Page 12 - IIA MAGAZINE_March 2017_English
P. 12

IT Audit                                                                                         TO COMMENT on the article,
                                                                                                 EMAIL the author at awais1116@hotmail.com

BY MUHAMMAD AWAIS NASEEM                         EDITED BY NAGESH SURYANARAYANA

Auditing Logical Access

The Overlooked Areas                             Job descriptions or role to determine the       Access Revocation
                                                 appropriateness.                                Issue: While verifying the user access
Auditing logical access area may seem                                                            revocation process IT Auditors generally
intuitive for IT auditors but its importance     Admin Activity Review                           adopt an approach of obtaining list of
can never be over emphasized, with latest        Issue: The other important area which           Leavers from HR and compare with the
security threats and Cyber Security attacks      the IT auditors generally overlook is the       active users on applications using a unique
it is common that a successful cyber-attack      review of the activity logs of privilege users  reference e.g. employee ID to validate the
may lead to a hacker gaining unauthor-           / administrators. Though the focus is more      status of the user (active or inactive). While
ized access to critical system and data and      of the existence of admin logs to review        this procedure provides the status of the
allows them to alter or compromise the           the privilege user activities “which acts       user account (active of revoked) it does not
system/data.
This article discusses                           as a detective control”, need of preventive                             provide the assurance
the common mistakes                              controls to eliminate such occurrence is                                for full audit period.
IT auditors make while                           not emphasized. No doubt you need to                                    Solution: While the
auditing the Logical                             trust your own personnel to certain extent,                             auditor performs the
access area, though                              this warrant such requirement due to the                                above procedure,
Logical Access area is                           role of administrators being critical for the                           there is a need to
important to all system                          continuity of business.                                                 ensure the adequacy
elements i.e. DB, OS,                            Solution: IT auditor should interview                                   of the demobilization
Applications etc, from                           relevant personnel to determine if admin                                process by verifying
now on where required                            activity is being logged and periodically                               the last working day
we will be focusing                              reviewed. Due to the extensive number                                   of employee (From
on Application level                             of logs it’s not humanly possible to review                             HR List) with the
access to narrate some                           manually, hence an effective SIEM or Logs                               last login or disable
examples.                                        correlating tools should be implemented                                 date (Extracted
                                                 and configured to capture critical events                               from application).
Access Rights Review                             such as e.g. user creation/deletion, access     For instance the policy mandated the
                                                 provisioning and revocation and unusual         revocation of employee access to the
Issue: One of the most common mistake by         activities noted after office hours etc.. for   system on last day or within 5 days, this test
the IT auditors while auditing the LA area       timely detection of such occurrence.            will provide assurance on timely revocation
is to just relay on the periodic access rights                                                   of the employee access to eliminate misuse
review performed by the management,                                                              or violation of user access.
certain cases it’s just a formality to sign the
access rights review document without                                                            Conclusion :
even reviewing the adequacy and need of                                                          Access management is being one of the
user rights like it’s a tick box activity, may                                                   critical areas of the overall security posture
be just to meet audit requirements.                                                              of the organization, enhanced focus/ro-
Solution: An IT auditor should interview                                                         bust assessment on this area will enable IT
the reviewer of access rights and ascertain                                                      Auditor to provide good insight on their
how he or she performs this review and                                                           current security posture and reasonable
on what basis the validity of user rights is                                                     assurance to the management & key stake-
assessed or determined.                                                                          holders.
IT auditor should also perform sample
basis testing of such access provided to                                                         Muhammad Awais Naseem
users to verify adequacy of the rights pro-
vided to the users are in line with his/her                                                      Senior IT Auditor, EY

12 INTERNAL AUDITOR - MIDDLE EAST                                                                MARCH 2017
   7   8   9   10   11   12   13   14   15   16   17