Are there procedures in place for Post intrusion prevention triggers and alerts based on anomalies in security logs?
Security Management-
Is a risk assessment conducted and are security controls documented according to risk?
Are new applications and services are reviewed for security risk?
Does staff have designated individuals for addressing user security questions and issues?
Are security policies and standards reviewed biannually and are additional security controls deployed as needed?
Does IT staff discourage users from using unencrypted USB drives or other mobile media?
Do the password policies for users conform to standards?
Are there more stringent password settings for system administrators- such as multifactor authentication or 15 character passwords?
Are there prohibitions against unencrypted laptops or personal electronic devices?
Are the procedures for terminating user accounts are coordinated with HR and enterprise systems? What is the timeframe for removing user accounts? What is the timeframe for terminating admin accounts? Are admin accounts annually recertified?
Change Management-
1. Does a documented change management procedure exist?
2. Is the IT staff briefed on change management processes biannually?
3. Are stakeholders identified and communications prior to change requests?
4. Are change requests reviewed and communicated with appropriate IT and business units?
5. Are problematic changes are reviewed? Do informal cm processes for root causes and lesson learned exist?
6. Are vendors, business partners, and other entities expected to follow CM processes?
7. Do CM procedures require documented testing plans?
8. Do processes include coordination, test dev, and prod data and systems as part of testing plan?
9. Are there prohibitions on testing on production systems? Is testing on prod data discouraged, limited and documented?
Problem Management-
Do documented procedures exist for identifying and classifying problems (e.g. usability or interfaces)? What are the procedures?
Do customers and partners have channel for communicating problems?
What are the documented procedures for escalating problems and events to incidents?
Are incident handlers identified based on type and scope of incidents?
Does an incident policy and procedure exist, and is it documented?
Are incident post mortems are conducted? Are remediation actions planned and deployed?
Is there a software package for monitoring system and/or user activity? What is it? What does it monitor?
What is the extent of vendor support (i.e., on-site, off-site, warranty coverage, extended hours, and system maintenance agreements)?
3. What security controls exist for data centers?
What security controls are in place for network closets?
4. Is authorization required for access to sensitive areas? Are there logs for visitors to data centers that include – date time, name, organization represented, and authorizing employee?
Are access rights reviewed annually?
5. Are Critical facilities out of public site and not be mapped for public access? Is video monitoring should be routinely reviewed?
Disaster Recovery-
Is there a DR plan? Does it include the inventory of hardware and software assets?
What is the date of the last DR test?
Does the DR plan include a Recovery Time Objective (RTO), and a Recovery Point Objective?
Is the DR plan coordinated with the Hopkins DR plan?
Is the DR plan linked to the BCP plan(s)?
Network-
Does the network policy include the acceptable use of network services? Network authorization procedures?
What type of network segmentation exists?
Is NAT or PAT in use?
Where are the firewalls located?
Is there a formal firewall policy in place? Is it reviewed against the IDS and IPS?
Is there filtering between the DMZ and the production network?
Are there testing processes in place for Web applications (such as SQL injection, XSS)?
What processes monitor database activity?
What policies are in place for email? Are there email checks on the gateway?
What restrictions are in place for numbers of email sent (assists in preventing spam)?
Are there procedures for internal or external penetration testing of the infrastructure?
Is remote administrative access limited to certain IP addresses?
Are users trained in acceptable use procedures? If yes, explain the process.
What type of encryption exists on the wireless network?
Is there a wireless guest network?
Is there a process to monitor for unauthorized WAP’s?