Checklist For Client
Checklist For Client
Key Focus: Ensuring that risk is identified, documented, and mitigated, with senior le
involvement in decision-making.
Checklist:
Risk Identification Process: Are security risks actively identified (internal/external) and documented in a risk register?
Risk Mitigation Strategies: Are there action plans for critical risks (e.g., vulnerability management, patching, business continuity
Executive Involvement: Are risk management practices reported to and overseen by executive leadership?
Security Frameworks: Does the organization align with a recognized security framework (e.g., ISO 27005, NIST RMF)?
Third-Party Risk Assessments: Are third-party vendors evaluated for their security posture?
Are there formal procedures for vendor and supply chain risk management?
Verification by customer:
Review the risk register and cross-check if identified risks are tied to security controls.
Secure Configuration
Key Focus: Secure configuration practices should ensure systems are set up secure
exposure to vulnerabilities.
Checklist:
Hardening Guidelines: Are there security baseline configurations (e.g., CIS, NIST) enforced across all systems?
Patching Schedule: Are all systems patched regularly based on the criticality of vulnerabilities?
Unnecessary Services Disabled: Are unused ports, protocols, and services disabled to reduce attack surfaces?
Configuration Management Tools: Are tools (e.g., Puppet, Ansible) used to automate configuration control?
Verification by customer:
Network Security
Key Focus: Design and protect network infrastructure to prevent unauthorized acces
malicious activity.
Checklist:
Segmentation of Critical Assets: Is the network segmented, and are sensitive systems isolated from general access ne
Firewall Rules: Are firewalls configured with least privilege and regularly audited?
Intrusion Detection/Prevention Systems (IDS/IPS): Are they deployed, and are alerts monitored regularly?
Network Traffic Encryption: Is traffic encrypted using strong protocols (e.g., TLS 1.2/1.3)?
Zero Trust Architecture: Is a zero trust model implemented, requiring verification of all access?
Are firewall rules reviewed periodically, and how are changes tracked?
What security measures are in place for internal network traffic (e.g., micro-segmentation)?
Verification by customer:
Security Training Programs: Is mandatory cybersecurity training provided, including for phishing and password polici
Role-Specific Training: Do privileged users receive additional security training tailored to their roles?
Phishing Simulations: Are phishing tests conducted, and are results analyzed for weaknesses?
Security Awareness Metrics: Are there KPIs to track the effectiveness of training (e.g., click rates on phishing simulati
Are users tested on their understanding of data protection and incident reporting?
Verification by customer:
Checklist:
Incident Response Plan (IRP): Is there a documented IRP, and are roles clearly defined?
Incident Detection: Are logs monitored for signs of security incidents? Is SIEM (Security Information and Event Manag
Forensic Readiness: Are systems configured to log and preserve evidence for investigations?
Is incident response automated (e.g., through SOAR platforms) to reduce response times?
Verification by customer :
Asset Management
Key Focus: Identifying and managing the full lifecycle of all information assets within
ensuring visibility and control over assets.
Checklist:
Is there a comprehensive and up-to-date asset inventory that covers hardware, software, and cloud assets?
Are assets categorized by their sensitivity, criticality, and ownership (e.g., high-value vs low-value assets)?
Is there a process for onboarding and offboarding assets, including decommissioning and secure disposal?
How are assets tagged or marked for easy tracking (e.g., using RFID, barcoding, or automated tools)?
How are asset discovery tools (e.g., network scanning, automated discovery systems) used to detect rogue or unmana
Are all endpoints (servers, workstations, IoT devices) visible to the IT/security teams, and are they monitored continuo
Are mobile devices and remote assets accounted for in the asset inventory?
How is software asset management handled, especially with respect to licensing and tracking unauthorized software i
Verification by customer:
MDM Solutions: Is mobile device management enforced for personal and corporate devices?
Data Encryption on Mobile: Are communications and data on mobile devices encrypted?
Mobile Security Policies: Are policies for secure mobile use documented and enforced?
Is mobile app usage controlled, and are apps regularly assessed for security?
Verification by customer:
Remote Working
Key Focus: Secure remote access to company systems, ensuring compliance with in
policies.
Checklist:
Secure Access (VPN, MFA): Is VPN access enforced for remote users, and is MFA required?
Remote Device Management: Are corporate devices remotely monitored and updated?
Zero Trust Policies: Are remote devices treated as untrusted, requiring regular authentication?
Verification:
Media Restrictions: Is the use of USB drives and other removable media restricted by policy or technical controls?
Media Monitoring: Are devices that connect to the network monitored for unauthorized access?
Verification by customer:
Malware Protection
Key Focus: Protect against malware through proactive measures, ensuring systems
infections.
Checklist:
Endpoint Protection Solutions: Is EDR (Endpoint Detection and Response) deployed, and is it regularly updated?
Malware Signature Updates: Are malware signatures and behavioral detection methods updated regularly?
Web Filtering: Are suspicious websites blocked, and are downloads scanned?
Quarantine Policies: Are infected machines isolated from the network to prevent spread?
Verification by customer: