NCI Procesos: Tecnología de la Información

Capacitación Virtual
24 Nov 202310:54

Summary

TLDRThis session delves into internal control standards for information technology, focusing on processes. It highlights laws like data protection and electronic signature, and standards such as ISO 27001. The script discusses Colombian General Controller's Office's internal control norms, which guide public entities in organizing, managing IT projects, infrastructure, and security. It emphasizes the importance of these norms in ensuring information security, confidentiality, integrity, availability, and privacy, as well as the effectiveness and efficiency of security controls in both public and private organizations managing public resources.

Takeaways

  • 📜 The session covers internal control standards with a focus on information technology processes, highlighting the importance of laws and regulations such as the Personal Data Protection Law and the Electronic Signature Law.
  • 🔒 ISO 27001 is mentioned as a standard that sets requirements for an information security management system, providing a framework for managing and governing information and technology systems.
  • 🏛 The General Comptroller's Office has issued internal control standards, specifically norms 410, which guide the organization, management, and operation of technological systems within public entities.
  • 🛠️ The norms 4101 to 4105 define how public entities should organize, manage committees, segregate functions, and have a strategic plan, policies, and procedures applicable to information technology and communications.
  • 🌐 Norms 4106 to 41014 refer to information architecture, technological projects, software development, maintenance, acquisition, and technological infrastructure, including their controls.
  • 🔒 Norms 41011 to 410144 focus on information technology security, contingency plans, administration, support, monitoring, and evaluation of processes and services.
  • 🌐 Norms 41015 to 41017 relate to interaction and communication, including web portals, telematic services, intranets, training, and electronic signature management.
  • 🛡️ Internal control standards are a set of principles, policies, and procedures established to ensure the security, confidentiality, integrity, availability, and privacy of information, as well as the effectiveness and efficiency of security controls.
  • 🏢 The organization of the Information and Communication Technology (ICT) unit is emphasized, requiring public sector entities to integrate a work framework for technology processes and involve senior management in decision-making.
  • 📝 The implementation of internal control standards requires the acquisition of security software, intrusion detection systems, backup and recovery systems, and the incorporation of specialized professionals in cybersecurity to improve organizational efficiency and protect critical information assets.
  • 📚 It's essential to have essential and key controls for the proper implementation of internal control standards for ICT, ensuring pre-authorization security through actions and verification methods aligned with institutional plans and budgets.

Q & A

  • What is the main focus of the session 4 of module 2?

    -The main focus of the session is on internal control standards, specifically those related to information technology processes.

  • Which laws and regulations are mentioned in the script as applicable to information management?

    -The script mentions the Personal Data Protection Law, the Electronic Signature Law, and standards such as ISO 27001.

  • What does ISO 27001 establish in terms of information security management?

    -ISO 27001 establishes the requirements for an information security management system.

  • What is the purpose of the internal control standards issued by the General Comptroller's Office?

    -The purpose of these standards is to guide the implementation, operation, and updating of technological systems within organizations.

  • How many internal control standards are there in the script's reference?

    -There are 17 internal control standards, ranging from 4101 to 4105.

  • What do the standards from 4101 to 4105 define regarding public entities' organization and management?

    -They define how public entities should organize, manage committees, segregate functions, have a strategic plan, and establish policies and procedures applicable to information technology and communications.

  • What is the significance of the internal control standards in ensuring the security and confidentiality of information?

    -The internal control standards are a set of principles, policies, and procedures established to ensure the security, confidentiality, integrity, availability, and privacy of information, as well as the effectiveness and efficiency of security controls.

  • What are the key areas that the internal control standards cover in terms of information technology?

    -The key areas include the organization of the information technology unit, risk management, security of information technology, contingency planning, support administration, monitoring, and evaluation of processes and services.

  • What is the importance of training and awareness in the implementation of internal control standards?

    -Training and awareness are crucial to ensure that all employees and third parties with access to systems and information are trained in security controls and comply with established policies and procedures.

  • What are some of the technical and administrative controls that should be implemented to ensure compliance with policies and procedures?

    -Some controls include firewalls, antivirus systems, intrusion detection systems, backup and recovery systems, and password policies.

  • How often should security controls be monitored and evaluated to identify potential weaknesses and improve them?

    -Security controls should be regularly monitored and periodically evaluated to identify potential weaknesses and continuously improve the security controls.

  • What is the role of the Information Security Officer in the context of internal control standards?

    -The Information Security Officer is responsible for ensuring the implementation and maintenance of information security controls to guarantee the security of the organization's critical information assets and reduce the risk of system interruptions.

Outlines

00:00

📜 Introduction to Internal Control Standards for IT

This paragraph introduces the session on internal control standards with a focus on information technology processes. Yael Ávila and Jorge Cortés highlight the importance of laws and regulations such as data protection and electronic signature laws, as well as standards like ISO 27001 and COBIT that provide a framework for information security management. The paragraph outlines the internal control standards issued by the General Comptroller of the State, specifically norms 410 which include 17 standards from 4101 to 4105. These standards guide public entities on how to organize, manage committees, segregate functions, and establish strategic plans and policies for information technology. The paragraph emphasizes the role of these standards in ensuring the security, confidentiality, integrity, availability, and privacy of information, as well as the effectiveness and efficiency of security controls in organizations managing public resources.

05:00

🛡️ Implementing and Evaluating IT Security Controls

The second paragraph delves into the implementation and evaluation of IT security controls as dictated by the internal control standards. It discusses the need for policies and procedures to identify and mitigate risks, including access controls, authentication, and ensuring the confidentiality, integrity, and availability of information. Technical and administrative controls such as firewalls, antivirus systems, intrusion detection systems, and backup and recovery policies are mentioned. The paragraph stresses the importance of training and awareness programs for personnel on the significance of security controls and the need for regular monitoring and periodic evaluations to improve security measures. It also touches on the necessity of acquiring security software, hiring IT security professionals, and understanding essential controls and key verification methods to ensure the proper authorization of processes and compliance with institutional plans and budgets related to information technology.

10:02

🔏 Concluding Remarks on IT Internal Control Standards

The final paragraph concludes the discussion on IT internal control standards, inviting participants to review the material on the platform and complete the session evaluation. It mentions the upcoming module three, which will focus on the weaknesses of internal controls and their effects. The paragraph also reminds participants of the obligation to protect personal access keys and the potential need to revoke electronic signature certificates if compromised, emphasizing the importance of confidentiality and security in IT management.

Mindmap

Keywords

💡Information Management

Information Management refers to the processes and strategies involved in acquiring, distributing, storing, and effectively utilizing information within an organization. In the video, it is discussed in the context of laws and regulations that govern the management of information, such as data protection laws and electronic signature laws, which are crucial for ensuring the security and integrity of information.

💡ISO 27001

ISO 27001 is an international standard that specifies the requirements for an information security management system (ISMS). It is mentioned in the script as one of the norms establishing requirements for the information security management system, indicating its importance in ensuring that organizations have a systematic approach to managing their information security risks.

💡Internal Control Norms

Internal Control Norms are a set of principles, policies, and procedures established to ensure the security, confidentiality, integrity, availability, and privacy of information. The script discusses these norms, particularly norms 410, which are issued by the General Comptroller's Office and include 17 standards from 4101 to 4105, guiding the organization, management, and governance of information technology systems.

💡Information Technology Governance

Information Technology Governance is the framework of rules and practices that ensure the effective and efficient use of information technology in enabling an organization's strategies and objectives. The script refers to the 'Norma Covid' as providing a reference framework for the governance and management of information systems and technology, emphasizing the need for a structured approach to IT governance.

💡Data Protection Law

A Data Protection Law is a legal framework designed to protect the privacy and security of individuals with respect to the processing of personal data. In the script, it is highlighted as one of the applicable laws in information management, indicating the importance of safeguarding personal data within the context of information security.

💡Electronic Signature Law

The Electronic Signature Law refers to legislation that gives legal recognition to electronic signatures, allowing them to be used in the same way as traditional handwritten signatures. The script mentions this law as part of the legal framework governing the management of information, underlining the significance of legally valid electronic transactions.

💡Information Security

Information Security is the practice of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The script discusses various aspects of information security, including the establishment of a security plan, contingency plans, and the implementation of technical and administrative controls to ensure the security of information technology.

💡Risk Management

Risk Management is the process of identifying, assessing, and controlling risks to minimize their impact on an organization's objectives. The script emphasizes the importance of risk management in the context of information technology, where organizations must evaluate risks associated with their information systems and define policies and procedures to mitigate them.

💡Contingency Plan

A Contingency Plan is a documented procedure to follow in the event of an emergency or disaster, aiming to ensure the continuity of operations. The script refers to the development of a contingency plan for information technology, which is crucial for organizations to respond effectively to potential disruptions in their IT systems.

