Free Assess Your Investment

Page 1

Call Us: (781) 356-3535 Visit: security.americatech.com

3.Independent review of information security

1.Allocation of information security responsibilities

2.Security requirements in third party contracts

Answer the following questions with Yes, No, or in Progress.

FREE RISK ASSESSMENT CHECKLIST

1.Information security policy document

Is the implementation of security policy reviewed independently on regular basis? This is to provide assurance that organizational practices properly reflect the policy, and that it is feasible and effective.

2.Co-operation between organizations

Does an Information security policy exist, which is approved by the management, published and communicated to all employees, as appropriate? Does it contain a statement of management’s commitment to information security and outline the organizations approach to information security management, implementation and oversight?

Security of third-party access

2.Review and Evaluation

1.Identification of risks from third party a. Are risks from third party access identified and appropriate security controls implemented? b. Are the types of accesses identified, classified and reasons for access justified? c. Are security risks with third party contractors working onsite identified and appropriate controls implemented?

Are responsibilities for the protection of individual assets and for carrying out specific security processes clearly defined?

Information Security Information Security Policy

Does each security policy have an owner responsible for its implementation, maintenance and oversight that follows a defined process for each? Does the process ensure that a review takes place in response to any changes affecting the basis of the original assessment, example: significant security incidents, new vulnerabilities or changes to organizational or technical structure?

Organizational Security Information security infrastructure

Call Us: (781) 356 3535 Visit: security.americatech.com

Are the appropriate contacts with law enforcement authorities, regulatory bodies, utility providers, information service providers and telecommunication operators maintained to ensure that appropriate action can be quickly taken and advice obtained, in the event of an incident?

1.Classification guidelines

a. Are security roles and responsibilities as laid in Organization=s information security policy documented where appropriate? Does this include general responsibilities for implementing or maintaining security policy as well as specific responsibilities for protection of particular assets, or for extension of particular security processes or activities?

a. Are security requirements addressed in the contract with the third party, when the organization has outsourced the management and control of all or some of its information systems, networks and/ or desktop environments?

1.Security requirements in outsourcing contracts

b. Does contract address how the legal requirements are to be met, how the security of the organization=s assets are maintained and tested, and the right of audit, physical security issues and how the availability of the services is to be maintained in the event of disaster?

Call Us: (781) 356 3535 Visit: security.americatech.com

a. Do employees sign Confidentiality or non-disclosure agreements as a part of their initial terms and conditions of the employment and annually b.thereafter?Doesthis agreement cover the security of the information processing facility and organization assets?

Outsourcing

Accountability of assets

1.Including security in job responsibilities

Information classification

Call Us: (781) 356-3535 Visit: security.americatech.com

a Is there a maintained inventory or register of the important assets associated with each information system?

1.Inventory of assets

2.Information labeling and handling a. Is there an appropriate set of procedures defined for information labeling and handling in accordance with the classification scheme adopted by the organization?

Personnel security Security in job definition and Resourcing

a. Is there a formal contract containing, or referring to, all the security requirements to ensure compliance with the organization=s security policies and standards?

a. Is there an Information classification scheme or guideline in place; which will assist in determining how the information is to be handled and protected?

2.Confidentiality agreements

Asset classification and control

a. Is maintenance carried out only by authorized personnel?

5.Secure disposal or re-use of equipment

2.Power Supplies

a. Does any equipment usage outside an organization=s premises for information processing have to be authorized by the management?

1.Reporting security/threat incidents

2.Reporting security weaknesses

Physical and Environmental Security Equipment Security

a. Are storage devices containing sensitive information either physically destroyed or securely over written?

a. Do all employees of the organization and third party users (where relevant) receive appropriate Information Security training and regular updates in organizational policies and procedures?

b. Are controls adopted to minimize risk from potential threats such as theft, fire, explosives, smoke, water, dist, vibration, chemical effects, electrical supply interfaces, electromagnetic radiation and flood?

Responding to security/threat incidents

a. Does a formal reporting procedure or guideline exist for users, to report security weakness in, or threats to, systems or services?

3.Terms and conditions of employment

a Do the terms and conditions of the employment cover the employee=s responsibility for information security? Where appropriate, these responsibilities might continue for a defined period after the end of the employment. User training

4.Securing of equipment offsite

Call Us: (781) 356 3535 Visit: security.americatech.com

a. Are items requiring special protection isolated to reduce the general level of protection required?

1.Information security education and training

1.Equipment location protection

Call Us: (781) 356-3535 Visit: security.americatech.com

a. Is the equipment protected from power failures by using redundant power supplies such as multiple feeds, uninterruptible power supply (ups), backup generator etc.?

