Page 161 - Courses
P. 161
Logical Security: The Network Layer
• Test a sample of policy changes that have been made to ensure they comply with documented
requirements.
• Review how false positives are minimized.
• Test to ensure appropriate follow-up and remediation occurs for a sample of alerts.
Job Scheduler
Job Scheduler Characteristics
A job scheduler, also known as an automated or batch scheduler, is software that schedules and
tracks computer batch tasks. Each operating system may have its own scheduler, each of which can
potentially be used for technology or processing reasons in order to assist the primary scheduler.
Important points include:
• A scheduler resides on, or is part of a server’s operating system.
• The scheduler usually resides within the organization’s network as part of the server farm.
• If in an AD environment, the scheduler IDs and passwords that are used for batch jobs are
integrated with AD security.
Security Risks
Security risks include:
• Unauthorized access to scheduling processes.
• Outdated patches.
Controls
Controls include:
• Standard network monitoring processes where logs are enabled and monitored using an
SIEM.
• Restricted access to the scheduler.
Suggested Audit Procedures
Suggested audit procedures include:
• Testing the appropriateness of user access to the scheduler.
• Reviewing the monitoring process for the scheduler.
• Testing to ensure changes to scheduled jobs, operating system, or scheduler patches comply
with change policy.
TOPIC 4: NETWORK SYSTEMS
Network Systems
The following are systems to consider in an assessment of network security controls:
Copyright © 2021 by The Institute of Internal Auditors, Inc. All rights reserved.