IT infrastructure security checklist for the company to maintain security during COVID 19

Procedure

Yes

No

 

 

 

PERSONEL SECURITY

 

 

 

 

Are authorized access level and types identified to access resources and enter at company?

 

 

Do you have policies addressing background checks for employees and contractors?

 

 

Do you have a process for effectively cutting off access to facilities and information systems when an employee/contractor terminates employment?

 

 

 

 

PHYSICAL SECURITY

 

 

 

 

 

Do you have policies and procedures that address allowing authorized and limiting unauthorized physical access to electronic information systems and the facilities in which they are housed?

 

 

Do your policies and procedures specify the methods used to control physical access to your secure areas, such as door locks, access control systems, security officers, or video monitoring?

 

 

Is access to your computing area controlled (single point, reception or security desk, sign-in/sign-out log, temporary/visitor badges)?

 

 

 Are visitors escorted into and out of controlled areas?

 

 

Are your PCs inaccessible to unauthorized users (e.g. located away from public areas)?

 

 

Visitors escorted into and out of controlled areas.

 

 

Is your computing area and equipment physically secured?

 

 

Are there procedures in place to prevent computers from being left in a logged- on state, however briefly?

 

 

Are screens automatically locked after 10 minutes idle?

 

 

Are modems set to Auto-Answer OFF?

 

 

Do you have procedures for protecting data during equipment repairs?

 

 

Do you have an emergency evacuation plan and is it current?

 

 

 Does your plan identify areas and facilities that need to be sealed off immediately in case of an emergency?

 

 

 Are key personnel aware of which areas and facilities need to be sealed off and how?

 

 

Wipe content on all devices before they are discarded or transferred to others

 

 

Develop and implement procedures to prevent unauthorized data transfer via USB drives and other portable devices

 

 

Secure all computer equipment and servers in a locked storage area with specific individual access permissions

 

 

Set automatic timeouts for all computers following a period of inactivity

 

 

Establish policies and procedures to disable inactive accounts, including those of transferred or terminated employees, after a set time period

 

 

Identify lost or stolen laptops and devices immediately; establish appropriate procedures to report lost items for employees

 

 

 

 

 

ACCOUNT AND PASSWORD MANAGEMENT

 

 

Do you have policies and standards covering electronic authentication, authorization, and access control of personnel and resources to your information systems, applications and data?

 

 

Do you ensure that only authorized personnel have access to your computers?

 

 

Do you require and enforce appropriate passwords?

 

 

Are your passwords secure (not easy to guess, regularly changed, no use of temporary or default passwords)?

 

 

Are you computers set up so others cannot view staff entering passwords?

 

 

 

 

 

CONFIDENTIALITY OF SENSITIVE DATA

 

 

Do you classify your data, identifying sensitive data versus non sensitive?

 

 

Are you exercising responsibilities to protect sensitive data under your control?

 

 

Is the most valuable or sensitive data encrypted?

 

 

Do you have a policy for identifying the retention of information (both hard and soft copies)?

 

 

Do you have procedures in place to deal with credit card information?

 

 

Do you have procedures covering the management of personal private information?

 

 

Is there a process for creating retrievable backup and archival copies of critical information?

 

 

Do you have procedures for disposing of waste material?

 

 

Is waste paper binned or shredded?

 

 

Is your shred bin locked at all times?

 

 

Do your policies for disposing of old computer equipment protect against loss of data (e.g.. by reading old disks and hard drives)?

 

 

Do your disposal procedures identify appropriate technologies and methods for making hardware and electronic media unusable and inaccessible (such as shredding CDs and DVDs, electronically wiping drives, burning tapes) etc.)?

 

 

 

 

 

 

DISASTER RECOVERY

 

 

Do you have a current business continuity plan?

 

 

Is there a process for creating retrievable back up and archival copies of critical information?

 

 

Do you have an emergency/incident management communications plan?

 

 

Do you have a procedure for notifying authorities in the case of a disaster or security incident?

