Auditing and Accountability Flashcards
Accountability
Trace all activities back to their sources, using identification, authentication, and authorization
HIPAA
Health Insurance Portability and Accountability Act of 1996
Protects medical information
Sarbanes-Oxley Act of 2002
Protects against corporate fraud
Auditing
Process of reviewing an organization’s records or information
Ensures people comply with laws, policies, etc
Prevents attacks
Nonrepudiation
Situation in which an individual is unable to successfully deny that he has made a statement or taken an action, generally because of sufficient evidence that he has done it
Deterrence
People will think twice about misbehaving on your system if they know you are monitoring them and if you have communicated that there will be penalties for misbehavior
Achieved through auditing and monitoring processes
Intrusion detection and prevention
Can occur in both physical and logical realms
Implement alerts based on unusual activity can help detect attacks
Automated tools used: intrusion detection systems (IDSs) and intrusion prevention systems (IPSs)
Security benefits of accountability
Nonrepudiation
Deterrence
Intrusion detection and prevention
Admissibility of records
Intrusion detection systems (IDSs)
Automated tool used strictly for monitoring and alerting
Intrusion prevention systems (IPSs)
Works with information sent from IDS
Can actually take action based on situation
Admissibility of records
Need unbroken chain of custody to submit records into legal settings
What does your capacity to audit directly relate to?
Your ability to hold anyone accountable for anything.
Factors commonly audited in information security
Passwords – allows to enforce policies on use and construction
Software licenses – legally acquired and current; Business Software Alliance
Internet usage – websites employees visit, instant messaging, email, file transfers; use proxy servers to funnel traffic through just a few gateways to filter it
Logging
Gives you the history of the activities that have taken place in an environment
Are logs usually generated manually or automatically?
Automatically