http://www.utah.gov/beready/business/documents/BRUCyberSecurityChecklist.pdf
This is a simple checklist designed to identify and document the existence and status for a recommended basic set of cyber security controls (policies, standards, and procedures) for an organization. Security controls are designed to reduce and/or eliminate the identified threat/vulnerabilities that place an organization at risk.
PERSONNEL SECURITY Yes No
PHYSICAL SECURITY Yes No
- Are visitors escorted into and out of controlled areas? ○ ○
- Are your PCs inaccessible to unauthorized users (e.g. located away from public areas)?
- Is your computing area and equipment physically secured? ○ ○
- Are there procedures in place to prevent computers from being left in a logged- on state, however briefly?
- Are screens automatically locked after 10 minutes idle? ○ ○
- Are modems set to Auto-Answer OFF (not to accept incoming calls)? ○ ○
- Do you have procedures for protecting data during equipment repairs? ○ ○
- Do you have policies covering laptop security (e.g. cable lock or secure storage)?
- Do you have an emergency evacuation plan and is it current? ○ ○
- Does your plan identify areas and facilities that need to be sealed off immediately in case of an emergency?
- Are key personnel aware of which areas and facilities need to be sealed off and how?
ACCOUNT AND PASSWORD MANAGEMENT Yes No
CONFIDENTIALITY OF SENSITIVE DATA Yes No
- Are you exercising responsibilities to protect sensitive data under your control? ○ ○
- Is the most valuable or sensitive data encrypted? ○ ○
- Do you have a policy for identifying the retention of information (both hard and soft copies)?
- Do you have procedures in place to deal with credit card information? ○ ○
- Do you have procedures covering the management of personal private information?
- Is there a process for creating retrievable back up and archival copies of critical information?
- Do you have procedures for disposing of waste material? ○ ○
- Is waste paper binned or shredded? ○ ○
- Is your shred bin locked at all times? ○ ○
- Do your policies for disposing of old computer equipment protect against loss of data (e.g.. by reading old disks and hard drives)?
- Do your disposal procedures identify appropriate technologies and methods for making hardware and electronic media unusable and inaccessible (such as shredding CDs and DVDs, electronically wiping drives, burning tapes) etc.)?
DISASTER RECOVERY Yes No
- Do you have a current business continuity plan? ○ ○
- Is there a process for creating retrievable back up and archival copies of critical information?
- Do you have an emergency/incident management communications plan? ○ ○
- Do you have a procedure for notifying authorities in the case of a disaster or security incident?
- Does your procedure identify who should be contacted, including contact information?
- Is the contact information sorted and identified by incident type? ○ ○
- Does your procedure identify who should make the contacts? ○ ○
SECURITY AWARENESS AND EDUCATION Yes No
COMPLIANCE AND AUDIT Yes No
Checklist Response Analysis
For each question that is marked “No,” carefully review its applicability to your organization. Implementing or improving controls decreases potential exposure to threats/vulnerabilities that may seriously impact the ability to successfully operate.