 

 

Does your procedure identify who should be contacted, including contact information?

 

 

Is the contact information sorted and identified by incident type?

 

 

Does your procedure identify who should make the contacts?

 

 

Have you identified who will speak to the press/public in the case of an emergency or an incident?

 

 

Does your communications plan cover internal communications with your employees and their families?

 

 

Can emergency procedures be appropriately implemented, as needed, by those responsible?

 

 

 

 

 

SECURITY AWARENESS AND EDUCATION

 

 

Are you providing information about computer security to your staff?

 

 

Do you provide training on a regular recurring basis?

 

 

Are employees taught to be alert to possible security breaches?

 

 

Are your employees taught about keeping their passwords secure?

 

 

Are your employees able to identify and protect classified data, including paper documents, removable media, and electronic documents?

 

 

Define policies and procedures for employee use of your organization’s information technologies

 

 

Employ a system use notification banner before granting employees access to the system that informs them of applicable regulations and federal laws (i.e. system usage may be monitored, recorded, and subject to audit and unauthorized use of the system is prohibited and subject to criminal and civil penalties)

 

 

Require employees and staff to utilize strong passwords for networks and systems with a combination of letters, numbers, and special characters

 

 

Require frequent password resets for all systems

 

 

Implement multiple authentication methods for computers and networks

 

 

Does your awareness and education plan teach proper methods for managing credit card data (PCI standards) and personal private information (Social security numbers, names, addresses, phone numbers, etc.)?

 

 

 

 

 

COMPLIANCE AND AUDIT

 

 

Do you review and revise your security documents, such as: policies, standards, procedures, and guidelines, on a regular basis?

 

 

Do you audit your processes and procedures for compliance with established policies and standards?

 

 

Do you test your disaster plans on a regular basis?

 

 

Does management regularly review lists of individuals with physical access to sensitive facilities or electronic access to information systems?

 

 

 

 

Network security

 

 

 

 

Conduct a computer network assessment to obtain the information you need to develop a cybersecurity plan to reduce cyber attacks and address breaches

 

 

Encrypt all computers and mobile devices issued by the organization; preapprove the use of any devices not issued by the organization

 

 

Implement role-based access to any systems to ensure employees only have access to any programs and applications necessary to perform the functions of their job

 

 

Prevent the installation of any peer-to-peer software applications

 

 

Perform regular desktop audits for the entire organization to ensure unauthorized software applications are not installed

 

 

Install and regularly update anti-virus software on all network computers

 

 

Conduct anti-virus scans on all incoming and outgoing files

 

 

Research and build the necessary firewalls to protect against intruders

 

 

Develop security policies for the use of virtual private network or remote connections

 

 

Configure any electronic health records (EHR) system or database to require specific access permissions for each user; inquire with the EHR vendor to determine how they provide updates and technical support

 

 

Backup data regularly and develop a plan to access information quickly in case of a natural or manmade disaster

 

 

 

 

Risk and Governance

 

 

Update and communicate acceptable use policies for employees and address the use of home computing devices.

 

 

Identify functions requiring secure IT environments that remote working may not provide, and develop ways of performing them.

 

 

Anticipate how entities on which your business depends — cloud, network infrastructure providers, and others — may be affected by COVID-19 disruptions, and develop resiliency options.

 

 

Refresh and update cyber incident response and disaster recovery plans to address current operational needs.

 

 

Regularly communicate cybersecurity awareness messages to employees to reinforce security procedures.

 

 

 

 

server security

 

 

Do you use configuration security standards?

 

 

Are tools used to initially harden production systems?

 

 

Are tools and technologies used to automate secure host builds and host hardering?

 

 

Is a dedicated group responsible for secure builds and host hardening?

 

 

Does secure configuration guidelines exist for deployed network devices?

 

 

Is testing conducted to validate host hardening and secure build efforts?

 

 

Is system baselining and integrity checking performed?

 

 

Does an established system patch and update policy exist?

