Page 727 - StudyBook.pdf
P. 727

Operational and Organizational Security: Policies and Disaster Recovery• Chapter 12  711

                 location, the changes are replicated across the network.This method of centralized
                 administration is considerably easier than the decentralized approach, which
                 required administrators to visit or connect to multiple servers across the network to
                 make security changes to accounts.
                    However, as with tasks that require the administrator’s physical presence at a
                 site, they can designate someone to perform basic account management functions
                 at a remote site. For example, someone at a remote location could be given the
                 necessary access privileges to create new accounts, modify existing accounts, or
                 delete accounts that are no longer needed. If a branch office hired a temporary
                 employee, such a person could create the account and remove it when the tempo-
                 rary employee no longer worked there.While this relieves the administrator from
                 having to manage all accounts in all locations, they need to trust that the person
                 they delegated this authority to is creating, modifying, and deleting accounts prop-
                 erly and according to policy.

                 Auditing

                 Auditing is the process of monitoring and examining items to determine if prob-
                 lems exist. Regular monitoring of different logs, data, and other sources can assist in
                 determining if there are lapses in security. Enabling auditing on a system allows the
                 system to record certain events to a log file or notify someone (e.g., by sending e-
                 mail, sending a page, and so forth). By analyzing these records, administrators can
                 identify attempted and successful breaches of security, and discover where lapses in
                 security exist.
                    Auditing can involve monitoring any number of events, allowing the adminis-
                 trator to track the activities of accounts and attempts to access data and resources.
                 For example, firewalls can be configured to monitor which Web sites users are vis-
                 iting through the corporate local area network (LAN), while a network OS can be
                 configured to monitor successful and unsuccessful logon attempts.Through
                 auditing, administrators can identify attempts to breach security and see if security
                 policies are being followed.
                    When enabling auditing, it is important to remember that system resources will
                 be used to monitor events, which will have an impact on performance.While pos-
                 sible to audit every event on a server, doing so could slow down the system signifi-
                 cantly.Also, the more events audited, the more entries are included in the log file
                 showing auditing results. It can be difficult to sift through a high volume of infor-
                 mation to find the information needed.To effectively audit a system, it is important
                 to first determine what events are significant and need to be monitored to protect




                                                                              www.syngress.com
   722   723   724   725   726   727   728   729   730   731   732