Page 138 - Courses
P. 138

Logical Security Applications


            Security Risks

            The primary risks are dependent on the business systems deployed, and may result from lack of
            separation of duties (SoD) within and among the various business system functions. Mostly, risk is
            associated with inappropriate access.

            Concepts

            Types of user accounts at the application layer include:

            Business Users

              Assignments to the general user population.
              Assignments by individual or role.
              Roles unique at the process-level.
              Activities logged and monitored.

            IT Personnel

              Assigned based on job duties taking separation of duties into consideration.
              Generally assigned a read-only access to production data and information.
              Not permitted to promote program source code to production.

            Privileged Accounts

              IT or business users can have privileged access capability. These users have a higher access to
               devices or data than others.
              There can be several levels of privileged access.
              IT engineers, technicians, and administrators may have domain or system administrator rights,
               which can access configuration settings or other IT functionality

            System Administrator ID

              The application comes with one built-in account that has access to all system functionality.
              The best practice is to disable this account and have all users log into the application through
               their own ID, assigning certain users privileged access capability. As denoted earlier, there could
               be various levels of privileged access.
              If the system administrator ID cannot be disabled, then access to this ID is very limited (normally
               to IT personnel). Access is only used when necessary. There could be required uses of the ID. For
               example, certain configuration parameters can only be modified using this account versus one
               assigned to an individual with privileged access.
              Activities of the system administrator ID are logged and monitored.

            Application/BOT Accounts

            Copyright © 2022 by The Institute of Internal Auditors, Inc. All rights reserved.
   133   134   135   136   137   138   139   140   141   142   143