UNIX/LINUX Operating System Security Audit/Assurance Program 


UNIX/LINUX Operating System Security Audit/Assurance Program   Download (Member Only, 2.6M)
Bookstore Purchase the Book

  Provide feedback on this document
Knowledge Center  Visit the Audit Tools and Techniques Knowledge Center community
Knowledge Center  Visit the Unix-like Knowledge Center community

The audit/assurance programs reflect the IT Assurance Framework (ITAF) sections 3400—IT Management Processes, 3600—IT Audit and Assurance Processes and 3800—IT Audit and Assurance Management and were developed in alignment with the Control Objectives for Information and related Technology (COBIT®)—specifically COBIT 4.1.

Objective—The objective of the UNIX/LINUX audit/assurance program is to provide management with an independent assessment relating to the effectiveness of configuration and security of the UNIX/LINUX operations systems with the enterprise’s computing environment.

Scope—The review will focus on configuration of the relevant UNIX/LINUX servers within the organization. The selection of the applications/functions and specific servers will be based upon the risks introduced to the organization by these systems.

UNIX/LINUX systems are subject to identity management, the process of identifying and authenticating users and superusers. Since this process is also addressed in the Identity Management Audit/Assurance Program, this review is limited to superuser access (access to the operating system’s configuration and security mechanisms) and general user controls (excluding users from access to operating system resources). Refer to the Identity Management Audit/Assurance Program for controls relating to user identity.

{The remainder of this paragraph needs to be customized to describe which servers and applications within the enterprise will be reviewed.}

IT audit and assurance professionals are expected to customize this document to the environment in which they are performing an assurance process. This document is to be used as a review tool and starting point. It may be modified by the IT audit and assurance professional; it is not intended to be a checklist or questionnaire. It is assumed that the IT audit and assurance professional holds the Certified Information Systems Auditor (CISA) designation or has the necessary subject matter expertise required to conduct the work and is supervised by a professional with the CISA designation and necessary subject matter expertise to adequately review the work performed.