Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
The IS auditor is assessing the deployment of a storage area network (SAN). The SAN administrator details that logging and monitoring are enabled, hard zoning is used to segregate data from different business units and all unused SAN ports are disabled. The administrator deployed the system, executed and documented security testing during deployment, and determined that he/she is the only user with administrative rights to the system. What should the IS auditor's initial conclusion be?
The SAN presents a potential risk because soft zoning should be used.
The SAN presents a potential risk because only one employee has access.
The SAN presents a probable risk because audit logs are not assessed in a timely manner.
The SAN is secure and there is minimal risk.
The largest potential risk in this scenario is the risk that the SAN administrator represents a single point of failure. Since only one administrator has the knowledge and access required to administer the system, the organization is susceptible to risk. For example, if the SAN administrator decided to quit unexpectedly, or was otherwise unavailable, the company may not be able to adequately administer the SAN in his/her absence. In addition, having a single administrator for a large, complex system such as a SAN also presents a segregation of duties risk. If the SAN is securely configured, using hard zoning, logging and monitoring, and disabling of unused ports, no significant risk appears to exist regarding that configuration. However, the risk of a single administrator does exist (single point of failure and separation of duties issues). Hard zoning is more secure and is preferred to soft zoning. Zoning is used to separate different data sources from each other (for instance, to ensure that payroll and human resources [HR] data are stored separately from sales data). Hard zones are enforced by the infrastructure (in hardware) and are therefore more secure than soft zones, which are implemented in software or firmware. The question does not provide information regarding whether logs are reviewed in a timely manner and thus the IS auditor does not have enough information to determine whether this is a risk area.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.