0% found this document useful (0 votes)
46 views1 page

User Activity Monitoring

The document discusses monitoring access changes by security staff, information owners, and department managers. It also discusses reviewing activity logs for evidence of management review and issue escalation, and determining if information owners, security specialists, and managers receive reports on access changes.

Uploaded by

kumusha123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views1 page

User Activity Monitoring

The document discusses monitoring access changes by security staff, information owners, and department managers. It also discusses reviewing activity logs for evidence of management review and issue escalation, and determining if information owners, security specialists, and managers receive reports on access changes.

Uploaded by

kumusha123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Monitoring of Access Monitoring of Access Changes

Changes
Control: Access changes are monitored by
security staff, information owners and Select a sample of various systems and applications that utilize user
department managers. access management methodologies

a. Determine how activity logs are:


Information Security Guide 1. Generated,
Security Login & File Object Access 2. Monitored
Auditing
Where applicable, the operating systems or
application must be enabled for security b. For each item in the sample, select a sample of activity logs for
login or file object access auditing one or more periods within the scope of the review.

Review each log for evidence of management review and issue


escalation.

Determine whether information owners, information security


specialists, and departmental managers receive reports on
access changes within their areas of responsibility.

Determine whether reviews and follow-up are evidenced either by


hard copy signatures or by online use of the reviewers’ IDs.

You might also like