Perform a quarterly audit of all user accounts

Assignment Help Computer Engineering
Reference no: EM133482415

Question: As part of annual audit requirements, the security team performed a review of exceptions to the company policy that allows specific users the ability to use USB storage devices on their laptops. The review yielded the following results:

• The exception process and policy have been correctly followed by the majority of users.
• A small number of users did not create tickets for the requests but were granted access.
• All access had been approved by supervisors.
• Valid requests for the access sporadically occurred across multiple departments.
• Access, in most cases, had not been removed when it was no longer needed.

Which of the following should the company do to ensure that appropriate access is not disrupted but unneeded access is removed in a reasonable time frame?

A. make an automated, monthly attestation process that removes access if an employee's supervisor denies the approval.
B. Remove access for all employees and only allow new access to be granted if the employee's supervisor approves the request.
C. Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the management team.
D. Implement a ticketing system that tracks each request and generates reports listing which employees actively use USB storage devices.

Reference no: EM133482415

Questions Cloud

What ways managed care actually manages costs : In what ways managed care actually manages costs and analyze if it does so without diminishing the quality of care. If so, how does it accomplish this?
Compare the us with your selected country : Compare/contrast the U.S. with your selected country. If they are the same, why do you think they are stated in similar ways. If different, discuss differences.
Addresses an organizational challenge : Reflect on Determining of the extent to which preliminary data addresses an organizational challenge - comprehensive gap analysis and identify the stakeholders
What is the differential diagnosis for this patient : How are you going to evaluate this patient? What is the differential diagnosis for this patient? Describe your treatment plan based on current guidelines.
Perform a quarterly audit of all user accounts : Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the management team.
How can a community health nurse apply christian worldview : How can a community health nurse apply the Christian worldview to the care of the individual, community, self, and colleagues during disaster management?
How can we empower them to make positive : Explain why it is important to work with the child to ensure they have strategies to protect themselves and make decisions about safety.
Discuss two concepts or lessons learned that you believe : Given the readings in the course, identify and discuss two concepts or lessons learned that you believe will be most applicable to your professional discipline.
Describe an appropriate model for exploring interaction : Describe an appropriate model for exploring interaction design possibilities with cars that are driven by human beings

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd