Automated IT Audit of Windows Server Access Control
Title | Automated IT Audit of Windows Server Access Control |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | PONGSRISOMCHAI, Sutthinee, Ngamsuriyaroj, Sudsanguan |
Conference Name | 2019 21st International Conference on Advanced Communication Technology (ICACT) |
Keywords | Access Control, access control violations, audit checklist, audit objectives, auditing, auditing processes, authorisation, automated audit tool, automated IT audit, automated process, business data processing, data breach incidents, Human Behavior, IEC standards, intrusion incidents, ISO standards, ISO/IEC 27002:2013, IT Audit, IT auditing process, Microsoft Windows, Microsoft Windows (operating systems), Object recognition, password, pubcrawl, Resiliency, Scalability, Security Audits, security controls, security policies, security weaknesses, Servers, Windows Operating System Security, Windows Server, Windows server access control, Windows server operating system |
Abstract | To protect sensitive information of an organization, we need to have proper access controls since several data breach incidents were happened because of broken access controls. Normally, the IT auditing process would be used to identify security weaknesses and should be able to detect any potential access control violations in advance. However, most auditing processes are done manually and not performed consistently since lots of resources are required; thus, the auditing is performed for quality assurance purposes only. This paper proposes an automated process to audit the access controls on the Windows server operating system. We define the audit checklist and use the controls defined in ISO/IEC 27002:2013 as a guideline for identifying audit objectives. In addition, an automated audit tool is developed for checking security controls against defined security policies. The results of auditing are the list of automatically generated passed and failed policies. If the auditing is done consistently and automatically, the intrusion incidents could be detected earlier and essential damages could be prevented. Eventually, it would help increase the reliability of the system. |
DOI | 10.23919/ICACT.2019.8701931 |
Citation Key | pongsrisomchai_automated_2019 |
- Scalability
- IT Audit
- IT auditing process
- microsoft windows
- Microsoft Windows (operating systems)
- Object recognition
- password
- pubcrawl
- Resiliency
- ISO/IEC 27002:2013
- Security Audits
- security controls
- security policies
- security weaknesses
- Servers
- Windows Server
- Windows server access control
- Windows server operating system
- automated IT audit
- Access Control
- access control violations
- audit checklist
- audit objectives
- auditing
- auditing processes
- authorisation
- automated audit tool
- Windows Operating System Security
- automated process
- business data processing
- data breach incidents
- Human behavior
- IEC standards
- intrusion incidents
- ISO standards