Please enable JavaScript.
Coggle requires JavaScript to display documents.
12.4.5
13.4.5
14.4.5 (FEDERATED IDENTITY MANAGEMENT (partnering…
12.4.5
13.4.5
14.4.5
-
-
AUDITING LOGICAL ACCESS
When evaluating logical access controls, the IS auditor should:
• Obtain a general understanding of the security risk facing information processing, through a review of ,
-
-
-
-
-
• Document and evaluate controls over potential access paths into the system to assess their adequacy, efficiency and effectiveness by reviewing
-
-
-
• Test controls over access paths to determine whether they are functioning and effective by applying appropriate audit techniques. #
• Evaluate the access control environment to determine if the control objectives are achieved by analyzing test results and other audit evidence.
-
-
-
-
-
-
-
-