Master IS Auditing, Security Engineering, and Security Architecture with advanced CISA, ISSEP, and ISSAP certification labs.
Develop expertise in information systems auditing, security engineering principles, and enterprise security architecture.
📄 Review the Lynis audit findings and answer these CISA certification-level questions to demonstrate your understanding of IS auditing principles and security control assessment.
Question 1 of 3: According to CISA Domain 1 (IS Auditing Process), what is the PRIMARY purpose of using automated audit tools like Lynis during an IS audit?
Question 2 of 3: The Lynis hardening index score ranges from 0-100. Per CISA Domain 5 (Protection of Information Assets), a system with a hardening index of 62 would be classified as:
Question 3 of 3: When Lynis identifies security "warnings" versus "suggestions", how should an IS auditor categorize these findings in the audit report per CISA standards?
GovSecure-CUI-SystemGSA-2024-001Controlled Unclassified Information (CUI)MODERATEUnder DevelopmentCloud Hybrid (FedRAMP)Chief Information Security OfficerAgency DirectorSecurity Engineering Team LeadEnterprise information system for processing CUI with cloud and on-premise componentsFull System BoundaryNIST SP 800-30ModerateModerateLowModerateMitigate through controlsPrimary risks from nation-state actors targeting CUI dataNIST 800-53 ModerateFIPS 140-2 Level 2PIV/CAC Multi-Factor15 minutes365 daysAll CUI must be encrypted at rest and in transit using AES-256Zero Trust ArchitectureActive-Active Multi-RegionZero trust model with microsegmentation, all traffic inspected regardless of sourceGovSecure-SSE-TestPlan-v1.0NIST SP 800-53ADedicated Security Test EnvironmentFull System External and Internal100% of critical controls validated, 95% of all controls testedNo critical or high findings; moderate findings require 90-day remediationNot Created
Categorization: -
Not Completed
Risk Level: -
Controls Selected: 0
Baseline: -
Not Started
Test Coverage: 0%
| Timestamp | Activity | Details | Status |
|---|---|---|---|
| No activity yet | |||
Microsoft Entra ID (Azure AD)HR System (Workday)QuarterlyAll privileged accessDaily automated scanManager approval for standard access, Security team for privilegedPassword + MFA RequiredEnabled with ML analysisContinuous validation8 hours1 hourCompliant managed devices only for sensitive appsBlock high-risk countries, step-up MFA for new locationsHybrid RBAC + ABACEnabled with inheritance5AI-assisted with manual reviewCentralized PDPEnforced with conflict detectionBreak-glass procedures with full audit trail and auto-expiryCyberArk Privileged Access SecurityAll privileged credentials in vaultAfter each useFull session recording with keystroke loggingEnabled with approval workflow4 hours1 hourAutomated rotation with dependency mappingML-based anomaly detection on all privileged sessionsSAML 2.0OpenID ConnectOAuth 2.0Primary Identity ProviderEnabled with partner vetting8 hours1 hour24 hoursMinimize attributes shared, encrypt sensitive claimsNot Configured
Platform: -
Not Configured
MFA: -
Model: -
SoD: -
Not Configured
JIT Access: -
| Timestamp | Component | Configuration | Status |
|---|---|---|---|
| No activity yet | |||