2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet69/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   65   66   67   68   69   70   71   72   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Job Responsibilities Job responsibilities
are the specific work tasks an employee is 
required to perform on a regular basis. Depending on their responsibilities, employees 
require access to various objects, resources, and services. On a secured network, users must 
be granted access privileges for those elements related to their work tasks. To maintain the 
greatest security, access should be assigned according to the principle of least privilege.
The 
principle of least privilege
states that in a secured environment, users should be 
granted the minimum amount of access necessary for them to complete their required work 
tasks or job responsibilities. True application of this principle requires low-level granular 
control over all resources and functions.
Job Rotation Job rotation
, or rotating employees among multiple job positions, is simply 
a means by which an organization improves its overall security (Figure 2.2). Job rotation 
serves two functions. First, it provides a type of knowledge redundancy. When multiple 
employees are all capable of performing the work tasks required by several job positions, 
the organization is less likely to experience serious downtime or loss in productivity if an 
illness or other incident keeps one or more employees out of work for an extended period 
of time.
Second, moving personnel around reduces the risk of fraud, data modification, theft, 
sabotage, and misuse of information. The longer a person works in a specific position, the 
more likely they are to be assigned additional work tasks and thus expand their privileges 
and access. As a person becomes increasingly familiar with their work tasks, they may 
abuse their privileges for personal gain or malice. If misuse or abuse is committed by one 
employee, it will be easier to detect by another employee who knows the job position and 
work responsibilities. Therefore, job rotation also provides a form of peer auditing and pro-
tects against collusion.


54
Chapter 2 

Personnel Security and Risk Management Concepts
F I g u R e 2 . 2
An example of job rotation among management positions
Network Management
Database Management
Firewall Management
User Account Management
Job rotation requires that security privileges and accesses be reviewed to maintain the 
principle of least privilege. One concern with job rotation, cross-training, and long-tenure 
employees is their continued collection of privileges and accesses, many of which they no 
longer need. The assignment of privileges, permissions, rights, access, and so on, should be 
periodically reviewed to check for privilege creep or misalignment with job responsibilities. 
Privilege creep occurs when workers accumulate privileges over time as their job respon-
sibilities change. The end result is that a worker has more privileges than the principle of 
least privilege would dictate based on that individual’s current job responsibilities.
Cross-training
Cross-training
is often discussed as an alternative to job rotation. In both cases, workers 
learn the responsibilities and tasks of multiple job positions. However, in cross-training 
the workers are just prepared to perform the other job positions; they are not rotated 
through them on a regular basis. Cross-training enables existing personnel to fill the 
work gap when the proper employee is unavailable as a type of emergency response 
procedure.
When several people work together to perpetrate a crime, it’s called collusion. 
Employing the principles of separation of duties, restricted job responsibilities, and job 
rotation reduces the likelihood that a co-worker will be willing to collaborate on an illegal 
or abusive scheme because of the higher risk of detection. Collusion and other privilege 


Personnel Security Policies and Procedures 
55
abuses can be reduced through strict monitoring of special privileges, such as those of an 
administrator, backup operator, user manager, and others.
Job descriptions are not used exclusively for the hiring process; they should be main-
tained throughout the life of the organization. Only through detailed job descriptions can a 
comparison be made between what a person should be responsible for and what they actu-
ally are responsible for. It is a managerial task to ensure that job descriptions overlap as 
little as possible and that one worker’s responsibilities do not drift or encroach on those of 
another. Likewise, managers should audit privilege assignments to ensure that workers do 
not obtain access that is not strictly required for them to accomplish their work tasks.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   65   66   67   68   69   70   71   72   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish