Page 137 - Courses
P. 137

Logical Security Applications

              Restrict password usage such as requiring alpha and numeric characters, limiting login attempts,
               password change intervals, etc.

            Role Revisions

            Periodically, role revisions are required due to system updates or organizational changes. Revisions
            may include the creation of new roles or the revision of existing roles.

            IP Filtering

            Internet Protocol (IP) filtering is a mechanism to restrict locations from which users can access an
            application. Such restrictions can be configured from the network or internally to the application. If
            internal to the application, the IP ranges allowed are usually contained in the general configuration
            settings. Internet Protocol (IP) filtering rules usually take the form of a single IP address or a range of
            IP addresses. For example, users could be restricted from logging into the application from specific
            parts of the network or externally to the network.

            IP filtering can be used to limit locations from which users can log into cloud-based systems. For
            example, the IP filtering ranges for a particular cloud-based general ledger (GL) system could be
            limited to only coming from the organization’s network. This will force the user to authenticate to
            the organization’s network prior to accessing the cloud-based system.

            User Events

            User Events include:

            New User
              A new user is authorized to the application.
              A new user is assigned a role.

            Additional Access Request
            Users can be assigned additional access capability due to changes in job function.

            Transferred User
            A transferred user’s access from the previous job role is removed and access is added based on the
            new job role.

            Terminated User
              A terminated user is an employee or contractor who has ended employment and must be denied
               access to the system.
              A terminated user’s account could be disabled or removed. Some applications do not allow
               removal since this would remove all user actions and audit trail. (Orphans)
              Users’ disabled accounts are normally placed into inactive roles to keep them separated from
               the active users.
              Terminated roles should be continuously monitored for inappropriate use.

            Copyright © 2022 by The Institute of Internal Auditors, Inc. All rights reserved.
   132   133   134   135   136   137   138   139   140   141   142