Tag Archives: ID

Do you have User IDs Hidden in the Cloud?

hidden-in-the-cloudIt’s 10 o’clock in the cloud. Do you know where all your user IDs are? Are some hidden in the cloud?

Cloud security if often cloudy because it’s not on premise where you can control it easier.

That means you may have powerful user IDs in the cloud that your security team knows nothing about, which means….

Continue reading

Advertisement

2 Comments

Filed under Audit, Case Files, Technology

Why You Must Validate Data

basic data analytics1Before you analyze data, you must first validate it.

Otherwise, your analysis may not be accurate, and you may miss some important insights or errors.

This post is part of the Excel: Basic Data Analytic series.

Before analyzing your data, you need to check the following:

  • Duplicate transactions do not exist.
  • Required fields/key fields do not contain blanks, spaces, zeroes, unprintable characters, or other invalid data.
  • Date fields contain real dates, and the range of dates is appropriate.
  • Amount fields don’t contain inappropriate zero, positive, or negative amounts, and the range of values is appropriate.
  • Each field is stored in the correct format. This prevents data from being converted on the fly into something else unexpectantly (e.g., user ID JUL15 becomes 15-Jul).

Continue reading

4 Comments

Filed under Audit, Data Analytics, Excel, How to...

How to Audit User Access

How to Audit User AccessWhen checking system access, make sure you look at all the different items that affect the user’s access. For example, the user might need one or more of the following:

  • Application ID
  • Application role or group
  • Membership in an local server group, Active Directory (AD) group, or UNIX Group
  • Access to the application’s share and/or folder on the server
  • Database ID
  • Database role, including access permissions (read/write)
  • Other permission (from a home-grown application code or enterprise identify management system)

Continue reading

8 Comments

Filed under Audit, How to..., Security, Technology