ers ec u r ity
Cy st
Ch ec kli
m b a t . c o m
Hackerco
Hacker Combat LLC
HACKER COMBAT LLC
This checklist sets out the key issues that a
business should deal with, and which should
be implemented where appropriate across
the entire suite of internal policies.
Types Of Security Policies
Information security policy
Privacy policy
BYOD policy
Remote access policy
Network security policy
Acceptable use/internet access policy
Email and communication policy
Depending on how your policies are structured,
the issues below may appear in one or more of
these policies.
Are your policies checked, updated on a
regular basis, and enforced?
Is there a board member with responsibility
for cyber security?
Does the CISO / Head of Information
Security meet regularly with the board
member responsible for cyber security?
Do you have clear responsibility for
cybersecurity, with clear reporting lines
and decision-making authority?
Do you ensure physical security of
premises?
Do you allocate sufficient budget to
cybersecurity?
Do you subscribe to cybersecurity
updates so that you are aware of
threats?
Do you have an effective breach
response plan, and do you test and
update it regularly?
Do you have appropriate cyberliability
insurance in place?
People
Do you have appropriate mechanisms for
staff to be able to report suspicious emails
quickly and effectively?
Do you train staff on cybersecurity
regularly?
Do you test staff, for example by sending
spoof phishing emails?
Do staff undertake reviews to ensure that
they understand cybersecurity risks, and are
results checked to ensure improvement?
Do you have proper onboarding / off
boarding processes, and are they applied in
practice?
Do your employees understand the risks of
using public WiFi?
Do you conduct appropriate checks on new
employees to understand if they are a
potential security risk?
Hardware, data, encryption
and technology
Is backup data encrypted?
Do you have appropriate mechanisms for securely
sending files?
Do you have a list of servers, and individuals who
are responsible for ensuring that they are up to
date?
Do you have appropriate firewalls and intrusion
detection software?
Do you ensure that test servers are appropriately
configured, and only contain dummy data?
Are your wireless networks appropriately
secured?
Do you have email and internet traffic filtering
software?
Do you regularly check the operating systems,
data and software against a 'good known state'
baseline?
Do you review unsuccessful attacks and probes /
scans?
Do you have a security roadmap, and do you
review it against your overall IT roadmap
regularly?
Do you have hardware and software asset
inventory lists?
Do you have an asset management policy?
Have you classified data by sensitivity and risk?
Do you appropriately limit access to data?
Do you have effective encryption of data at rest,
and is encryption in transit appropriate?
Do you back up data on a regular basis?
Do you have an appropriate patching policy and is
it applied consistently?
If you use automated patching software, do you
conduct periodic checks that it is operating
properly?
Do you have appropriate configuration
management systems in place?
Do you maintain log files for at least a year?
Do you use automated analytics on log files?
Do you have appropriate policies regarding use of
external hard drives or USB drives?
Third Parties
Do you properly understand risks arising
from third party service providers?
Do you undertake appropriate due diligence
before engaging third party service
providers?
Do you assess third parties for cybersecurity
risk?
Do you build appropriate contractual
obligations on third parties to take steps to
keep data secure?
If you use SaaS or cloud storage, do you
have appropriate contractual mechanisms
to be notified quickly of potential security
issues?
Remote Access/BYOD
Do you require multifactor authentication
where appropriate?
Do you allow remote access?
> If so, do you have appropriate software
and controls in place to ensure it is secure?
Do you have appropriate policies to
secure mobile devices?
> Is data encrypted on mobile devices?
> Can mobile devices be remotely wiped?
> If you use BYOD, do you apply appropriate
restrictions to personal use to maintain
security?
> Have you considered the use of secure
areas on BYOD devices?
User Accounts/Passwords
Do you require unique accounts?
Do you require multifactor
authentication where
appropriate?
Do you restrict administrator
accounts to the minimum
necessary?
Do you require strong, hard to
guess passwords?
Do you automatically prevent use
of common passwords?
Source: Globaldatahub
https://globaldatahub.taylorwessing.com/article/cybersecurity-checklist
Hacker Combat LLC