IT-Questionnaires AIRES
IT-Questionnaires AIRES
Date 01/00/1900
Note: Gray cells are populated when the completed box is checked on the associated questionnaire.
Scoping/Exam Prep.
IT-Profile
IT-Items Needed
IT-Pre-Exam Update
Tier 1 Review
IT-Anti-Virus & Malware y
IT-Audit Program y
IT-Business Continuity y
IT-Electronic Banking y
IT-Networks y
IT-Policy Checklist y
Tier 2 Review
IT-Firewalls y
IT-IDS-IPS y
IT-Pen Test Review y
IT-Physical & Environmental y
IT-Remote Access y
IT-Routers y
IT-Servers y
IT-Virtualization y
IT-Wireless Networks y
1
Charter Eff. Date 01/00/1900
IT - Profile
Objective: Perform initial assessment of IT services to assist in developing examination scope for the IT rev
Name 0
Asset Size 0
Number of Members 0
Number of Transactional Website Users: 0
COMPLEXITY SCORE: 0
COMPLEXITY RATING: Low
7 Indicate the name of the primary share/loan data processing vendor. N/A
8 How do your members access/perform electronic financial services (select all that apply):
8a Home Banking via Internet Website N/A
8b Audio Response/Phone Based N/A
8c Automatic Teller Machine (ATM) N/A
8d Mobile Banking N/A
8e Kiosk N/A
8f Other N/A
9 What services do you offer electronically (select all that apply):
9a Account Aggregation N/A
9b Account Balance Inquiry N/A
9c Bill Payment N/A
9d Download Account History N/A
9e Electronic Cash N/A
9f Electronic Signature Authentication/Certification N/A
9g e-Statements N/A
9h External Account Transfers N/A
9i Internet Access Services N/A
9j Loan Payments N/A
9k Member Application N/A
9l Merchandise Purchase N/A
9m Merchant Processing Services N/A
9n New Loan N/A
9o New Share Account N/A
9p Remote Deposit Capture N/A
9q Account Share Transfers N/A
9r Share Draft Orders N/A
9s View Account History N/A
Other (please specify) N/A
2
Charter Eff. Date 01/00/1900
IT - Profile
Objective: Perform initial assessment of IT services to assist in developing examination scope for the IT rev
In the event of a disaster, will the credit union communicate with members through a website? N/A
Please provide the date of the last disaster recovery test completed by the credit union. N/A
3
Charter Eff. Date 01/00/1900
IT - Items Needed
Comment to the Credit Union: This is a list of items needed for the IT review. Applicable items
requested for this review are indicated with a "Yes". All items should be available at the start of the
examination. Please number the items to correspond with the numbering system below, provide
electronic versions of documents or reports, and include the lead contact person and phone number in the
comment box. If an item is unavailable, please state why in the comment box.
4
Charter Eff. Date 01/00/1900
IT - Items Needed
Comment to the Credit Union: This is a list of items needed for the IT review. Applicable items
requested for this review are indicated with a "Yes". All items should be available at the start of the
examination. Please number the items to correspond with the numbering system below, provide
electronic versions of documents or reports, and include the lead contact person and phone number in the
comment box. If an item is unavailable, please state why in the comment box.
5
Charter Eff. Date 01/00/1900
IT - Items Needed
Comment to the Credit Union: This is a list of items needed for the IT review. Applicable items
requested for this review are indicated with a "Yes". All items should be available at the start of the
examination. Please number the items to correspond with the numbering system below, provide
electronic versions of documents or reports, and include the lead contact person and phone number in the
comment box. If an item is unavailable, please state why in the comment box.
6
Charter Eff. Date 01/00/1900
IT Pre-Exam Update
Objective: Allow Credit Union IT management to provide an overview of the IT environment prior
to commencement of field exam work.
Question Response
1. What type of data processing system (in-house, on-line, etc.)
does the credit union use? Who is the provider and what version
of the program is the credit union using?
2. Has there been a computer conversion or any substantial
software changes since the last exam? If so, list changes and
dates that changes were made?
3. Describe senior IT management changes, if any, that have
occurred since the last exam. List specific reasons for the
changes and the affected positions.
4. Has the credit union entered into any new IT related contracts
since the last exam? What is the type and nature of the
contract(s)? Do the contracts establish measurable service level
agreements where appropriate? Have the contracts been
reviewed by legal counsel and the technology committee?
10. Does the credit union use virus wall, spam blocking, web
filtering, or enterprise distribution control programs? If so,
describe how these systems are implemented. (e.g. control
workstation content, update virus signatures, scan e-mail, and
monitor internet use) Who is responsible for maintaining and
monitoring these tools? What reporting is regularly made?
7
Charter Eff. Date 01/00/1900
IT Pre-Exam Update
Objective: Allow Credit Union IT management to provide an overview of the IT environment prior
to commencement of field exam work.
Question Response
12. Is a wireless access point to the network in use? If so,
describe your usage of wireless networking and explain how the
wireless networks are secured.
13. Who is granted remote access to the network? List all
remote users, the type of connection (VPN, dial-up modem,
Internet, etc.), and how the remote user access is monitored and
controlled?
14. How often are firewall logs, system audit logs, and network
event logs reviewed? Are log files backed up? Who is
responsible for the reviews, and how are the reviews
documented?
15. Do you have an Intrusion Detection System (IDS) or an
Intrusion Prevention System (IPS)? If so, are the systems being
monitored in-house or externally? What information is regularly
reported?
16. Have there been any IT incidents, intrusions, or attacks since
the last examination? If so, describe what happened. Include the
date and management’s response.
17. Describe back-up procedures and the disaster recovery
testing process. When were disaster plans last tested? Indicate
the scope and results of recent tests. Describe your backup
processing site (e.g. is it a hot site, cold site, dual site, location
by city and state).
Examiner's Comments:
8
Charter Eff. Date 01/00/1900
9
Charter Eff. Date 01/00/1900
Access Controls
23 Are perimeter protections including firewalls, malicious code
prevention (anti-virus), outbound filtering (data leak
prevention - DLP), and security monitoring in place?
24 Do procedures address remote access controls for wireless,
VPN, modems, and Internet-based access?
25 Are there procedures to address the administration and
periodic review of access rights at enrollment, change of
duties, and at employee separation?
26 Are there minimum configuration standards enforced for user
ID and password content?
27 Are user accounts automatically locked until released by an
administrator or delayed access when the maximum number of
unsuccessful attempts is exceeded?
Physical Controls
28 Is access to the data center (computer room) or areas
containing member information adequately controlled?
29 Are areas containing member data or information systems
secured with security devices that provide monitoring and/or
logs of failed and successful access?
10
Charter Eff. Date 01/00/1900
Encryption
34 Does the Risk Assessment, ISP, or other documented
guideline document the minimum encryption standard?
35 Is critical and/or sensitive data in transit encrypted?
36 Is critical and/or sensitive data in storage encrypted?
Change Management
37 Does the credit union have written change management
procedures that address management approval, scheduled
upgrades, testing, and implementation?
38 Does the credit union employ automated processes to update
workstations and servers?
39 Does Management have a formal process to determine the
types of changes to the information system that are allowed?
Monitoring
40 Are the appropriate system logging functions enabled to
capture audit trails related to network components?
41 Has management implemented automated methods to convert
logs with different content and formats to a single standard
format with consistent data field representations?
11
Charter Eff. Date 01/00/1900
Information Destruction
55 Does management sanitize information system media, both
digital and non-digital, prior to disposal, release out of
organizational control, or release for reuse.
Vendor Oversight
56 Is the vendor oversight program appropriate for the size and
complexity of the credit union's outsourced services?
12
Charter Eff. Date 01/00/1900
13
Charter Eff. Date 01/00/1900
14
Charter Eff. Date 01/00/1900
15
Charter Eff. Date 01/00/1900
16
Charter Eff. Date 01/00/1900
IT - Audit Program
Scope: To determine whether Information Technology activities are subject to regular, independent review (internal
and/or external), and whether management is appropriately addressing significant matters resulting from such reviews.
Resources: FFIEC Information Security Handbook and NIST Special Publication 800-12, 800-53, 800-100.
Question Yes/No/NA Comments
Core Review - 8 Questions
Audit Program
1 Does the credit union have policies or procedures in place that
describe how and when independent reviews of IT related
areas will be performed?
2 Is adequate documentation of IT audits maintained?
3 Does the credit union have an internal audit department?
4 Is internal audit involved in auditing the IT area?
4a If no, are external resources used to perform audit of the IT
area?
4b If yes, does the audit staff receive adequate IT training?
5 Is the IT audit function independent and free from influence
by management and/or departments that it audits?
17
Charter Eff. Date 01/00/1900
IT - Audit Program
Scope: To determine whether Information Technology activities are subject to regular, independent review (internal
and/or external), and whether management is appropriately addressing significant matters resulting from such reviews.
Resources: FFIEC Information Security Handbook and NIST Special Publication 800-12, 800-53, 800-100.
Question Yes/No/NA Comments
13 Do audit records of the information system identify, at a
minimum:
13a What type of event occurred?
13b When the event occurred?
13c Where the event occurred?
13d The source of the event?
13e The success or failure of the event?
13f The identity of any user/subject associated with the event?
18
Charter Eff. Date 01/00/1900
19
Charter Eff. Date 01/00/1900
20
Charter Eff. Date 01/00/1900
21
Charter Eff. Date 01/00/1900
IT - Electronic Banking
Scope: To determine whether adequate controls are in place for the credit union to safely deliver electronic banking through multiple
channels such as Internet, mobile devices, and telephone banking.
Resources Used: FFIEC E-banking Booklet, LTCU 05-CU-18 Guidance for Authentication in Internet Banking Environment, LTCU
06-CU-13 Authentication for Internet Based Services, LTCU 11-CU-09 Supplement to Authentication in an Internet Banking
Environment, LTCU 02-CU-17 E-commerce Guide for Credit Unions.
Question Yes/No/NA Comments
Core Review - 12 Questions
Critical E-Banking Controls
1 Has the board approved each electronic banking product or
service offered?
2 Is the credit union utilizing an external vendor to provide the
electronic banking services?
2a If yes, has appropriate due diligence been performed on the
third party electronic banking provider?
3 Does management review external audits or reviews relating
to their electronic banking service?
4 Has management performed a risk assessment to address the
risk of each electronic banking service provided?
5 Has management evaluated E-banking solutions for
compliance with FFIEC authentication guidance?
6 Are appropriate controls in place for personnel with electronic
banking duties (manage/access the system)?
7 Does management adequately monitor system reports for
suspicious or unauthorized access?
8 Do policies, procedures, and/or practices for User IDs and
passwords for E-banking systems address:
8a Strong password selection?
8b Do user names and passwords for electronic payment systems
avoid use of account numbers or personal identifiers such as
social security numbers?
8c Is there a secure process for opening new E-banking accounts?
22
Charter Eff. Date 01/00/1900
IT - Electronic Banking
Scope: To determine whether adequate controls are in place for the credit union to safely deliver electronic banking through multiple
channels such as Internet, mobile devices, and telephone banking.
Resources Used: FFIEC E-banking Booklet, LTCU 05-CU-18 Guidance for Authentication in Internet Banking Environment, LTCU
06-CU-13 Authentication for Internet Based Services, LTCU 11-CU-09 Supplement to Authentication in an Internet Banking
Environment, LTCU 02-CU-17 E-commerce Guide for Credit Unions.
Question Yes/No/NA Comments
14 Does management update the risk assessment at least
annually?
15 Does the risk assessment process address new electronic
banking services prior to implementation?
16 Has management developed a written action plan that includes
a timeline to address any weaknesses identified in existing
electronic banking controls?
17 Does management have documentation to support that it is
working with any applicable technology service providers to
implement the action plan for compliance?
18 Has the credit union implemented appropriate authentication
solution(s) to protect member accounts consistent with LTCUs
05-CU-18 & 11-CU-09?
19 Is the authentication solution required for all member
accounts?
20 Are any identified high-risk accounts and/or transactions
protected by layered security controls?
21 Do layered security controls include anomaly detection and
response:
21a At initial login?
21b At initiation of funds transfers to external parties?
22 Does the fraud detection and monitoring system consider
customer history and behavior to enable a timely and effective
response by the credit union?
23 Is there a monitoring process for account maintenance
activities?
24 Do layered security controls include simple device
identification and/or basic challenge questions?
25 Has management considered the additional layered controls
outlined in the Supplemental Guidance?
26 Does the electronic banking system utilize challenge questions
as part of the authentication solution? If no, skip questions 26
a&b.
26a Has management reviewed the challenge questions and
implemented sophisticated challenge questions?
26b Does the solution refrain from exposing all challenge
questions at the same session?
27 Does the electronic banking system utilize device
identification? If no, skip questions 27 a&b.
27a Does the device authentication solution utilize cookies not
susceptible to copying?
27b Does the device authentication solution creates a complex
digital “fingerprint” by looking at a number of characteristics?
23
Charter Eff. Date 01/00/1900
IT - Electronic Banking
Scope: To determine whether adequate controls are in place for the credit union to safely deliver electronic banking through multiple
channels such as Internet, mobile devices, and telephone banking.
Resources Used: FFIEC E-banking Booklet, LTCU 05-CU-18 Guidance for Authentication in Internet Banking Environment, LTCU
06-CU-13 Authentication for Internet Based Services, LTCU 11-CU-09 Supplement to Authentication in an Internet Banking
Environment, LTCU 02-CU-17 E-commerce Guide for Credit Unions.
Question Yes/No/NA Comments
29 Does the credit union offer commercial deposit accounts? If
not, skip the remainder of this section, the FFIEC
authentication review is complete.
30 Do commercial accounts include a multifactor authentication
solution?
31 Has management considered the layered controls outlined in
the Supplement's appendix?
32 Do commercial accounts controls include multiple user
account profiles?
32a If yes, do transaction audit logs identify the user account
which performed the transaction?
Mobile Banking
33 Does the credit union provide mobile banking services to
members? If no, skip this section.
34 Has management performed a documented risk assessment
prior to implementing the mobile banking service(s) offered?
40 Does the application allow the user to save their user name
and password in the application for automatic login?
24
Charter Eff. Date 01/00/1900
IT - Electronic Banking
Scope: To determine whether adequate controls are in place for the credit union to safely deliver electronic banking through multiple
channels such as Internet, mobile devices, and telephone banking.
Resources Used: FFIEC E-banking Booklet, LTCU 05-CU-18 Guidance for Authentication in Internet Banking Environment, LTCU
06-CU-13 Authentication for Internet Based Services, LTCU 11-CU-09 Supplement to Authentication in an Internet Banking
Environment, LTCU 02-CU-17 E-commerce Guide for Credit Unions.
Question Yes/No/NA Comments
46 Have daily and monthly transaction and dollar limits been put
in place?
46a Has management established criteria to grant and remove
member access for use of the service?
47 If yes, is the access controlled by the system or service,
without employee involvement?
48 Do credit union systems have the ability to identify duplicate
deposit submissions?
Bill Pay Controls
49 Does the credit union provide bill payment services to
members? If no, skip this section.
50 Does the credit union have a written Bill Pay Procedure
Manual that provides guidance to employees?
51 Has management reviewed and adjusted the default bill pay
limits?
52 Do members have to submit a request to be enrolled?
53 Do members receive a Bill Pay Agreement which details their
responsibilities and rights for using the system and all required
consumer compliance disclosures?
53a Is access to the bill pay solution provided to the member after
they sign-in to the online banking?
54 If no, does the bill pay vendor's sign-in process meet required
authentication standards?
55 Are bill pay transactions reviewed and reconciled daily?
E-Statements
56 Does the credit union offer E-Statements? If no skip this
section.
57 Do members have to submit a request to be enrolled?
58 Is the email address provided by the member validated to
complete the enrollment process for e-statements?
59 Are members notified by e-mail that e-statements are available
for review?
60 Do members receive an agreement which details their
responsibilities and rights for using the system and all required
consumer compliance disclosures?
Account Aggregation Controls
61 Does the credit union offer account aggregation services to
members? If no, skip this section.
62 Is the account aggregation service provided by a third party
vendor?
62a Is there a contract in place with the account aggregation
providers which addresses:
62b Liability of the credit union and provider?
62c Statement processor will remain in compliance with legal and
regulatory requirements?
62d The authentication and verification process
25
Charter Eff. Date 01/00/1900
IT - Electronic Banking
Scope: To determine whether adequate controls are in place for the credit union to safely deliver electronic banking through multiple
channels such as Internet, mobile devices, and telephone banking.
Resources Used: FFIEC E-banking Booklet, LTCU 05-CU-18 Guidance for Authentication in Internet Banking Environment, LTCU
06-CU-13 Authentication for Internet Based Services, LTCU 11-CU-09 Supplement to Authentication in an Internet Banking
Environment, LTCU 02-CU-17 E-commerce Guide for Credit Unions.
Question Yes/No/NA Comments
63 Do members have to submit a request to be enrolled?
64 Do members receive an account aggregation agreement which
details their responsibilities and rights for using the service
and all required consumer compliance disclosures?
26
Charter Eff. Date 01/00/1900
IT - Electronic Banking
Scope: To determine whether adequate controls are in place for the credit union to safely deliver electronic banking through multiple
channels such as Internet, mobile devices, and telephone banking.
Resources Used: FFIEC E-banking Booklet, LTCU 05-CU-18 Guidance for Authentication in Internet Banking Environment, LTCU
06-CU-13 Authentication for Internet Based Services, LTCU 11-CU-09 Supplement to Authentication in an Internet Banking
Environment, LTCU 02-CU-17 E-commerce Guide for Credit Unions.
Question Yes/No/NA Comments
Employee Access Controls
84 Are policies and procedures documented to provide employees
with guidance?
85 Does management maintain a complete list of employees who
access or manage the system and the duties each performs?
27
Charter Eff. Date 01/00/1900
IT - Networks
Scope: To review the operational controls and policies in place to secure the network infrastructure.
Resources: NIST Special Publication 800-53, Consensus Audit Guidelines, FFIEC Information Security Booklet.
Questions Yes/No/NA Comment
Core Review - 14 Questions
Critical Network Security Controls
1 Are there written network password policies and/or
procedures? If yes, do they address the following:
1a The expiration period for system passwords?
1b Password length and composition?
1c Additional controls on administrator passwords?
2 Are user accounts disabled for employees who have left the
organization or change job responsibilities?
3 Do contingency measures exist to provide management access
in the event the system administrator is not available?
28
Charter Eff. Date 01/00/1900
IT - Networks
Scope: To review the operational controls and policies in place to secure the network infrastructure.
Resources: NIST Special Publication 800-53, Consensus Audit Guidelines, FFIEC Information Security Booklet.
Questions Yes/No/NA Comment
16a Board of Directors
16b Security Officer
16c IT department
17 Is there a schedule for equipment maintenance or
replacement?
18 Are there policies and procedures in place to ensure adequate
management reporting of problems and resolution?
Network Architecture/Design
19 Is a detailed listing of critical computer equipment and
programs maintained?
20 Has management identified and reviewed network
infrastructure access points and associated risks and
vulnerabilities?
22 Are policies, procedures, and practices in place describing
how the network components (such as network servers, web
servers, transaction servers, application and content servers,
and electronic mail servers) are configured to ensure adequate
security?
23 Are the network services segregated to ensure data integrity
and security (for example, web services and e-mail services
should not be on the same server)?
24 For each network component, does the credit union maintain a
current inventory of the components' specifications (such as
type of server, the operating system, required software,
software version, and the last updates installed)?
Patch/Change Management
28 Does the credit union have written change management
procedures that address management approval, scheduled
upgrades, testing, and implementation?
29 Does the change control documentation provide adequate
audit trails, logs and support for all types of software
modifications?
29
Charter Eff. Date 01/00/1900
IT - Networks
Scope: To review the operational controls and policies in place to secure the network infrastructure.
Resources: NIST Special Publication 800-53, Consensus Audit Guidelines, FFIEC Information Security Booklet.
Questions Yes/No/NA Comment
30 Are there policies and procedures in place to handle
emergency and temporary software fixes as well as new
releases or upgrades?
31 Are policies, procedures, and practices in place to allow the
credit union to restore its previous software versions in the
event a software modification adversely affects one or more
systems?
32 Are policies, procedures, and practices in place to maintain
compatibility throughout the credit union's system
environment?
33 Is there a specific test environment set up, separate from the
production environment to allow for testing patches and
updates without destroying or damaging critical data?
Network Monitoring
34 Do the credit union's policies and procedures establish
network infrastructure performance standards for the
following areas:
34a Target throughput parameters?
34b Hardware monitoring procedures?
34c Transaction volume, response times, and bandwidth
availability vs. bandwidth capacity?
34d System uptime?
35 Does management use automated network system monitoring
tools?
Overall Questionnaire Comments:
30
Charter Eff. Date 01/00/1900
IT - Policy Checklist
Objective: Provide a general list of subjects normally covered in effective IT policies to assist in the
examiner's review and evaluation of credit union IT policies.
Section A: General IT Policies
1 Information security program (risk assessments, tests of controls, training, board reports)
2 Designated security officer responsible for ensuring compliance (Appendix A, RR 748)
3 Physical access controls and environmental controls for the data center
4 System, network, e-mail, and database administration
5 Firewall, router, and server security management
6 Monitoring and backup of firewall and intrusion detection logs
7 Wireless communication
8 System access levels and administrative authorities granted by duty position
9 Password administration for critical systems (network & EDP system logon, home banking)
10 Use of encryption to protect sensitive data
11 Use of modems (these can undermine firewall protection if not properly managed)
12 Remote access for vendors and employees, if applicable
13 Frequency of system patches and updates, logs maintained
14 Virus protection and updates
15 Vulnerability scanning and penetration tests
16 Regulatory compliance of website content, e-forms, e-statements, applications, etc.
17 Vendor management (Procurement, Contract Reviews, Service Level Agreements, Due Diligence Reviews,
Vulnerability Scans, SAS 70s, Business Continuity Tests, etc.)
18 Problem resolution and member service
19 Backup & recovery procedures
20 Testing of business continuity and disaster recovery plans
21 Procedures for disposal of hardware, software, and documents containing sensitive information
Section B: Personnel Policies
22 Acceptable usage of Internet, e-mail, and social media
23 Mobile device usage
24 No expectation of privacy
25 Installation of personal software
26 Prohibited use of e-mail for sending private/confidential information
27 Disciplinary actions to be taken for non-compliance
28 Password protection
29 Information systems security awareness
30 Code of ethics/fraud policy
31 Procedures for removal of systems access upon termination of employment
32 Acknowledgement form(s) to be signed by employees annually
33 Evidence of periodic monitoring of compliance
Section C: IT Security Incident Response Policy
34 Definition of a security incident
35 Containment procedures (isolate, do not use compromised systems)
36 Preservation of evidence (make 2 copies of the hard drive of the compromised system)
37 Contact persons to notify (including FBI or local law enforcement)
38 A formal reporting process (notifying senior management, filing suspicious activity reports)
31
Charter Eff. Date 01/00/1900
IT - Firewalls
Scope: Determine whether the firewall environment has been designed to adequately support the network infrastructure
and whether day-to-day operations promotes the integrity of the firewalls in place.
Resources used: NIST SP 800 - 41, Consensus Audit Guidelines, World Bank Technology Risk Checklist.
Question Yes/No/NA Comment
Core Review- 14 Questions
1 Does management have a formal, documented firewall
configuration management policy that addresses the
following:
1a Purpose
1b Scope
1c Roles
1d Responsibilities
1e Management commitment
1f Coordination among organizational entities
1g Compliance
2 Does the firewall administrator receive adequate training?
3 Does the credit union have a comprehensive list of what
should be allowed/disallowed through the firewall?
4 Is the firewall located in a controlled access area?
5 Is the firewall(s) secured against unauthorized access from the
Internet, Extranet and Intranet users?
6 Are inner firewalls placed around all critical, financial and
transactional systems?
7 Can the firewall be accessed by a secondary IT Committee
member or assigned staff member in an emergency?
32
Charter Eff. Date 01/00/1900
IT - Firewalls
Scope: Determine whether the firewall environment has been designed to adequately support the network infrastructure
and whether day-to-day operations promotes the integrity of the firewalls in place.
Resources used: NIST SP 800 - 41, Consensus Audit Guidelines, World Bank Technology Risk Checklist.
Question Yes/No/NA Comment
16 Does Management configure the firewall to provide only
essential capabilities and specifically prohibits or restricts the
use of management identified functions, ports, protocols,
and/or services such as:
16a IP spoofing attacks?
16b Denial of Service attacks?
16c Programs like finger, whois, tracert and nslookup?
17 Is there a default deny rule?
18 Is the firewall operating system updated regularly?
19 Is the firewall system(s) appropriately configured to protect
the confidentiality and integrity of information at rest, i.e. rule
sets?
20 Is the firewall rule change control process automated?
21 Does the credit union have an automated monitoring system
that provides real-time alerts about firewall configuration
changes?
22 Does the credit union use automated tools to evaluate the
firewall rule set for errors or conflicts after making significant
changes?
23 Do assigned individuals monitor events on the information
system in accordance with Management's organization defined
monitoring objectives and detect information system attacks?
33
Charter Eff. Date 01/00/1900
IT - Firewalls
Scope: Determine whether the firewall environment has been designed to adequately support the network infrastructure
and whether day-to-day operations promotes the integrity of the firewalls in place.
Resources used: NIST SP 800 - 41, Consensus Audit Guidelines, World Bank Technology Risk Checklist.
Question Yes/No/NA Comment
38 Is automatic failover enabled?
Firewall Security Assessment
39 Are vulnerability assessments periodically run on the firewall
to identify open ports and services?
40 Did the last assessment result in a favorable rating?
41 Does management take corrective action on the
recommendations from the assessments?
42 Are external penetration tests attempted after major system
updates?
43 Is there an audit trail of who accesses the firewall
administrative accounts?
44 Are firewall rules, policies, and procedures reviewed at least
annually by a qualified auditor?
45 Is each rule documented sufficiently to allow for review by a
qualified auditor?
46 Is there an audit trail of changes made during the past year?
34
Charter Eff. Date 01/00/1900
IT - Firewalls
Scope: Determine whether the firewall environment has been designed to adequately support the network infrastructure
and whether day-to-day operations promotes the integrity of the firewalls in place.
Resources used: NIST SP 800 - 41, Consensus Audit Guidelines, World Bank Technology Risk Checklist.
Question Yes/No/NA Comment
35
Charter Eff. Date 01/00/1900
IT - IDS / IPS
Scope: Evaluate whether the credit union is adequately securing and monitoring its network environment with an
Intrusion Detection System and/or Intrusion Prevention System to detect potentially harmful network activity.
Resources: NCUA Rules and Regulations Part 748, Appendix A, National Institute of Standards and Technology (NIST)
Special Publication 800-94, Guide to Intrusion Detection and Prevention (IDP) Systems and NIST Special Publication,
800-61, Incident Response.
Question Yes/No/NA Comment
Core Review - 8 Questions
1 Does management have a formal, documented IDS/IPS
management policy that addresses:
1a Risk assessment?
1b Access control?
1c Change management/updates?
1d Log management?
1e Escalation procedures?
2 Is the number and location of the IDS/IPS sensors
appropriate?
3 Is the management of your IDS/IPS outsourced?
4 Is the IDS/IPS system updated on a regular basis?
4a If yes, how often?
5 Are the IDS/IPS reports reviewed periodically by an
employee?
6 How often are reports received and reviewed by an employee?
Configuration Management
15 Are the IDS/IPS configurations processes in line with the
policies and procedures?
36
Charter Eff. Date 01/00/1900
IT - IDS / IPS
Scope: Evaluate whether the credit union is adequately securing and monitoring its network environment with an
Intrusion Detection System and/or Intrusion Prevention System to detect potentially harmful network activity.
Resources: NCUA Rules and Regulations Part 748, Appendix A, National Institute of Standards and Technology (NIST)
Special Publication 800-94, Guide to Intrusion Detection and Prevention (IDP) Systems and NIST Special Publication,
800-61, Incident Response.
Question Yes/No/NA Comment
16 Is there a separation of duties between those who configure the
IDS and those who monitor the IDS?
17 Is the IDS/IPS operating system updated regularly?
18 Does Management ensure the IDS/IPS system maintains an
up-to-date list of attack signatures?
Alerts and Monitoring
19 Are automated, real time alerts in place?
20 Are alerts sent to a centralized logging system?
20a Are alerts parsed using an automated system?
20b How long are the IDS/IPS logs maintained?
21 Are IDS/IPS logs backed up?
22 Is a review of the IDS/IPS alert logs performed daily?
22a If no, how often is the review completed?
23 Is a qualified individual responsible for the regular monitoring
of network traffic for potential intrusions?
Host Based System - Alerts and Monitoring
24 Does the system monitor changes in identified critical
operating system files?
25 Does the system monitor changes in the identified application
files?
26 Does the system monitor administrator activity on critical
servers?
27 Are there separation of duties between server system
administrators and IDS administrators?
Incident Response
28 Does management include dynamic reconfiguration of the
IDS/IPS as part of the incident response capability.
29 Do intrusion detection policies and procedures address
escalation procedures?
30 Do policies and procedures address how and when to notify an
appropriate individual to determine the need to file a
Suspicious Activity Report?
31 Are documented escalation procedures in place based on the
threat-level?
Custom Signatures
32 Does management deploy custom signatures; if no, skip this
section.
33 Is third party or credit union staff trained to add custom
signatures?
34 Are custom signatures approved by management prior to
implementation?
35 Is documentation retained for the approval and change
process?
36 Are custom signatures verified by an independent party and is
documentation retained of the verification?
Business Continuity
37
Charter Eff. Date 01/00/1900
IT - IDS / IPS
Scope: Evaluate whether the credit union is adequately securing and monitoring its network environment with an
Intrusion Detection System and/or Intrusion Prevention System to detect potentially harmful network activity.
Resources: NCUA Rules and Regulations Part 748, Appendix A, National Institute of Standards and Technology (NIST)
Special Publication 800-94, Guide to Intrusion Detection and Prevention (IDP) Systems and NIST Special Publication,
800-61, Incident Response.
Question Yes/No/NA Comment
37 Can the IDS/IPS be quickly reconfigured from backups (e.g.,
to restore a previous configuration)?
38 Is backup recovery of the IDS/IPS tested at least annually?
38
Charter Eff. Date 01/00/1900
39
Charter Eff. Date 01/00/1900
40
Charter Eff. Date 01/00/1900
41
Charter Eff. Date 01/00/1900
42
Charter Eff. Date 01/00/1900
IT - Remote Access
Scope: Determine whether appropriate remote access technologies, policies, procedures, and practices are in place and
the credit union is operating in accordance with policies.
Resources: NIST Special Publications 800-46 and 800-111.
Question Yes/No/NA Comment
Core Review - 6 Questions
1 Has management performed a risk assessment on the use of
remote access to the credit union's systems?
2 Are there policies and procedures in place that address remote
access?
2a Does the policy address controls for vendor remote access?
3 Has remote access been granted based upon job duties and/or
business needs ?
4 Is an appropriate level of authentication in place for remote
access?
5 Is all remote access monitored and logged?
6 Can remote users access or retrieve sensitive or confidential
information residing in the internal network?
6a If yes, is encryption implemented on the remote access
solution?
6b If yes, is the device used for remote access required to have
the same security and encryption standards as devices inside
the network?
