Você está na página 1de 18

www.pwc.com.

br

Corporate
Security Statement

February 2013
Table of Contents

2 • Overview
3 • Disclaimer
4 • Security Police
4 • Security Organization
5 • Asset Management
6 • Human Resources Security
7 • Physical and Environmental Security
8 • Communications and Operations Management
10 • Access Control
11 • Information Systems Development Cycle
12 • Information Security Incident Management
12 • Business Continuity Management
13 • Compliance
Overview

The leadership of PwC Brazil takes the security of its information,


infrastructure and applications very seriously. Its commitment to
corporate security is shown through the implementation of policies,
controls and procedures, as well as the allocation of dedicated resources
required for a formal Corporate Security organization. This document
provides an overview of the security controls employed by PwC Brazil
and is intended to be shared with its current and potential clients.

Corporate Security Statement | 2


Disclaimer

In this document, “PwC Brazil” (“PwC” or “Firm”) refers to


PricewaterhouseCoopers Brasil Ltda., which is a member firm of
PricewaterhouseCoopers International Limited (PwCIL), each member firm
of which is a separate legal entity. The intent of this statement is to provide a
brief overview of the security measures implemented to help protect the PwC
information, infrastructure and applications. It does not represent all efforts
made by the Firm to mitigate the risks related to Information Technology.
These security measures do not guarantee complete protection.

The information contained in this statement is for current or potential clients


and should not be distributed to others without permission from PwC.

3 | PwC
Security Policy

PwC provides its employees with


security policies and guidelines
to communicate individual
responsibilities with respect to
safeguarding the Firm’s resources.
These policies are readily available
to employees through the intranet
portal and specific handbooks.

PwC utilizes an Information


Security Policy based on ISO
27002. This Information Security
Policy has been independently Security Organization
reviewed to ensure compatibility
with and conformity to ISO/IEC
27002:2005.
Internal Security Organization Confidentiality Agreements
All PwC new hires are required
PwC has a formal Corporate All PwC partners and employees,
to undertake a series of training
Security organization led by the upon joining the Firm and/or during
sessions, which among other
Chief Security Officer (CSO), who their employment period, as well
issues address partner and staff
is responsible for all the security as certain service providers, are
responsibilities as they relate to our
matters in the Firm and is assisted required to sign non-disclosure
Code of Conduct, local policies and
by a team of technology and security and confidentiality agreements,
procedures, Information Security,
professionals. demonstrating their commitment to
and privacy. The Firm’s Code
the Firm and its information security.
of Conduct is available at
The CSO reports to a Corporate
www.pwc.com.br.
Security Committee, which is
formed by PwC partners and has
PwC partners and staff are
the ultimate responsibility for the
required to complete an
Firm’s security-related decisions and
individual confirmation of their
strategies.
responsibility for the security of

PwC’s information to which they
These security professionals hold a
are granted access and to take
variety of certifications, including
due care to protect the technology
Certified Information Systems
equipment assigned to them.
Security Professional (CISSP),
ISO 27001 Lead Auditor, and
other credentials that attest their
proficiency in the field.

They participate in training


programs and activities sponsored
by industry-specific security groups
to stay abreast of current security
trends and issues.

Corporate Security Statement | 4


Asset Management

Asset Inventory and Classification Information Handling

PwC has established and maintains Information subject to legislative or


asset inventory processes for its regulatory requirements is identified
main physical and information through the asset inventory process.
assets. Security controls are established to
address the relevant requirements.
PwC’s information security policy PwC professionals are regularly
defines a four-tier scheme for provided with instructions on
classifying its main information identifying and handling the Firm’s
assets, which are: information.

• Determination of the
data classification level of
information assets;

• Identification of the
information owner;

• Identification of security risk


factors; and,

• Identification of disaster
recovery risk factors.

5 | PwC
Human Resources Security

People connecting to the PwC Confirmation of Security Appropriate Use


network are required to conduct Responsibilities
themselves in a manner consistent The PwC Code of Conduct
with the Firm’s security policies All PwC professionals must and the Guide for Information
regarding, among other matters, participate in the Firm’s Security and Protection address
confidentiality, business ethics and annual regulatory process for the appropriate use of electronic
professional standards. PwC requires Compliance Confirmation. tools and technologies. Those who
that communications via these This process requires that violate the Code or PwC policies
connections comply with applicable the professionals provide an and procedures will be subject to
laws and regulations, including individual confirmation of their the sanctions established by the
those governing: responsibility for the security labor legislation in force, up to and
of PwC’s information to which including dismissal, depending on
• Restrictions on the use of they have access, and to take due the seriousness of the violation.
telecommunications technology care to protect the technology
and encryption; equipment assigned to them. Security Awareness Training

• Copyrights and license All partners, staff and service Security awareness training is
agreement terms and conditions. providers sign a personal liability a component of the PwC hiring
agreement acknowledging their process. An awareness program
responsibility for the professional reinforces periodically the concepts
equipment and tools received and responsibilities defined in the
to develop their work, being Information Security Policy.
also responsible for the physical
security of these assets. Termination Processes

PwC has established documented


termination processes that define
responsibilities for collection of
information assets and removal of
access rights for professionals who
leave the Firm.

