Subject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento

Similar documents
Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

Subject: Audit Report 16-50, IT Disaster Recovery, California State University, Fresno

Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up.

EMERGENCY MANAGEMENT

DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, DOMINGUEZ HILLS. Audit Report June 15, 2012

ART CENTER AND SATELLITE PLANT

DATA CENTER OPERATIONS CALIFORNIA STATE UNIVERSITY, LONG BEACH. Audit Report July 24, 2012

REPORT 2015/149 INTERNAL AUDIT DIVISION

Date: December 11, 2015 TECHNICAL LETTER HR/EHDB From: Evelyn Nazario Theresa Hines

HIPAA COMPLIANCE CALIFORNIA STATE UNIVERSITY, LOS ANGELES. Audit Report October 29, 2010

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA FAYETTEVILLE STATE UNIVERSITY

Academic Planning Database Web-Based User Guide

Employee Projection System Campus User Guide

Office of Semester Conversion UNIVERSITY LIBRARY, ROOM Carlos Bee Boulevard, Hayward, California 94542

UNIVERSITY OF NORTH CAROLINA CHARLOTTE

Standard CIP Cyber Security Critical Cyber Asset Identification

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

Public Safety Canada. Audit of the Business Continuity Planning Program

Audit & Advisory Services. IT Disaster Recovery Audit 2015 Report Date January 28, 2015

INTERNAL AUDIT DIVISION REPORT 2017/138

General Information Technology Controls Follow-up Review

UCLA AUDIT & ADVISORY SERVICES

Standard CIP Cyber Security Critical Cyber Asset Identification

STATE OF NORTH CAROLINA

REPORT 2015/186 INTERNAL AUDIT DIVISION

AUDIT UNITED NATIONS VOLUNTEERS PROGRAMME INFORMATION AND COMMUNICATION TECHNOLOGY. Report No Issue Date: 8 January 2014

INFORMATION SECURITY- DISASTER RECOVERY

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

REPORT 2015/010 INTERNAL AUDIT DIVISION

Number: USF System Emergency Management Responsible Office: Administrative Services

Subject: University Information Technology Resource Security Policy: OUTDATED

TUFTS HEALTH PLAN CORPORATE CONTINUITY STRATEGY

Internal Audit Report. Electronic Bidding and Contract Letting TxDOT Office of Internal Audit

Business Continuity Planning

Information Technology Disaster Recovery Planning Audit Redacted Public Report

STATE OF NORTH CAROLINA

UNIVERSITY OF NORTH CAROLINA CHAPEL HILL

Appendix 3 Disaster Recovery Plan

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

Introduction to Business continuity Planning

SENSITIVE DATA SECURITY AND PROTECTION CALIFORNIA STATE UNIVERSITY, CHANNEL ISLANDS. Audit Report June 25, 2013

Information Technology General Control Review

Statewide Information Technology Contingency Planning

IT Managed Services. Schedule 1 Specification 11/07/18

SENSITIVE DATA SECURITY AND PROTECTION CALIFORNIA STATE UNIVERSITY, SAN BERNARDINO. Audit Report July 10, 2013

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

Security Guideline for the Electricity Sector: Business Processes and Operations Continuity

Table of Contents. Sample

Policies and Procedures Date: February 28, 2012

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Texas A&M University: Learning Management System General & Application Controls Review

Standard for Security of Information Technology Resources

TAC 202 Requirements 2017

FOLLOW-UP REPORT Industrial Control Systems Audit

CYBER SECURITY POLICY REVISION: 12

INTERNAL AUDIT DIVISION REPORT 2017/037

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning

SCO Audit Tales. Chapter I. California State University, Sacramento

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II

STRATEGIC PLAN. USF Emergency Management

NUIT Tech Talk. Emergency Preparedness. March 1, Sharlene Mielke. Jay Bagley. Disaster Recovery / Business Continuity Coordinator

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009

INFORMATION SECURITY CALIFORNIA STATE UNIVERSITY, CHICO. Audit Report November 7, 2008

Business Continuity - An Inside Perspective

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Disaster Recovery and Business Continuity Planning (Mile2)

Business Continuity and Disaster Recovery

Frontiers of Risk. Don t Be Afraid: Business Continuity Plan Development Only Hurts A Little!

