Tuesday, June 4, 2019

A Case Study Audit Report of Veterans Affairs Association

A Case Study take stock Report of Veterans Affairs AssociationIntroductionThe Veterans Affairs (VA) is subject to the Government credentials polity (GSP) and must ensure compliance with the GSP and operational standards. The VA is creditworthy for the conduct of an examine to determine the cogency and effectiveness of its shelter architectural plan. At the request of the VA, we conducted an audit of hostage to provide worry of the VA with an objective assessment of it security schedule. Overall, we found that the VA met the requirements of the Government surety Policy (GSP) with respect to compliance, efficiency, and effectiveness. The audit provides an overview of the main security measures we observed. We similarly identified aras for improvement.The department of Veterans Affairs InvestigationA Case Study Audit ReportGenerally, the VA has put in ordain a security architectural plan which complies with the GSP and operational standards. The roles and responsibilities of earnest Management, power credential, Physical Security, teaching Technology Security as well as contracting Management Security and Contingency Measures Security are intelligibly defined in the Security Management Structure.The Departmental security officer (DSO) carries out his duties by coordinating, controlling and updating the security program on a regular basis. The VA has implemented adequate mechanisms to ensure the protective cover of sensitive data and assets. The sensitive information and assets are class, designated, de assort or prone of, in compliance with the standards. Emergency and recovery plans are periodically developed, documented and revised, in compliance with the requirements.Public Works and Secure Impact (PWSI) is currently responsible for security screening services which are conducted in compliance with the Security Policy and the Personnel Security Standards. Even though the original agreement in the midst of the two parties for this servi ce is no longer valid. Moreover, certain roles and responsibilities amongst the two parties are not clearly established and defined in the agreement. Presently, the VA determines the security level related to the position requirements and requests the appropriate personnel screening. The PWSI acts as the administrative security officer by granting the level of security requested by the VA.About the AuditThe Veterans Affairs (VA) is responsible for protecting sensitive data much(prenominal) as financial, medical, and personal Veteran and employee information under their authority. The information must be classified and designated considering the provisions for adequate exceptions of the Access to Information Act and the Privacy Act. The data appropriate to information technologies must be classified and specifically designated per their confidentiality, integrity, availability and value. Information and sensitive data must be protected per minimal standards, and related take plac e and threat assessment.The VA is responsible for the implementation of the Security Policy within its trigger and must conduct an internal audit on their compliance with the policy and their efficiency in implementing it at least every year. This audit is conducted within the mannikin of Treasury Board Secretariats requirements in this respect. verifiablesThe objectives of the audit are to ensure the compliance of all sensitive information and goods with the Government Security Policy (GSP) and with the operational standards and the efficiency and effectiveness of the Security Program of the VA. More specifically, the objectives focused on Security organization, Security Management, Physical Security and Personnel Security.Scope of the AuditThe audit covers the followersSecurity Organization the structure of security management at the VA for the overall security program.Security Management the security program, the security educational activity and information programs, the c ategorization and designation of sensitive data, the measures of breastplate for sensitive information, the breaches and violations of security and early(a) security-related incidents, the protection measures taken for external communications.Physical Security the location and layout of installations, the identification and the application of protection measures in the installations, the examination and control of physical security measures.Personnel Security the personnel security investigations, the authorization, refusal and revocation of security levels, the measures required at employees termination of employment.Security and management of emergency cases indispensable actions are taken to protect sensitive information and assets and employees during all types of emergencies.Security and management of contracting security measurements are include with other requirements in contracts involving approach shot to sensitive information.Approach and MethodologyThe audit methodolo gies are comprised of interviews, data gathering, information and line analyses, the study of files and the observation of practices.Findings and Management ResponsesSecurity OrganizationObjective To avouch whether there is in place a security management structure meeting the Agencys requirements for the overall security program, specifically management security, physical security and personnel security.VA has implemented a security management structure which meets the overall security program needs of the Agency. The security responsibilities are clearly defined, established and charge to personnel whose positions include security responsibilities defined in the position description. Secure Impact, a tenant in the same building as VA, is responsible for the development and implementation of the physical security. For personnel security screening VA depends on the services of PW.Area of ImprovementThe audit has found that the agreement between the VA and PW for the delivery of pe rsonnel security screening services has run out. Furthermore, certain roles and responsibilities of PW as related to the security of the VA personnel were not clearly established in the expired agreement.Management ResponseThe VA recognizes the importance of maintaining valid agreements with its service providers, especially when dealing with security issues. The VA as well as appreciates the necessity of having clear roles and responsibilities defined in the agreement and understand by all parties.After being apprised of the above situation, the VA contacted PW to begin negotiation on a new agreement, which would clearly state roles and responsibilities of all parties.The VA will also ensure that this agreement is revised periodically and that it is extended, based on operational requirements.Security ManagementObjective To assure whether a good security program is an integral part of the VAs overall program and meets the GSP requirements and operational standards.The VA current ly has a good security program in place which complies with the requirements of the GSP and operating standards. The responsibilities assigned to security personnel are fully carried out. Guides and procedures have been developed which are used as guidelines for those in charge of security.Area of