Skip to primary content
Skip to secondary content

MSI :: State of Security

Insight from the Information Security Experts

MSI :: State of Security

Main menu

  • Home
  • Learn More About MicroSolved, Inc.

Tag Archives: Account Audit

Challenges Auditing Authentication Mechanisms in Organizations

Posted on January 10, 2023 by Brent Huston
Reply
Tweet

Authentication mechanisms are essential for organizations to protect their data and systems from unauthorized access. However, auditing these authentication mechanisms can be a challenge due to the complexity of the systems and the ever-evolving nature of cyber threats. This blog post will explore some of the challenges associated with auditing authentication mechanisms in organizations.

Challenges

1. Disparate Authentication Practices – As an auditor, you’re likely to come across a variety of authentication practices that can be difficult to manage. From different passwords to separate systems, disparate authentication requirements can be a major roadblock when auditing authentication mechanisms. To help reduce this challenge, organizations should establish strong identity and access management policies and ensure compliance with relevant regulations.

2. Staffing and Evidence Collection – The challenge of finding and retaining qualified staff who are knowledgeable and experienced in auditing authentication mechanisms is a common issue. Additionally, effective evidence collection is essential to successful audits, yet ensuring that meaningful data is gathered efficiently can be difficult.

3. Internal Controls – Auditors must ensure that the controls in place are sufficient to reduce risks associated with authentication processes. Weak access controls can lead to costly mistakes, potentially risking the organization’s data. Auditors should take the time to develop a detailed understanding of the organization’s internal controls and audit them on a regular basis against up-to-date and relevant threat models.

TLDR

This article discusses the challenges associated with auditing authentication mechanisms in organizations. It highlights three main issues: disparate authentication practices, staffing and evidence collection, and internal controls. Organizations should establish strong identity and access management policies to reduce the challenge of disparate authentication practices. Additionally, finding qualified staff and collecting meaningful evidence can be difficult tasks for auditors. Lastly, auditors must ensure that internal controls are sufficient to reduce risks associated with authentication processes.

PS – Make sure if you are performing such an audit that, you are checking your current practices against international standards, regulatory requirements, privacy rules, and best practice audit controls. Ensure that you are taking the essential steps to protect digital identity, providing strong access control policies and user controls. Reviewing the logging, and event detection capabilities and ensuring that both unauthorized access and successful authentications are being properly monitored in the event that forensic analysis is needed to respond to a security breach or other incident.

PSS – If you need a process for auditing your authentication points, you can find that here.

Posted in End-user Focused, General InfoSec, Risk Management | Tagged Account Audit, audit, Authentication, detection | Leave a reply

Now Is a Great Time to Audit Stale Accounts

Posted on December 30, 2011 by Mary Rose Maguire
Reply
Tweet

Out with the old, in with the new!

As we wrap up another year, now is a great time to perform an account audit of your systems, networks and applications. Accounts that belong to staff members who may have left the organization are a primary focus for this process. Begin by inspecting your primary data store or identity tree against a current list of employees from HR. If you find accounts for people not on the list, then flag those accounts for investigation.

Likely, you will discover accounts for people who have left your organization or for services that are no longer needed. These accounts should be disabled and removed as soon as possible. Many organizations argue against these audits because they claim that they have controls in place for employee terminations. While this may be true, a quick review of a list of departed employees should still be performed at least yearly as a control to make sure that the process is being followed.

Another area to look at along these lines is to audit the system and application rights of folks who may have moved from one line of business or department to another. Often, their accounts are mis-configured and may give them rights to access data that they no longer need. These should also be investigated and refined as soon as possible. Don’t forget to ensure that routers, network gear and off site systems are included in the audit.They often house old accounts long past their prime.

Do this and you’ll save resources for the New Year! Here’s to a prosperous and successful 2012 for you and your organization!

Posted in General InfoSec | Tagged Account Audit | Leave a reply

Subscribe to our mailing list

* indicates required

Catagories

  • 80/20 Rule for Information Security
  • AI and Machine Learning
  • Announcements
  • Anti-Virus
  • Application Security
  • Ask the Security Experts
  • Asset Management
  • Audio Blog Post
  • Awareness
  • blockchain
  • Book Reviews
  • Chat
  • China
  • CIS CSC
  • ClawBack
  • Cloud Technology
  • Code Review
  • Compliance
  • Credit Unions
  • Data Leak
  • DeFi
  • Detection in Depth
  • Emerging Threats
  • End-user Focused
  • Events
  • Free Tool
  • General InfoSec
  • Healthcare
  • HoneyPoint
  • HoneyPoint Manifesto
  • How To
  • ICS/SCADA
  • incident response
  • Information Security Training
  • intelligence
  • Iran
  • ISSA InfoSec Summit
  • jobs
  • MachineTruth
  • Malware
  • Maps
  • MicroSolved's Strategies & Tactics Talks
  • Mobile Application Security
  • New Category
  • Opinion
  • OWASP
  • Password Security
  • Pen Testing & Vuln Mgmt
  • PHI
  • Phishing
  • Podcast
  • Policy and Process
  • Poll
  • Privacy
  • Projects
  • prompt engineering
  • ProtoPredator
  • Rants
  • Red Dragon Rising
  • Regulation
  • Reputational Risk
  • Research
  • Risk Management
  • SCADA/ICS
  • Smart Grid
  • Stolen Data Impact Model
  • Supply Chain
  • Surprise Interviews
  • Testing Lab
  • Threat Intelligence
  • Threat-Centric
  • Three Tough Questions
  • TigerTrax
  • TISAX
  • Tool Review
  • Touchdown Task
  • Tweetstream
  • vCISO
  • Video
  • Vulnerability Management
  • Webinar
  • What is HPSS?

Authors

  • Brent Huston
  • Adam Hostetler
  • John Davis
  • Lisa Wallace
  • Dave Rose
  • Johnny Chuah
  • Jim Klun

RSS State of Security – MicroSolved, Inc.

  • Three Tips for a Better, Easier BIA Process May 6, 2025
  • Bridging the Divide: Innovative Strategies to Conquer the Cybersecurity Talent Shortage April 28, 2025
  • How Changing DeFi Regulations May Impact Information Security Teams April 21, 2025
  • Leveraging Multiple Environments: Enhancing Application Security through Dev, Test, and Production Segregation April 14, 2025
  • The 3 Most Difficult Issues in TISAX Compliance April 9, 2025

Past Posts

Information Security Blogroll

  • Dave Rose interview with CEO Brent Huston
  • Digital Soapbox: Down the Security Rabbithole!
  • Dr. InfoSec (TM)
  • ESET Threat Blog
  • Evil Code Cave
  • Hacking the Universe
  • Head Hacker
  • Information Security Law
  • Infosanity's Blog
  • InfoSec Ramblings
  • ISO 27001 & BS 25999
  • ITWorld Security Site
  • Jamie Levy
  • Jon's Network
  • Krebs on Security
  • Mac Virus
  • McAfee Labs Blog
  • MicroSolved Home Page
  • Network Security Blog
  • Nova InfoSec Portal
  • PaulDotCom
  • Peter Van Eeckhoutte's Blog
  • Red Team Secure
  • RedCondor Secure
  • RSA Conference
  • Search Security
  • SecTechno Information Security Blog
  • Securiteam
  • Security Active Blog
  • Security Dark Reading
  • Security in Motion
  • Security Ninja
  • Security Warrior
  • Security Watch
  • Selil
  • Steve Kalman
  • Taddong
  • Tao Security
  • Tech Buddha
  • The AVIEN Blog
  • The Falcon's View
  • The Guerilla CISO
  • Voice of VOIPSA
  • Windows Incident Response
  • Zero Day Blog
Proudly powered by WordPress