IT Examiner School eBook

• Default passwords and accounts changed/disabled

• Length and complexity of password (alphanumeric, uppercase/lowercase, special characters)

• Password expiration period

• Password re-use and history

• Failed login settings (number of attempts and lockout period)

• Screen saver passwords

• Automatic timeouts

• Password reset procedures

• Use of tokens

• Biometric solutions

• Time-of-day and day-of-week restrictions

Procedure 19

Determine whether sufficient controls are in place to prevent the corruption of data and software and to correct problems caused by computer viruses or malware. Assess the following:

• Virus/malware detection practices (e.g., frequency and scope of scans)

• Virus/malware update practices for remote access devices

• Processes for updating virus detection applications (i.e., virus signature and scan engines)

• Automated tools to filter email and web traffic

Control Test

Verify that management obtains, reviews, and acts upon alerts from intrusion detection/prevention systems and other security systems.

Verify that management tracks and remediates findings from vulnerability assessments and penetration tests.

Verify that management obtains and reviews security logs/monitoring reports for operating systems, application systems, and networks.

Verify virus signatures are current on a sample of servers and clients

Procedure 20

Assess system configuration procedures. Consider the following:

Configurations based upon industry standards/vendor recommendations

Configurations standards approved and settings audited

InTREx Mapping

27

Tandem, LLC | Copyright © 2024

Confidential - Internal Use Only

Made with FlippingBook - Online magazine maker