Page 1111 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1111

users are not abusing their privileges. For example, if an information
               security team has access to eDiscovery tools that allow searching

               through the contents of individual user files, security managers should
               routinely review the logs of actions taken by those administrative users
               to ensure that their file access relates to legitimate eDiscovery
               initiatives and does not violate user privacy.




                             Network flow (NetFlow) logs are particularly useful when

                  investigating security incidents. These logs provide records of the
                  connections between systems and the amount of data transferred.




               Account Management

               Account management reviews ensure that users only retain authorized

               permissions and that unauthorized modifications do not occur.
               Account management reviews may be a function of information
               security management personnel or internal auditors.

               One way to perform account management is to conduct a full review of
               all accounts. This is typically done only for highly privileged accounts
               because of the amount of time consumed. The exact process may vary
               from organization to organization, but here’s one example:


                1.  Managers ask system administrators to provide a list of users with
                    privileged access and the privileged access rights. They may
                    monitor the administrator as they retrieve this list to avoid
                    tampering.

                2.  Managers ask the privilege approval authority to provide a list of
                    authorized users and the privileges they should be assigned.

                3.  The managers then compare the two lists to ensure that only

                    authorized users retain access to the system and that the access of
                    each user does not exceed their authorization.

               This process may include many other checks, such as verifying that
               terminated users do not retain access to the system, checking the
               paper trail for specific accounts, or other tasks.
   1106   1107   1108   1109   1110   1111   1112   1113   1114   1115   1116