Corporate Security Statement | 6


Physical and Environmental Security

Data Center Security PwC Office Security

The following physical and Physical access controls are


environmental controls are implemented at all PwC offices in
incorporated into the design of the Brazil. Controls vary by location, but
PwC Data Center: typically include card-reader access
to facilities, on-premises security
• Separate protected facilities; staff and defined procedures for
visitor access control.
• Biometric entrance control;

• Internal and external cameras;

• Temperature and humidity


control and monitoring;

• Smoke detection alarm;

• Lightning suppression;

• Transient voltage surge


suppression and grounding;

• Redundant power feeds and UPS


Systems; and,

• Physically secured network


equipment areas and locked
cabinets.

Data center access is limited to


authorized personnel. Visitor
access procedures and loading dock
security protocols are established.

7 | PwC
Communications and Operations Management

Operational Procedures and Security Software Suite • Secure Remote Access - PwC
Responsibilities utilizes virtual private network
PwC uses a combination of (VPN) software, configured to
PwC’s IT organization has technology tools to provide a secure require dual factor authentication
established and maintains computing environment equipped to enable secure remote access to
controls over standard operating with: its networks.
procedures, including a repository
of procedures, formal review and • Antivirus - the virus protection • Lotus Notes - The Firm uses
approval processes, and revision software package is loaded Lotus Notes for a number of
management. during the operating system applications, including e-mail.
start up process and performs Lotus Notes’ security features are
Change Control on-access scans of all data. The widely recognized in the market.
software is configured to clean
PwC’s IT organization has or delete infected files and Spam Blocking and URL Filtering
established and maintains a provides other safeguards. Virus
Change Management/Change signatures are automatically and PwC has deployed and regularly
Control process which includes constantly updated through a updates URL filtering software that
risk assessment, test and retrieval process managed on a central blocks access to inappropriate web
procedures and review and approval basis. sites from its network. The Firm
components. has also established and maintains
• Antispyware - PwC installs e-mail gateway with spam-blocking
Development Environments spyware detection and removal and anti-virus software.
of malicious software on all the
PwC maintains separate Firm’s computers.
development and production
environments. Development • Desktop Firewall - PwC’s desktop
environments are required to firewall software is automatically
be physically separated from enabled and uses the Firm’s
production environments. The standard configuration to protect
transfer of an application from against malicious network traffic,
development to production follows including internet-based network
the procedures established in the threats, untrusted networks or
Change Management/Change malicious software. Database
Control process. configuration settings are secured
against change, tampering or
disablement by end users or
malicious programs.

Corporate Security Statement | 8


System Backup Network Security Secure Storage Media Disposition

Data center systems are routinely All data center internet access PwC has established procedures
backed up for disaster recovery points feature firewall segregation. for secure erasure or destruction
purposes. Restoration success Intrusion Prevention Systems of data center storage media prior
metrics are maintained. PwC utilizes (IPS) are positioned or installed at to disposal, aimed at protecting
an information protection and strategic locations in all internet the secrecy and confidentiality of
storage provider for secure transport connections. Firewall logging is information.
and offsite storage of backup media. enabled to track communications
(failed and successful access Application Security Reviews
Wireless Networks attempts) between the internet and
PwC’s internal network. Console Procedures for conducting
Only IT-managed wireless networks access to the firewalls is limited to application security reviews have
are permitted on PwC’s network. administrative personnel using the been established and include the
Wireless access security controls Secure Shell protocol. following:
include standards for encryption and
authentication that are managed by • Asset classification;
PwC’s IT department.
• Infrastructure vulnerability
scanning;

• Application security review; and,

• Database security review.

9 | PwC
Access Control

Authorization and Authentication Privileged Access VPN tunnels are secured using 3DES
Controls or higher encryption.
Access to authentication servers at
PwC follows a formal process to grant administrative, root or system levels The client software uses smart
or revoke access to its resources. is limited to those professionals tunneling technology to ensure
System access is based on the designated by PwC. that communications between the
concepts of “least-possible-privilege” host PC and the PwC network are
and “need-to-know” to ensure that Password Requirements transmitted via an encrypted VPN
authorized access is consistent with tunnel.
defined responsibilities. The Firm The Firm’s security policy establishes
uses a combination of user-based, requirements for password changes, Communications to internet-routed
role-based and rule-based access reuse and complexity. addresses will be conducted outside
control approaches. of the established VPN tunnel.
PwC requires the use of screensavers
PwC has established documented that reactivate after a period of Also, session timeout settings
procedures for secure creation inactivity through the use of a are configured to automatically
and deletion of user accounts, password. disconnect the user from a session
including processes to disable and/ after a period of mouse or keyboard
or delete accounts of employees Remote Access inactivity.
temporarily away from the Firm.
All PwC’s partners and staff are PwC uses virtual private network Processes are established to limit
required to agree to take reasonable (VPN) software to enable secure, third-party remote access to PwC
precautions to protect the integrity internet-based remote access for systems. Such access requires
and confidentiality of security its professionals. VPN users are approval from the security
credentials. required to authenticate using organization and access is limited
two-factor authentication; both a to those systems required for the
valid user name/password and a third-party to complete the task and
corresponding password-protected is monitored on a regular basis.
VPN token are required to create a
VPN tunnel.  

Corporate Security Statement | 10


Computer Security Mobile Devices

All PwC desktops and laptops are Mobile device access is only permitted
protected by hard drive encryption from Blackberry devices configured
software through the 256-bit AES in accordance with the Firm’s security
encryption algorithm. The software policy.
enforces password controls and
uses a dynamic password time-out This security policy requires a
to prevent brute force password password to be entered to access the
attacks. device, that the information in the
device be erased after ten incorrect
Additionally, the software is bound access attempts and allows remote
to the hard drive, protecting not only erasure if the Blackberry device is
the operating system, but also the reported lost or stolen.
data.

Laptop computers are provided


with a locking steel cable to secure
the equipment and deter theft. The
internal policy that regulates the use
of laptop is widely disclosed to PwC
professionals. Training is delivered
to new employees to educate them
about theft and to encourage
behavior that will help protect
laptops against it.

11 | PwC
Information Systems Development Cycle

PwC has established a methodology Internal and External Network This process includes steps to
to manage the acquisition, Scanning evaluate vendor supplied patches
development and maintenance of to determine servers that require
systems. Key security components PwC utilizes multiple vulnerability patches and updates, to document
related to this methodology include: scanning tools to assess its internal procedures for patching and
and externally facing network updating servers, and to deploy
• Business criticality assessment; environments. These tools are patches and updates in a timely
selected and configured to match manner to protect the PwC
• Risk assessment; the requirements of PwC’s IT infrastructure.
infrastructure, and are updated  
• Security organization on an ongoing basis. Processes are PwC continually reviews patches
involvement in project reviews established to assess and correct the and updates, as they are released, to
and key contracts; and, vulnerabilities discovered. determine their criticalities. Patches
released on a regularly scheduled
• Utilization of established change basis are applied following the
control processes to transfer Patch Management release; patches released on a
changes from the development regular basis and others determined
to the production environment. PwC has patch management to be critical are applied as
processes and tools to assess and needed to ensure protection from
deploy operating system and vulnerabilities.
application-specific patches and
updates.

Corporate Security Statement | 12


Information Security Incident Management

PwC professionals are made • Escalation process;


aware that security incidents must
be reported immediately. PwC • Pre-defined roles and
has documented procedures for responsibilities; and,
the receipt of security incident
reports. PwC’s Corporate Security • Virus response plan.
organization has a documented
incident response process which
includes:

13 | PwC
Business Continuity Management

PwC maintains a Recovery Plan for Examples of disaster situations that


its critical operations. could lead to the plan activation are
destructive events such as fire, power
The purpose of this plan is to or communication blackouts, storms,
provide a set of guidelines and floods, hurricanes, earthquakes, civil
corresponding processes for unrest, sabotage, etc.
supporting business processes in the
event of a disaster. While PwC has taken many steps
to mitigate the risk of a disaster,
the Firm recognizes that there are
variables beyond its control.

Corporate Security Statement | 14


Compliance

Vulnerability Scanning Internal Audit Privacy Organization

PwC has established processes for PwC has an Internal Audit PwC has established Data Protection
performing periodic vulnerability organization responsible for rules that define, among other
scans of its IT systems. These assessing internal operations, issues, the standards of behavior
procedures specify the use of including the Security and IT regarding the protection of PwC
multiple vulnerability scanning organizations. information.
software packages, the creation of
vulnerability assessment reports,  
and the presentation of vulnerability Ethics & Compliance
scanning results to the IT Operations
organization and IT leadership. PwC has implemented
communication channels (telephone
Access to vulnerability scanning hotline and email) which can be
tools is restricted to authorized used to report, either anonymously
members of the security team. or not, any misconduct of its
professionals or third-parties with
respect to the Code of Ethics and
laws and regulations referring to
property, secrecy, confidentiality,
ethics, business conduct, as well as
to internal policies and procedures.