 

 

Are the latest vendor - supplied security patches tested and applied within a scheduled timeframe for release to system components and software?

 

 

Do you apply patches withing seven days of the vendors releasing them?

 

 

Is the organization using a tool to detect known vulnerabilities and/or missing patches?

 

 

Does an established antivirus signature update policy exist?

 

 

Does an established IDS signature update policy exist?

 

 

Are all patches tested prior to production deployment?

 

 

Do network or other control exist to detect direct patching or updating of systems from the internet?

 

 

 

 

Application Security

 

 

 

 

Is a formal methodology or process used to guide the acquisition, deployment or maintenance of software systems?

 

 

Is a security Deployment Lifecycle utilized in software development?

 

 

Does management provide effective support and resources for the SDL process?

 

 

Are SDL tasks deliverables built into the software development schedule?

 

 

Have security requirements been established including the planed operational environment?

 

 

Have bug and quality bars established and integrated into the issue tracking system?

 

 

Have security and privacy risk assessments been conducted?

 

 

Did the product team follow good design practice?

 

 

Has the attack surface been analysed and appropriately minimized?

 

 

Has the threat modelling been performed appropriately to identify potential vulnerabilities?

 

 

were unsafe functions defined and deprecated?

 

 

Does development follow secure programming practices?

 

 

Does application execute proper error handling so that error messages do not reveal potentially harmful information to unauthorized users

 

 

Have you disabled default password while installing the applications?

 

 

Have you removed/disable the functionalities that allow the bypass of security controls prior to implementation in a production environment?

 

 

 

 

Wi-Fi security

 

 

Have you changed the SSID of your wireless router while installing it?

 

 

Have you enabled network encryption?

 

 

Do you filter devices using MAC address so that only specified devices can be added into your wireless network?

 

 

Have you restricted the range of the wireless signal?

 

 

 

 

Cloud security

 

 

 

 

Are cloud related security policies and procedures aligned with general corporate or departmental strategy and policies? Is there a process in place that assures this?

 

 

Have you addressed data residency concerns of the country?

 

 

Does the workload or capability considered for the cloud allow for access by unmanaged devices — laptops, smartphones, iPads/Slates, general browsers, etc.?

 

 

Do you have a data classification scheme? Is there a policy and related processes that underpin such a scheme? Do you have a way to identify sensitive or confidential information?

 

 

In the context of data classification, are you encrypting data in the cloud?

 

 

Can you ensure integrity of data and applications in the cloud?

 

 

For cloud adoption, is there a process that helps to determine, understand, and mitigate threats to the company or department? Is there a formal threat modelling process?

 

 

Have you mapped the assets to potential cloud deployment models?

 

 

Have you carried out IT risk assessment for cloud adoption?

 

 

Does your company or department have known, documented criteria for due diligence on third party providers; whether cloud providers or outsourcers?

 

 

Does your cloud service provider share risk assessment reports?

 

 

Does your cloud provider operate at a level that is more or less secure than you are at present?

 

 

How does your GRC (Governance, Risk and Compliance) model map through security controls to the cloud service and the SLA for that service?

 

 

Do you have Data Loss Prevention (DLP) solution that identifies, monitors, and protects sensitive data and helps users understand and manage data risk for the organization?

 

 

For secure access, do you have a solution to use multi-factor authentication with options like call my mobile phone, text code to mobile phone, notify me through app, etc. for cloud Do you have a solution to encrypt e-mail messages with appropriate access privileges like don't copy, don’t forward, etc., for cloud-based solutions?

 

 

Do you automatically delete unnecessary accounts when an employee leaves, changes groups, or does not use the account prior to its expiration?

 

 

Do you carry out mandatory background checks for high-privilege access?

 

 

Do your cloud service provider have a process in which Just-In-Time access and elevation is granted on-an-as needed and only-at-the-time-of-need basis to troubleshoot the service?

 

 

 


Comments

Popular posts from this blog

Set password by default when transfering data through xender hot spot network.

Browser cache weakness

Email Phishing