UNIT 7 - IT Security Management Risk Assessment Security Auditing5 Hrs
UNIT 7 - IT Security Management Risk Assessment Security Auditing5 Hrs
INSO
Unit-7
A security policy is a high-level management document to inform all users of the goals of
and constraints on using a system. A policy document is written in broad enough terms
that it does not change frequently. The information security policy is the foundation upon
which all protection efforts are built. It should be a visible representation of priorities of
the entire organization, definitively stating underlying assumptions that drive security
activities. The policy should articulate senior management's decisions regarding security
as well as asserting management's commitment to security. To be effective, the policy
must be understood by everyone as the product of a directive from an authoritative and
influential person at the top of the organization.
People sometimes issue other documents, called procedures or guidelines, to define how
the policy translates into specific actions and controls. In this section, we examine how to
write a useful and effective security policy.
Purpose
Security policies are used for several purposes, including the following:
The different types of risk analysis include considering the possibility of adverse
events caused by natural disasters, such as severe storms, earthquakes or floods;
or adverse events caused by malicious or accidental human activities. An essential
part of risk analysis is identifying the estimated damage from these events and the
likelihood of their occurrence.
Check that your security training efforts are moving the needle from one audit to the next
Reduce cost by shutting down or repurposing extraneous hardware and software that you
uncover during the audit
Security audits uncover vulnerabilities introduced into your organization by new technology
or processes
Prove the organization is compliant with regulations – HIPAA, SHIELD, CCPA, GDPR, etc.
Application logs – this is a broader category as it includes logs that are not necessarily part of
the audit trail (e.g. debug messages, exception stack traces). Nevertheless, they may be
useful, especially in case there is no dedicated application-specific audit trail functionality
Database logs – whether it is logged queries, change data capture or change tracking
functionality, or some native audit trail functionality
Operating system logs – for Linux that would include the /var/log/audit/audit.log (or similar
files), /var/log/auth.log. For Windows, it would include the Windows Event logs for the
Security and System groups.
Access logs – access logs for web servers can be part of the audit trail especially for internal
systems where a source IP address can more easily be mapped to particular users.
Network logs – network equipment (routers, firewalls) generate a lot of data that may be seen
as part of the audit trail (although it may be very noisy)
The details logged for each event may vary widely, but at minimum each event should
capture
timestamp
event, status, and/or error codes
service/command/application name
user or system account associated with an event
Device used (e.g. source and destination IPs, terminal session ID, web browser etc.)