fbpx

CIMSNex User Guides

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

A.8.18 Use of privileged utility programs would include:

  1. Access Control Policies: Documentation of access control policies that define who has access to privileged utility programs and under what circumstances. This includes user roles, permissions, and authorization processes.

  2. Privileged User Management: Evidence of procedures for managing privileged users, such as administrators, who have access to utility programs. This should include user account creation, modification, and termination processes.

  3. Privileged Account Monitoring: Logs and records of privileged account activities, including the use of utility programs. These logs should be regularly monitored for any suspicious or unauthorized activities.

  4. Separation of Duties: Documentation of separation of duties to ensure that users with access to utility programs do not have sole control over critical functions. This helps prevent potential abuses of privileges.

  5. Least Privilege Principle: Evidence of the principle of least privilege being applied, meaning that users are only granted the minimum privileges necessary to perform their job functions, reducing the risk of unauthorized access to utility programs.

  6. Training and Awareness: Records of training programs and awareness initiatives provided to users with access to utility programs. This ensures that they understand their responsibilities and the risks associated with privileged access.

  7. Vulnerability Management: Evidence of regular vulnerability assessments and patch management procedures for the utility programs to mitigate potential security risks.

  8. Incident Response Procedures: Documentation of incident response procedures specific to incidents related to privileged utility program usage. This includes how incidents are identified, reported, and responded to.

  9. Review of Configuration Settings: Verification that utility programs are configured securely and in accordance with industry best practices to prevent misuse.

  10. Compliance Documentation: Evidence of compliance with relevant regulations, standards, and internal policies regarding the use of privileged utility programs.

As an auditor, I would review and assess the presence and effectiveness of these pieces of evidence to ensure that the use of privileged utility programs is controlled, monitored, and aligned with security best practices. Proper management of privileged utility programs helps prevent potential security breaches and ensures the integrity and confidentiality of critical systems and data

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

A.8.19 Installation of software on operational systems would include:

  1. Software Inventory: A comprehensive inventory of all software installed on operational systems, including servers, workstations, and other devices. The inventory should include details such as software names, versions, and vendors.

  2. Software Approval Process: Documentation of a formal software approval process that outlines the steps required to request, review, and approve the installation of new software on operational systems. This process should include security reviews to ensure that the software is safe and compliant with the organization's policies.

  3. Change Management Records: Records of change management processes for software installation, including change requests, approvals, testing, and implementation plans. These records should demonstrate that software installations are controlled and properly authorized.

  4. Licensing Compliance: Evidence of compliance with software licensing agreements, ensuring that all software installed on operational systems is properly licensed and authorized for use.

  5. Vulnerability Management: Documentation of vulnerability management processes that include regular scanning and assessment of installed software for known vulnerabilities. Evidence of patch management procedures for addressing and mitigating identified vulnerabilities.

  6. User Privileges: Verification of user privileges and access controls to ensure that only authorized personnel have the capability to install software on operational systems.

  7. Segregation of Duties: Documentation of segregation of duties to prevent conflicts of interest and unauthorized software installations. Separate roles should be defined for requesting, approving, and installing software.

  8. Software Configuration Baselines: Evidence of established configuration baselines for operational systems, ensuring that software installations adhere to the approved configurations and are consistent across the organization.

  9. Logs and Monitoring: Access logs and monitoring records to track software installations and detect any unauthorized or suspicious activities related to software on operational systems.

  10. Incident Response Procedures: Documentation of incident response procedures specific to software installations, outlining how the organization addresses security incidents related to software vulnerabilities or unauthorized installations.

  11. Training Records: Proof of user training and awareness programs related to software installation procedures and security best practices.

  12. Compliance Documentation: Evidence of compliance with relevant regulations and standards concerning software installations on operational systems.

As an auditor, I would review and assess the presence and effectiveness of these pieces of evidence to ensure that software installations on operational systems are controlled, monitored, and performed in a secure and compliant manner. Proper management of software installations helps to reduce the risk of introducing vulnerabilities and ensures the overall security and stability of operational systems.

Image
SIMPLIFYING IMPLEMENTATION OF ISO STANDARDS, providing specialized guidance through reliable Expert Knowledge and Software to help you obtain and maintain your ISO certification.
ISO Compliance Software
Integrate . Mantain . Comply

Search