Evaluate critical operating system security parameters.

Evaluation should include establishing or following

  • authentication policy
  • access control (i.e., rights and permissions)
  • audit policy.

Process/Skill Questions:

  • What is a user authentication policy? Why is it important to implement physical and digital access policies? What types of authentication protocols can be used for network access?
  • How does an organization or business benefit from a user authentication policy?
  • How can access control systems reduce the risk of data breakers and other cyber-attacks?
  • How can an audit policy assist with file server access and tracking changes to data security settings? Who is accessing files and folders, and audit file permission changes on a server?