Auditing Systems -Security

I am currently working in System Security Department in my orginisation. They are currently want to develop a new section for Security Auditing.

I was assigned to be on the system auditing team. Can anyone give me a brief overview on what do system Auditors do ? any suggestions or links which can guide me on how to do it?

I like experts to share their knowledge and experince in this field. I've just started my work career few months back.

Thanks Guys  
Who is Participating?
shahrialConnect With a Mentor Commented:
Dear cancer_66,
Should you have further questions, please ask a new question.
I believe i had answered your current question... ;-)
Computer systems auditors are involved in the design and monitoring of control systems which ensure the accuracy and security of data. They also review an organisation's computing environment and the use of their computer facilities.

Computer systems auditors provide managers with expert opinions about the reliability of results and operations of computer systems. It is essential that computer systems auditors understand both the accounting and information technology implications of computer systems.

Depending on the level of responsibility and the particular job role involved, duties may also include:

- Analyse information processing systems to assess their completeness, accuracy, validity and efficiency
- Assess business systems to gauge the accurateness, completeness and timeliness of transaction processing
- Review applications systems and their business procedures in achieving desired business objectives
- Participate in new system design to ensure an efficient, effective and well-controlled system
- Evaluate the organisation's computing environment for effective operational, systems software, systems development and   security procedures
- Check software and hardware acquisition in terms of economy, efficiency and ability to deliver operationally
- Check and report on the usage of computing facilities
- Talk with data processing management and system users
- Write reports and recommendations for improvement in computing facility management.

Hope this helps...;-)
cancer_66Author Commented:
Thanks Guys, sorry for responding late was quite busy.

I am required to provide a Tasklist for System security audit. Can anyone help here?

I cant think of many?!

Tasklists:- Baseline report, checklists, tools windows NT/XP and Unix,....errr

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

For a start, you should look at these...

Microsoft TechNet Security website:
Internet Storm Center

What platform are you running? So that I can give you the Tasklist specific to your system...;)
cancer_66Author Commented:
Ill be auditing two system. 2000
2.solaris 8.0

thanks alot for the help
Auditing Process
The auditing process provides a well-defined set of procedures and protocols to measure compliance or deviation from applicable standards.However, audits can be used to verify compliance with applicable laws and regulations, efficiency of organizational operation, and effectiveness achieving desired organizational goals.The auditing process should consist of regularly planned activities that maximize participation and consider resource allocation. For instance, it may not make sense to perform an audit during end-of-year holidays when it is difficult to meet with and collect information from key personnel.
The Department of Defense (DoD) provides the following detailed steps that are more particular to an IT audit:

1. Plan the audit:
- Understand the business context of the security audit
- Obtain required approvals from senior management and legal representatives
- Obtain historical information on previous audits, if possible
- Research the applicable regulatory statutes
- Assess the risk conditions inherent to the environment

2. Determine the existing controls in place and the associated risk profile:
- Evaluate the current security posture using risk-based approach
- Evaluate the effectiveness of existing security controls
- Perform detection risk assessment
- Perform control risk assessment
- Determine the total resulting risk profile

3. Conduct compliance testing:
- Determine the effectiveness of policies and procedures
- Determine the effectiveness of segregation of duties

4. Conduct substantive testing:
- Verify that the security controls behave as expected
- Test controls in practice

5. Determine the materiality of weaknesses found:
- If the security exploits found were to be executed, what would be the tangible impact to the business (in dollars) and the intangible impact (loss of reputation)
- Determine if the security exploits found increase the organizational risk profile

6. Present findings:
- Prepare the audit report and the audit opinion
- Create recommendations

The auditing process provides a means to ensure compliance with organizational security policy. Audit trail reports can be used to demonstrate compliance over a period of time. Audit trails should be able to reconstruct events, provide
problem identification and resolution, and assign individual accountability. It is important that an “owner” is assigned and that owners know they are culpable for neglecting to protect information assets and that the audit trail must be protected
from unauthorized modification as well. Accountability is significant but limited since it is a reactive control. It does not prevent activities from happening, but reports them once an event has occurred.
After the policy has been created, the maintenance activities monitor effectiveness and compliance. Monitoring can take the form of checking for the latest security vulnerabilities and applying patches as needed. However, applying patches as
announcements are made on vulnerabilities is not enough. It is important to provide regularly scheduled penetration tests to discover exploits that may have resulted from a recent change in operating environment.The risk-based approach
to protecting information assets should consider the importance of the assets that need to be protected and the frequency of review required to mitigate risk.

Hope this helps...;-)
If you have time to read, get this good book:
Syngress SSCP (Systems Security Certification Practitioner) Study Guide and DVD Training System.
ISBN: 1-931836-80-9

It a good book...alternatively, you may want to get the CISSP or the Security+ books.
It give good insight into Auditing and a lot more... ;-)
cancer_66Author Commented:
Thanks alot shahrial. good info. ill look into the links right away.

cancer_66Author Commented:
Hmm, excuse my ignorant guys, got a question i would really appricate if someone helps me out with it.

How can i create a baseline? lets say for windows 2000?

what is a baseline first of all ?
Use the Microsoft Baseline Security Analyzer V1.2

Microsoft Baseline Security Analyzer (MBSA) 1.2 Q&A

Check out these:
Support WebCast: Vulnerability assessment and the Microsoft Baseline Security Analyzer

Download the additional resource. This is a Microsoft PowerPoint (.ppt) file

Supplemental reading: Scripting with the Microsoft Baseline Security Analyzer V1.2

Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

These will give you the tools, detailed instructions and general info on auditing.
Should be able to help you...;-)
cancer_66Author Commented:
Yes sir:)

you'll get your points ! thanks alot.

expect more questions from me !=)
shahrialCommented: problem...if i can assist, i will...;-)
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.