15 | PwC
PwC Brazil Offices

São Paulo - SP Curitiba - PR Rio de Janeiro - RJ


Av. Francisco Matarazzo, 1400 Al. Dr. Carlos de Carvalho, 417 - 10º Av. José Silva de Azevedo Neto 200,
05001-903 - São Paulo/SP Curitiba Trade Center 1º e 2º - Torre Evolution IV
Torre Torino - Água Branca 80410-180 - Curitiba/PR Barra da Tijuca
Telefone: (11) 3674-2000 Telefone: (41) 3883-1600 22775-056 - Rio de Janeiro/RJ
Fax: (41) 3222-6514 Telefone: (21) 3232-6112
Barueri - SP Fax: (21) 3232-6113
Alameda Caiapós 243, Térreo Florianópolis - SC
Centro Empresarial Tamboré Avenida Rio Branco, 847 Rio de Janeiro - RJ
06460-110 - Barueri/SP Salas 401/ 402/ 403 e 409 Rua da Candelária 65, 20º - Centro
Telefone: (11) 3509-8200 88015-205 Florianópolis/SC 20091-020 - Rio de Janeiro/RJ
Fax: (11) 3509-8500 Telefone: (48) 3212-0200 Telefone: (21) 3232-6112
Fax: (48) 3212-0210 Fax: (21) 2516-6319
Belo Horizonte - MG
Rua dos Inconfidentes, 1190 - 9º Porto Alegre - RS Salvador - BA
30140-120 - Belo Horizonte/MG Rua Mostardeiro, 800 8º e 9º Av. Tancredo Neves, 620 - 30º e 34º
Telefone: (31) 3269-1500 Edifício Madison Center Ed. Empresarial Mundo Plaza
Fax: (31) 3261-6950 90430-000 - Porto Alegre/RS 41820-020 - Salvador/BA
Telefone: (51) 3378-1700 Telefone: (71) 3319-1900
Brasília - DF Fax: (51) 3328-1609 Fax: (71) 3319-1937
SHS - Quadra 6
Conjunto A - Bloco C Recife - PE São José dos Campos - SP
Edifício Business Center Tower Rua Padre Carapuceiro, 733 - 8º Rua Euclides Miragaia, 433
Salas 801 a 811 - Brasília/DF Edifício Empresarial Center Cjs. 301 e 304
70322-915 - Caixa Postal 08850 51020-280 - Recife/PE 12245-550 - São José dos Campos/SP
Telefone: (61) 2196-1800 Telefone: (81) 3465-8688 Telefone: (12) 3913-4505
Fax: (61) 2196-1820 Fax: (81) 3465-1063 Fax: (12) 3942-3329

Campinas - SP Ribeirão Preto - SP Sorocaba - SP


Rua José Pires Neto, 314 - 10º Av. Antônio Diederichsen, 400 Rua Riachuelo, 460 - 5º
13025-170 - Campinas/SP 21º e 22º - Edifício Metropolitan Edifício Trade Tower
Telefone: (19) 3794-5400 Business Center Salas 501, 502, 503 e 504
Fax: (19) 3794-5454 14020-250 - Ribeirão Preto/SP 18035-330 - Sorocaba/SP
Telefone: (16) 2133-6600 Telefone: (15) 3332-8080
Caxias do Sul - RS Fax: (16) 2133-6685 Fax: (15) 3332-8076
Rua Os 18 do Forte, 1256 - Sala 11
95020-471 - Caxias do Sul/RS Ribeirão Preto - SP | Outsourcing
Telefone: (54) 3202-1466 Rua Rui Barbosa, 1145 - 12º
Fax: (54) 3225-6789 14015-120 - Ribeirão Preto/SP
Telefone: (16) 3635-4303
Fax: (16) 3632-4424
© 2013 PricewaterhouseCoopers Brasil Ltda. All rights reserved. In this document, “PwC” refers to PricewaterhouseCoopers
Brasil Ltda., which is a member firm of PricewaterhouseCoopers, each member firm of which is a separate legal entity.

“PwC” refers to the network of member firms of PricewaterhouseCoopers International Limited (PwCIL), or, as the context
requires, individual member firms of the PwC network. Each member firm is a separate legal entity and does not act as agent of
PwCIL or any other member firm. PwCIL does not provide any services to clients. PwCIL is not responsible or liable for the acts
or omissions of any of its member firms nor can it control the exercise of their professional judgment or bind them in any way. No
member firm is responsible or liable for the acts or omissions of any other member firm nor can it control the exercise of another
member firm’s professional judgment or bind another member firm or PwCIL in any way.

Public Information (DC0)

Você também pode gostar