Audit Procedures Relating to Subversive Threats
To achieve these control objectives, the auditor may perform the following tests of control
1. Review the adequacy of the firewall in achieving the proper balance between control and convenience based on the organization’s business objective and potential risks.
Criteria for assessing the firewall effectiveness include:
• Flexibility. The firewall should be flexible enough to accommodate new services as the security needs of the organization change.
• Proxy services. Adequate proxy applications should be in place to provide explicit user authentication to sensitive services, applications, and data.
• Filtering. Strong filtering techniques should be designed to deny all services that are not explicitly permitted. In other words, the firewall should specify only those services the user is permitted to access, rather than specifying the services that are denied
• Segregation of system. Systems that do not require public access should be segregated from the Internet.
• Audit tools. The firewall should provide a thorough set of audit and logging tools that identify and record suspicious activity.
• Probe for weaknesses. To validate security, the auditor (or a professional security analyst) should periodically probe the firewall for weaknesses just as a computer Internet hacker would do. A number of software products are currently available for identifying security weaknesses.
Audit Procedures Relating to Subversive ThreatsTo achieve these control objectives, the auditor may perform the following tests of control1. Review the adequacy of the firewall in achieving the proper balance between control and convenience based on the organization’s business objective and potential risks. Criteria for assessing the firewall effectiveness include:• Flexibility. The firewall should be flexible enough to accommodate new services as the security needs of the organization change.• Proxy services. Adequate proxy applications should be in place to provide explicit user authentication to sensitive services, applications, and data.• Filtering. Strong filtering techniques should be designed to deny all services that are not explicitly permitted. In other words, the firewall should specify only those services the user is permitted to access, rather than specifying the services that are denied• Segregation of system. Systems that do not require public access should be segregated from the Internet.• Audit tools. The firewall should provide a thorough set of audit and logging tools that identify and record suspicious activity.• Probe for weaknesses. To validate security, the auditor (or a professional security analyst) should periodically probe the firewall for weaknesses just as a computer Internet hacker would do. A number of software products are currently available for identifying security weaknesses.
การแปล กรุณารอสักครู่..
