Page 148 - Courses
P. 148

Logical Security Applications

            Concepts: Event Activity Logging

            Key points of event activity logging:
              OSs come with logging capability.
              The depth and extent of logging is dependent upon the organization and OS.
              Normally, those that use the super user account or have super account capability can disable
               and modify OS logs.
              To ensure log integrity, logs are usually transferred to a logging server for later review by the
               security staff.

            Server virtualization OS considerations:
              Allows deployment of many servers at one time.
              Servers can be moved very easily from one physical box to another.
              One physical server can share several OSs all logically separated and controlled by the virtual OS.
              Virtualization means that there is one root OS that all other deployed OSs run under. Examples of
               OSs used for virtualization include Unix and VMS.
              Virtualization allows dynamic addressing of capacity management; however, this means that
               they are relying on this as their only option.
              The root OS has the same risks as a standard OS. The main difference is that now you have a
               single OS controlling several. The root OS should deploy virus protection, etc.

            Security Risks

            Incorrect security modifications:
              A change to an OS results in the system becoming insecure.
              A user approved for access assigns an incorrect ACL.
              An access rule provides users access to the wrong data.

            Intrusions that occur and go undetected:
              Ineffective controls fail to identify a hacker intrusion.
              OS security updates are not patched in a timely fashion.
              A guest or other OS account is not disabled or becomes re-enabled.

            Virus contamination:
              The computer does not have antivirus software or it has been disabled.
              Antivirus software is not updated.
              Malware is not recognized by the current, updated antivirus system.

            Controls

            Antivirus Software

            Antivirus software prevents malware situations. The following steps help assure antivirus software
            effectiveness:


            Copyright © 2022 by The Institute of Internal Auditors, Inc. All rights reserved.
   143   144   145   146   147   148   149   150   151   152   153