Access Control |
1. Is there a defined standard for login names/passwords? |
|
|
|
2. Are good aging procedures in place for passwords? |
|
|
|
3. Are users locked out after a given number of password failures? |
|
|
|
4. Is there a link for help (e.g., forgotten passwords?) |
|
|
|
5. Is there a process for password administration? |
|
|
|
6. Have authorization levels been defined? |
|
|
|
7. Is management sign-off in place for authorizations? |
|
|
|
|
Disaster Recovery |
1. Have service levels been defined. (e.g., how long should recovery take?) |
|
|
|
2. Are fail-over solutions needed? |
|
|
|
3. Is there a way to reroute to another server in the event of a site crash? |
|
|
|
4. Are executables, data, and content backed up on a defined interval appropriate for the level of risk? |
|
|
|
5. Are disaster recovery process & procedures defined in writing? If so, are they current? |
|
|
|
6. Have recovery procedures been tested? |
|
|
|
7. Are site assets adequately Insured? |
|
|
|
8. Is a third party “hot-site’ available for emergency recovery? |
|
|
|
9. Has a Business Contingency Plan been developed to maintain the business while the site is being restored? |
|
|
|
10. Have all levels in organization gone through the needed training & drills? |
|
|
|
11. Do support notification procedures exist & are they followed? |
|
|
|
12. Do support notification procedures support a 24/7 operation? |
|
|
|
13. Have criteria been defined to evaluation recovery completion / correctness? |
|
|
|
|
Firewalls |
1. Was the software installed correctly? |
|
|
|
2. Are firewalls installed at adequate levels in the organization and architecture? (e.g., corporate data, human resources data, customer transaction files, etc.) |
|
|
|
3. Have firewalls been tested? (e.g., to allow & deny access). |
|
|
|
4. Is the security administrator aware of known firewall defects? |
|
|
|
5. Is there a link to access control? |
|
|
|
6. Are firewalls installed in effective locations in the architecture? (e.g., proxy servers, data servers, etc.) |
|
|
|
|
Proxy Servers |
1. Have undesirable / unauthorized external sites been defined and screened out? (e.g. gaming sites, etc.) |
|
|
|
2. Is traffic logged? |
|
|
|
3. Is user access defined? |
|
|
|
|
Privacy |
1. Is sensitive data restricted to be viewed by unauthorized users? |
|
|
|
2. Is proprietary content copyrighted? |
|
|
|
|
3. Is information about company employees limited on public web site? |
|
|
|
4. Is the privacy policy communicated to users and customers? |
|
|
|
5. Is there adequate legal support and accountability of privacy practices? |
|
|
|
|
Data Security |
1. Are data inputs adequately filtered? |
|
|
|
2. Are data access privileges identified? (e.g., read, write, update and query) |
|
|
|
3. Are data access privileges enforced? |
|
|
|
4. Have data backup and restore processes been defined? |
|
|
|
5. Have data backup and restore processes been tested? |
|
|
|
6. Have file permissions been established? |
|
|
|
7. Have file permissions been tested? |
|
|
|
8. Have sensitive and critical data been allocated to secure locations? |
|
|
|
9. Have date archival and retrieval procedures been defined? |
|
|
|
10. Have date archival and retrieval procedures been tested? |
|
|
|
|
Monitoring |
1. Are network monitoring tools in place? |
|
|
|
2. Are network monitoring tool working effectively? |
|
|
|
3. Do monitors detect
- Network time-outs?
- Network concurrent usage?
- IP spoofing? |
|
|
|
4. Is personnel access control monitored? |
|
|
|
5. Is personnel internet activity monitored?
- Sites visited
- Transactions created
- Links accessed |
|
|
|
|
Security
Administration |
1. Have security administration procedures been defined? |
|
|
|
2. Is there a way to verify that security administration procedures are followed? |
|
|
|
3. Are security audits performed? |
|
|
|
4. Is there a person or team responsible for security administration? |
|
|
|
5. Are checks & balances in place? |
|
|
|
6. Is there an adequate backup for the security administrator? |
|
|
|
|
Encryption |
1. Are encryption systems/levels defined? |
|
|
|
2. Is there a standard of what is to be encrypted? |
|
|
|
3. Are customers compatible in terms of encryption levels and protocols? |
|
|
|
4. Are encryption techniques for transactions being used for secured transactions?
- Secure socket layer (SSL)
- Virtual Private Networks (VPNs) |
|
|
|
5. Have the encryption processes and standards been documented? |
|
|
|
Viruses |
1. Are virus detection tools in place? |
|
|
|
2. Have the virus data files been updated on a current basis? |
|
|
|
3. Are virus updates scheduled? |
|
|
|
4. Is a response procedure for virus attacks in place? |
|
|
|
5. Are notification of updates to virus files obtained from anti-virus software vendor? |
|
|
|
6. Does the security administrator maintain an informational partnership with the anti-virus software vendor? |
|
|
|
7. Does the security administrator subscribe to early warning e-mail services? (e.g., www.cert.org or www.icsa.net) |
|
|
|
8. Has a key contact been defined for the notification of a virus presence? |
|
|
|
9. Has an automated response been developed to respond to a virus presence? |
|
|
|
10. Is the communication & training of virus prevention and response procedures to users adequate? |
|
|
|