Access Control
|
1. Is there a defined standard for login names/passwords?
|
|
|
|
2. Are good aging procedures in place for passwords?
|
|
|
|
3. Are users locked out after a given number of password failures?
|
|
|
|
4. Is there a link for help (e.g., forgotten passwords?)
|
|
|
|
5. Is there a process for password administration?
|
|
|
|
6. Have authorization levels been defined?
|
|
|
|
7. Is management sign-off in place for authorizations?
|
|
|
|
|
Disaster Recovery
|
1. Have service levels been defined. (e.g., how long should recovery take?)
|
|
|
|
2. Are fail-over solutions needed?
|
|
|
|
3. Is there a way to reroute to another server in the event of a site crash?
|
|
|
|
4. Are executables, data, and content backed up on a defined interval appropriate for the level of risk?
|
|
|
|
5. Are disaster recovery process & procedures defined in writing? If so, are they current?
|
|
|
|
6. Have recovery procedures been tested?
|
|
|
|
7. Are site assets adequately Insured?
|
|
|
|
8. Is a third party “hot-site’ available for emergency recovery?
|
|
|
|
9. Has a Business Contingency Plan been developed to maintain the business while the site is being restored?
|
|
|
|
10. Have all levels in organization gone through the needed training & drills?
|
|
|
|
11. Do support notification procedures exist & are they followed?
|
|
|
|
12. Do support notification procedures support a 24/7 operation?
|
|
|
|
13. Have criteria been defined to evaluation recovery completion / correctness?
|
|
|
|
|
Firewalls
|
1. Was the software installed correctly?
|
|
|
|
2. Are firewalls installed at adequate levels in the organization and architecture? (e.g., corporate data, human resources data, customer transaction files, etc.)
|
|
|
|
3. Have firewalls been tested? (e.g., to allow & deny access).
|
|
|
|
4. Is the security administrator aware of known firewall defects?
|
|
|
|
5. Is there a link to access control?
|
|
|
|
6. Are firewalls installed in effective locations in the architecture? (e.g., proxy servers, data servers, etc.)
|
|
|
|
|
Proxy Servers
|
1. Have undesirable / unauthorized external sites been defined and screened out? (e.g. gaming sites, etc.)
|
|
|
|
2. Is traffic logged?
|
|
|
|
3. Is user access defined?
|
|
|
|
|
Privacy
|
1. Is sensitive data restricted to be viewed by unauthorized users?
|
|
|
|
2. Is proprietary content copyrighted?
|
|
|
|
|
3. Is information about company employees limited on public web site?
|
|
|
|
4. Is the privacy policy communicated to users and customers?
|
|
|
|
5. Is there adequate legal support and accountability of privacy practices?
|
|
|
|
|
Data Security
|
1. Are data inputs adequately filtered?
|
|
|
|
2. Are data access privileges identified? (e.g., read, write, update and query)
|
|
|
|
3. Are data access privileges enforced?
|
|
|
|
4. Have data backup and restore processes been defined?
|
|
|
|
5. Have data backup and restore processes been tested?
|
|
|
|
6. Have file permissions been established?
|
|
|
|
7. Have file permissions been tested?
|
|
|
|
8. Have sensitive and critical data been allocated to secure locations?
|
|
|
|
9. Have date archival and retrieval procedures been defined?
|
|
|
|
10. Have date archival and retrieval procedures been tested?
|
|
|
|
|
Monitoring
|
1. Are network monitoring tools in place?
|
|
|
|
2. Are network monitoring tool working effectively?
|
|
|
|
3. Do monitors detect
- Network time-outs?
- Network concurrent usage?
- IP spoofing?
|
|
|
|
4. Is personnel access control monitored?
|
|
|
|
5. Is personnel internet activity monitored?
- Sites visited
- Transactions created
- Links accessed
|
|
|
|
|
Security
Administration
|
1. Have security administration procedures been defined?
|
|
|
|
2. Is there a way to verify that security administration procedures are followed?
|
|
|
|
3. Are security audits performed?
|
|
|
|
4. Is there a person or team responsible for security administration?
|
|
|
|
5. Are checks & balances in place?
|
|
|
|
6. Is there an adequate backup for the security administrator?
|
|
|
|
|
Encryption
|
1. Are encryption systems/levels defined?
|
|
|
|
2. Is there a standard of what is to be encrypted?
|
|
|
|
3. Are customers compatible in terms of encryption levels and protocols?
|
|
|
|
4. Are encryption techniques for transactions being used for secured transactions?
- Secure socket layer (SSL)
- Virtual Private Networks (VPNs)
|
|
|
|
5. Have the encryption processes and standards been documented?
|
|
|
|
Viruses
|
1. Are virus detection tools in place?
|
|
|
|
2. Have the virus data files been updated on a current basis?
|
|
|
|
3. Are virus updates scheduled?
|
|
|
|
4. Is a response procedure for virus attacks in place?
|
|
|
|
5. Are notification of updates to virus files obtained from anti-virus software vendor?
|
|
|
|
6. Does the security administrator maintain an informational partnership with the anti-virus software vendor?
|
|
|
|
7. Does the security administrator subscribe to early warning e-mail services? (e.g., www.cert.org or www.icsa.net)
|
|
|
|
8. Has a key contact been defined for the notification of a virus presence?
|
|
|
|
9. Has an automated response been developed to respond to a virus presence?
|
|
|
|
10. Is the communication & training of virus prevention and response procedures to users adequate?
|
|
|
|