3.Equipment Maintenance

b. Is the equipment covered by insurance, and are the insurance requirements are satisfied?

a. Does a formal reporting procedure exist, to report security/threat incidents through appropriate management channels as quickly as possible?

b. Is the security provided for equipment while outside the premises equal to or more than the security provided inside the premises?

Operational Procedure and responsibilities

b. Does the agreement address the security issues based on the sensitivity of the business information involved?

1.Removal of property

b. Are spot checks or regular audits conducted to detect unauthorized removal of property?

1.Documented Operating procedures

a. Does an Incident Management procedure exist to handle security/threat incidents?

a. Does a procedure exist for management of removable computer media such as tapes, disks, cassettes, memory cards and reports?

Exchange of Information and software

d. Are the audit trails and logs relating to the incidents are maintained and proactive action taken in a way that the incident doesn’t reoccur?

2.Incident management procedures

b. Are the risks associated with such management identified in advance, discussed with the third party and appropriate controls incorporated into the contract?

3.External facilities management

c. Is necessary approval obtained from business and application owners?

2.Other forms of information exchange

1.Information and software exchange agreement

a. Is there any formal or informal agreement between the organizations for exchange of information and software?

Media handling and Security

b. Does the procedure address the incident management responsibilities, orderly and quick response to security/threat c.incidents?Doesthe procedure address different types of incidents ranging from denial of service to breach of confidentiality etc., and ways to handle them?

Call Us: (781) 356-3535 Visit: security.americatech.com

General Controls

Call Us: (781) 356 3535 Visit: security.americatech.com

a. Can equipment, information or software be taken offsite without appropriate authorization?

c. Are individuals aware of these types of spot checks or regular audits?

Communications and Operations Management

a. Does the Security Policy identify any Operating procedures such as Back-up, Equipment maintenance etc.?

a. Are any of the Information processing facilities managed by an external company or contractor (third party)?

1.Management of removable computer media

c. Are the users and service providers given a clear statement of the business requirement to be met by access controls?

a. Are there any policies, procedures and/ or standards to control telecommuting activities, this should be consistent with organization=s security policy? b. Is suitable protection of telecommuting site in place against threats such as theft of equipment, unauthorized disclosure of information etc.?

Access Control Business Requirements for Access Control

Business Continuity Management

a. Are there are any policies, procedures or controls in place to protect the exchange of information through the use of voice, facsimile and video communication facilities?

Call Us: (781) 356-3535 Visit: security.americatech.com

a. Has a formal policy been adopted that takes into account the risks of working with computing facilities such as notebooks, palm pilots etc., especially in unprotected environments? b. Was training arranged for staff that use mobile computing facilities to raise their awareness on the additional risks resulting from this way of working and controls that need to be implemented to mitigate the risks?

a. Are events that could cause interruptions to business process been identified? Example: equipment failure, flood and fire. b. Was a risk assessment conducted to determine impact of such c.interruptions?Wasastrategy plan developed based on the risk assessment results to determine an overall approach to business continuity?

a. Is there a managed process in place for developing and maintaining business continuity throughout the organization? This might include Organization wide Business continuity plan, regular testing and updating of the plan, formulating and documenting a business continuity strategy etc.,

1.Access Control Policy

Aspects of Business Continuity Management

2.Business continuity and impact analysis

a. Have the business requirements for access control been defined and documented. b. Does the Access control policy address the rules and rights for each user or a group of users?

1.Mobile computing

2.Telecommuting

Call Us: (781) 356 3535 Visit: security.americatech.com

1.Business continuity management process

Mobile computing and telecommuting

Call Us: (781) 356-3535 Visit: security.americatech.com Call Us: (781) 356 3535 Visit: security.americatech.com 3.Writing and implementing continuity plan a. Were plans developed to restore business operations within the required time frame following an interruption or failure to business b.process?Istheplan regularly tested and updated? 4.Business continuity planning framework a. Is there a single framework of Business continuity plan? b. Is this framework maintained to ensure that all plans are consistent and identify priorities for testing and maintenance? c. Does this identify conditions for activation and individuals responsible for executing each component of the plan? 5.Testing, maintaining and re-assessing business continuity plan a. Are the Business continuity plans tested regularly to ensure that they are up to date and effective? b. Are the Business continuity plans maintained by regular reviews and updates to ensure their continuing effectiveness? c. Are procedures included within the organizations change management program to ensure that Business continuity matters are appropriately addressed?

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Free Assess Your Investment by Derek Brown - Issuu