Page 167 - Courses
P. 167

Logical Security: The Network Layer

            •  Account vendor-supplied default passwords are changed. Each person accessing the system uses
               his or her own ID. The built-in administrator account is disabled or processes exist to ensure
               access to the account’s password is restricted.
            •  The rules built into the IDS/IPS are the controls, not the software package itself.

            Suggested Audit Procedures

            Suggested audit procedures include:
            •  Review the network diagram and validate that it shows the correct placement of network
               appliances.
            •  Test a sample of the changes (vendor-supplied, custom, patches, etc.) to ensure compliance with
               change management policy.
            •  Attempt to log into the network appliance through the built-in accounts using the vendor-
               supplied default passwords.
            •  Test the follow-up timing of recorded events and ensure that false positives are minimized.
            •  Evaluate whether penetration or vulnerability assessments are performed and timely corrective
               action occurs.
            •  Test to ensure that all network appliance software default settings are changed to a security-
               hardened status. If an external operating system is used, test to ensure bare minimum operating
               system processes, systems, services, and commands are enabled.

            TOPIC 5: NETWORK SERVERS

            Network Servers

            Servers to consider in an assessment of network security controls:
               •  DNS.
               •  FTP Server.
               •  Proxy Server.
               •  Mail Server.
               •  Web Server.

            Domain Name System (DNS)

            DNS Characteristics

            DNS Characteristics:

            Domain Name Systems (DNSs) are the internet or LAN equivalent of a phone book. They maintain a
            directory of domain names and translate them to Internet Protocol (IP) addresses. Computers and
            machines access websites via IP addresses.

            A DNS server is hosted on a server with a security-hardened OS (e.g., Windows, Unix). The OS is
            usually stripped down to a bare minimum to minimize risk.

            Copyright © 2021 by The Institute of Internal Auditors, Inc. All rights reserved.
   162   163   164   165   166   167   168   169   170   171   172