Auditing Infrastucture Flashcards
1
Q
Data centers
A
They are automated but require staff to operate so there should be policies and procedures in place which should include physicial access control, system and facility monitoring, facility and equipment planning, tracking and maintained as well as responsive procedures for outages, emergencies and alarm conditions.
2
Q
Windows Server
A
- I review user access request and approval process and how terminated user accounts are deactivated.
- I check password controls and verify if auditing is enabled
- I ensure legal warning banning is displayed during process to provide warning against unauthorized access.
- I ensure guest account is disabled
- I check password configuration, firewall settings and patch management
- Most Times, we send windows audit script to administrators or sit with one to go over local security.
3
Q
Active Directory
A
- I check user permission, group policies, computer and domains
- I do so by using windows script to validate all domains
- The script copies the dump, and I review the dump.
- I also check security, domain, administrative right and control over controller.
4
Q
Oracle Audit
A
- I inquire a list of DBA’s to determine who has access to the database.
- I check user authentication
- I review password configuration to ensure it meets the company policy
- I ensure default database user account password has been changed.
- I ensure control is in place to prevent users from updating data directly in the database environment.
- I ensure they have audit trail enabled for administrative account.
5
Q
Unix Audit (operating system)
A
- I review user account creation and approval process.
- I ensure that there are no terminated users with active accounts in the system.
- I review security of user directories and configuration files for world writable files.
- I review cron and @ job for suspicious entries
- I also interview the admins to know the monitoring tools used to manage the Unix operating system.
6
Q
Network devices
A
- Active directory/Domain Controller controls Local Area Network with a particular location
- Firewall
- Router
7
Q
Database
A
- SQL Database
- Oracle Database
- DB2 (IBM)
8
Q
Operating System
A
- Windows
- Unix/Linux
- mainframe
9
Q
Categories of IT Applications
A
- Authorization Checks
- Calculation Checks
- Completeness Checks
- Interface Checks
- Validity Checks
10
Q
Security Audit Logs
A
One of the easiest ways to verify that access control mechanisms are performing.
11
Q
How we test infrastructure
A
- Send a request list or script to obtain security settings of servers.
- Sit with auditee to obtain settings via screenshot from servers.
- Perform vulnerability scanning using NESSUS tool made by McAffee, and WebInspect made by HP.