Page 1257 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1257

Inspection Audits

               Secure IT environments rely heavily on auditing as a detective security
               control to discover and correct vulnerabilities. Two important audits

               within the context of access control are access review audits and user
               entitlement audits.

               It’s important to clearly define and adhere to the frequency of audit
               reviews. Organizations typically determine the frequency of a security
               audit or security review based on risk. Personnel evaluate
               vulnerabilities and threats against the organization’s valuable assets to
               determine the overall level of risk. This helps the organization justify

               the expense of an audit and determine how frequently they want to
               have an audit.



                          Audits cost time and money, and the frequency of an audit is


                  based on the associated risk. For example, potential misuse or
                  compromise of privileged accounts represents a much greater risk
                  than misuse or compromise of regular user accounts. With this in
                  mind, security personnel would perform user entitlement audits
                  for privileged accounts much more often than user entitlement
                  audits of regular user accounts.



               As with many other aspects of deploying and maintaining security,

               security audits are often viewed as key elements of due care. If senior
               management fails to enforce compliance with regular security reviews,
               then stakeholders can hold them accountable and liable for any asset
               losses that occur because of security breaches or policy violations.
               When audits aren’t performed, it creates the perception that
               management is not exercising due care.


               Access Review Audits


               Many organizations perform periodic access reviews and audits to
               ensure that object access and account management practices support
               the security policy. These audits verify that users do not have excessive
               privileges and that accounts are managed appropriately. They ensure
               that secure processes and procedures are in place, that personnel are
   1252   1253   1254   1255   1256   1257   1258   1259   1260   1261   1262