Skip to main content

Questions tagged [audit]

For questions about the assessment of software, hardware, systems, people, processes, procedures, projects, etc, that are somehow related to the security of an organization or product. Often these are related to a certification the organization or product holds, or looking for tools or processes for performing an audit.

0 votes
1 answer
354 views

Third party consultants background checks, NDA signing etc for SOC-2

We are a SOC-2 compliant company. We used to have all full time employees till now, hence we could do our due diligence on all the hired employees e.g. Background checks, reference checks, getting NDA ...
Rakesh Goyal's user avatar
1 vote
1 answer
907 views

How could I know if a website is fingerprinting you via WebGL?

I would like to know if a website is fingerprinting me via WebGL, first of all, knowing if the site is doing it Knowing when they send the request to my browser Knowing what value I am reporting to ...
The Dan's user avatar
  • 111
0 votes
1 answer
202 views

Do the organisational policies need to have ownership to ensure accountability?

Policies are the high-level statement from Senior Management. It's a philosophy for the management to be guided by, and management has the direction to plan, build, run and monitor the activities to ...
RAmin's user avatar
  • 13
0 votes
1 answer
317 views

What alternative standard for ISO 27001 can be used in Australia?

I am looking for alternatives, that are less strict and less time consuming, than ISO 27001. Australia is in the Commonwealth, so maybe Cyber Essentials Plus could work, but I do not know if that ...
Maria Celeste Galera Laferrere's user avatar
1 vote
1 answer
188 views

What information should I collect when a user performs an action on a website? [closed]

In the development of an organization's web system (containing sensitive information) with credentials, where the actions carried out must be monitored, what information should I keep when each action ...
John's user avatar
  • 95
0 votes
1 answer
284 views

Synology logs SMB "Read" event false positives

We recently switched to a Synology enterprise setup at work and we're hoping to benefit from the additional logging that comes with Synology software. In response to a security incident, I found log ...
jtlindsey's user avatar
  • 225
1 vote
0 answers
256 views

AuditD and SysCall alerts

Given an alert rule like -a always,exit -F arch=b32 -S open -S openat -F exit=-EACCES -k access how does adding multiple SysCalls (-S) options work? When an application gets executed do all the ...
Jason's user avatar
  • 3,126
0 votes
1 answer
326 views

How to start pentesting/reverse engineering/cracking a software on Linux? (Docker based) [closed]

TL:DR; What are good learning resources for security testing a software which runs with Docker on Ubuntu. I am in junior position at this company, and they figured it would be good if I just test ...
boblearningaboutsec's user avatar
2 votes
1 answer
200 views

PCI scope for a Direct-Post e-commerce site (SAQ A-EP)

An e-commerce site uses the Direct-Post method (see page 14 PCI e-commerce security). Is the server for the e-commerce application and network it resides on in scope for PCI? There are questions in ...
J. Lam's user avatar
  • 21
1 vote
1 answer
2k views

auditd rules for both 64-bit (b64) and 32-bit (b32) architectures

I'm looking at the OpenSCAP Security Guide for CentOS 7: https://static.open-scap.org/ssg-guides/ssg-centos7-guide-index.html Under "Record File Deletion Events by User" (as an example), it ...
cherdt's user avatar
  • 111
8 votes
2 answers
326 views

Do people even exist who actually vet all the updates to their open source software?

A year or so ago, I set up this system which, whenever Composer (that's PHP's packet/library update manager) fetched new updates to my few (but critically required) third-party libraries, created a ...
T R's user avatar
  • 81
-1 votes
2 answers
173 views

Election security is considered one of the most difficult problems in computer security [closed]

Not just electronic voting, but in election security general. I think it part is because there are many components to it, and it has many components that could be compromised. What are some of the top ...
London's user avatar
  • 7
0 votes
2 answers
257 views

Is there any such thing as an independent code vetting project which works for free to vet open source projects?

I'm sure I'm not the only one who is scared to death to blindly trust random strangers with all my data. Which is the case in practice if, for example, I'm to use this library right now, which I'm ...
X. Stoaks's user avatar
1 vote
1 answer
174 views

Is it possible to ensure detection and logging of all attempts to copy data out of a system?

I am cross-posting this question from Serverfault, because I am in doubt where it fits best. Say I have a server set up for processing sensitive data. The few authorised users of the system are ...
Thomas Arildsen's user avatar
0 votes
2 answers
218 views

Logging SSH commands on Linux - is custom kernel the only way?

I've done some research and it looks like that the way linux keeps history is less about security and audit and more about helping the user. Even after making changes to instantly log the command and ...
Jason's user avatar
  • 3,126

15 30 50 per page
1 2
3
4 5
31