it udit ches - smartsheet · it udit ches | 1 application access controls operating system access...

2
IT AUDIT CHECKLIST www.RivialSecurity.com | 1 Applicaon Access Controls Operang System Access Controls Virtual Access Controls User accounts provisioned Access levels modifiable, user privileges limited to job funcon Periodical access reviews scheduled Password complexity requirement Admin acvity monitored Database Access Controls Database admin accounts controlled Admin acvity monitored Applicaon access to database restricted System installaon checklists or images used Security and event logs enabled Unnecessary services turned off Access to hypervisors restricted Access levels modifiable Periodical access reviews Password complexity requirement Secure configuraon guide applied to hypervisors and SANs Access to services running on host restricted Network Access Controls Firewall for remote access IDS for remote access IPS for remote access VPN for remote access MFA for remote access Physical Security Controls An Malware Controls Vulnerability Management Controls Physical perimeter protecons Locks Badge access Baery backup up Generators HVAC An-virus soſtware Gateway filtering Browser protecons Scanning and remediaon for vulnerabilies Patch management program

Upload: others

Post on 08-Jul-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IT UDIT CHES - Smartsheet · IT UDIT CHES | 1 Application Access Controls Operating System Access Controls Virtual Access Controls ☐ User accounts provisioned ☐ Access levels

IT AUDIT CHECKLIST

www.RivialSecurity.com | 1

Application Access Controls

Operating System Access Controls

Virtual Access Controls

☐ User accounts provisioned

☐ Access levels modifiable, user privileges limited

to job function

☐ Periodical access reviews scheduled

☐ Password complexity requirement

☐ Admin activity monitored

Database Access Controls

☐ Database admin accounts controlled

☐ Admin activity monitored

☐ Application access to database restricted

☐ System installation checklists or images used

☐ Security and event logs enabled

☐ Unnecessary services turned off

☐ Access to hypervisors restricted

☐ Access levels modifiable

☐ Periodical access reviews

☐ Password complexity requirement

☐ Secure configuration guide applied to

hypervisors and SANs

☐ Access to services running on host restricted

Network Access Controls

☐ Firewall for remote access

☐ IDS for remote access

☐ IPS for remote access

☐ VPN for remote access

☐ MFA for remote access

Physical Security Controls

Anti Malware Controls

Vulnerability Management Controls

☐ Physical perimeter protections

☐ Locks

☐ Badge access

☐ Battery backup up

☐ Generators

☐ HVAC

☐ Anti-virus software

☐ Gateway filtering

☐ Browser protections

☐ Scanning and remediation for vulnerabilities

☐ Patch management program

Page 2: IT UDIT CHES - Smartsheet · IT UDIT CHES | 1 Application Access Controls Operating System Access Controls Virtual Access Controls ☐ User accounts provisioned ☐ Access levels

IT AUDIT CHECKLIST

www.RivialSecurity.com | 2

Software Development Controls User Awareness Controls

Data Protection Controls

Asset Management Controls

Security Program Controls

Change Management Controls

Disaster Recovery Controls

Vendor Management Controls

Incident Management Controls

☐ Software development lifecycle established

☐ Secure coding and web app firewall/security

testing

☐ Users trained on security

☐ Background checks for new employees

☐ Duties separated and documented

☐ Security logs collected and reviewed

☐ Encryption in transit and at rest

☐ Data classification

☐ Usb restrictions in place

☐ Removal of data from storage media

☐ Hardware and software inventoried

☐ Installation of unauthorized software, utility

and audit tools prohibited

☐ System capacity and performance monitored

☐ Risk assessments regularly performed

regularly

☐ Risks mitigated to acceptable levels

☐ Information security policies approved and in place

☐ Periodical independent audits performed

☐ Process for change management instated

☐ Inventory of IT assets

☐ Backups for systems and data

☐ Disaster recovery plan established and

regularly tested

☐ Business impact analysis plan established and

regularly tested

☐ Security clauses included in contracts

☐ SLA’s are monitored

☐ Vendor incident notifications sent to

subservice organizations

☐ Incident response plan instated and regularly

tested

☐ Customers notified following vendor incidents