💡Training and Awareness

Training and Awareness are critical components of an organization's security strategy, ensuring that employees understand the importance of security controls and how to use them effectively. The script highlights the need for organizations to generate training and awareness processes for their staff regarding information security, which is essential for preventing risks associated with the use of IT.

💡Compliance

Compliance refers to an organization's adherence to established policies, procedures, laws, regulations, and standards. In the script, compliance is discussed in the context of ensuring that security controls are implemented and followed, including the use of passwords, access controls, and other technical and administrative measures to ensure the protection of information.

Highlights

Introduction to session 4 of module 2 focusing on internal control standards for information technology processes.

Mention of applicable laws and regulations such as the Data Protection Law and the Electronic Signature Law.

Discussion of standards like ISO 27001 for information security management systems.

Explanation of the internal control standards issued by the General Comptroller's Office, specifically norms 410.

Norms 4101 to 4105 outline the organization and management of public entities in information technology.

Norms 41006 to 41010 relate to information architecture, technological projects, and software and infrastructure acquisition.

Norms 41011 to 410144 focus on information technology security, contingency plans, and process monitoring and evaluation.

Norms 41015 to 41017 pertain to interaction and communication, including web portals, telematic services, and electronic signatures.

Internal control standards ensure the security, confidentiality, integrity, availability, and privacy of information.

The importance of managing risks and threats associated with information technology use.

Emphasis on the organization of the information technology and communication unit within public entities.

The necessity of involving senior management in decision-making and establishing an IT organizational structure.

Highlighting the role of an information security officer in ensuring the implementation and maintenance of information security controls.

Requirement for organizations to apply IT and communication controls throughout the information lifecycle.

The importance of training and awareness for personnel on the use of security controls to prevent risks.

The need for regular monitoring and periodic evaluation of implemented security controls to identify weaknesses and improve them.

Implementation of these standards requires the acquisition of security software and systems, as well as specialized IT security professionals.

Essential controls and key actions for the correct implementation of internal control standards for IT.

The application of prior internal controls and their criteria for legality, truthfulness, convenience, opportunity, relevance, and conformity.

The verification of trainings through electronic files or signed electronic messages to ensure compliance with regulations.

The obligation not to divulge or share personal access keys to prevent the revocation of electronic signature certificates.

Conclusion of the review of internal control standards with an invitation to review material and complete the session evaluation.

