Page 109 - CISSO_Prep_ Guide
P. 109

KRIs, can alert management to trends or changes in risk that may
            be a sign of a potential breach. There are many ways to review
            controls, including log reviews, alarms, incident reports, and user
            feedback.

            Reports  that  show  comparable  results  and  can  indicate  trends
            inactivity  should  be  provided  to  management.  The  reports,
            however, should be based on metrics that are good indicators of
            system security. There may be many points at which a system is
            being monitored, but not all logs need to be reviewed.
            The reports should focus on areas of most importance. All logs
            should be protected and retained so that they are available for later
            review and investigation. Writing the logs onto a separate media
            that would prevent the deletion or modification of log entries may
            also be desirable. The length of time that logs should be retained
            is dependent on legal requirements, business needs, and the value
            of the information in the logs. Some logs may need to be retained
            for years to be compliant with laws and regulations; other logs
            may be deleted or overwritten in a matter of days.



            Change Control
            A time of change is a time of risk. A change may interrupt
            business processes, bypass controls, lead to project overruns,
            and scope creeps or render business continuity plans ineffective.
            Therefore, the organization should have a clearly defined and
            followed change management process. This will ensure that all
            changes are formally requested and documented, reviewed for
            their impact on the business and security, and tested and
            approved before implementation.
            Change control procedures should be used for all changes to
            projects, networks, applications, configurations, and user
   104   105   106   107   108   109   110   111   112   113   114