Preview

proactive auditing

Powerful Essays
Open Document
Open Document
1588 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
proactive auditing
Safeguards Technical Assistance Memorandum
Protecting Federal Tax Information (FTI) By Proactive Auditing

Introduction
The traditional way to audit a system involves identifying issues that have already occurred, then reviewing audit logs to determine which relevant events are of a serious nature. While this "after the fact" or “passive” auditing is an important tool in data security, an auditing program requires significant resources in people, process and technology to effectively identify potential incidents in a timely manner. Auditing management should be taken to the next level through adopting a “proactive” approach. By directly identifying relevant security events prior to, during, or after FTI exposure, the agency can progressively manage risk and identify potential security incidents involving FTI in a timely and near-real time manner.

Typically, auditing entails capturing relevant auditable security events from end-to-end, or from receipt of FTI to its destruction or its return to the original source. The events captured in audit log files contain details of the action performed, result of the action, and the date and time of the action. Audit logs are a primary tool used by administrators to detect and investigate attempted and successful unauthorized activity. However, policies and procedures often do not specify the regular review of audit logs, reviews are too infrequent or not conducted on a routine basis, and/or the audit review is conducted after a security incident has occurred.

The benefit of passive log analysis, while important, fails to realize the proactive benefit of knowing when a security violation is occurring in real-time. Proactive security measures would capture unauthorized activity as it occurs or immediately following the violation and provide proper personnel with the information they need to react to a violation effectively, which can reduce the impact of the attempt or incident.

Currently, IRS



References: 1. IRS Publication 1075, (http://www.irs.gov/pub/irs-pdf/p1075.pdf) 2. NIST Special Publication (SP) 800-53 Revision 3, Recommended Security Controls for Federal Information Systems and Organizations, (http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf) 3. NIST SP 800-92, Guide to Computer Security Log Management, (http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf) 4. NIST SP 800-123, Guide to General Server Security will serve as the basis for these requirements, (http://csrc.nist.gov/publications/nistpubs/800-123/SP800-123.pdf)

You May Also Find These Documents Helpful

  • Powerful Essays

    274. UFIT Security Incident Response Procedures, Standards and Guidelines. (n.d.). Retrieved January 2014, from UF Information Technology University of Florida: http://www.it.ufl.edu/policies/security/incident-response/…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Log Files contain complete records of all security events (logon events, resource access, attempted violations of policy, changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can allow a admin to quickly discover the root cause of any issues.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    A popular saying is, “inspect what you expect,” and this is definitely true in the area of IT information security auditing. The goal should not be to catch rule breakers, but rather to work with IT and the business to ensure nothing slips through the cracks and that solid practices are always followed. Doing this will go a long way to ensuring and maintaining the expected information security policy of the…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    New auditing features in Windows 7 and Windows Server 2008 R2 make it easier to audit important user, computer, and network activities in a focused, efficient manner. These features…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    [242.1] Select and use appropriate methods to minimise security risk to IT systems and data…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Log Files encompass complete records of all security events (logon events, resource access, attempted violations of policy, and changes in system configuration or policies) and critical system events (service/daemon start/stop, errors generated, system warnings) that can allow an administrator to quickly discover the root cause of any issues.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    ISP Survey

    • 1455 Words
    • 5 Pages

    References: Cichonski, P., Millar, T., Grance, T., Scarfone, K. (2012). NIST SP 800-61: Computer Security Incident Handling Guide. National Institute of Standards and Technology. Rev. 2. Retrieved from National Institute of Standards and Technology.…

    • 1455 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    Security guidance must exist in the form of formal written policies and procedures that define…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Logs are a great monitoring tool that provides a record of events. As such, I need every occurrence to be logged, tracked and reported on. For each entry, I want to know "what" occurred, "when" it occurred, and "who" or what cause it. Monitoring compliance would allow me to: (1) "Detect and correct violations (2) Provide evidence to support enforcement actions (3) Evaluate program progress by establishing compliance status (4) Provide case studies for staff training (The SANS Institute, 2012). At each location I would nominate ISS enforcement officers who will be held responsible for monitoring and enforcement strategies to ensure that employees act in according with acceptable use policies (AUPs), set forth by management to ensure the organization assets are protected. Sguil (pronounced sgweel) is one of the best GUI monitoring tool around I would use that provides "real time events, sessions data, and raw packet captures." It facilitates seamless analysis, as when an alert that needs more investigation has been identified, it makes a decision on how to handle the situation. Sguil uses a backend database for most of its data, which allows users to perform SQL queries against several different types of security events (The SANS Institute, 2012). For access control, I would use…

    • 577 Words
    • 2 Pages
    Good Essays