improvementDevelop a security policy or adapt the TBS security policy to meet the VA requirements.Management ResponseThe VA will review current Government Security Policy and determine how and if it can be adapted to meet VA requirements. Should this not be feasible, the VA will develop its own internal security policy.It should be noted that although the VA has no official internal policy which covers all aspects of security, it does have a policy on electronic mail, which sets out standards for ensuring that established security levels are adhered to and that needed information is preserved.Objective To verify whether there are good security education and training programs.The VA does no t have in place a security education and training program.Area of improvementProvide training to employee with security responsibilities.Management ResponseThe VA is fully supportive in providing training to its employees. Each year, a training plan is submitted by employees and approved by the Chairperson. The VA will ensure that those employees with specific security functions are made aware of and encouraged to take training necessary to meet current and upcoming security requirements.Objective To verify whether sensitive information is classified and designated in compliance with the GSP and operational standards, and whether the classifications and designations are unclassified or eliminated when the information is no longer, or less of a sensitive nature.The VA has implemented a mechanism to ensure that goods of a sensitive nature are classified and designated in compliance with the GSP and operational standards the same mechanism is also being used to declassify or dispose of the same goods.Area of improvementNo recommended improvementObjective To verify whether protection measures are applied for sensitive information, as well as for employees, in compliance with the mandatory standards and with a risk management methodology.The VA has implemented mechanisms to ensure the security of sensitive information. A process is in place to declassify sensitive information when it is no longer sensitive. The controls in place ensure authorized to receive such information.Area of improvementNo recommended improvementObjective To verify whether breaches of security, security violations and other security-related incidents that may happen are the subject of an enquiry, that measures are taken to minimize the losses and that the necessary administrative or disciplinary measures are taken if warranted.Breaches of security, security violations and other security-related incidents are reported to Secure Impact. Secure Impact is responsible to take the necessary adminis trative measures and to ensure follow-up.A mechanism is in place and is used to report security breaches and to prepare reports.Area of improvementNo recommended improvementObjective To verify whether the necessary protection measures are taken for the sensitive information communicated to or from official sources outside the department.The VA follows procedures concerning sensitive information transmitted to official sources outside the department.Area of improvementNo recommended improvementPhysical SecurityObjective To verify whether consideration was given to providing good siting to, as well as adequate retrofit of installations, to reduce or eliminate threats and risks to which the information, and the employees in those installations are exposed.The VA uses the facilities along with other government departments. Secure Impact ensures the physical security, thus reducing or eliminating threats and risks. A physical security committee is established with a representative of the VA. In this regards, the physical security is adequate.Area of improvementNo recommended improvementObjective To verify whether the required physical protection measures are applied in installations, so that sensitive information is well protected.The current physical protection measures ensure that sensitive information is protected.Area of improvementNo recommended improvementObjective To verify whether the physical security measures required are applied in the installations to ensure the protection and security of staff.Implemented physical security measures in the VA facilities ensure employee protection and security.Area of improvementNo recommended improvementObjective To verify whether the physical security measures are periodically reviewed and controlled.Security measures are reviewed and controlled periodically.Area of improvementNo recommended improvementPersonnel SecurityObjective To ensure that the personnel of the VA is subjected to a security check per the Government Security Policy (GSP) and the standard on Personnel SecurityThe audit found that security checks were conducted in compliance with the Government Security Policy (GSP) and the standards on Personnel Security. PW is responsible for the safe storing of personnel records and for the woof in and storing of security investigation forms requests.Area of improvementNo recommended improvementObjective To verify whether the necessary levels of security are authorized, refused and revoked per the GSP and to the personnel security standard, and whether such measures are taken in a just and impartial way.The VA has no record of refusals or revocations of levels of security. The VA recognizes its responsibilities in this matter.Area of improvementNo recommended improvementObjective To verify that the necessary measures are taken to reduce or eliminate any risk for the sensitive information and goods as well as for the departments congenital systems at the termination of employment.The audit f ound that the necessary measures are taken at the termination of employment.Area of improvementNo recommended improvementSecurity and Contracting ManagementObjective Ensure that security requirements are included with other requirements in contracts when they involve access to sensitive information.The VA does not have mechanisms in place to check authorization to access facilities by the contracting parties.Area of ImprovementPut in place a mechanism to check the authority to access the facilities by the contracting parties.Management responseThe VA is fully aware of its responsibility to ensure that only those individuals with proper authority are given access to its facilities. In some cases, authority to access VA facilities is given by another department, such as Secure Impact, but the VA is informed in advance. The VA will ensure that in those situations where another department gives access to its facilities, once the individuals show up, their name and authority will be veri fied with the other department.ConclusionThe audit provides an overview of the main security measures observed, as well as, identifies areas for improvement. The audit methodologies are comprised of interviews, data gathering, information and report analyses, the study of files and the observation of practices. Finally, the audit covers security organization, security management, physical security, personnel security, security and management of emergency cases, and security and management of contracting.Referencehttp//andrei.clubcisco.ro/cursuri/5master/sric-asr/cursuri/Readings/secaudit.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.