Assessing the Root Cause of IT Security Weaknesses:
You are conducting an IT audit of your company's Unix security controls. You are reviewing several system-based reports and determine that several Unix servers do not comply with the corporate information security policies. Develop a recommendation that will help management fix the root cause of this issue.
Assessing the Identity Management Process:
A global bank recently identified issues with their user identity management process, specifically related to the modification of users IDs when an employee transfers departments and deletions when employees leave the bank. You have been hired as a consultant. Provide a list of key control recommendations that will help management improve their user access management process. [Identify at least 5 recommendations]
Preparing for an IT Audit of the Help Desk:
You are preparing to conduct an audit of your company's service management process and related Help Desk procedures. Develop five questions for the Help Desk Manager to aid in your audit planning activities.
Business Continuity Planning - Board Responsibilities - Creating a Persuasive Risk Management Argument:
You are nearing completion of an IT audit of your company's Business Continuity Planning (BCP) program. You have noted that the Board has not approved the BCP plan. You have performed some research and came across some guidance written by the FFIEC. Use the FFIEC guidance to help develop a persuasive recommendation that highlights the Board's responsibilities.