A.8.19 Installation of software on operational systems would include:
-
Software Inventory: A comprehensive inventory of all software installed on operational systems, including servers, workstations, and other devices. The inventory should include details such as software names, versions, and vendors.
-
Software Approval Process: Documentation of a formal software approval process that outlines the steps required to request, review, and approve the installation of new software on operational systems. This process should include security reviews to ensure that the software is safe and compliant with the organization's policies.
-
Change Management Records: Records of change management processes for software installation, including change requests, approvals, testing, and implementation plans. These records should demonstrate that software installations are controlled and properly authorized.
-
Licensing Compliance: Evidence of compliance with software licensing agreements, ensuring that all software installed on operational systems is properly licensed and authorized for use.
-
Vulnerability Management: Documentation of vulnerability management processes that include regular scanning and assessment of installed software for known vulnerabilities. Evidence of patch management procedures for addressing and mitigating identified vulnerabilities.
-
User Privileges: Verification of user privileges and access controls to ensure that only authorized personnel have the capability to install software on operational systems.
-
Segregation of Duties: Documentation of segregation of duties to prevent conflicts of interest and unauthorized software installations. Separate roles should be defined for requesting, approving, and installing software.
-
Software Configuration Baselines: Evidence of established configuration baselines for operational systems, ensuring that software installations adhere to the approved configurations and are consistent across the organization.
-
Logs and Monitoring: Access logs and monitoring records to track software installations and detect any unauthorized or suspicious activities related to software on operational systems.
-
Incident Response Procedures: Documentation of incident response procedures specific to software installations, outlining how the organization addresses security incidents related to software vulnerabilities or unauthorized installations.
-
Training Records: Proof of user training and awareness programs related to software installation procedures and security best practices.
-
Compliance Documentation: Evidence of compliance with relevant regulations and standards concerning software installations on operational systems.
As an auditor, I would review and assess the presence and effectiveness of these pieces of evidence to ensure that software installations on operational systems are controlled, monitored, and performed in a secure and compliant manner. Proper management of software installations helps to reduce the risk of introducing vulnerabilities and ensures the overall security and stability of operational systems.