customers through an extranet infrastructure. Which of the following
should be the GREATEST concern to an IS auditor reviewing the firewall
security architecture?
A
、
A Secure Sockets Layer (SSL) has been implemented for user
authentication and remote administration of the firewall.
B
、
Firewall policies are updated on the basis of changing requirements.
C
、
Inbound traffic is blocked unless the traffic type and connections
have been specifically permitted.
D
、
The firewall is placed on top of the commercial operating system
with all installation options.
ANSWER:D
NOTE:The greatest concern when implementing firewalls on top of commercial
operating systems is the potential presence of vulnerabilities that could
undermine the security posture of the firewall platform itself. In most
circumstances, when commercial firewalls are breached that breach is
facilitated by vulnerabilities in the underlying operating system. Keeping
all installation options available on the system further increases the
risks of vulnerabilities and exploits. Using SSL for firewall
administration (choice A) is important, because changes in user and supply
chain partners' roles and profiles will be dynamic. Therefore, it is
appropriate to maintain the firewall policies daily (choice B), and
prudent to block all inbound traffic unless permitted (choice C).
82
、
During an audit of the logical access control of an ERP financial
system an IS auditor found some user accounts shared by multiple
individuals. The user IDs were based on roles rather than individual
identities. These accounts allow access to financial transactions on the
ERP. What should the IS auditor do next?
A
、
Look for compensating controls.
B
、
Review financial transactions logs.
C
、
Review the scope of the audit.
D
、
Ask the administrator to disable these accounts.
ANSWER:A
NOTE:The best logical access control practice is to create user IDs for
each individual to define accountability. This is possible only by
establishing a one-to-one relationship between IDs and individuals.
However, if the user IDs are created based on role designations, an IS
auditor should first understand the reasons and then evaluate the
effectiveness and efficiency of compensating controls. Reviewing
transactions logs is not relevant to an audit of logical access control