Page 165 - Courses
P. 165

Logical Security: The Network Layer

            Controls

            Controls include:
            •  Account vendor-supplied default passwords are changed. Each person accessing the system uses
               his or her own ID. The built-in administrator account is disabled, or processes exist to ensure
               access to the account’s password is restricted.
            •  Policies and rules comply with the organization’s policies or documented configuration.
            •  Changes adhere to the organization’s change control process.
            •  Systems containing OSs (e.g., Windows, UNIX, etc.) should be hardened so the bare minimum
               essential system services, modules, and features are enabled.
            •  Access is restricted to a minimal number of users.

            Suggested Audit Procedures

            Suggested audit procedures include:
            •  Obtaining a sample of changes and test to ensure the changes were managed through the
               organization’s change process.
            •  Obtaining evidence that the number of users is limited and users who access the system is
               appropriate.
            •  Testing to ensure that identified events (based on policies and rules) are logged and reviewed.
            •  Testing to ensure that all network appliance software default settings are changed to a security-
               hardened status. If an external operating system is used, test to ensure bare minimum operating
               system processes, systems, services, and commands are enabled.

            Intrusion Prevention System





























            IDS/IPS Characteristics




            Copyright © 2021 by The Institute of Internal Auditors, Inc. All rights reserved.
   160   161   162   163   164   165   166   167   168   169   170