In-Depth

SOX and the Single Admin

The Sarbanes-Oxley (SOX) Act poses a real compliance headache for businesses of every size, and Windows admins are feeling the heat. Fortunately, we’re here with a few handy shortcuts.

Does your SOX compliance stink? Is your new technology budget in lockdown because all the free cash is going towards compliance? You are not alone.

Costs associated with making information systems compliant with the Sarbanes-Oxley Act of 2002 have gone through the roof. A Financial Executives International (FEI) survey of 217 large companies (average revenues above $5 billion) revealed that SOX compliance cost an average of $4.36 million. The same survey showed that companies spent, on average, nearly 40 percent more than they expected in the effort.

Companies are underestimating the challenge of meeting SOX compliance, and busy IT managers and Windows admins are bearing the load. A lone Windows admin may not be able to do much about strategic planning and budgets, but with the right tools, you can get the most out of the time and dollars on hand. If you’re looking for some tips on cleaning up your SOX act, you’ve come to the right place.

The 411 on Section 404
From an IT perspective, the challenge comes from Section 404 of the Sarbanes-Oxley Act of 2002. Section 404 requires that companies define, test, implement and document effective internal controls over financial reporting.

Think of these controls as safeguards designed to prevent and detect problems. Home security offers a good analogy. To keep burglars out, you install an alarm system, lock the doors and windows, put lights in dark areas and maybe get a watchdog. Without realizing it, you’ve implemented some prevent controls (locks, lights and watchdog) and a detect control (burglar alarm). For SOX compliance, companies implement prevent and detect controls that ensure the accuracy of financial statements.

BP, mapped
Figure 1. Business Process to IT Infrastructure Map: Business processes are handled by IT systems, which store financial data, leading you right into the wonderful world of managing SOX compliance. (Click image to view larger version.)

Of course, it falls to IT departments to implement these controls. Figure 1 shows the simplified process of inputting purchase orders. Orders entered into the purchasing application get stored in the back-end database and at some point are reported to the financial reporting application. No question, IT plays a significant role in the processing of order information. The question is, how do companies use detect and prevent controls to safeguard that data and ensure its accuracy?

To prevent data from being altered, IT managers can limit users’ ability to enter or approve orders, secure the database so that the order information can’t be altered once entered, and restrict access to the overall network. On the detection front, the company might implement logging, monitor who has entered orders, and perform a periodic review of user access histories. These are just a few examples of IT-related controls within the business process.

When it comes to SOX compliance, it’s up to IT managers and admins to implement these types of controls. Unfortunately, audit requests and issues can overwhelm busy IT staffs, especially when an audit finding creates a scramble to remediate the issue. This is where compliance efforts have begun to stink -- like a pair of old gym SOX that no one wants to touch.

The best way to clean up SOX compliance is to understand, automate and proactively monitor your controls. To accomplish this, we’ll take the following controls common to most companies and put them through the wash cycle:

  • Only Authorized Users have Privileged Access
  • All Inactive Accounts are disabled after 60 days and deleted after 90
  • All Users Have Expiring Passwords

For each of these controls we’ll explain why the control is important, provide a tool to help automate the control and explain how to use the tool to proactively monitor the control.

Control #1: Only Authorized Users Have Privileged Access
Privileged access typically allows users to override, circumvent or bypass other controls. Most database administrator IDs have direct access to modify data within the database. If the wrong person were to gain this privileged access, he could bypass other controls and alter data directly in the database. Or even worse, in a Microsoft SQL Server environment, any domain administrator could create a DBA user.

Either type of access rights must be limited to a small number of people and remain closely monitored.

The Solution: CSVDE
The CSVDE command is typically used to bulk export, import or make changes to Active Directory environments. You might also be familiar with CSVDE’s twin, LDIFDE. The CSVDE command can be a great tool for automating the monitoring of many controls, because it allows you to get a listing of domain users and group membership.

Table 1: Results of the Sample CSVDE Command
DN CN memberOF
CN=Gary Olsen Gary Olsen CN=Enterprise Admins
CN=Users   CN=Users
DC=Corp   DC=Corp
DC=NET   DC=NET

CSVDE Command Syntax

C:\>csvde -f c:\dump.csv -r "(objectCategory=person)" -l "cn,memberOf"

Note: The command must be run on a server that is a member of the domain in question. You can also copy the CSVDE file from a server to your desktop and run the command.

Command Syntax Explained

CSVDE is the executable script that queries Active Directory and then creates a comma separated (.CSV) data file.

–f specifies that a file will be created, followed by the file name

–r filters based on the specified criteria

objectCategory=person will only be true for users

–l lists the specified attributes (Our command used the following attributes: cn and memberOf)

Command Output: Table 1 shows the first two lines produced in the dump.csv file produced in the example script above.

The DN column provides information about the user and the domain, while the CN column displays the user name for each record in the file.

The memberOf column shows the different groups and Organizational Units that the user belongs to (i.e. Enterprise Admins, Domain Admins, DBA_Group, sales, etc). In this example, the user Gary Olsen is a member of the Corp.net domain and is a member of the Enterprise Admins group.

Proactive Monitoring of the Control: The CSVDE command lets you easily monitor privileged access within your Windows environment. Open the dump.csv file using Excel or Access and perform a search for all users with "*Domain Admins*," "*Enterprise Admins*," or "*DBA_Group*" in the ‘memberOf’ field. Create an automated script and you can take monitoring of this control to the next level. With the right script, you could be the first to know when someone is added to the "Domain Admins," "Enterprise Admins," or "DBA_Group" group.

Want to earn a little extra credit? Keep a record of your review and audit trail to show the auditor -- it’ll help dispel all doubt. For more details on CSVDE and LDIFDE refer to Microsoft’s "Step-by-Step Guide to Bulk Import and Export to Active Directory".

Control #2: All Inactive Accounts are Disabled After 60 Days and Deleted After 90
This control is critical in large organizations, which can have hundreds of people come and go every few months. Meanwhile, the complexities of the HR process can make it hard to scrub inactive accounts from an AD environment. Throw in weak password policies, and you have the makings of substantial risk from inactive accounts.

The Solution: LastLogOn.vbs
This tool was discovered deep in the results of a Google search for the true last logon date for Windows users. Hidden behind several commercial tools, an article written by Bill Boswell describes how to identify the true last logon date.

The "LastLogOn" script was created with a few minor modifications. The great thing about this script is that you don’t have to populate the list of domain controllers -- it will identify all the domain controllers and then query each one for the user’s last logon date (and convert it to a readable date).

The Script:

'Establish ADO Constants
ADS_CHASE_REFERRALS_NEVER = &00
ADS_CHASE_REFERRALS_SUBORDINATE = &20
ADS_CHASE_REFERRALS_EXTERNAL = &40
ADS_CHASE_REFERRALS_ALWAYS = &60
ADS_SCOPE_BASE = 0
ADS_SCOPE_ONELEVEL = 1
ADS_SCOPE_SUBTREE = 2

'Get Distinguished Name for local domain
Set RootDSE = GetObject("LDAP://RootDSE")
domainDN = RootDSE.Get("DefaultNamingContext")

'Initialize ADO connection
Set connection = CreateObject("ADODB.Connection")
connection.Provider = "ADsDSOObject"
connection.open
Set command = CreateObject("ADODB.Command")
Set command.ActiveConnection = connection
Command.Properties("Page Size") = 1000
Command.Properties("Timeout") = 30
Command.Properties("searchscope") = ADS_SCOPE_SUBTREE
Command.Properties("Chase referrals") = ADS_CHASE_REFERRALS_NEVER
Command.Properties("Cache Results") = False

'file output
Set fs = CreateObject("Scripting.FileSystemObject")
Set a = fs.CreateTextFile("c:\Logondate.txt", True)

'Get list of domain controllers for the domain
Set dcList = GetObject("LDAP://ou=domain controllers," & domainDN)

'Walk each domain controller for logons
For Each dc In dcList
WScript.Echo String(40,"=")
WScript.Echo "Obtaining Logon dates at " & dc.DNSHostName & "Please wait...."

command.CommandText = "SELECT name,lastlogon,whencreated,whenchanged FROM " &"'LDAP://" & dc.DNSHostName & "/" & domainDN &"' WHERE objectcategory = 'user'"

Set rs = command.Execute
Do Until rs.EOF
adoLastLogon = rs.fields("lastlogon")
On Error Resume Next
Err.Clear
Set longDate = adoLastLogon
If Err.Number <> 0 Then
Err.Clear
logonDate = "No Local Logon"
Else
longDateHigh = longDate.HighPart
longDateLow = longDate.LowPart
If (longDateLow = 0) And (longDateHigh = 0) Then
logonDate = "No Local Logon"
Else
If longDateLow < 0="" then="" longdatehigh="longDateHigh" +="">
logonDate = #1/1/1601# + (((longDateHigh * (2 ^ 32)) + longDateLow)/600000000/1440)
End If
End If

a.WriteLine(rs.fields("name")& ";"& logonDate &";"& dc.DNSHostName)

rs.MoveNext
Loop

WScript.Echo vbNL

Next

a.Close

WScript.Echo "The file 'c:\Logondate.txt' has been created"
WScript.Quit()

