Auditing Operating Systems: Audit Objectives Relating To Access Privileges
Auditing Operating Systems: Audit Objectives Relating To Access Privileges
Operating System Security- involves policies, procedures, and controls that determine who can
access the operating system, which resources they can use, and what actions they can take.
Security Components
1) Log-on procedure- operating system’s first line of defense against unauthorized access.
2) Access token- contains key information about the user, including user ID, password, user
group, and privileges granted to the user.
3) Access control list- assigned to each IT resource which controls access to the resources.
4) Discretionary access privileges- allows owner to grant access privilege to other users.
2. Password Control
Password- secret code the user enters to gain access to systems, applications, data
files, or a network server.
Common forms of contra-security behavior
forgetting passwords and being locked out of the system
failing to change passwords on a frequent basis
Post-it syndrome
Simplistic passwords that computer criminal easily anticipates
Reusable Passwords- user defines the password to the system once and then
reuses it to gain future access.
One-Time Passwords- user’s password changes continuously.
Audit Objectives relating to passwords:
-To ensure that the organization has an adequate and effective password policy for
controlling access to the operating system.
Audit Procedures:
Verify that all users are required to have passwords
Verify that new users are instructed in the use of passwords and the importance of
password control.
Review password control procedures to ensure that passwords are changed regularly.
Review password file to determine that weak passwords are identified and disallowed.
Verify that the password file is encrypted and that the encryption key is properly
secured.
Assess the adequacy of password standards such as length and expiration interval.
Review the account lockout policy and procedures.