Page 1245 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1245

prevent modification or deletion.


               Monitoring and Accountability

               Monitoring is a necessary function to ensure that subjects (such as
               users and employees) can be held accountable for their actions and

               activities. Users claim an identity (such as with a username) and prove
               their identity (by authenticating), and audit trails record their activity
               while they are logged in. Monitoring and reviewing the audit trail logs
               provides accountability for these users.

               This directly promotes positive user behavior and compliance with the
               organization’s security policy. Users who are aware that logs are

               recording their IT activities are less likely to try to circumvent security
               controls or to perform unauthorized or restricted activities.

               Once a security policy violation or a breach occurs, the source of that
               violation should be determined. If it is possible to identify the
               individuals responsible, they should be held accountable based on the
               organization’s security policy. Severe cases can result in terminating
               employment or legal prosecution.


               Legislation often requires specific monitoring and accountability
               practices. This includes laws such as the Sarbanes–Oxley Act of 2002,
               the Health Insurance Portability and Accountability Act (HIPAA), and
               European Union (EU) privacy laws that many organizations must
               abide by.







                   Monitoring Activity


                  Accountability is necessary at every level of business, from the
                  frontline infantry to the high-level commanders overseeing daily
                  operations. If you don’t monitor the actions and activities of users

                  and their applications on a given system, you aren’t able to hold
                  them accountable for mistakes or misdeeds they commit.

                  Consider Duane, a quality assurance supervisor for the data entry
                  department at an oil-drilling data mining company. During his
   1240   1241   1242   1243   1244   1245   1246   1247   1248   1249   1250