Script Output: Below are the first four lines of output from the script:

MyAdministrator;7/12/2005 8:20:18 PM;dc1.mydomain.com
Guest;No Local Logon; dc1.mydomain.com
MyAdministrator; 7/11/2005 3:40:30 PM; dc2.mydomain.com
Joe User:9/20/2005 6:45:58 AM; dc2.mydomain.com

Script Output Explained: We see that the login information from each domain controller is contained in the output in the following format: username, login date time, and domain controller name. The list will probably contain duplicate entries, similar to the example output, because each domain controller maintains its own record of user logons. To find the true last logon date, sort the output by user and find the most recent date. In the above output, the true last logon for the user "MyAdministrator" is 7/12/2005.

Proactive Monitoring of the Control: Use this script to take control of your AD user base. Run it on a weekly or monthly basis and import the results into Excel or Access. Now you can sort by username, identify the most recent logon date for each user, and then re-sort by logon date.

Assuming you are within corporate policy and have management approval, go ahead and disable the accounts of any users who haven’t logged in for 60 days or more. Delete those accounts that haven’t shown a logon in more than 90 days. You’ll find that this simple control is one of the best for managing network access.

Control #3: All Users Have Expiring Passwords
Expiring user passwords is an often-overlooked, but extremely important control. In most organizations, a password policy specifies the minimum password length, use of special characters, password expiration cycle, and other characteristics. A common issue found by auditors is that administrators often exclude themselves (and sometimes their friends) from the password expiration cycle, by selecting the "Password Never Expires" flag. While there are some instances where activating this flag is appropriate (i.e. system process user accounts), its use should be limited and monitored.

The Solution: Custom Queries Within Users and Computers MMC
The Active Directory Users and Computers MMC snap-in has some built-in queries that will help us institute several controls. Two frequently used queries in the audit world are "Disabled Accounts" and "Non-Expiring Passwords." We’ll walk through the "Non-Expiring Passwords" query, which is easy to modify to fit your specific control needs.

Passwords query that never dies
Figure 2. Creating a non-expiring password query.

The Query: Open the Active Directory Users and Computers MMC and the first folder you’ll probably see is a "Saved Queries" folder. Within this folder you can create standard and highly customized queries. To create a query, right-click on the "Saved Queries" folder; select "New Query"; then select "Define Query"; and finally select "Common Queries" and check the "Non expiring passwords" option as shown in Figure 2.

Passwords in ADUC
Figure 3. Results of non-expiring password query.

You use the results of the query (see Figure 3) to identify all users who have the non-expiring password flag set.

Proactive Monitoring of the Control: Using custom AD queries, you can identify and monitor important attributes with a minimum of time and effort. The "Password Never Expires" query, for instance, lets you clean up this critical weakness and baseline those accounts which should have this flag set. As with the other controls, you should executive this query periodically to monitor the control and maintain a clean AD environment.

Next Steps
The three control examples here won’t clean all the dirt out of your SOX implementation, but they do show how even simple controls can have a major positive impact. They’ll also help you master creative new ways to automate and monitor other controls within the environment.

More Information

The three control examples here won’t clean all the dirt out of your SOX implementation, but they do show how even simple controls can have a major positive impact. They’ll also help you master creative new ways to automate and monitor other controls within the environment. The following list of tools will help as you tackle other SOX-related controls:

  • MS Baseline Security Analyzer: MBSA can be used to scan for security issues and identify missing updates. This tool is very useful tool when looking at your Windows change management processes as well.
  • DumpSec (formerly DumpACL): DumpSec is the catch-all for Windows auditing and can be useful in gathering user information, group policy, registry information, etc.
  • PASSPROP. exe: This tool will enable lock out for administrator accounts.
  • WMIC: WMIC scripting offer endless automation of many of the commands we have discussed.
  • PsTools: The PsTools suite, by Sysinternals, offers a variety of tools that can be used with an audit twist.

There is always more. Microsoft Windows offers many built-in commands that can be used to audit SOX compliance. You simply need to be willing to explore and experiment.

Interested in learning more about other SOX IT controls? You can review the ITGI framework (PDF) published by the Information Systems Audit and Control Association (ISACA).

Understanding SOX and developing solid audit processes may not make your whites whiter, but it will help clean up your SOX compliance act. With a small investment of time and resources, you’ll find that your job will be a lot easier, especially if you don’t have to deal with cleaning up dirty SOX.

Featured

comments powered by Disqus

Subscribe on YouTube