Questions tagged [audit]
For questions about the assessment of software, hardware, systems, people, processes, procedures, projects, etc, that are somehow related to the security of an organization or product. Often these are related to a certification the organization or product holds, or looking for tools or processes for performing an audit.
459
questions
0
votes
1
answer
354
views
Third party consultants background checks, NDA signing etc for SOC-2
We are a SOC-2 compliant company. We used to have all full time employees till now, hence we could do our due diligence on all the hired employees e.g. Background checks, reference checks, getting NDA ...
1
vote
1
answer
907
views
How could I know if a website is fingerprinting you via WebGL?
I would like to know if a website is fingerprinting me via WebGL,
first of all, knowing if the site is doing it
Knowing when they send the request to my browser
Knowing what value I am reporting to ...
0
votes
1
answer
202
views
Do the organisational policies need to have ownership to ensure accountability?
Policies are the high-level statement from Senior Management. It's a philosophy for the management to be guided by, and management has the direction to plan, build, run and monitor the activities to ...
0
votes
1
answer
317
views
What alternative standard for ISO 27001 can be used in Australia?
I am looking for alternatives, that are less strict and less time consuming, than ISO 27001. Australia is in the Commonwealth, so maybe Cyber Essentials Plus could work, but I do not know if that ...
1
vote
1
answer
188
views
What information should I collect when a user performs an action on a website? [closed]
In the development of an organization's web system (containing sensitive information) with credentials, where the actions carried out must be monitored, what information should I keep when each action ...
0
votes
1
answer
284
views
Synology logs SMB "Read" event false positives
We recently switched to a Synology enterprise setup at work and we're hoping to benefit from the additional logging that comes with Synology software. In response to a security incident, I found log ...
1
vote
0
answers
256
views
AuditD and SysCall alerts
Given an alert rule like -a always,exit -F arch=b32 -S open -S openat -F exit=-EACCES -k access how does adding multiple SysCalls (-S) options work?
When an application gets executed do all the ...
0
votes
1
answer
326
views
How to start pentesting/reverse engineering/cracking a software on Linux? (Docker based) [closed]
TL:DR; What are good learning resources for security testing a software which runs with Docker on Ubuntu.
I am in junior position at this company, and they figured it would be good if I just test ...
2
votes
1
answer
200
views
PCI scope for a Direct-Post e-commerce site (SAQ A-EP)
An e-commerce site uses the Direct-Post method (see page 14 PCI e-commerce security).
Is the server for the e-commerce application and network it resides on in scope for PCI? There are questions in ...
1
vote
1
answer
2k
views
auditd rules for both 64-bit (b64) and 32-bit (b32) architectures
I'm looking at the OpenSCAP Security Guide for CentOS 7:
https://static.open-scap.org/ssg-guides/ssg-centos7-guide-index.html
Under "Record File Deletion Events by User" (as an example), it ...
8
votes
2
answers
326
views
Do people even exist who actually vet all the updates to their open source software?
A year or so ago, I set up this system which, whenever Composer (that's PHP's packet/library update manager) fetched new updates to my few (but critically required) third-party libraries, created a ...
-1
votes
2
answers
173
views
Election security is considered one of the most difficult problems in computer security [closed]
Not just electronic voting, but in election security general.
I think it part is because there are many components to it, and it has many components that could be compromised.
What are some of the top ...
0
votes
2
answers
257
views
Is there any such thing as an independent code vetting project which works for free to vet open source projects?
I'm sure I'm not the only one who is scared to death to blindly trust random strangers with all my data. Which is the case in practice if, for example, I'm to use this library right now, which I'm ...
1
vote
1
answer
174
views
Is it possible to ensure detection and logging of all attempts to copy data out of a system?
I am cross-posting this question from Serverfault, because I am in doubt where it fits best.
Say I have a server set up for processing sensitive data. The few authorised users of the system are ...
0
votes
2
answers
218
views
Logging SSH commands on Linux - is custom kernel the only way?
I've done some research and it looks like that the way linux keeps history is less about security and audit and more about helping the user.
Even after making changes to instantly log the command and ...