KEMBAR78
Cyber Security Checklist Sample PDF Report | PDF | Access Control | Computing
0% found this document useful (0 votes)
41 views9 pages

Cyber Security Checklist Sample PDF Report

The Cyber Security Checklist for the Marketing department, conducted by John Jack Daniel on May 11, 2023, scored 89.29% with 6 flagged items and 1 action required. Key issues include the absence of current pictures on ID badges, lack of policies for physical access control, and inadequate password management. Recommendations include updating ID badges, reviewing security policies, conducting employee training, and enhancing password requirements.

Uploaded by

yosef benti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views9 pages

Cyber Security Checklist Sample PDF Report

The Cyber Security Checklist for the Marketing department, conducted by John Jack Daniel on May 11, 2023, scored 89.29% with 6 flagged items and 1 action required. Key issues include the absence of current pictures on ID badges, lack of policies for physical access control, and inadequate password management. Recommendations include updating ID badges, reviewing security policies, conducting employee training, and enhancing password requirements.

Uploaded by

yosef benti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Cyber Security Checklist

Marketing / 11 May 2023 / John Jack Daniel Complete

Score 89.29% Flagged items 6 Actions 1

Department Marketing

Date and Time of Inspection 11.05.2023 17:48 PST

IT Personnel (Full Name) John Jack Daniel

1/9
1.Flaggeditems&Actions

Flagged items & Actions 6 flagged, 1 action

Flagged items 6 flagged, 1 action

Inspection / PEOPLE

Is a current picture part of the ID badge? No

No picture on the ID badge

Photo 1

Inspection / PHYSICAL SECURITY

Do you have policies and procedures that address allowing


authorized and limiting unauthorized physical access to
No
electronic information systems and the facilities in which they
are housed?

Review visitor policies

Inspection / PHYSICAL SECURITY

Are there procedures in place to prevent computers from


No
being left in a loggedon state, however briefly?

Some employees left their PC's unlocked when they left their stations

Inspection / PHYSICAL SECURITY

Are screens automatically locked after 10 minutes idle? No

Change the settings of all PC

Inspection / ACCOUNT AND PASSWORD MANAGEMENT

Do you require and enforce appropriate passwords? No

To Do | Assignee SafetyCulture Staff | Priority Low | Due 18.05.2023 17:53 PST | Created by S
afetyCulture Staff

Change settings for password set up

Inspection / DISASTER RECOVERY

Do you have a procedure for notifying authorities in the case


No
of a disaster or security incident?

Review disaster recovery policies

2/9
Other actions 0 actions

3/9
2.Inspection-89.29%

Inspection 6 flagged, 1 action, 89.29%


2.1.PEOPLE-83.33%

PEOPLE 1 flagged, 83.33%

Does your staff wear ID badges? Yes

Is a current picture part of the ID badge? No

No picture on the ID badge

Photo 1

Are authorized access levels and type (employee, contractor,


Yes
visitor) identified on the badge?

Do you check the credentials of external contractors? Yes

Do you have policies addressing background checks for


Yes
employees and contractors?

Do you have a process for effectively cutting off access to


facilities and information systems when an Yes
employee/contractor terminates employment?
2.2.PHYSICALSECURITY-76.92%

PHYSICAL SECURITY 3 flagged, 76.92%

Do you have policies and procedures that address allowing


authorized and limiting unauthorized physical access to
No
electronic information systems and the facilities in which they
are housed?

Review visitor policies

Does your policies and procedures specify the methods used


to control physical access to your secure areas, such as door
Yes
locks, access control systems, security officers, or video
monitoring?

Is the access to your computing area controlled (single point,


reception or security desk, sign-in/sign-out log, Yes
temporary/visitor badges)?

Are visitors escorted into and out of controlled areas? Yes

Are your PCs inaccessible to unauthorized users (e.g. located


Yes
away from public areas)?

4/9
Is your computing area and equipment physically secured? Yes

Are there procedures in place to prevent computers from


No
being left in a loggedon state, however briefly?

Some employees left their PC's unlocked when they left their stations

Are screens automatically locked after 10 minutes idle? No

Change the settings of all PC

Are modems set to Auto-Answer OFF (not to accept incoming


N/A
calls)?

Do you have procedures for protecting data during equipment


Yes
repairs?

Do you have policies covering laptop security (e.g. cable lock


Yes
or secure storage)?

