A sound network configuration practice should focus on enhancing security, preventing unauthorized access, and ensuring data integrity. The validation of intrusion prevention controls ensures that the network security measures function as intended and effectively protect data from threats.
(A) Change management practices to ensure operating system patch documentation is retained.
Incorrect: While maintaining patch documentation is important, change management alone does not directly enhance network security.
(B) User role requirements are documented in accordance with appropriate application-level control needs.
Incorrect: This practice improves access control and governance, but it is not a direct network security configuration practice.
(C) Validation of intrusion prevention controls is performed to ensure intended functionality and data integrity. (Correct Answer)
Intrusion Prevention Systems (IPS) help detect and prevent malicious activities in real time.
Ensuring proper validation enhances security and prevents data corruption.
IIA GTAG 15 – Information Security Governance recommends continuous monitoring and validation of security controls.
(D) Interfaces reinforce segregation of duties between operations administration and database development.
Incorrect: Segregation of duties is a good governance practice, but it does not directly relate to network security configuration.
IIA GTAG 15 – Information Security Governance: Recommends validating security controls, including intrusion prevention systems.
IIA Standard 2120 – Risk Management: Encourages proactive security controls to prevent cyber threats.
Analysis of Each Option:IIA References Supporting the Answer:Thus, the correct answer is (C) Validation of intrusion prevention controls, as it directly enhances information security by ensuring real-time threat detection and data integrity.