Expanded Review - 21 Questions Yes/No/NA Comment
Remote Access Controls
7 Does the credit union have a remote access server?
7a If yes, does the server reside in the DMZ?
7b If yes, does the remote access server host any other services or
applications?
8 Does the credit union use a remote desktop solution?
8a If yes, does the solution enable a direct connection between
the remote user client device and the internal workstation?
43
Charter Eff. Date 01/00/1900
IT - Remote Access
Scope: Determine whether appropriate remote access technologies, policies, procedures, and practices are in place and
the credit union is operating in accordance with policies.
Resources: NIST Special Publications 800-46 and 800-111.
Question Yes/No/NA Comment
15 Is vendor access to the credit union's network for diagnostic
and/or maintenance activities properly restricted?
44
Charter Eff. Date 01/00/1900
IT - Routers
Scope: Determine whether installed routers adequately support the network infrastructure and whether day-to-day
operations promote the integrity of the routers in place.
Resources used: NIST SP 800 - 53, NIST SP 800 - 34, FFIEC Information Security Handbook.
Question Yes/No/NA Comment
Core Review - 10 Questions
1 Does the Information Security Program (ISP)incorporate
router configuration policies?
2 Are baseline configurations maintained for routers within the
information system?
3 Are changes to the router configuration documented and
reviewed by approved individuals?
4 Before changes are made to router configurations, is the
potential security impact considered?
5 Does documentation (i.e. topology maps) exist to identify the
routers existing on the credit union's network?
6 Does documentation exist for the current firmware version
installed on the routers?
7 Is physical access to routers adequately controlled in the main
office and in branches?
8 Is logical access to the routers controlled through the use of
passwords or other means?
9 Is a telnet, SSH, or HTTPS protocol used to maintain the
router?
9a If so, is access granted only to specific workstations on the
internal network side of the router?
10 Is the responsibility for managing the routers assigned to a
specific person or third party?
10a Does the responsible individual or third party have the
requisite knowledge and training to provide router
maintenance and support?
Expanded Review - 21 Questions Yes/No/NA Comment
11 Are default router configurations used, and are they set to
Default/Deny?
12 Has the credit union verified routers are properly configured
for the credit union's system requirements? How has this been
verified?
13 If the router(s) is/are maintained remotely, are communication
links secured?
14 Is router configuration reviewed and retained by independent,
internal employees?
15 Is the router configuration reviewed regularly?
16 Are commented, offline copies of all router configurations
maintained and consistent with the actual configuration
running on the router(s)?
17 Is router log activity monitored and retained?
18 Have backup router configuration files been tested, and how
often?
19 Are there written backup test procedures?
20 Is router log activity monitored?
21 Has the service timestamps command been used to ensure the
complete date and time are stamped onto entries in the routers
buffer log?
45
Charter Eff. Date 01/00/1900
IT - Routers
Scope: Determine whether installed routers adequately support the network infrastructure and whether day-to-day
operations promote the integrity of the routers in place.
Resources used: NIST SP 800 - 53, NIST SP 800 - 34, FFIEC Information Security Handbook.
Question Yes/No/NA Comment
22 Have access list filters been implemented to permit only those
protocols and services that network users really need, and to
explicitly deny everything else?
23 Are router access lists configured to comply with corporate
policy?
24 Have all unused interfaces been shutdown?
25 Are internal addresses allowed to enter the router only from
the internal interfaces?
26 Are illegal addresses blocked at outgoing interfaces?
27 Are packets blocked coming from the outside (untrusted)
network that are obviously fake or commonly used for
attacks?
28 Are incoming packets blocked that claim to have the same
destination and source address?
29 Has SNMP trap authentication been turned off to prevent a
remote SNMP system shutdown request?
30 Do the router(s) prevent forwarding packets with no clear
route (no ip classless)?
31 If not needed, has proxy ARP been disabled on all interfaces?
46
Charter Eff. Date 01/00/1900
IT - Servers
Scope: To evaluate whether general security issues are addressed for critical servers that store or process personal
financial information, such as: Web; email; database; infrastructure management; and file servers.
Resources: NIST SP 800 - 123, Consensus Audit Guidelines.
Question Yes/No/NA Comment
Core Review- 8 Questions
Critical Server Controls
1 Does the credit union identify the purpose of the server?
47
Charter Eff. Date 01/00/1900
IT - Servers
Scope: To evaluate whether general security issues are addressed for critical servers that store or process personal
financial information, such as: Web; email; database; infrastructure management; and file servers.
Resources: NIST SP 800 - 123, Consensus Audit Guidelines.
Question Yes/No/NA Comment
22 Have the following security controls been installed and
configured:
22a Anti-virus and malware detection/prevention software?
22b Host-based intrusion detection and prevention software
(IDPS)?
22c Patch management solution?
22d Disk encryption technologies?
23 Are servers monitored for capacity utilization?
Server Software Security
24 Is there evidence management securely installed server
software?
25 Does the Information Security Program, or any other
management directive, provide guidance on configuring
access controls for critical servers?
26 Does the server OS limit which files can be accessed by the
service processes?
27 Has the server been configured to limit the amount of OS
resources it can consume?
28 Have timeouts been configured?
29 Have the maximum number of open connections been
minimized?
30 Has management implemented authentication and
encryption technologies?
Security Maintenance
31 Have the logging capabilities been identified along with log
monitoring requirements?
32 Are server logs reviewed?
33 Are logs maintained?
34 Are automated log file analysis tools used?
35 Are server backup procedures in place?
36 Are server data backup policies adequate?
37 Are server backup types appropriate?
38 Does the CU maintain a test server?
39 Are procedures adequate to recover from a security
compromise?
Overall Questionnaire Comments:
48
Charter Eff. Date 01/00/1900
IT - Virtualization
Scope: To determine whether appropriate controls and oversight are in place to provide effective operation and security
are in the virtual environment. This questionnaire is focused on VMware as it is the dominant industry solution, however
the concepts in the questions can be posed to all virtualization solutions.
Resources: FFIEC Information Security Handbook, NIST Special Publication 800-53, VMware Security Hardening
Guide.
Question Yes/No/NA Comment
Core Review - 12 Questions
1 Is there a policy in place to address virtualization deployment
and controls?
2 Which types of virtualization are being used by the credit
union?
2a Desktop virtualization
2b Virtual testing environments
2c Presentation virtualization
2d Application virtualization
2e Storage virtualization
3 What type of virtualization software does the credit union use?
49
Charter Eff. Date 01/00/1900
IT - Virtualization
Scope: To determine whether appropriate controls and oversight are in place to provide effective operation and security
are in the virtual environment. This questionnaire is focused on VMware as it is the dominant industry solution, however
the concepts in the questions can be posed to all virtualization solutions.
Resources: FFIEC Information Security Handbook, NIST Special Publication 800-53, VMware Security Hardening
Guide.
Question Yes/No/NA Comment
15 Is there a process for applying patches to dormant machines?
Service Console
22 Is the service console appropriately segmented from the
network by the use of VLANs and/or a single switch and
ports?
23 Is the service console's firewall set to high security (by
default)? If no explain in comment.
24 Do you use the VI client, either connected to the host or
through the service console, to configure or maintain the
server host?
25 Is a directory service such as LDAP or NIS used to define and
authenticate users on the service console instead of local user
accounts?
26 Are user accounts on the service consoles shared?
27 Is remote root access for the service console disabled?
28 Is the SU privilege appropriately restricted? (Enter all
employee names in comment box)?
29 Are password aging and complexity requirements enforced for
any local user accounts?
30 Is the credit union running additional software on the service
console?
31 Are there patching and change management procedures for the
service console?
32 Is there an effective log management program in place for the
virtual environment?
Server Host
33 Are virtual servers labeled to allow accurate identification of
servers?
34 Was the default machine port and machine port group created
during server setup?
50
Charter Eff. Date 01/00/1900
IT - Virtualization
Scope: To determine whether appropriate controls and oversight are in place to provide effective operation and security
are in the virtual environment. This questionnaire is focused on VMware as it is the dominant industry solution, however
the concepts in the questions can be posed to all virtualization solutions.
Resources: FFIEC Information Security Handbook, NIST Special Publication 800-53, VMware Security Hardening
Guide.
Question Yes/No/NA Comment
35 If encryption of VMotion traffic is not used, are networks
using VMotion properly segmented from other networks?
51
Charter Eff. Date 01/00/1900
IT - Wireless Networks
Scope: Review policies/procedures and the adequacy of security and controls being used on the wireless local area
networks (WLANs).
Resources Used: NSA Wireless Security Checklist, NIST SP800-48 , and NIST SP800-97 - Within NIST SP800-48,
Security Checklist (Table 3-3) and the Security Summary (Table 3-4) present guidelines and recommendations for creating
and maintaining a secure 802.11b wireless network.
Question Yes/No/NA Comment
Core Review - 12 Questions
1 Does the credit union have a WLAN usage policy that
specifies which user or departments are authorized to use
WLAN technology and for what purposes?
2 Does the risk assessment process address WLANs?
3 Are wireless users educated about the risks of WLAN
technology and how to mitigate those risks?
4 Did management employ the services of security professionals
to assist with WLAN security issues if the requisite skill sets
are not currently available in the organization?
52
Charter Eff. Date 01/00/1900
IT - Wireless Networks
Scope: Review policies/procedures and the adequacy of security and controls being used on the wireless local area
networks (WLANs).
Resources Used: NSA Wireless Security Checklist, NIST SP800-48 , and NIST SP800-97 - Within NIST SP800-48,
Security Checklist (Table 3-3) and the Security Summary (Table 3-4) present guidelines and recommendations for creating
and maintaining a secure 802.11b wireless network.
Question Yes/No/NA Comment
21 Are wireless access points securely configured as follows:
53
Charter Eff. Date 01/00/1900
IT - Wireless Networks
Scope: Review policies/procedures and the adequacy of security and controls being used on the wireless local area
networks (WLANs).
Resources Used: NSA Wireless Security Checklist, NIST SP800-48 , and NIST SP800-97 - Within NIST SP800-48,
Security Checklist (Table 3-3) and the Security Summary (Table 3-4) present guidelines and recommendations for creating
and maintaining a secure 802.11b wireless network.
Question Yes/No/NA Comment
32 Can the wireless device be accessed by a secondary IT
employee, Supervisory Committee member or assigned staff
member in an emergency?
33 Is the recovery of the wireless appliance tested at least
annually?
34 Is the wireless device on an Uninterruptible Power Supply
(UPS)?
35 Is there a copy of vendor documentation for the devices used
by the CU?
36 Is there a trained backup to the primary WLAN administrator?
54