S 2.360 Security audits and reporting for storage systems

Initiation responsibility: Top Management, IT Security Officer

Implementation responsibility: IT Security Officer, Administrator, Auditor

The scope and frequency of security audits on storage systems are determined according to the data processed on the particular storage system. For complex systems in which numerous applications store their data on the storage system, the business processes and the specification of the protection level required by these processes must be analysed. In the analysis, the protection level required for the applications and data supporting the essential business processes must be determined in order to obtain the requirements for the frequency and depth of the security audits. As usual, the application with the strictest requirements determines the requirements for the overall system.

A process must therefore be set up to monitor all security-relevant operations. The security reports to be produced regularly must be specified in this process. Since storage systems can be combined to create complex systems, security reports must collect and evaluate the relevant information from a variety of sources. Furthermore, the procedure for handling deviations from the specifications must also be defined. The security reports should be used to provide information to the auditors.

Contents of an audit

An audit compares the security policies to the current settings and data. Such an audit is used to check if the required security settings are properly set and if the required procedures are being followed.

Goal of the security audit

It is important to note that an audit should only serve to determine the facts and not who is at fault (see also S 2.199 Maintaining information security).

Security reporting

The results of an audit can be documented as a simple comparison of the required and actual states. The report should briefly present the specifications from the security policy, for example, and the results of the audit for each specification. If deviations from the requirements are detected and measures for improvement are known, these measures should be written directly in the report.

Independence of the auditors

The audits must be performed by independent auditors, which means someone performing an audit is not permitted to audit him/herself or his/her own work.

Even if the job of the auditors is supported by the administrators of the storage system, they need deeper knowledge of the storage system to perform their task. This knowledge must be obtained and/or updated through regular training measures.

Authorisation of the auditors

If the auditors are to perform their tasks alone without the support of the administrators, an "Auditor" role must be defined for all components of the storage system. This role should be granted "Read Only" rights to all settings and log files of the storage system.

If there are no concrete specifications available from the organisation, the auditors should check the following areas at a minimum:

Review questions: