Page 1246 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1246

daily routine, he sees many highly sensitive documents that

                  include the kind of valuable information that can earn a heavy tip
                  or bribe from interested parties. He also corrects the kind of
                  mistakes that could cause serious backlash from his company’s
                  clientele because sometimes a minor clerical error can cause
                  serious issues for a client’s entire project.

                  Whenever Duane touches or transfers such information on his
                  workstation, his actions leave an electronic trail of evidence that

                  his supervisor, Nicole, can examine in the event that Duane’s
                  actions should come under scrutiny. She can observe where he
                  obtained or placed pieces of sensitive information, when he
                  accessed and modified such information, and just about anything
                  else related to the handling and processing of the data as it flows in
                  from the source and out to the client.

                  This accountability provides protection to the company should

                  Duane misuse this information. It also provides Duane with
                  protection against anyone falsely accusing him of misusing the
                  data he handles.




               Monitoring and Investigations

               Audit trails give investigators the ability to reconstruct events long
               after they have occurred. They can record access abuses, privilege
               violations, attempted intrusions, and many different types of attacks.
               After detecting a security violation, security professionals can
               reconstruct the conditions and system state leading up to the event,

               during the event, and after the event through a close examination of
               the audit trail.

               One important consideration is ensuring that logs have accurate time
               stamps and that these time stamps remain consistent throughout the
               environment. A common method is to set up an internal Network
               Time Protocol (NTP) server that is synchronized to a trusted time
               source such as a public NTP server. Other systems can then

               synchronize with this internal NTP server.

               NIST operates several time servers that support authentication. Once
   1241   1242   1243   1244   1245   1246   1247   1248   1249   1250   1251