Computer security audit
From Wikipedia, the free encyclopedia
A computer security audit is a manual or systematic measurable technical assessment of a system or application. Manual assessments include interviewing staff, performing security vulnerability scans, reviewing application and operating system access controls, and analyzing physical access to the systems. Automated assessments, or CAAT's, include system generated audit reports or using software to monitor and report changes to files and settings on a system. Systems can include personal computers, servers, mainframes, network routers, switches. Applications can include Web Services, Microsoft Project Central, Oracle Database. (examples only).
Contents |
[edit] Audit Event Reporting
During the last few decades systematic audit record generation (also called audit event reporting) can only be described as ad hoc. Ironically, in the early days of mainframe and mini-computing with large scale, single-vendor, custom software systems from companies such as IBM and Hewlett Packard, auditing was considered a mission-critical function. Over the last 30 years, COTS or Common Off The Shelf software applications and components, and micro computers have gradually replaced custom software and hardware as more cost-effective business management solutions.
During this transition, the critical nature of audit event reporting gradually transformed into low priority customer requirements. Software consumers, having little else to fall back on, have simply accepted the lesser standards as normal. The consumer licenses of existing COTS software disclaim all liability for security, performance and data integrity issues.
[edit] Traditional Logging
Using traditional logging methods, applications and components submit free-form text messages to system logging facilities such as the Unix Syslog process, or the Microsoft Windows System, Security or Application event logs. Java applications often fall back to the standard Java logging facility, log4j. These text messages usually contain information only assumed to be security-relevant by the application developer, who is often not a computer- or network-security expert.
The fundamental problem with such free-form event records is that each application developer individually determines what information should be included in an audit event record, and the overall format in which that record should be presented to the audit log. This variance in formatting among thousands of instrumented applications makes the job of parsing audit event records by analysis tools (such as the Novell Sentinel product, for example) difficult and error prone. Such domain and application specific parsing code included in analysis tools is also difficult to maintain, as changes to event formats inevitably work their way into newer versions of the applications over time.
[edit] Modern Auditing Services
The importance of audit event logging has increased with recent new (post-2000) US and world-wide legislation mandating corporate and enterprise auditing requirements. Open source projects such as OpenXDAS, a Bandit project identity component, have begun to take their place in software security reviews as not only an improvement, but a requirement.
OpenXDAS is based on the Open Group Distributed Auditing Service (XDAS) specification, and has begun to show prominence in the security community as a more structured alternatives to free-form text audit logging. The XDAS specification defines a well-considered event format for security-related events, an event taxonomy with event types that cover most security-related event scenarios, and a standardized API for event submission and management.
[edit] Performing an Audit
Generally, computer security audits are performed by:
1) Federal or State Regulators - Certified accountants, CISA, CISSP. Federal OTS, OCC, DOJ, etc.
1) Corporate Internal Auditors - Certificated accountants, CISA, CISSP.
2) Corporate Security Staff - Security managers, CISSP, CISM.
3) IT Staff - subject matter expects, oversight support.
[edit] See also
- Computer insecurity, or all the things that can go wrong thanks to vulnerabilities to malware, crackers, vandals, insider crime, then what all has to be done to protect against this.
- Defensive computing
- Computer security
- Penetration test
- Security breach
[edit] References
[edit] External links
- California Privacy and Security Best Business Practices
- Information Technology Audit Resources.
- Online Computer Security Audits.
- Security reviews for mid-range systems.
- Information Systems and Audit Control Association (ISACA)
- The Institute of Internal Auditors
- The OpenXDAS Distributed Auditing Service project
- The Bandit Project
- Novell Sentinel