10 review firewall redundancy and controls for

Info icon This preview shows pages 11–13. Sign up to view the full content.

View Full Document Right Arrow Icon
10. Review firewall redundancy, and controls for ensuring uptime. Intrusion Detection and Response 1. Review the Intrusion Detection & Response (IDR) process documentation. 2. Evaluate the triggers and their thresholds for appropriateness. Page 11 of 13
Image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
UC Core Audit Program Audit Program and Internal Control Questionnaire Network Management 3. Are triggers on critical network segments more sensitive? 4. Evaluate the process for updating and changing the IDR system and settings. 5. Is the IDR process directly connected to the Incident Response process? Evaluate. 6. Evaluate the scope of intrusion reporting. Work Order (Problem Management) Systems 1. Are network problems, work orders, service requests tracked and managed similarly to other IT works? 2. Is the process for managing work and problems, documented and consistent? 3. If an application is used to manage work, evaluate controls over it. 4. Review escalation procedures to determine if they are followed? 5. How are ticket and performance statistics reported and to whom? Performance Monitoring 1. Evaluate the criteria used for monitoring network performance. 2. Are all core network segments covered? 3. Review the alert thresholds for appropriateness 4. Are segments containing mission critical or critical systems using lower thresholds? 5. Are performance statistics published for general viewing? 6. Review the escalation procedure for critical performance events. 7. Evaluate the procedure used during a network device or segment overload 8. Is load shed or redirected? 9. Are devices or segments shut down? 10. Are appropriate management and users notified? 11. Are critical segments protected? 12. How are performance statistics used for capacity planning? 13. Are key users/departments involved in the capacity planning? 14. Is an external company used for network monitoring? If so, a. Evaluate the contract’s confidentiality and non-disclosure clauses b. Evaluate the service level agreement, and the level of information contractually provided c. Does the situation present any delays for critical information? d. Has the company been authorized to take any action on information they receive? Evaluate. Network Management Applications (Open View, Net View) 1. What tools are used to monitor network performance? 2. What is the scope of their coverage? 3. Are they operating 24/7? 4. How are their alerts monitored? 5. Evaluate configuration options to determine if appropriate events are scanned for and escalated properly. 6. Review configuration of the application. Page 12 of 13
Image of page 12
UC Core Audit Program Audit Program and Internal Control Questionnaire Network Management 7. Review SLAs to determine if measured criteria are automatically monitored, logged and escalated. 8. Are SLA measurements logged and stored in a read-only format? 9. Does the application interface directly with the intrusion detection system/process? 10. Is the application configured to automatically respond to any network events? Evaluate. 11. Evaluate the network monitoring application change control procedures. Page 13 of 13
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern