Monitoring of Access Monitoring of Access Changes
Changes
Control: Access changes are monitored by
security staff, information owners and Select a sample of various systems and applications that utilize user
department managers. access management methodologies
a. Determine how activity logs are:
Information Security Guide 1. Generated,
Security Login & File Object Access 2. Monitored
Auditing
Where applicable, the operating systems or
application must be enabled for security b. For each item in the sample, select a sample of activity logs for
login or file object access auditing one or more periods within the scope of the review.
Review each log for evidence of management review and issue
escalation.
Determine whether information owners, information security
specialists, and departmental managers receive reports on
access changes within their areas of responsibility.
Determine whether reviews and follow-up are evidenced either by
hard copy signatures or by online use of the reviewers’ IDs.