An IS auditor discovers an option in a database that allows the administrator to directly modify any table.
This option is necessary to overcome bugs in the software, but is rarely used.
Changes to tables are automatically logged.
The IS auditor's FIRST action should be to:
Click on the arrows to vote for the correct answer
A. B. C. D.B.
The IS auditor has discovered an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software but is rarely used, and changes to tables are automatically logged. The IS auditor's first action should be to:
A. Determine whether the log of changes to the tables is backed up. B. Determine whether the audit trail is secured and reviewed. C. Recommend that the option to directly modify the database be removed immediately. D. Recommend that the system require two persons to be involved in modifying the database.
Explanation:
The IS auditor has discovered a potential security risk in the database, and the first action should be to evaluate the existing control measures to ensure that they are adequate.
Option A: Determine whether the log of changes to the tables is backed up. The primary reason for logging changes is to ensure that a record is kept of all activity in the database. This allows the system administrator to identify any unauthorized changes and provide an audit trail for compliance purposes. Therefore, the IS auditor should first determine whether the logs of changes are backed up to prevent loss of critical data in case of any disaster, and whether they are being retained for an appropriate duration as per the data retention policy of the organization.
Option B: Determine whether the audit trail is secured and reviewed. The audit trail is a record of all activity in the database, and it is necessary to ensure that it is secured to prevent any unauthorized modifications. The IS auditor should evaluate whether the audit trail is secured, including access controls, encryption, and monitoring to ensure that only authorized users can access it. Also, the auditor should check whether the audit trail is being reviewed regularly to identify any suspicious activity.
Option C: Recommend that the option to directly modify the database be removed immediately. This option may not be feasible, as it is necessary to overcome bugs in the software. Direct modification of the database is a common practice in many applications, and disabling it may cause significant operational disruptions. Therefore, the IS auditor should evaluate whether there are any alternative controls to mitigate the risk of unauthorized modifications without removing this option.
Option D: Recommend that the system requires two persons to be involved in modifying the database. Requiring two persons to modify the database can provide additional control over the process, ensuring that no single individual can make unauthorized changes. However, this can also introduce operational difficulties, as it may slow down the process of making changes to the database, and it may not be possible to implement in certain situations. Therefore, the IS auditor should evaluate whether this control is feasible and effective in mitigating the risk of unauthorized modifications.
Conclusion: Option A and B are the most appropriate choices as the IS auditor's first action. The auditor should ensure that the logs of changes to the tables are backed up and secured and that the audit trail is secured and reviewed regularly. If required, the IS auditor can also evaluate other controls such as access controls, encryption, and monitoring to mitigate the risk of unauthorized modifications.