Appendix D. Audit Program for Auditing UNIX/Linux Environments

Questions

Yes

No

N/A

Comments

Preliminary Steps:

    
  • Obtain a description/overview of the UNIX system configuration.

    
  • Obtain a listing of the various systems supported by the UNIX environment.

    
  • Obtain a map of the physical network to include: file servers, bridges, routers, gateways, concentrators/hubs, and modems.

    
  • Obtain design specifications for the system(s) security.

    
  • Obtain an overview of password management logic.

    
  • Obtain a job description of the system administrator.

    

Procedures:

    
  • Review design specifications for system security.

    
  • Determine if access is controlled through UNIX password administration facilities or through application(s) user access tables or a combination or both.

    
  • Check if documentation procedures exist or are planned for security administration.

    
  • Review procedures for password administration.

    
  • Review existing security guidelines

    • Users

    • Groups

    • Functions

    

Physical Security:

    
  • Check the adequacy of physical security for each of the network components, especially file servers.

    
  • Are unused network connectors disabled or physically secured?

    
  • Is physical access to network components such as cables, routers, taps, repeaters, and terminators adequately restricted?

    
  • Are proper procedures in place for the administration of configuration changes to the network’s physical structure?

    

Systems Administration:

    
  • Has a system administrator been designated for the UNIX/Linux environment? ...

Get Auditor’s Guide to Information Systems Auditing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.