Certified Information Systems Auditor (CISA)

Cyber Security Standards Drafting Team Update

Florida State University

Business Continuity Planning

Memorandum APPENDIX 2. April 3, Audit Committee

The Texas A&M University System Internal Audit Department MONTHLY AUDIT REPORT

Report. Diemer Plant Improvements Program Audit Report. Internal Audit Report for January 2011

The Texas A&M University System Internal Audit Department MONTHLY AUDIT REPORT

MNsure Privacy Program Strategic Plan FY

SCO Audit Tales. Chapter II Sonoma State University

Critical Cyber Asset Identification Security Management Controls

Office of Internal Audit

KSU Policy Category: Information Technology Page 1 of 5

Inspector General. Report on the Peace Corps Information Security Program. Peace Corps Office of. Background FISCAL YEAR 2017

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

Internal Audit Follow-Up Report. Multiple Use Agreements TxDOT Office of Internal Audit

Office of MN.IT Services Data Centers

HIPAA RISK ADVISOR SAMPLE REPORT

UF CEMP Support Group Annex: IT Group

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

UNIT PLAN PART A Program/Pathway Update

Service Level Agreement (SLA) for The Texas State University System Office

Data Recovery Policy

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

Standard Development Timeline

Business Continuity: How to Keep City Departments in Business after a Disaster

Transcription:

Larry Mandel Vice Chancellor and Chief Audit Officer Audit and Advisory Services 401 Golden Shore, 4th Floor Long Beach, CA 90802-4210 562-951-4430 562-951-4955 (Fax) lmandel@calstate.edu October 23, 2018 Dr. Robert S. Nelsen, President California State University, Sacramento 6000 J Street Sacramento, CA 95819 Dear Dr. Nelsen: Subject: Audit Report 18-84, IT Disaster Recovery, California State University, Sacramento We have completed an audit of IT Disaster Recovery as part of our 2018 Audit Plan, and the final report is attached for your reference. The audit was conducted in accordance with the Institute of Internal Auditors International Standards for the Professional Practice of Internal Auditing. I have reviewed the management response and have concluded that it appropriately addresses our recommendations. The management response has been incorporated into the final audit report, which has been posted to Audit and Advisory Services website. We will follow-up on the implementation of corrective actions outlined in the response and determine whether additional action is required. Any observations not included in this report were discussed with your staff at the informal exit conference and may be subject to follow-up. I wish to express my appreciation for the cooperation extended by the campus personnel over the course of this review. Sincerely, Larry Mandel Vice Chancellor and Chief Audit Officer c: Timothy P. White, Chancellor CSU Campuses Bakersfield Channel Islands Chico Dominguez Hills East Bay Fresno Fullerton Humboldt Long Beach Los Angeles Maritime Academy Monterey Bay Northridge Pomona Sacramento San Bernardino San Diego San Francisco San José San Luis Obispo San Marcos Sonoma Stanislaus

CSU The California State University Audit and Advisory Services IT DISASTER RECOVERY California State University, Sacramento Audit Report 18-84 September 25, 2018

EXECUTIVE SUMMARY OBJECTIVE The objectives of this audit were to determine whether an appropriate governance structure exists to address program and facility readiness and resource planning for the recovery of data processing services following a catastrophic event; to ascertain the effectiveness of operating controls related to information technology disaster recovery (ITDR) planning and preparedness; and to evaluate adherence to the Integrated California State University Administrative Manual (ICSUAM) business continuity and disaster recovery policy and compliance with relevant regulations, Trustee policy, and other Office of the Chancellor directives. CONCLUSION We found the control environment for some of the areas reviewed to be in need of improvement. Based upon the results of the work performed within the scope of the audit, except for the weaknesses described below, the operational and administrative controls for ITDR as of August 3, 2018, taken as a whole, provided reasonable assurance that risks were being managed and objectives were met. ITDR planning is a critical function of the information technology (IT) department and a key element of the campus business continuity plan. The central information resources and technology (IRT) ITDR plan at California State University, Sacramento (Sacramento State) was current; however, business impact assessments (BIA) were not always reviewed and updated annually as required by Executive Order (EO) 1014, and BIAs for some business units did not document the business dependence and expectation for recovery of IT services. In addition, the campuswide ITDR plan did not include a comprehensive test plan, though the campus had implemented redundant systems and facilities to help mitigate local disasters affecting the IRT data center and decentralized IT operations server rooms. Also, campus business units had not documented manual procedures that may be required to conduct business in the event that data-processing capabilities were unavailable for an extended period, including steps for the recovery and re-creation of any lost data. Specific observations, recommendations, and management responses are detailed in the remainder of the report. Audit Report 18-84 Audit and Advisory Services Page 1

OBSERVATIONS, RECOMMENDATIONS, AND RESPONSES 1. BUSINESS IMPACT ASSESSMENTS OBSERVATION Administration of campus BIAs needed improvement. We found that: BIAs were not always reviewed and updated annually as required by EO 1014. BIAs for some business units did not document the business dependence and expectation for recovery of IT services by specifying the number of days the units could continue without data-processing services before the business operation would be severely impacted. EO 1014 requires campuses to review BIAs annually and identify essential business application systems that would need to be restored in the event of a disaster. In addition, BIAs are essential in establishing recovery priorities and a recovery timeline by documenting the length of time data-processing services could be disrupted before business activities would be severely impacted. RECOMMENDATION We recommend that the campus: a. Develop a process to review and update BIAs annually. b. Ensure that BIAs for business units document the business dependence and expectation for recovery of IT services by specifying the number of days the units could continue without data-processing services before the business operation would be severely impacted. MANAGEMENT RESPONSE We concur. a. The campus has a process to review and update BIAs annually; however, the process has not been carried out consistently due to failures in the aging business continuity planning software currently in use. The campus will procure new business continuity planning software and will develop a revised process for reviewing and updating BIAs annually as part of the transition to the new software. b. The campus will develop a process for documenting the business dependence and expectation for recovery of IT services as part of the transition to new business continuity planning software. The process will ensure that BIAs specify the number of days a unit could continue without data-processing services before the business operation would be severely impacted Audit Report 18-84 Audit and Advisory Services Page 2

Estimated completion date: March 25, 2019 2. DISASTER RECOVERY TEST PLAN OBSERVATION The campus had not developed a comprehensive ITDR test plan or performed tests to validate the ITDR plan strategy. EO 1014 requires the campus to create a detailed recovery test plan and test all key components of the plan within a seven-year time frame. The absence of a current, tested, and easily executable business continuity and ITDR plan could result in unnecessary financial and non-financial losses in the event of a disaster and could create recovery delays outside of management expectations. RECOMMENDATION We recommend that the campus develop a comprehensive ITDR test plan and perform tests to validate the ITDR plan strategy. MANAGEMENT RESPONSE We concur. The campus will develop a comprehensive ITDR test plan and perform tests to validate the ITDR plan strategy. The test plan will include information on, for example, service documentation, test parameters, service migration, and service restoration. Estimated completion date: February 28, 2019 3. HOSTED SERVICES DOCUMENTATION OBSERVATION The campus IRT department did not have a memorandum of understanding or service level agreement for the IT services provided to other campus organizations in its data center. RECOMMENDATION We recommend that the campus create a memorandum of understanding or service level agreement for the IT services provided to other campus organizations in its data center. MANAGEMENT RESPONSE We concur. The campus will create a memorandum of understanding (MOU) for IT services provided to other campus organizations in its data center. The MOU will reference the campus IT disaster recovery plan, which will provide an anticipated recovery time frame for IT services provided to other campus organizations in the data center. Audit Report 18-84 Audit and Advisory Services Page 3

Estimated completion date: December 31, 2018 4. MANUAL PROCESSING AND DATA RESTORE PROCEDURES OBSERVATION Campus business units had not documented manual desk procedures that may be required to conduct business in the event that data-processing capabilities were unavailable for an extended period. Additionally, business units had not documented the procedures necessary to recover or recreate lost data in the event of a disaster. RECOMMENDATION We recommend that the campus document: a. The manual desk procedures required to conduct business in the event that dataprocessing capabilities are unavailable for an extended period. b. Procedures necessary to recover or re-create lost data in the event of a disaster. MANAGEMENT RESPONSE We concur. a. The campus will develop a process for documenting the manual desk procedures required to conduct essential business functions in the event that data-processing capabilities are unavailable for an extended period as part of the transition to new business continuity planning software. b. The campus will develop a process for documenting the procedures necessary to recover or re-create lost data for essential business functions in the event of a disaster as part of the transition to new business continuity planning software. Estimated completion date: March 25, 2019 Audit Report 18-84 Audit and Advisory Services Page 4

