11.4.2 User Authentication for External Connections

Illustrative Controls and TIBCO LogLogic Solution

Administrators should assess the authentication mechanisms used to validate user credentials (new and existing) for critical systems to support the validity of transactions. Server and application activities must be monitored for locked-out and enabled accounts as they can represent malicious activities.

In general, auditors validate the technical standards used (example two-factor authentication with one-time passwords) and the Know Your Customer policies that the organization uses before issuing appropriate tokens. However, log files can be used to validate that the systems implemented are working effectively.

To achieve this control objective, administrators must review the time and sources of the external logins to determine whether they are authenticated and authorized.

Reports and Alerts

Use the following link/reference to see the 11.4.2 reports and alerts: TIBCO LogLogic Reports and Alerts Quick Reference.