Tip

What controls can compensate when segregation of duties isn't economically feasible?

Effective segregation of security-related duties is sometimes not economically feasible in smaller businesses. What internal controls do you suggest to help compensate for this problem?

If the organization has only one IT person, then it's hard to enforce segregation of duties. But all is not lost; even though true segregation is not feasible, corporations can do a good job "watching the watcher." I suggest having a strong log management capability implemented to keep a record of all transactions.

But it's not enough to just log the actions. It's critical that organizations store the data somewhere that the IT administrator cannot gain access and tamper with it. The first thing a bad guy does is try to cover his or her tracks, which means eliminating log records. So the log device needs to be protected and the IT person can't have access.

A few organizations are now offering log management services in which the logging platform resides "in the cloud" or via a hosted service, which provides the type of segregation necessary to keep things separate. To be clear, this wouldn't necessarily provide true segregation of duties (since the IT person is still doing all the functions), but it will provide an audit trail and the ability to investigate an issue if some malfeasance is suspected.


    Requires Free Membership to View

This was first published in February 2009

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.