Page 45 - StudyBook.pdf
P. 45

General Security Concepts: Access Control, Authentication, and Auditing • Chapter 1  29

                 Auditing


                 Auditing provides methods for tracking and logging activities on networks and sys-
                 tems, and links these activities to specific user accounts or sources of activity. In the
                 case of simple mistakes or software failures, audit trails can be extremely useful in
                 restoring data integrity.They are also a requirement for trusted systems to ensure
                 that the activity of authorized individuals can be traced to their specific actions,
                 and that those actions comply with defined policy.They also allow for a method of
                 collecting evidence to support any investigation into improper or illegal activities.
                 Auditing Systems


                 Auditing of systems must occur with a thorough understanding of the benefits of
                 the process.As you create your auditing procedures, you are trying to develop a
                 path and trail system in the logging of the monitored events that allows you to
                 track usage and access, either authorized or unauthorized.To do this, you must
                 consider the separation of duties that improves security and allows for better defini-
                 tion of your audit policies and rules.
                    To assist in catching mistakes and reducing the likelihood of fraudulent activi-
                 ties, the activities of a process should be split among several people.This process is
                 much like the RBAC concepts discussed earlier.This segmentation of duties allows
                 the next person in line to possibly correct problems simply because they are being
                 viewed with fresh eyes.
                    From a security point of view, segmentation of duties requires the collusion of
                 at least two people to perform any unauthorized activities.The following guidelines
                 assist in assuring that the duties are split so as to offer no way other than collusion
                 to perform invalid activities.

                      ■  No access to sensitive combinations of capabilities. A classic
                         example of this is control of inventory data and physical inventory. By sep-
                         arating the physical inventory control from the inventory data control, you
                         remove the unnecessary temptation for an employee to steal from inven-
                         tory and then alter the data so that the theft is left hidden.

                      ■  Prohibit conversion and concealment. Another violation that can be
                         prevented by segregation is ensuring that there is supervision for people
                         who have access to assets.An example of an activity that could be pre-
                         vented if properly segmented follows a lone operator of a night shift.This
                         operator, without supervision, could copy (or “convert”) customer lists and




                                                                              www.syngress.com
   40   41   42   43   44   45   46   47   48   49   50