When you are setting up your audit standards, be sure to double check,
preferrably with the vendor, the correct way to terminate a user in
their application in order to maintain the integrity of the audit log.
Then, train your staff, who have probably developed their own system and
having been doing it their "preferred" way for years. We found two
applications, by the same vendor, handle audit logs in very different
ways. On one app, if you "remove" the user ID when the user terminates
or has a name change, you are still able to run audit logs. On the other
app, removal  of a UserID corrupts the database and destroys the
integrity of the log. "Disabling" the UserID on the second system is the
correct methodology.

This may sound elementry, but when you have decentralized
(departmental) system, system analysts, many of them earned the job just
by being the best on the system, and may not have much IT training. The
lessons we learn! Mimi

---
The WEDI SNIP listserv to which you are subscribed is not moderated. The discussions 
on this listserv therefore represent the views of the individual participants, and do 
not necessarily represent the views of the WEDI Board of Directors nor WEDI SNIP. If 
you wish to receive an official opinion, post your question to the WEDI SNIP Issues 
Database at http://snip.wedi.org/tracking/.   These listservs should not be used for 
commercial marketing purposes or discussion of specific vendor products and services.  
They also are not intended to be used as a forum for personal disagreements or 
unprofessional communication at any time.

You are currently subscribed to wedi-security as: [EMAIL PROTECTED]
To unsubscribe from this list, go to the Subscribe/Unsubscribe form at 
http://subscribe.wedi.org or send a blank email to [EMAIL PROTECTED]
If you need to unsubscribe but your current email address is not the same as the 
address subscribed to the list, please use the Subscribe/Unsubscribe form at 
http://subscribe.wedi.org

Reply via email to