GENERAL INFORMATION BACKGROUND ITDR planning is a specific subset of the campus business continuity planning process that addresses how the IT resources required to operate critical business functions will be restored in a timely and effective manner following a disaster. ITDR planning requires the interaction of individuals at every level of an organization and a recognition by the organization that, in today s computer-driven work environment, the loss of data-processing capabilities can lead to significant financial loss and non-financial exposures if an organization has not planned properly for such an occurrence. The ITDR planning process requires the evaluation and consideration of several factors, including: Who will coordinate the recovery activities, and which supporting groups will report to that coordinator. How business units will be impacted if data-processing capabilities are lost. Which IT systems are critical to support those business units. How systems will be restored in the event of a disaster, whether alternate processing facilities will be necessary, whether backup hardware should be stockpiled, and whether insurance coverage will be needed to cover the costs of recovery activities. The kind of training individuals involved with the recovery activities will need to ensure they will be prepared to respond to a disaster in a concise and coordinated manner. What incidents have occurred in the past that tested the recovery capabilities of the IT systems, how plans have been modified as a result of the incidents, and what simulated testing is required to refine the effectiveness of the plan. Because organizational and operational design variances exist between the 23 campuses and the Office of the Chancellor, each campus process must consider many unique factors. Campuses have been directed to prepare ITDR plans for disasters via multiple directives, including, but not limited to, Executive Order (EO) 1014 and ICSUAM 8085.0. ICSUAM 8085.0, Business Continuity and Disaster Recovery, represents the most recent and specific guidance to campuses in regard to ITDR planning. Simply stated, the policy directs campuses to ensure that information assets can continue to operate or, in a reasonable time frame, be supplanted by backup systems so that minimal interruption of critical business services occurs in the event of a disaster or other emergency event. Although the policy itself does not provide detailed operational requirements, it can be surmised that the campuses must consider a multitude of factors such as restart times, backup and recovery procedures, system security (environmental, physical, and logical), and system interdependence and redundancy to ensure a satisfactory level of continued operational capacity. Audit Report 18-84 Audit and Advisory Services Page 5

SCOPE At Sacramento State, the campuswide ITDR plan consists of separate ITDR plans managed by the various campus technical operations teams, such as IRT, University Enterprises, Inc., Associated Students of California State University, Sacramento, and the College of Continuing Education, among others. In the event of a disaster, the IRT department is responsible for restoring the core campus technological infrastructure such as internet and network connectivity, virtual server hardware, and Domain Naming Service, and campus business units are responsible for restoring their individually owned hardware and software components. The risk management and public safety departments serve as the lead coordinating departments for the campuswide business continuity plan and disaster recovery preparedness, response, and mitigation. ITDR was last audited at Sacramento State in 2011. We visited the Sacramento State campus from July 9, 2018, through August 3, 2018. Our audit and evaluation included the audit tests we considered necessary in determining whether operational and administrative controls are in place and operative. The audit focused on procedures in effect from January 1, 2017, through August 3, 2018. Specifically, we reviewed and tested: The administration of the ITDR program to ensure there is a defined mission, stated goals and objectives, clear lines of organizational authority and responsibility, and adequate funding. Whether the ITDR plan is reviewed and modified on a regular basis, modifications reflect the needs of the campus and business units, and plans are integrated with the campus business continuity plan. Whether the campus business unit s business impact assessments are considered in determining the prioritization of systems and their recovery time expectations. Whether an adequate emergency operations center (EOC) exists; sufficient equipment, supplies, and other critical resources are properly provisioned; and the campus is fully prepared for emergencies affecting data-processing activities. The ITDR plan to determine whether it clearly identifies who has authority and responsibility for emergencies and incidents and whether the emergency organization is sufficient to ensure that campus command/incident command techniques provide command and control when emergency incidents occur. The adequacy of system redundancy or alternate processes that were developed to ensure minimal interruption of critical business services. System backups and record retention to ensure they are sufficient to meet the recovery objectives of the campus. Audit Report 18-84 Audit and Advisory Services Page 6

CRITERIA AUDIT TEAM Training to ensure that it has been provided to employees, disaster recovery staff, and building marshals who are expected to execute the ITDR plan. Whether routinely scheduled simulated tests of plan components are conducted. Whether end-user desk procedures define the actions required to adequately synchronize data recovery and restoration efforts. As a result of changing conditions and the degree of compliance with procedures, the effectiveness of controls changes over time. Specific limitations that may hinder the effectiveness of an otherwise adequate system of controls include, but are not limited to, resource constraints, faulty judgments, unintentional errors, circumvention by collusion, and management overrides. Establishing controls that would prevent all these limitations would not be cost-effective; moreover, an audit may not always detect these limitations. Our testing and methodology was designed to provide a managerial-level review of ITDR practices, which included campus policy; governance and risk management; completeness of planning documentation, including replacement equipment contract details and recovery provisions; security and adequacy of data center and alternative site controls; data backup and availability; and manual operating desk procedures. Our testing approach was designed to provide a broad view of controls surrounding ITDR practices. Our audit was based upon standards as set forth in California State University Board of Trustee policies; Office of the Chancellor policies, letters, and directives; campus policies and procedures; and other sound administrative practices. This audit was conducted in conformance with the Institute of Internal Auditors International Standards for the Professional Practice of Internal Auditing. This review emphasized, but was not limited to, compliance with: ICSUAM 8085.0, Business Continuity and Disaster Recovery EO 1014, California State University Business Continuity Program IT Audit Manager: Greg Dove Senior IT Auditor: Summy Voong Audit Report 18-84 Audit and Advisory Services Page 7