Do you have an emergency evacuation plan and is it current? Yes

Does your plan identify areas and facilities that needs to be


Yes
sealed off immediately in case of an emergency?

Are key personnel aware of which areas and facilities need to


Yes
be sealed off and how?
2.3.ACCOUNTANDPASSWORDMANAGEMENT-80%

ACCOUNT AND PASSWORD MANAGEMENT 1 flagged, 1 action, 80%

Do you have policies and standards covering electronic


authentication, authorization, and access control of personnel
Yes
and resources to your information systems, applications and
data?

Do you ensure that only authorized personnel have access to


Yes
your computers?

Do you require and enforce appropriate passwords? No

To Do | Assignee SafetyCulture Staff | Priority Low | Due 18.05.2023 17:53 PST | Created by S
afetyCulture Staff

Change settings for password set up

Are your passwords secure (not easy to guess, regularly


Yes
changed, no use of temporary or default passwords)?

Are your computers set up so others cannot view staff


Yes
entering passwords?
2.4.CONFIDENTIALITYOFSENSITIVEDATA-100%
5/9
CONFIDENTIALITY OF SENSITIVE DATA 100%

Do you classify your data, identifying sensitive data versus


Yes
non sensitive?

Are you exercising responsibilities to protect sensitive data


Yes
under your control?

Is the most valuable or sensitive data encrypted? Yes

Do you have a policy for identifying the retention of


Yes
information (both hard and soft copies)?

Do you have procedures in place to deal with credit card


Yes
information?

Do you have procedures covering the management of


Yes
personal private information?

Is there a process for creating retrievable back up and


Yes
archival copies of critical information?

Do you have procedures for disposing of waste material? Yes

Is waste paper binned or shredded? Yes

Is your shred bin locked at all times? Yes

Do your policies for disposing of old computer equipment


protect against loss of data (e.g. by reading old disks and hard Yes
drives)?

Do your disposal procedures identify appropriate technologies


and methods for making hardware and electronic media
Yes
unusable and inaccessible (such as shredding CDs and DVDs,
electronically wiping drives, burning tapes) etc.)?
2.5.DISASTERRECOVERY-90%

DISASTER RECOVERY 1 flagged, 90%

Do you have a current business continuity plan? Yes

Is there a process for creating retrievable back up and


Yes
archival copies of critical information?

Do you have an emergency/incident management


Yes
communications plan?

Do you have a procedure for notifying authorities in the case


No
of a disaster or security incident?

Review disaster recovery policies

6/9
Does your procedure identify who should be contacted,
Yes
including contact information?

Is the contact information sorted and identified by incident


Yes
type?

Does your procedure identify who should make the contacts? Yes

Have you identified who will speak to the press/public in the


Yes
case of an emergency or an incident?

Does your communications plan cover internal


Yes
communications with your employees and their families?

Can emergency procedures be appropriately implemented, as


Yes
needed, by those responsible?
2.6.SECURITYAWARENESS-100%

SECURITY AWARENESS 100%

Are you providing information about computer security to


Yes
your staff?

Do you provide training on a regular recurring basis? Yes

Are employees taught to be alert to possible security


Yes
breaches?

Are your employees taught about keeping their passwords


Yes
secure?

Are your employees able to identify and protect classified


data, including paper documents, removable media, and Yes
electronic documents?

Does your awareness and education plan teach proper


methods for managing credit card data (PCI standards) and
Yes
personal private information (Social security numbers, names,
addresses, phone numbers, etc.)?
2.7.COMPLIANCE-100%

COMPLIANCE 100%

Do you review and revise your security documents, such as:


policies, standards, procedures, and guidelines, on a regular Yes
basis?

Set a meeting with Carl to review security policies

Do you audit your processes and procedures for compliance


Yes
with established policies and standards?

Do you test your disaster plans on a regular basis? Yes

7/9
Does management regularly review lists of individuals with
physical access to sensitive facilities or electronic access to Yes
information systems?
2.8.COMPLETION

COMPLETION

Overall Recommendations

- Replace ID badges with employee photos


- Review security and disaster policies
- Conduct employee training about cyber security policies
- Change password settings (require complex password)

IT Personnel (Name and Signature)

John Jack Daniel


11.05.2023 17:55 PST

8/9
3.Mediasummary

Media summary

Photo 1

9/9

You might also like