Prepared by: | [YOUR NAME] |
Date: | January 5, 2055 |
Company Name: | [YOUR COMPANY NAME] |
Task | Checklist Item | Yes | No |
---|---|---|---|
1. | Are firewalls properly configured to monitor and filter traffic? | ||
2. | Is the intrusion detection/prevention system (IDS/IPS) in place and updated? | ||
3. | Are Virtual Private Networks (VPNs) implemented for remote access? | ||
4. | Are unused network ports closed and monitored? | ||
5. | Is there network segmentation between critical systems and non-essential systems? |
Task | Checklist Item | Yes | No |
---|---|---|---|
1. | Are user access levels reviewed and updated regularly? | ||
2. | Is Multi-Factor Authentication (MFA) enabled for critical systems? | ||
3. | Are processes in place to manage access for new hires and terminated employees? | ||
4. | Are privileged accounts restricted and monitored for suspicious activity? | ||
5. | Is there a password policy enforcing complexity and expiration rules? |
Task | Checklist Item | Yes | No |
---|---|---|---|
1. | Is sensitive data encrypted in transit and at rest? | ||
2. | Are regular data backups performed and stored securely off-site? | ||
3. | Are Data Loss Prevention (DLP) tools in place to prevent unauthorized data sharing? | ||
4. | Is third-party data access properly managed and secured? | ||
5. | Is there a response plan for data breaches, including notification procedures? |
Task | Checklist Item | Yes | No |
---|---|---|---|
1. | Are applications regularly tested for vulnerabilities (e.g., using penetration testing)? | ||
2. | Are outdated software applications removed from the system? | ||
3. | Are patches and updates applied regularly to all software and systems? | ||
4. | Are Web Application Firewalls (WAF) in place for web applications? | ||
5. | Is there a secure coding policy guiding developers? |
Task | Checklist Item | Yes | No |
---|---|---|---|
1. | Is there a documented and regularly updated incident response plan? | ||
2. | Are incident response drills or tabletop exercises conducted regularly? | ||
3. | Are staff trained on their roles in incident response processes? | ||
4. | Are forensic tools available to investigate and contain incidents? | ||
5. | Is there a plan for post-incident recovery and system restoration? |
Templates
Templates