfelter Senator Walter H. Dalton Senator Charlie S. Dannelly Senator James Forrester Senator Linda Garrou Senator Wilbur P. Gulley Senator Fletcher L. Hartsell, Jr. Senator David W. Hoyle Senator Ellie Kinnaird Senator Jeanne H. Lucas Senator Stephen M. Metcalf Senator Anthony E. Rand Senator Eric M. Reeves Senator Robert A. Rucho Senator R. C. Soles, Jr. Senator Scott Thomas Speaker of the House Representative James B. Black, Co-Chair Representative Richard T. Morgan, Co-Chair Representative Martha B. Alexander Representative Rex L. Baker Representative Bobby H. Barbee, Sr. Representative Harold J. Brubaker Representative Debbie A. Clary Representative E. Nelson Cole Representative James W. Crawford, Jr. Representative William T. Culpepper, III Representative W. Pete Cunningham Representative W. Robert Grady Representative Joe Hackney Representative Julia C. Howard Representative Joe L. Kiser Representative Edd Nye Representative William C. Owens, Jr. Representative Wilma M. Sherrill Representative Thomas E. Wright Other Legislative Officials Mr. James D. Johnson Director, Fiscal Research Division Other Officials Chairman and Members of the Information Resource Management Commission 11

ORDERING INFORMATION Copies of this report may be obtained by contacting the: Office of the State Auditor State of North Carolina 2 South Salisbury Street 20601 Mail Service Center Raleigh, North Carolina 27699-0601 Internet: http://www.ncauditor.net Telephone: 919/807-7500 Facsimile: 919/807-7647