125k views
3 votes
A systems administrator recently joined an organization and has been asked to perform a security assessment of controls on the organization's file servers, which contain client data from a number of sensitive systems. The administrator needs to compare documented access requirements to the access implemented within the file system.

Which of the following is MOST likely to be reviewed during the assessment?

A. Access control list
B. Security requirements traceability matrix
C. Data owner matrix
D. Roles matrix
E. Data design document
F. Data access policies

User DickieBoy
by
8.2k points

1 Answer

1 vote

Final answer:

During a security assessment of file server controls, the systems administrator will likely review the Access Control List (ACL), Data Access Policies, and the Roles Matrix to ensure access rights align with the organization's requirements.Option A is the correct answer.

Step-by-step explanation:

When a systems administrator is tasked with performing a security assessment of controls on an organization's file servers, especially those containing sensitive client data, they would most likely review the Access Control List (ACL). The ACL is a list used by file servers to control access to directories and files, and to manage permissions and user rights. The administrator would compare the access rights granted in the ACL to the access requirements set forth in the organization's internal policies to ensure proper control is maintained.

Additionally, the administrator might also review the Data Access Policies, which are formal guidelines that outline how data should be handled, shared, and accessed within an organization. These policies would provide insight into the documented access requirements. The Roles Matrix can also be part of the assessment. It aligns different user roles with their respective access rights and is useful in verifying that the access implemented adheres to the principle of least privilege. While other documents like the Security Requirements Traceability Matrix, Data Owner Matrix, or Data Design Document might be relevant in other contexts, they are less directly associated with day-to-day permissions and access management on file servers.

User Ozeray
by
7.4k points