Auditing OS and Database Controls
Auditing OS and Database Controls
T
o secure information effectively, it needs to be secured
from all perceivable threats. The standard approach to ness rules relating to who interacts with which elements of the
information security has been to build layers of securi- data and how. As long as the user stays within such an applica-
ty that aim to control specific risks related to different compo- tion, the user’s actions are well controlled. Most application
nents of a system. users log directly onto an application and, on exiting the appli-
Figure 1 is a representation of a computer system, deliber- cation, are automatically logged out of the system.
ately simplified to facilitate easier understanding of certain However, if a user is able to bypass the application and gain
concepts. access to the operating system, then all the rules and controls
The next few paragraphs may seem quite basic, but they are in the application software become irrelevant.
written with an audit and control focus, and the topic’s under- The OS views data not as basic pay, balance amount or stock
standing is important to the article. value, but as a series of bits in a file. Once a user or an intruder
Essentially the data physically reside on a hard disk, which gains access to the data through the operating system, the con-
is a part of the hardware and is closely coupled with the trols in the application software do not have any value—what
processor and memory. The operating system envelops the the intruder can do to the data is dependent on the controls in
hardware and interacts with all the input/output devices and the operating system only. Therefore, it is necessary to review
connections outside of the computer. The operating system is whether adequate controls have been enabled in the OS.
the primary link between the software and the physical data
and all attempts to read, write or manipulate the data must Auditing OS
pass through the operating system. Every operating system includes a set of security features
However, most end users of enterprise systems rarely inter- and vulnerabilities, which varies from OS to OS and some-
act with the operating system—not by choice, but by good times between versions. The security features are designed in
design. The users interact with the applications, e.g., the cus- such a way that they can be turned on or off and set to high
tomer of a bank logs in directly to a screen that prompts for security or low security, depending on the purpose for which
inputs required for withdrawal of monies or other transactions, the user intends to use the OS. In most cases, the default set-
and the store keeper logs into a menu that allows receipt of
goods or issue of stocks. Application software—such as enter-
prise resource planning, inventory management system, retail Figure 1—S-OX Resources
banking, financial accounting and invoicing—are what users
log into depending on their roles in the organization.
Application software sits on top of the operating system (with
T I ON SO
a database management system, also on top of the OS). A user A FT
does not need to know what OS is being used, and the user’s C E M G M T
only interaction is with the application software. LI AS I N G S WA
Notwithstanding all of this, the IS auditor needs to be con- P B AT SY YS R
cerned about the operating system for the following reasons.
P A R S T E
T E
The operating system sees all data on the disk as streams of
A T P E
bits in the records inside the files and folders. The operating E
system does not see the data relating to the basic pay of an A O CPU D
I M M
employee as being significantly more or less sensitive than the D RAM S
employee’s telephone number. It is the application software K
that understands the data from the business perspective; all X
business rules relating to the way the data can be manipulated WI I
N E Y
are enforced through programs in the application software. For N U
M / CL R
PA S Q R A TO
example, the application software does not allow a banking
customer to modify the balance in the account, but only dis-
YR L O
plays it and accepts a transaction. Good application software
OL L V EN
IN
Information Systems Control Journal, formerly the IS Audit & Control Journal, is published by the Information Systems Audit and Control Association, Inc.. Membership in the association, a voluntary
organization of persons interested in information systems (IS) auditing, control and security, entitles one to receive an annual subscription to the Information Systems Control Journal.
Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of the Information Systems Audit
and Control Association and/or the IT Governance Institute® and their committees, and from opinions endorsed by authors' employers, or the editors of this Journal. Information Systems Control Journal
does not attest to the originality of authors' content.
© Copyright 2003 by Information Systems Audit and Control Association Inc., formerly the EDP Auditors Association. All rights reserved. ISCATM Information Systems Control AssociationTM
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the
association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles
owned by the Information Systems Audit and Control Association Inc., for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume,
and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the
association or the copyright owner is expressly prohibited.
www.isaca.org