Alma Toys is an imaginaty company and they recently decided to open into global markets via online sales. Upon a Security Audit, we have found that there are many key security areas that the company lacks confiance. Here is the result of our audit :

Alma Toys: Scope, goals, and risk assessment report

Scope and goals of the audit

Scope: The scope of this audit is defined as the entire security program at Alma Toys. This includes their assets like employee equipment and devices, their internal network, and their systems. You will need to review the assets Alma Toys has and the controls and compliance practices they have in place.
Goals: Assess existing assets and complete the controls and compliance checklist to determine which controls and compliance best practices that need to be implemented to improve Alma Toys’ security posture.

Current assets

Assets managed by the IT Department include:
On-premises equipment for in-office business needs
Employee equipment: end-user devices (desktops/laptops, smartphones), remote workstations, headsets, cables, keyboards, mice, docking stations, surveillance cameras, etc.
Storefront products available for retail sale on site and online; stored in the company’s adjoining warehouse
Management of systems, software, and services: accounting, telecommunication, database, security, ecommerce, and inventory management
Internet access
Internal network
Data retention and storage
Legacy system maintenance: end-of-life systems that require human monitoring

Risk assessment

Risk description

Currently, there is inadequate management of assets. Additionally, Alma Toys does not have all of the proper controls in place and may not be fully compliant with U.S. and international regulations and standards.

Control best practices

The first of the five functions of the NIST CSF is Identify. Alma Toys will need to dedicate resources to identify assets so they can appropriately manage them. Additionally, they will need to classify existing assets and determine the impact of the loss of existing assets, including systems, on business continuity.

Risk score

On a scale of 1 to 10, the risk score is 8, which is fairly high. This is due to a lack of controls and adherence to compliance best practices.
Additional comments
The potential impact from the loss of an asset is rated as medium, because the IT department does not know which assets would be at risk. The risk to assets or fines from governing bodies is high because Alma Toys does not have all of the necessary controls in place and is not fully adhering to best practices related to compliance regulations that keep critical data private/secure. Review the following bullet points for specific details:

  • Currently, all Alma Toys employees have access to internally stored data and may be able to access cardholder data and customers’ PII/SPII.
  • Encryption is not currently used to ensure confidentiality of customers’ credit card information that is accepted, processed, transmitted, and stored locally in the company’s internal database.
  • Access controls pertaining to least privilege and separation of duties have not been implemented.
  • The IT department has ensured availability and integrated controls to ensure data integrity.
  • The IT department has a firewall that blocks traffic based on an appropriately defined set of security rules.
  • Antivirus software is installed and monitored regularly by the IT department.
  • The IT department has not installed an intrusion detection system (IDS).
  • There are no disaster recovery plans currently in place, and the company does not have backups of critical data.
  • The IT department has established a plan to notify E.U. customers within 72 hours if there is a security breach. Additionally, privacy policies, procedures, and processes have been developed and are enforced among IT department members/other employees, to properly document and maintain data.
  • Although a password policy exists, its requirements are nominal and not in line with current minimum password complexity requirements (e.g., at least eight characters, a combination of letters and at least one number; special characters).
  • There is no centralized password management system that enforces the password policy’s minimum requirements, which sometimes affects productivity when employees/vendors submit a ticket to the IT department to recover or reset a password.
  • While legacy systems are monitored and maintained, there is no regular schedule in place for these tasks and intervention methods are unclear.
  • The store’s physical location, which includes Alma Toys’ main offices, store front, and warehouse of products, has sufficient locks, up-to-date closed-circuit television (CCTV) surveillance, as well as functioning fire detection and prevention systems.

Here are the Security Audit Assesment for stakeholders :

Controls and compliance checklist

Controls assessment checklist

YesNoControl
uncheckedcheckedLeast Privilege
uncheckedcheckedDisaster recovery plans
checkeduncheckedPassword policies
uncheckedcheckedSeparation of duties
checkeduncheckedFirewall
uncheckedcheckedIntrusion detection system (IDS)
uncheckedcheckedBackups
checkeduncheckedAntivirus software
checkeduncheckedManual monitoring, maintenance, and intervention for legacy systems
uncheckedcheckedEncryption
uncheckedcheckedPassword management system
checkeduncheckedLocks (offices, storefront, warehouse)
checkeduncheckedClosed-circuit television (CCTV) surveillance
checkeduncheckedFire detection/prevention (fire alarm, sprinkler system, etc.)

