five

Audit of Logical Security Controls

收藏
NIAID Data Ecosystem2026-05-10 收录
下载链接:
https://data.mendeley.com/datasets/pgd9mpzkmc
下载链接
链接失效反馈
官方服务:
资源简介:
Logical controls encompass user authentication, authorization, session management, segregation of duties (SoD), and log monitoring capabilities. Weaknesses in these areas expose payroll data to unauthorized changes, privilege abuse, and potential fraud. Students will operate in a controlled environment emulating FinGroup’s production payroll system. They will extract user entitlement listings, correlate them with HR records to detect orphan accounts or over-provisioned users, and test SoD conflicts such as users having both payroll data entry and approval rights. System logs will be collected, parsed, and analyzed to identify suspicious patterns (e.g., after-hours logins, repeated failed authentications, privilege escalations). The ultimate goal is to validate whether FinGroup’s logical access management processes comply with governance frameworks like COBIT DSS05 and ISO/IEC 27001 Annex A.9 (Access Control), and to generate actionable remediation recommendations.
创建时间:
2025-09-29
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作