Transcripts

play00:03

Bienvenidos a la sesión 4 del módulo 2

play00:06

donde abordaremos las normas de control

play00:08

interno con enfoque a procesos para la

play00:10

tecnología de la información soy Yael

play00:13

Ávila y me acompaña Jorge Cortés

play00:15

entrando en materia es importante

play00:17

señalar que existen leyes y regulaciones

play00:20

aplicables a la gestión de la

play00:22

información como son la ley de

play00:24

protección de datos personales y la ley

play00:26

de firma electrónica Así también hay

play00:29

algunas noras como la ISO

play00:31

27001 que establecen los requisitos para

play00:34

el sistema de gestión de seguridad de la

play00:37

información y la Norma covid que

play00:39

corresponde a los objetivos de control

play00:41

para la información y tecnología

play00:43

relacionada que proporciona un marco de

play00:46

referencia para la gestión y gobierno de

play00:49

los sistemas de información y tecnología

play00:53

ahora bien las normas de control interno

play00:56

emitidas por la contraloría general del

play00:58

estado incluye en las normas 410 sobre

play01:02

el componente de tecnología de la

play01:04

información que sirven para dirigir

play01:07

asegurar la implantación funcionamiento

play01:09

y actualización de los sistemas

play01:12

tecnológicos organizadas en 17 normas

play01:15

así de la 4101 a la

play01:19

4105 definen la manera en la cual las

play01:21

entidades públicas deben organizarse

play01:24

gestionar comités segregar funciones

play01:27

contar con un plan estratégico est

play01:30

políticas y procedimientos aplicables a

play01:32

la tecnología de la información y

play01:34

comunicaciones de la 410 06 a la 4101

play01:40

hacen referencia a la arquitectura de la

play01:42

información proyectos tecnológicos

play01:45

desarrollos mantenimiento adquisición de

play01:47

software e infraestructura tecnológica y

play01:50

su control de la 41011 a la 410 144

play01:55

hacen referencia a la seguridad de la

play01:57

tecnología de la información plan de

play01:59

contingencias administración de soporte

play02:02

monitoreo y evaluación de los procesos y

play02:05

servicios de la 41015 a la

play02:08

41017 están relacionadas a la

play02:11

interacción y comunicación como el

play02:13

portal web servicios telemáticos e

play02:15

intranet capacitación y manejo de firmas

play02:19

electrónicas las normas en este

play02:21

componente de control interno son un

play02:23

conjunto de principios y políticas

play02:26

procedimientos establecidos para

play02:28

garantizar la seguridad

play02:30

confidencialidad integridad

play02:32

disponibilidad y privacidad de la

play02:35

información así como la efectividad y

play02:38

eficiencia de los controles de seguridad

play02:40

en una organización o entidad pública o

play02:43

privada que administre recursos públicos

play02:46

se centran en la gestión de los riesgos

play02:48

y amenazas asociados al uso de las

play02:50

tecnologías de la información y la

play02:53

comunicación y buscan asegurar que se

play02:55

cumplan los objetivos institucionales de

play02:58

manera segura y confiable En lo

play03:02

particular la organización de la unidad

play03:04

de tecnologías de la información y

play03:07

comunicación Establece que las entidades

play03:10

y organismos del sector público deben

play03:13

acoplar un marco de trabajo para

play03:15

procesos de tecnología involucrar a la

play03:18

alta dirección en la toma de decisiones

play03:21

generar una estructura organizacional de

play03:24

tecnología de la información y la

play03:27

comunicación establecer una unidad

play03:30

posicionada dentro de la estructura

play03:32

organizacional de la entidad y disponer

play03:35

de áreas que cubran proyectos

play03:37

tecnológicos infraestructura tecnológica

play03:41

soporte interno y externo seguridad de

play03:44

tecnologías de la información y

play03:46

comunicación e incorporar un oficial de

play03:49

seguridad de la

play03:52

información por ello recordemos que las

play03:55

normas de control interno permiten la

play03:58

implementación y mantenimiento de los

play04:01

controles de seguridad de la información

play04:03

para garantizar que todos los empleados

play04:06

y terceros que tienen acceso a los

play04:08

sistemas y a la información de la

play04:10

organización estén capacitados en cuanto

play04:13

a los controles de seguridad y cumplan

play04:16

con las políticas y procedimientos

play04:18

establecidos es importante conocer que

play04:21

las normas de control interno aseguran

play04:24

que los controles orientados a las

play04:26

tecnologías de la información y

play04:28

comunicación se aplican en todas las

play04:31

etapas del ciclo de vida de la

play04:33

información desde la

play04:35

recopilación hasta el almacenamiento

play04:38

procesamiento uso y eliminación de la

play04:41

información las normas de control

play04:43

interno 410 realizan una evaluación de

play04:46

los riesgos asociados a los sistemas de

play04:49

información de la organización esto

play04:51

implica identificar los activos críticos

play04:55

vulnerabilidades existentes amenazas

play04:57

potenciales e impactos que puede tener

play05:00

sobre la organización en base a la

play05:02

evaluación de riesgos se debe definir

play05:05

políticas y procedimientos que permitan

play05:07

identificarlos y mitigarlos estas

play05:10

políticas y procedimientos deben incluir

play05:13

controles de acceso autenticación

play05:16

confidencialidad integridad y

play05:18

disponibilidad de la información además

play05:21

se debe implementar controles técnicos y

play05:24

administrativos para garantizar el

play05:26

cumplimiento de las políticas y

play05:30

procedimientos estos controles pueden

play05:32

incluir fireware antivirus sistema de

play05:35

detección de intrusos sistema de

play05:37

respaldos y recuperación políticas de

play05:40

uso de contraseñas entre otros Cabe

play05:43

señalar que las organizaciones deben

play05:45

generar procesos de capacitación y

play05:48

concientización a su personal sobre la

play05:51

importancia de los controles de

play05:53

seguridad la forma en que deben

play05:55

utilizarse para prevenir los riesgos

play05:57

asociados al uso de las tecnologías de

play06:00

la información es necesario también

play06:03

monitorear regularmente los controles de

play06:06

seguridad implementados y realizar

play06:08

evaluaciones periódicas para identificar

play06:11

posibles debilidades y mejorar

play06:13

continuamente los controles de

play06:17

seguridad en general la implementación

play06:20

de estas normas requiere la adquisición

play06:23

de software de seguridad sistemas de

play06:26

detección de intrusos sistemas de

play06:28

respaldo y recuperación así como la

play06:31

incorporación de profesionales

play06:33

especializados en seguridad informática

play06:36

lo que permitirá mejorar la eficiencia y

play06:39

productividad de la organización al

play06:41

proteger sus activos críticos de

play06:44

información y reducir el riesgo de

play06:46

interrupciones en los sistemas para

play06:48

complementar es necesario conocer que

play06:51

existen controles esenciales y claves

play06:54

para la correcta implementación de las

play06:56

normas de control interno para la

play06:58

tecnología de de la información mediante

play07:01

acciones y medios de verificación que

play07:04

brinden una seguridad previo a la

play07:06

autorización de los

play07:08

procesos Así es ya la aplicación del

play07:11

control interno previo y sus criterios

play07:14

de legalidad veracidad conveniencia

play07:17

oportunidad pertinencia y conformidad

play07:20

deben alinearse con los planes y

play07:22

presupuestos institucionales en lo

play07:24

referente a las tecnologías de la

play07:27

información por ello se

play07:30

los procedimientos para controles de

play07:33

idoneidad donde hay una calificación de

play07:37

idoneidad del comité de tecnologías de

play07:40

la información y Comunicaciones y otra

play07:43

al oficial de seguridad de la

play07:46

información controles de verificación de

play07:49

evidencia documental donde debe

play07:52

evidenciarse la asignación formal por la

play07:55

autoridad competente de sus funciones y

play07:59

responsabilidades del personal de tig la

play08:02

existencia de un plan estratégico de tig

play08:04

un diccionario de datos corporativo

play08:07

actualizado con las reglas de validación

play08:09

y los controles de integridad y

play08:12

consistencia con la identificación de

play08:14

los sistemas o

play08:16

módulos regulaciones de los procesos de

play08:19

desarrollo mantenimiento y adquisición

play08:21

de software de aplicación y de usuario

play08:24

final procedimientos que garanticen el

play08:27

mantenimiento y uso adecuado de la

play08:30

infraestructura tecnológica de las

play08:32

entidades públicas métodos establecidos

play08:36

para garantizar el cumplimiento de la

play08:39

normativa de protección de

play08:42

datos propiedad intelectual del Software

play08:45

seguridad de la información utilización

play08:48

de estándares sistemas o plataformas

play08:51

establecidos para el sector

play08:53

público un plan de contingencia en caso

play08:56

de una emergencia o suspensión en el

play08:59

procesamiento de la información por

play09:02

problemas en los equipos programas o

play09:04

personal

play09:07

relacionado normas procedimientos e

play09:10

instructivos de

play09:11

instalación configuración y utilización

play09:14

de los sistemas internos y externos de

play09:17

la entidad medios tecnológicos

play09:19

necesarios que permitan el uso de la

play09:21

firma electrónica de conformidad con el

play09:24

marco

play09:26

legal cabe considerar también que se

play09:29

debe efectuar el control de las

play09:31

capacitaciones realizadas mediante la

play09:34

verificación de un archivo electrónico o

play09:37

mensaje de datos que se encuentre

play09:39

firmado

play09:41

electrónicamente condiciones

play09:43

contractuales certificaciones emitidas

play09:46

por una entidad acreditada en el país

play09:49

conforme la normativa vigente

play09:51

almacenamiento de archivos electrónicos

play09:54

notificación a la entidad emisora en

play09:57

todo este proceso recordaremos que que

play09:59

es obligación no divulgar O compartir

play10:01

las claves de acceso personales ya que

play10:04

esto implicará la solicitud de la

play10:06

revocación de su certificado de firma

play10:08

electrónica cuando se presentare

play10:10

cualquier circunstancia que pueda

play10:13

comprometer su

play10:15

utilización hemos concluido con la

play10:17

revisión de las normas de control

play10:19

interno con enfoque a la tecnología de

play10:22

la información les invitamos a revisar

play10:25

el material en la plataforma y realizar

play10:28

la evaluación de la sesión para

play10:30

continuar con el módulo tres sobre las

play10:32

debilidades del control interno y sus

play10:37

[Música]

play10:52

efectos

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
Internal ControlsIT GovernanceInformation SecurityData ProtectionISO 27001Risk ManagementCompliance StandardsElectronic SignaturesTechnology ManagementSecurity Policies
Benötigen Sie eine Zusammenfassung auf Englisch?