Today’s network and data security environments are complex and diverse. There are hundreds of pieces to a security system and all of those pieces need to be looked at individually and as a whole to make sure they are not only working properly for your organization, but also safe and not posing a security threat to your company and your data or the data of your customers.
Risk management and risk assessments are important parts of this process. Data loss and data breaches are detrimental to your organization and can make or break a company, especially if a breach causes other organizations to lose confidence in your ability to keep yours and their data secure. For this reason, it is absolutely critical for you to perform regular audits of your environment.
There are hundreds of items that could be on a cybersecurity audit checklist. Here are some broad categories and ideas that cover many of the crucial cybersecurity threats:
- Company security policies in place
- Security policies written and enforced through training
- Computer software and hardware asset list
- Data classified by usage and sensitivity
- Established chain of data ownership
- Training on phishing, handling suspicious emails, social engineering hackers
- Password training and enforcement
- Training on dealing with strangers in the workplace
- Training on carrying data on laptops and other devices and ensuring the security of this data
- All security awareness training passed and signed off ensuring that all employees not only understand the importance of security but are active guardians for security
- Ensure that Secure Bring Your Own Device (BYOD) plans are in place
- Business practices
- Emergency and cybersecurity response plans
- Determine all possible sources of business disruption cybersecurity risk
- Plans in place to lessen business disruptions and security breaches
- Emergency disaster recovery plans in place
- Alternative locations for running business in case of emergencies or disruptions
- Redundancy and restoration paths for all critical business operations
- Have you tested your restoration and redundancy plans?
- IT staff
- System hardening plans
- Automated system hardening on all operating systems on servers, routers, workstations, and gateways
- Software patch management automated
- Security mailing lists?
- Regular security audits and penetration testing
- Anti-virus software installed on all devices with auto-updates
- Systematic review of log files and backup logs to make sure there are no errors
- Remote plans in place, as well as policies regarding remote access
- Physical security
- Lock servers and network equipment
- Have a secure and remote backup solution
- Make sure keys for the network are in a secure location
- Keep computers visible
- Use locks on computer cases
- Perform regular inspections
- Prevent unauthorized users from entering the server room or even in the workstation areas
- Security camera monitoring system
- Keycard system required for secure areas
- Secure Data Policy in place and ensure users understand the policy through training
- Secure trash dumpsters and paper shredders to prevent dumpster diving
- Secure data
- Encryption enabled wherever required
- Secure laptops, mobile devices, and storage devices
- Enable automatic wiping of lost or stolen devices
- Secure Sockets Layer (SSL) in place when using the Internet to ensure secure data transfers
- Secure email gateways ensuring data is emailed securely
- Active monitoring and testing
- Regular monitoring of all aspects of security
- Regularly scheduled security testing
- External penetration testing to ensure your staff hasn’t missed something
- Scanning for data types to make sure they are secure and properly stored
There are three levels of security in an organization. Information Security or InfoSec encompasses everything and refers to the processes and information technology designed to protect any kind of sensitive data and information whether in print or electronic form from unauthorized access.
Cybersecurity is a subset of InfoSec and deals with protecting internet-connected systems including hardware, software, programs, and data from potential cyberattacks. It protects the integrity of networks from unauthorized electronic access.
Cybersecurity is the practice of defending your organization’s networks, computers and data from unauthorized digital access, attack or damage by implementing processes, technologies and practices. There are many sophisticated threats targeting many organizations and it is critical that your infrastructure is secured at all times to prevent a full-scale attack on your network and risk exposing your company’ data and reputation.
Network Security is a subset of cybersecurity and deals with protecting the integrity of any network and data that is being sent through devices in that network. We discussed Network Security in another blog entry, which also includes the Network Security Audit Checklist.
When creating an information systems security program, start with proper governance structure and management systems software. There are many articles on this website about what governance frameworks are, but it is the framework established to ensure that the security strategies align with your business objectives. Governance aligns business and information security, so the teams can efficiently work together. It also defines the roles, responsibilities and accountabilities of each person and ensures that you are meeting compliance.
When security experts are creating policies and procedures for effective information security programs, they use the CIA (confidentiality, integrity and availability) Model as a guide. The components of the CIA Model are Confidentiality, Integrity, and Availability.
Confidentiality: Ensures that information isn’t accessible to unauthorized people-usually by enabling encryption-which is available in many forms.
Integrity: Protects data and systems from being modified by unauthorized people; making sure that data has integrity and wasn’t changed between the time you created it and the time it arrives at its intended party.
Availability: Ensures that authorized people can access the information when needed and that all hardware and software is maintained and updated when necessary.
The CIA Model has become the standard model for keeping your organization secure. The three principles help build a set of security controls to preserve and protect your data.
About Other Cybersecurity Audit Checklists
There are many sources of cybersecurity checklists you can find on the Internet. Some companies are happy to give away their checklists and others charge for them. Some are just the cost of a subscription email in hopes of selling you other products and services down the road.
It really doesn’t hurt to start grabbing some of these security checklists as they are a great place to start developing your own, because you really need to make a checklist of your own. Nobody else has the same configuration of networks, devices, and software that you have.
Those canned lists are merely ballpark ideas of how you should be checking your security, as will the one included in this document.
For your checklist to be effective, you need to take a basic checklist or collection of checklists, put them together, and then add specifics for your environment. Also, because an organization is constantly changing, you will be making changes to it as time goes by. ZenGRC can help streamline the process of creating and updating your information security controls, related objects such as risks, threats, and vulnerabilities, as well as audit and assessment tasks.
You may attend a new class about security that will give you ideas to add to your checklist. Or you may purchase a new firewall or some new anti-virus software that will make you rethink how you do a certain aspect of your checklist. You may also decide that you want to outsource your security checks, although even if you do that, you’ll want to have your own checklist and compare it against what your outsourced consultants use to make sure that they have covered all the bases as well as add things from their checklist to yours.