Page 1256 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1256

security for the environment. The test process ensures that personnel
               are following the requirements dictated by the security policy or other

               regulations, and that no significant holes or weaknesses exist in
               deployed security solutions.

               Auditors are responsible for testing and verifying that processes and
               procedures are in place to implement security policies or regulations,
               and that they are adequate to meet the organization’s security
               requirements. They also verify that personnel are following these

               processes and procedures. In other words, auditors perform the
               auditing.



                  Auditing and Auditing


                  The term auditing has two different distinct meanings within the
                  context of IT security, so it’s important to recognize the
                  differences.

                  First, auditing refers to the use of audit logs and monitoring tools

                  to track activity. For example, audit logs can record when any user
                  accesses a file and document exactly what the user did with the file
                  and when.

                  Second, auditing also refers to an inspection or evaluation.
                  Specifically, an audit is an inspection or evaluation of a specific
                  process or result to determine whether an organization is following
                  specific rules or guidelines.


                  These rules may be from the organization’s security policy or a
                  result of external laws and regulations. For example, a security
                  policy may dictate that inactive accounts should be disabled as
                  soon as possible after an employee is terminated. An audit can
                  check for inactive accounts and even verify the exact time accounts
                  were disabled and match this to the time of a terminated
                  employee’s exit interview. Inspection audits can be done internally

                  or by an external auditor, and they will often use the logs created
                  from auditing and monitoring as part of the evaluation process.
   1251   1252   1253   1254   1255   1256   1257   1258   1259   1260   1261