Securing Document Management Systems: Call for Standards, Leadership
Harpaz, Joe, The CPA Journal
As companies become more reliant upon "paperless" electronic document management technologies, there is increasing need for those who manage this data to expand their knowledge base and implement security standards so that data cannot be compromised. For some, this means hiring full-time, in-house staff to manage security features, or expanding the role of existing IT resources. For others, retaining an outside vendor that can provide this type of expertise, including software, hardware, and maintenance, is easier and less expensive. Whichever option a company chooses, it should become more involved in setting the standards for the security of client financial data.
What Makes a System secure?
Many businesses think that information that is housed off-site and managed by an outside firm is less secure. In reality, most electronic data management companies are extremely stringent about security measures. They will secure the entire system, scan for vulnerabilities, provide back-up solutions, and update and maintain software regularly.
Many software and database applications originally designed to be run on internal networks, with security on a very basic functionality level. Increasingly, corporated networks are now connected to the Internet, making them (and the applications on the network) potentially available to an intruder. If these systems are not consistently updated and maintained with proper security features, a network may be exposed to outside vulnerabilities.
When assessing security risks, the company should look at every layer of the system: the program (e.g., document management software), the network (e.g., firewalls), and the operating system (e.g., Microsoft Windows). Any gaps in these layers and the company is at risk.
Where data reside-in-house, on a network, or on the Internet-has little to do with security. The key is to maintain procedures and manage security updates on an ongoing basis. For example, Microsoft provides almost daily updates on vulnerabilities in its systems and on how to patch and update the systems. But if no one in a company is implementing these updates daily, the data are vulnerable. Vendors that publicly post their security vulnerabilities inherently expose themselves to those risks as they become known and accessible to those looking to leverage weaknesses.
Surprisingly, the majority of information theft in corporations is committed by employees, not by outsiders or so-called hackers. According to a survey reported by MSNBC technology correspondent Bob Sullivan in May 2004, as much as 70% of all identity theft starts with the theft of personal data from a company by an employee. Many businesses fail to consider this when examining their electronic information systems. Having an in-house IT administrator with access to everything within the company's data banks may present a major source of risk.
Basic guidelines for managing a secure network and application environment include the following:
* Stringent policies and procedures;
* Physical security, including setting limitations for equipment and network access;
* Ongoing efforts to update, patch, and maintain all components to applications so all known vulnerabilities are fixed regularly;
* Vulnerability estimates, including regular scans of the entire system, for errors or configurations that could present security "holes"; and
* Management of audit trails and audit logs to monitor access to information for indicators of unusual activity or intrusions. …