Page 161 - Courses
P. 161

Logical Security: The Network Layer

            •  Test a sample of policy changes that have been made to ensure they comply with documented
               requirements.
            •  Review how false positives are minimized.
            •  Test to ensure appropriate follow-up and remediation occurs for a sample of alerts.

            Job Scheduler

            Job Scheduler Characteristics

            A job scheduler, also known as an automated or batch scheduler, is software that schedules and
            tracks computer batch tasks. Each operating system may have its own scheduler, each of which can
            potentially be used for technology or processing reasons in order to assist the primary scheduler.
            Important points include:
            •  A scheduler resides on, or is part of a server’s operating system.
            •  The scheduler usually resides within the organization’s network as part of the server farm.
            •  If in an AD environment, the scheduler IDs and passwords that are used for batch jobs are
               integrated with AD security.

            Security Risks

            Security risks include:
               •  Unauthorized access to scheduling processes.
               •  Outdated patches.

            Controls

            Controls include:
               •  Standard network monitoring processes where logs are enabled and monitored using an
                   SIEM.
               •  Restricted access to the scheduler.

            Suggested Audit Procedures

            Suggested audit procedures include:
               •  Testing the appropriateness of user access to the scheduler.
               •  Reviewing the monitoring process for the scheduler.
               •  Testing to ensure changes to scheduled jobs, operating system, or scheduler patches comply
                   with change policy.

            TOPIC 4: NETWORK SYSTEMS

            Network Systems

            The following are systems to consider in an assessment of network security controls:

            Copyright © 2021 by The Institute of Internal Auditors, Inc. All rights reserved.
   156   157   158   159   160   161   162   163   164   165   166