Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Access Control

Welcome to the Access Control topic!

Collaborate, contribute, consume and create knowledge around role or responsibility based access, active directory, ldap, administrator/privileged access, and other access topics.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
687 Members
1 Online
10281 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 51 total

Must be a Topic member to contribute
View All »
I am IT auditor. Sometime i found documentation of the roles and accesses in Access Control Matrix (Role Vs Permission) has not to be maintained stringently. The major cause is : - IT security / User administrator not update any information to Acces...
CHAOWALITS | 6/7/2017 12:16:20 PM | COMMENTS(5)
Background: Outsourced IT to Third Party Vendor, Compliance to SOX required Problem Statement: A large volume of redundant/dormant/orphaned user accounts exist on applications, databases, servers, and networks, where access should be limited to only ...
Babar339 | 6/5/2017 5:23:26 PM | COMMENTS(2)
Hi Folks,I would like to know what tools or scripts people are using to monitor admin access in the enterprise. In many organisations I have worked in the past admin monitoring has been done poorly if at all. So I am looking for controls for all types of ...
JayMIET927 | 5/30/2017 10:36:54 AM | COMMENTS(15)
I’m currently conducting an audit on user access. Most organizations grant system or network access to consultants, contractors, and 3rd party service providers. Do you have any suggestions or comments on access controls that should be implemented for use...
david ho | 5/28/2017 5:11:55 AM | COMMENTS(1)
I believe access control is an important process in protecting sensitive information and establishing SoD. I'm planning to set up continuous audit of access control. Please let me know if you have any comments or suggestions.
david ho | 4/7/2017 9:51:13 AM | COMMENTS(6)
Recently I pull a list of service accounts. As I tried to identify who know how the account being used, I received a couple return answer that the account is not needed anymore. Some has password hard coded but some can be changed. Now the question is ...
Audry847 | 4/7/2017 9:30:47 AM | COMMENTS(4)

Documents & Publications: 6 total

Must be a Topic member to contribute
Books
Posted by ISACA 520 days ago
Books
Posted by ISACA 1209 days ago
In the modern connected world trust is an important requirement. End to end trust involving identity, conditions of trust, policy and actions to be taken such as enabling or precenting access need to be defined more clearly and mechanisms created to facilitate access. This ISSA Working Group paper outlines basic thinking about end to end trust and the Adaptive Access Framework.
Posted by Ron Hale Ph.D. CISM 1685 days ago
Books
Posted by ISACA 1871 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 21 total

Volume 3, 2017
by Kurt Kincaid, CISA, Lean Six Sigma Green Belt
What follows is a discussion of the nature of HTTPS, how it should be configured, and how to remotely assess that configuration for oneself, rather than relying on verbal or written attestation from server or application administrators.
Volume 2, 2017
by Kathleen Martin, CISA, CRISC
Owners of critical business data need to ensure that all application and database user entitlements and privileges are recertified on a periodic basis to make sure that only authorized individuals have access to the enterprise’s data.
Volume 1, 2017
by Richard Hoesl, CISSP, SCF, Martin Metz, CISA, Joachim Dold and Stefan Hartung
The average total cost of a data breach is about US $4 million, whereas the average cost for a stolen record increased slightly from US $154 in 2015 to US $158 in 2016.
Volume 4, 2016
by Vincent Kha, CISM, GPEN, MCTS, OWSP
For many information systems auditors, reviewing domain accounts in an Active Directory (AD) environment is sufficient for testing controls around user authentication.
Volume 4, 2016
by Debbie Newman, CISA
Get to know your network.
Volume 4, 2016
by Trevor J. Dildy, CCNA
Network access control (NAC) is the technique for network management and security that enforces policy, compliance and management of access control to a network.

Wikis: 2 total

Blog Posts: 6 total

Must be a Topic member to view blog posts
Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
A recent publication in a local newspaper, indicated that an employee was charged with fraud with regards to claims of insurance payments that were lodged with the company were paid out to people who were not entitled to receive such payments. What potent...
Posted By : Paulina.PNI | 2 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments
We have already seen that OS/400 passwords are controlled using system values (http://www.isaca.org/Blogs/273340/Lists/Posts/ViewPost.aspx?ID=18). To refresh: QPWDEXPITV - The number of days for which a password is valid. QPWDMAXLEN - The maximum num...
Posted By : Ian Cooke | 0 comments
As with configurations the company you are auditing should have a policy on password controls.  We have previously discussed that SQL Server allows two methods of authenticating to the database – Mixed Mode and Windows Authentication (see http://www.isa...
Posted By : Ian Cooke | 0 comments
Traditionally, each software application is developed to maintain and manage the identity and the related permission information within it. As more and more such applications gets deployed, user provisioning and managing access control could soon be a nig...
Posted By : Kannan | 0 comments