4: Auditing Access Logs Flashcards
Access log contenst
IS auditor needs to determine what events are recorded in access logs.
The IS auditor needs to understand the capabilities of the system being audited and determine if the right events are being logged, or if logging is suppressed on events that should and could be logged.
• Centralized access logs
The IS auditor should determine whether the organization’s access logs are aggregated or are stored on individual systems.
Access log review
The IS auditor needs to determine if there are policies, processes, or procedures regarding access log review. The auditor should determine if access log reviews take place, who performs them, how issues requiring attention are identified, and what actions are taken when necessary.
Access log protection
The IS auditor needs to understand access log protection mechanisms. Primarily, the auditor needs to determine if access logs can be altered, destroyed, or attacked to cause the system to stop logging events.
Access alerts
The IS auditor should determine whether automated mechanisms are in place that alert appropriate personnel of security alerts related to access logs.
The IS auditor should determine whether written procedures exist for such events, as well as records of their