Preview

Aix Audit Check List

Powerful Essays
Open Document
Open Document
3519 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Aix Audit Check List
AIX CHECKLIST

By: Frank W. Lyons President of Entellus Technology Group, Inc. 407-774-8397 EntellusFL@aol.com

I. Preliminary Steps

A. Obtain an organizational chart of the group responsible for the operating environment.

B. Obtain any existing security and control procedures

C. Obtain a description of the network configuration

D. Obtain a listing of the various systems (applications) supported by the operating system

E. Obtain a job description of the System Administrator

II. Installation Audit Steps

A. Review any design criteria for system security.

B. Determine whether the user access is controlled through the operating system, the database management system, or the application front-end menu system.

C. Determine what documentation standards exist and whether they are being followed.

D. Determine who acts as the Security Administrator for the operating environment.

E. Determine the standards for password management and construction.

F. Review any existing security guidelines for users, groups, and functions.

III. Physical Security

A. Review the network configuration to ensure that all network components are physically secured.

These include File Servers, Bridges, Routers, Hubs/Concentrators, Gateways, Terminal Servers, and Modems.

B. Determine who is responsible and what documentation is required for configuration changes to the physical network.

Are these procedures effective?

Are the changes to the network documented?

Are users and other impacted parties properly notified?

C. Ensure that only the System Administrator or other authorized personnel have physical access to the file server console as the system can be rebooted from the ‘A’ drive and a new root password can be supplied.

IV. System Administration

A. Identify all the System Administrators.

$grep :0: /etc/passwd

B. Determine that each administrator requires this

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Audit Checklist

    • 2781 Words
    • 12 Pages

    This Appendix includes guidance for reviewing the Office of Inspector General’s (OIG’s) attestation engagements conducted in accordance with Government Auditing Standards (GAS), Chapter 6, and the American Institute of Certified Public Accountants’ (AICPA’s) Statements on Standards for Attestation Engagements (SSAE). When an auditor conducts an attestation engagement under generally accepted government auditing standards (GAGAS), the engagement must be conducted in accordance with the SSAEs and additional GAGAS standards. This appendix is not intended to replace auditor judgment, and while comprehensive, the peer review team may also wish to consult with other guidance as warranted. That guidance includes the SSAE and the AICPA’s peer review checklists for attestation engagements (aicpa.org/members/div/practmon/systemreview.asp). In this regard, there are three AICPA checklists covering AICPA requirements and GAGAS: (1) Agreed-Upon Procedures Engagement Checklist – PRP §20,900; (2) Other Attestation Engagement Checklist – PRP §21,000; and (3) Supplemental Checklist for Review of Agreed Upon Procedures and Other Attestation Engagements Performed in Accordance With Government Auditing Standards (Yellow Book) July 2007 Revision – PRP §21,120A.…

    • 2781 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    True False

    • 378 Words
    • 2 Pages

    12. User access refers to what objects and data in a database a user has permission to use.…

    • 378 Words
    • 2 Pages
    Good Essays
  • Good Essays

    * a.For each control issue, write a Yes/No question such that a “No” answer represents a control weakness. For example, one question might be “Are supporting documents, such as purchase orders and receiving reports, marked ‘paid’ when a check is issued to the vendor?”…

    • 445 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Advanced Auditing

    • 2114 Words
    • 9 Pages

    you should be able to [5] Recognize issues surrounding the privacy of customer information [6] Describe audit implications when transaction evidence is solely electronic [7] Recognize threats to eBusiness strategies, which rely solely on the delivery of services "via the Internet…

    • 2114 Words
    • 9 Pages
    Satisfactory Essays
  • Powerful Essays

    2. Within the organization, who is involved in a network design project (operations, sales, marketing executives, etc.)? How?…

    • 2027 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Java Project

    • 419 Words
    • 2 Pages

    4) Your system should have at least two levels of access: 1) account holder, and 2) administrator.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    b. Monitoring and controlling communications throughout the entire project life cycle to ensure the information needs of the project stakeholders are met.…

    • 526 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    End User

    • 584 Words
    • 3 Pages

    a) Direct users: Direct users are the users who se the computer, database system directly, by following instructions provided in the user interface. They interact using the application programs already developed, for getting the desired result. E.g. People at railway reservation counters, who directly interact…

    • 584 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2 IT Protocol questions

    • 289 Words
    • 1 Page

    a. Know the infrastructure – The first thing is to know the infrastructure when one performs troubleshooting.…

    • 289 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Audit Program

    • 2433 Words
    • 10 Pages

    We have done general operations audit of ABCD 1234 AND company WLL from 1.11.2012 to 20.11.2012 and submitting the draft audit report below..…

    • 2433 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Audit Program

    • 906 Words
    • 4 Pages

    a. Determining that cash on hand as shown in the general ledger is represented by currency and coins on hand.…

    • 906 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Assessor S Script

    • 2139 Words
    • 8 Pages

    The Assessor: Moving on, we are now going to tackle the Core Competencies of NC II – CHS. There are 4 Units of Competencies. These are:…

    • 2139 Words
    • 8 Pages
    Powerful Essays

Related Topics