Page 158 - Courses
P. 158

Logical Security: The Network Layer

            •  Not hardening devices before joining them to the network.

            VLAN
            Improper configuration of virtual local area networks (VLANs).

            VLAN Control
            Virtual local area networks (VLANs) are tested to ensure they are correctly configured.

            Physical Control
            Processes are in place to monitor location of devices on the network, including:
            •  Comparing current and previous versions of network snapshots and following up on differences.
            •  Using a Network Access Control (NAC) system (a system that logically controls access to the
               network).
            •  Using newer versions of network tools that have software that provides alerts of new devices
               attached to the network.

            Suggested Audit Procedures

            Suggested high-level audit procedures include:
            1.  Asking network personnel for the VLAN hardening checklist.
            2.  Asking about the process used to configure VLANs.
            3.  Validating that the process is followed to ensure VLANs are correctly configured.
            4.  Testing sample of VLAN changes to ensure compliance with change management policy.
            5.  Inquiring into processes used to monitor for unauthorized devices connected to the network.


            TOPIC 3: PREVENTION SOFTWARE

            Prevention Software

            Antivirus.
            SIEM.
            Job Scheduler.

            Antivirus Software

            Antivirus Software Characteristics

            Antivirus software is computer software used to prevent and detect malicious software. After
            detection, antimalware software should be used to remove malicious code that exists in a device.
            Important points include:
            •  Since desktop computers and servers are connected to the network, it is important for network
               security that antivirus is maintained and up-to-date.
            •  In most organizations, antivirus software is centrally managed, and the endpoint console
               provides alerts when antivirus is disabled or not updated.

            Copyright © 2021 by The Institute of Internal Auditors, Inc. All rights reserved.
   153   154   155   156   157   158   159   160   161   162   163