2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet734/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   730   731   732   733   734   735   736   737   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Inspection Audits
Secure IT environments rely heavily on auditing as a detective security control to discover 
and correct vulnerabilities. Two important audits within the context of access control are 
access review audits and user entitlement audits.
It’s important to clearly define and adhere to the frequency of audit reviews. 
Organizations typically determine the frequency of a security audit or security review 
based on risk. Personnel evaluate vulnerabilities and threats against the organization’s 
valuable assets to determine the overall level of risk. This helps the organization justify the 
expense of an audit and determine how frequently they want to have an audit.


Logging, Monitoring, and Auditing 
785
Audits cost time and money, and the frequency of an audit is based on the 
associated risk. For example, potential misuse or compromise of privileged 
accounts represents a much greater risk than misuse or compromise of 
regular user accounts. With this in mind, security personnel would per-
form user entitlement audits for privileged accounts much more often than 
user entitlement audits of regular user accounts.
As with many other aspects of deploying and maintaining security, security audits are 
often viewed as key elements of due care. If senior management fails to enforce compli-
ance with regular security reviews, then stakeholders can hold them accountable and 
liable for any asset losses that occur because of security breaches or policy violations. 
When audits aren’t performed, it creates the perception that management is not exercis-
ing due care.
Access Review Audits 
Many organizations perform periodic access reviews and audits to ensure that object access 
and account management practices support the security policy. These audits verify that 
users do not have excessive privileges and that accounts are managed appropriately. They 
ensure that secure processes and procedures are in place, that personnel are following 
them, and that these processes and procedures are working as expected. 
For example, access to highly valuable data should be restricted to only the users who 
need it. An access review audit will verify that data has been classifi ed and that data clas-
sifi cations are clear to the users. Additionally, it will ensure that anyone who has the 
authority to grant access to data understands what makes a user eligible for the access. For 
example, if a help desk professional can grant access to highly classifi ed data, the help desk 
professional needs to know what makes a user eligible for that level of access. 
When examining account management practices, an access review audit will ensure 
that accounts are disabled and deleted in accordance with best practices and security 
policies. For example, accounts should be disabled as soon as possible if an employee 
is terminated. A typical termination procedure policy often includes the following 
elements: 

At least one witness is present during the exit interview. 

Account access is disabled during the interview. 

Employee identification badges and other physical credentials such as smartcards are 
collected during or immediately after the interview. 

The employee is escorted off the premises immediately after the interview.
The access review verifi es that a policy exists and that personnel are following it. When 
terminated employees have continued access to the network after an exit interview, they 
can easily cause damage. For example, an administrator can create a separate administra-
tor account and use it to access the network even if the administrator’s original account is 
disabled.



Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   730   731   732   733   734   735   736   737   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish