ExamGecko
Question list
Search
Search

Related questions











Question 617 - CISA discussion

Report
Export

An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?

A.
Monitoring access rights on a regular basis
Answers
A.
Monitoring access rights on a regular basis
B.
Referencing a standard user-access matrix
Answers
B.
Referencing a standard user-access matrix
C.
Granting user access using a role-based model
Answers
C.
Granting user access using a role-based model
D.
Correcting the segregation of duties conflicts
Answers
D.
Correcting the segregation of duties conflicts
Suggested answer: C

Explanation:

The best way to prevent the misconfiguration from recurring is to grant user access using a role-based model.A role-based access control (RBAC) model is an access control method that assigns permissions to end-users based on their role within the organization1.RBAC provides fine-grained control, offering a simple, manageable approach to access management that is less error-prone than individually assigning permissions1.RBAC also enforces the principle of least privilege, which means that users only have the minimum access required to perform their tasks2.

A role-based model can help prevent segregation of duties (SoD) issues in an ERP system by restricting user access to conflicting activities within the application.SoD is a central issue for enterprises to ensure compliance with laws and regulations, and to reduce the risk of fraud and unauthorized transactions3.SoD requires that no single individual or group of individuals should have control over two or more parts of a process or an asset3. For example, a user who can create and approve purchase orders should not be able to process payments or modify vendor records.

By using a role-based model, user access provisioning is based on the needs of a group (e.g., accounting department) based on common responsibilities and needs1. This means each role has a given set of permissions, and individuals can be assigned to one or more roles. For example, you may designate a user as an accounts payable clerk, an accounts receivable clerk, or a financial manager, and limit access to specific resources or tasks.The user-role and role-permissions relationships make it easy to perform role assignment because individual users no longer have unique access rights, rather they have privileges that conform to the permissions assigned to their specific role or job function1.

The other options are not the best way to prevent the misconfiguration from recurring. Monitoring access rights on a regular basis (option A) is a detective control that can help identify SoD issues after they occur, but it does not prevent them from happening in the first place. Referencing a standard user-access matrix (option B) is a tool that can help document and analyze user access rights, but it does not ensure that the user access rights are configured correctly or consistently. Correcting the segregation of duties conflicts (option D) is a corrective action that can resolve SoD issues once they are detected, but it does not prevent them from happening again.

asked 18/09/2024
Jyoti Gupta
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first