Payment Card Industry Data Security Standard (PCI DSS)

Yes NoBest practice
uncheckedcheckedOnly authorized users have access to customers’ credit card information. 
uncheckedcheckedCredit card information is stored, accepted, processed, and transmitted internally, in a secure environment.
uncheckedcheckedImplement data encryption procedures to better secure credit card transaction touchpoints and data. 
uncheckedcheckedAdopt secure password management policies.

General Data Protection Regulation (GDPR)

YesNoBest practice
checkeduncheckedE.U. customers’ data is kept private/secured.
checkeduncheckedThere is a plan in place to notify E.U. customers within 72 hours if their data is compromised/there is a breach.
checkeduncheckedEnsure data is properly classified and inventoried.
checkeduncheckedEnforce privacy policies, procedures, and processes to properly document and maintain data.

System and Organizations Controls (SOC type 1, SOC type 2) 

YesNoBest practice
uncheckedcheckedUser access policies are established.
uncheckedcheckedSensitive data (PII/SPII) is confidential/private.
checkeduncheckedData integrity ensures the data is consistent, complete, accurate, and has been validated.
checkeduncheckedData is available to individuals authorized to access it.

Message to stakeholders to reduce risks to assets and improve Alma Toys’ security posture:

Based on the security audit results for Alma Toys, It needs a huge uplift for their security posture. I suggest to solve these issues before opening up to more serious markets which will pose more serious threats, vulnerabilities and risks here are key suggestions to improve the company’s security posture:

  1. Implement strict access controls:

Apply the principle of least privilege, granting employees access only to data necessary for their roles. Implement separation of duties to prevent any single employee from having excessive access. Set up a centralized identity and access management system to control and monitor user permissions.

  1. Enhance data protection:

Implement strong encryption for all sensitive data, especially cardholder information and PII/SPII, both in transit and at rest. Regularly review and update encryption protocols to ensure they meet current standards.

  1. Strengthen password policies:

Enforce a robust password policy requiring longer passwords with a mix of uppercase, lowercase, numbers, and special characters. Implement a centralized password management system to enforce policy requirements and simplify password resets.

  1. Improve network security:

Install and configure an intrusion detection system (IDS) to monitor for and alert on suspicious network activity. Regularly review and update firewall rules to ensure they align with current security needs. 

  1. Develop comprehensive disaster recovery and business continuity plans:

Create and implement backup strategies for all critical data. Establish clear disaster recovery procedures and regularly test them.

  1. Enhance system maintenance:

Implement a regular schedule for monitoring and maintaining legacy systems. Develop clear intervention methods for addressing issues with legacy systems.

  1. Implement security awareness training:

Conduct regular training sessions for all employees on security best practices, focusing on data handling, password security, and recognizing potential threats.

  1. Establish a vulnerability management program:

Conduct regular vulnerability assessments and penetration testing. Implement a patch management system to ensure all systems are up-to-date with the latest security patches.

  1. Expand incident response capabilities:

Develop a comprehensive incident response plan that covers various scenarios beyond just EU customer notification. Conduct regular drills to test and improve the incident response process.

  1. Implement data loss prevention (DLP) measures:

Deploy DLP solutions to prevent unauthorized data exfiltration. Monitor and control data movement within and outside the organization.

  1. Enhance physical security:

While current measures are good, consider implementing multi-factor authentication for access to sensitive areas. Regularly review and update physical security measures.

  1. Conduct regular security audits:

Establish a schedule for regular internal and external security audits to continually assess and improve the security posture. By implementing these suggestions, Alma Toys can significantly enhance its overall security posture, better protect sensitive data, and improve compliance with relevant regulations and standards.

Leave a Reply

Your email address will not be published. Required fields are marked *