You are on page 1of 11

FINAL

Internal Audit
Report

Data Centre
Operations and
Security
Document Details:
Reference: Report nos from monitoring spreadsheet/2013.14
Senior Manager, Internal Audit & Assurance: ext. 6567
Engagement Manager:
Auditor:

Date: 17 September 2014

This report is not for reproduction publication or disclosure by any means to unauthorised persons.

Page 1
Internal Audit Report – Data Centre Operations and Security

1. EXECUTIVE SUMMARY
1.1 INTRODUCTION

As part of the 2014/15 Internal Audit Plan an audit of the ‘Data centre operations and
security’ was carried out.

The objective of this review is to evaluate the security of the data centre, in particular
the following areas:
 data centre policies and procedures are defined, documented, and
communicated for all key functions;
 Council systems are secured to prevent unauthorised access (including 3rd
party access);
 access to the data centre is monitored and reviewed, and access rights are
periodically reviewed;
 data is backed up from servers held at the civic data centre;
 data transferred off site is secured at all times and appropriate controls are in
place to monitor the location of the data;
 environmental controls are present to protect the servers from fire, electrical and
water damage;
 capacity for the data centre is adequate for the server rooms equipment and
storage needs;
 environmental equipment is routinely maintained in line with manufacturer
recommended schedules; and
 backup electricity supplies are in place to ensure systems and services are not
affected in the event of a power outage.

1.2 OVERALL OPINION

The overall opinion of this review is ‘significant assurance’.

There are some areas that are appropriately managed and in line with acceptable good
practice, including:
 A computer room policy has been developed and is reviewed on an annual
basis;
 Backup schedules are in place and failed backups are monitored and actioned
by ICT staff;
 An offsite location is used for storage of backup tapes; and
 Storage capacity for the data centre is considered adequate based on the plans
of ICT.

However, we also identified a number of areas that require improvement, and have
thus led to the ‘limited assurance’ rating:

 Failure to test restores of critical applications regularly;


 Lack of documented back up policy and procedures;
 Excessive computer room access;
 A lack of regular review of the computer room access;

Page 2
Internal Audit Report – Data Centre Operations and Security

 Lack of formalised computer room training as required by the computer room


policy;
 Lack of a visitors register in the computer room, as required by the computer
room policy;
 Lack of a fire suppression system; and
 The backup process is inefficient due to the increase of data over the last five
years.

Recommendations 7 and 8 are included for completeness. Management have agreed a


response to these recommendations in the Disaster Recovery audit report. These
recommendations have not influence the overall opinion.

Overall Audit Opinion


Full assurance Full assurance that the system of internal control meets
the organisation’s objectives and controls are
consistently applied.

 Significant Significant assurance that there is a generally sound


assurance system of control designed to meet the organisation’s
objectives. However, some weaknesses in the design or
inconsistent application of controls put the achievement
of some objectives at some risk.

Limited Limited assurance as weaknesses in the design or


assurance inconsistent application of controls put the achievement
of the organisation’s objectives at risk in some of the
areas reviewed.

No assurance No assurance can be given on the system of internal


control as weaknesses in the design and/or operation of
key control could result or have resulted in failure(s) to
achieve the organisation’s objectives in the area(s)
reviewed.

Page 3
Internal Audit Report – Data Centre Operations and Security

2. SUMMARY OF CONCLUSIONS
2.1 The conclusion for each control objective evaluated as part of this audit was as follows:

Control Objective Assurance


Full Significant Limited None

CO1: data centre policies and procedures are  


defined, documented, and communicated for all key
functions;
CO2: Council systems are secured to prevent 
unauthorised access (including 3rd party access);
CO3: access to the data centre is monitored and 
reviewed, and access rights are periodically
reviewed;
CO4: data is backed up from servers held at the 
data centre;
CO5: data transferred off site is secured at all times 
and appropriate controls are in place to monitor the
location of the data;
CO6: environmental controls are present to protect 
the servers from fire, electrical and water damage;
CO7: capacity for the data centre is adequate for 
the server rooms equipment and storage needs
CO8: environmental equipment is routinely 
maintained in line with manufacturer recommended
schedules
CO9: backup electricity supplies are in place to 
ensure systems and services are not affected in the
event of a power outage

2.2 The recommendations arising from the review are ranked according to their level of
priority as detailed at the end of the report within the detailed audit findings.
Recommendations are also colour coded according to their level of priority with the
highest priorities highlighted in red, medium priorities in amber and lower priorities in
green. In addition, the detailed audit findings include columns for the management
response, the responsible officer and the time scale for implementation of all agreed
recommendations.

2.3 Where high recommendations are made within this report it would be expected that
they should be implemented within three months from the date of the report to ensure
that the major areas of risk have either been resolved or that mitigating controls have
been put in place and that medium and low recommendations will be implemented
within six and nine months respectively.

Page 4
Internal Audit Report – Data Centre Operations and Security

3. LIMITATIONS REGARDING THE SCOPE OF THE AUDIT


The scope of our work will be limited to those areas outlined above.

4. ACKNOWLEDGEMENTS
Audit would like to thank all involved for their assistance during this review.

Page 5
Internal Audit Report – Data Centre Operations and Security

5. DETAILED AUDIT FINDINGS


Ref. Priority Findings Risk Arising/ Recommendation Management Response Responsibility Recommendation
Consequence and Timescale Implemented
(Officer & Date)
CO1: Policies and Procedures
1 Low Lack of Backup Policy and In the absence of a We recommend that the The Computer Room Policy Service
Procedures documented backup Computer Room policy is and description of the data Operations
policy and procedure, expanded to include the back-up and restore service Manager,
On inspection of the Computer there is an increased backup cycle, backup transit are given in two separate End November
room policy, it was noted that risk that backups are and storage arrangements. documents. These can be 2014.
the document does not contain not performed in line combined, giving the back-up
any details on the backup with ICT’s and restore weight by placing
policy and procedure. requirements. This it into policy.
may result in the loss
We accept that the off-site of data, interruption of
backup storage arrangements ICT services and
are detailed in the IT Disaster operational difficulties.
Recovery document.

CO2: Access to the data centre


2 High Excessive access to Unauthorised/inappro The access to all computer The current security group Technical
Computer Room priate physical access rooms should be restricted used within the Door Access Services
to the computer room to and other who require Control System (Net2) to manager, end
On inspection of the access list may result in access to perform their cover the computer rooms is November
dated 14 August 2014, we accidental or responsibilities. also shared with other duty 2014.
noted that there are a total of malicious damage to staff requiring access 'all
65 access cards that provide ICT equipment hours, all doors'.
staff access to the County Hall resulting in loss of The access list should be
computer room. data, interruption of reviewed by management This is inappropriate, as
ICT services and on a regular basis to ensure some staff will require open
Examples of these include the operational difficulties. that the access granted is access to most areas, but
following: valid. Proof of the review not the computer areas.
 20 temporary passes should be maintained.
held by Reception; S&CA have already arranged
 Senior Internal Auditor; with Facilities to create a
Internal Audit Report – Data Centre Operations and Security

Ref. Priority Findings Risk Arising/ Recommendation Management Response Responsibility Recommendation
Consequence and Timescale Implemented
(Officer & Date)
 Audit assistant dedicated access group for
 Two members of the Computer rooms. This will
applications team; be used for appropriate staff
 One staff member from who require access to the
Adult Services & computer rooms only.
Health;
 One staff member from Access to the computer
Children’s Services; rooms will be removed from
 Six temporary the 'all hours, all doors'
contractors; and group.
 One leaver who has
not yet been removed.

We accept that part of the


issues arises due to Reception
issuing an ‘all hours all doors’
pass, that is out of the control
of ICT.

3 Medium Computer Room Access Unauthorised/inappro Where non authorised staff Agreed, S&CA will create a Technical
Logging priate physical access require access to the manual logging process that Services
to the computer room computer room, they should can be used to record manager, end
The computer room policy may result in be accompanied by a access for individuals that do November
states that ‘access to the accidental or member of the ICT team not have access right to the 2014.
central computer rooms must malicious damage to and their access logged computer room within their
be logged. For regular staff ICT equipment (utilising an access log own responsibility.
this can be via the automated resulting in loss of form).
Access Control System, for data, interruption of Will record
other staff, this must be via an ICT services and The log should be reviewed  Date/time
electronic or manual booking operational difficulties. by Management on a  Who requires access
system administered centrally. regular basis (monthly), to Reason for access
identify any unauthorised
The 'booking system' should access.
Internal Audit Report – Data Centre Operations and Security

Ref. Priority Findings Risk Arising/ Recommendation Management Response Responsibility Recommendation
Consequence and Timescale Implemented
(Officer & Date)
show name of the person
accessing the computer room,
data and time from and until,
reason for access and detail of
work to be carried out’. We
noted that there is no ‘booking
system’ in place for visitors.

4 Low Computer Room Training A lack of training may A formalised training S&CA are working in Service
result in staff not programme should be conjunction with Operations
The computer room policy understanding the developed, that includes Development and Training to Manager, and
states that ‘access is granted controls appropriate details of the policies and derive an on-line Computer Development
once users have received for the computer procedures staff must Room Access course to be and Training
training’. There is currently no room. This may result follow, guidance on completed by staff before End December
proof of the training. in accidental or escalation and roles and being allowed access to the 2014.
malicious damage to responsibilities. computer rooms.
We understand that the training ICT equipment
is currently verbal and there is resulting in loss of Evidence of a formal
an intention for ICT to data, interruption of training record should be
implement an online training ICT services and maintained.
course going forward. operational difficulties.

CO3: Management review of data centre access


5 Medium Access List Reviews Unauthorised/inappro We recommend that Agreed, this is good practice Service
priate physical access computer room access lists and will be scheduled within Operations
Access list reviews are to the computer room are reviewed more formally the team. Manager,
performed on an ad-hoc basis. may result in on a regular basis, and End November
The last review was performed accidental or proof of review is retained. 2014.
in February 2014. malicious damage to
IT equipment resulting As a minimum the
We noted that there are many in loss of data, recommended guidance is
users on the access list that interruption of IT every 3 months.
should not have access to the services and
computer room. See CO2 operational difficulties.
Internal Audit Report – Data Centre Operations and Security

Ref. Priority Findings Risk Arising/ Recommendation Management Response Responsibility Recommendation
Consequence and Timescale Implemented
(Officer & Date)
above for details.

In addition there is no evidence


of the access review.

CO4: Data is backed up


6 Medium New Backup System In the event that a Implement a backup system The review of the back-up Service
disaster occurs and that is scalable and process will be done by HP Operations
Netbackup, the backup system data is not therefore can cope with the as the new Service Provider, Manager,
currently in use by the Council, appropriately backed level of data growth within in conjunction with S&CA, to September
was implemented five years up, inability to recover the Council. achieve a solution that will be 2015.
ago. Since the implementation, the data may result in strategic for the needs of the
there has been a 12% annual critical business This system should cope Council and in line with HP
growth of the data that requires functions not being with the demands of Council support model going forward
backup. The backup process recovered in a timely, and projected changes to
has thus become very slow accurate and occur.
and inefficient. controlled fashion.
This could result in
We understand that a budget the loss of data,
for the implementation of a new interruption of ICT
backup system has already services and
been approved and will form operational difficulties
part of the commissioning
process.

7 High Key System restores Refer to IT Disaster Management should Refer to IT Disaster Refer to IT Refer to IT
Recovery report develop a policy on how Recovery report Disaster Disaster
We noted that restores for key often restores will be Recovery Recovery report
systems (SAP and Framework performed and retain all report
i) are not performed on a supporting documentation
regular basis, and no restore
documentation is retained.

Refer to IT Disaster Recovery


Internal Audit Report – Data Centre Operations and Security

Ref. Priority Findings Risk Arising/ Recommendation Management Response Responsibility Recommendation
Consequence and Timescale Implemented
(Officer & Date)
report, section ‘CO4: What
testing is performed to validate
IT Disaster Recovery, how the
outcomes are reported and
corrective actions
implemented’, issue 5.

CO6: Environmental controls are present to protect the servers


8 High Fire suppression system Refer to IT Disaster Refer to IT Disaster Refer to IT Disaster Refer to IT Refer to IT
Recovery report Recovery report Recovery report Disaster Disaster
There is no fire suppression Recovery Recovery report
system in place. report

For more details, refer to IT


Disaster Recovery report,
section ‘CO3: Whether
inclusion of end-to-end
recovery processes and the
identification of interfaces
between dependent and feeder
systems are understood within
the ITDR Plan(s)’, issue 3.

Key to Priorities:

High This is essential to provide satisfactory control of serious risk(s)

Medium This is important to provide satisfactory control of risk

Low This will improve internal control


Internal Audit Report – Data Centre Operations and Security

Limitations relating to the Internal Auditor's work

The matters raised in this report are limited to those that came to our attention, from the relevant sample selected, during the course of our audit and to the
extent that every system is subject to inherent weaknesses such as human error or the deliberate circumvention of controls. Our assessment of the controls
which are developed and maintained by management is also limited to the time of the audit work and cannot take account of future changes in the control
environment.

You might also like