Page 1261 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1261

administrator account only 10 percent of the time to perform
               administrative actions, this reduces the potential risk of an infection

               occurring at the same time the administrator is logged on with an
               administrator account.

               Auditing can verify that administrators are using the privileged
               account appropriately. For example, an organization may estimate
               that administrators will need to use a privileged account only about 10
               percent of the time during a typical day and should use their regular

               account the rest of the time. An analysis of logs can show whether this
               is an accurate estimate and whether administrators are following the
               rule. If an administrator is constantly using the administrator account
               and rarely using the regular user account, an audit can flag this as an
               obvious policy violation.


               Security Audits and Reviews


               Security audits and reviews help ensure that an organization has
               implemented security controls properly. Access review audits
               (presented earlier in this chapter) assess the effectiveness of access
               controls. These reviews ensure that accounts are managed
               appropriately, don’t have excessive privileges, and are disabled or
               deleted when required. In the context of the Security Operations
               domain, security audits help ensure that management controls are in

               place. The following list includes some common items to check:

               Patch Management A patch management review ensures that
               patches are evaluated as soon as possible once they are available. It
               also ensures that the organization follows established procedures to
               evaluate, test, approve, deploy, and verify the patches. Vulnerability
               scan reports can be valuable in any patch management review or
               audit.


               Vulnerability Management A vulnerability management review
               ensures that vulnerability scans and assessments are performed
               regularly in compliance with established guidelines. For example, an
               organization may have a policy document stating that vulnerability
               scans are performed at least weekly, and the review verifies that this is
               done. Additionally, the review will verify that the vulnerabilities
   1256   1257   1258   1259   1260   1261   1262   1263   1264   1265   1266