Security Governance and Management Scorecard

Similar documents
Certified Information Security Manager (CISM) Course Overview

Changing face of endpoint security

HISPOL The United States House of Representatives Internet/ Intranet Security Policy. CATEGORY: Telecommunications Security

Education Network Security

Audit Logging and Monitoring Procedure Document Number: OIL-IS-PRO-ALM

External Supplier Control Obligations. Cyber Security

The Common Controls Framework BY ADOBE

CYBER SECURITY POLICY REVISION: 12

Information Security Controls Policy

Firewall Configuration and Management Policy

Juniper Vendor Security Requirements

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Daxko s PCI DSS Responsibilities

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

SECURITY & PRIVACY DOCUMENTATION

ASD CERTIFICATION REPORT

CTS performs nightly backups of the Church360 production databases and retains these backups for one month.

CompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ]

Cyber security tips and self-assessment for business

QuickBooks Online Security White Paper July 2017

April Appendix 3. IA System Security. Sida 1 (8)

Altius IT Policy Collection

Forensics and Active Protection

LBI Public Information. Please consider the impact to the environment before printing this.

University of Pittsburgh Security Assessment Questionnaire (v1.7)

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

Pass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output:

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

VMware vcloud Air SOC 1 Control Matrix

Best Practices for Cloud Security at Scale. Phil Rodrigues Security Solutions Architect Amazon Web Services, ANZ

Cyber Security Program

Cybersecurity Overview

Embedding GDPR into the SDLC

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Research Data Security Plan (RDSP) Reviewer Training

SERVICE DESCRIPTION ISO Lex. Certifications

AUTHORITY FOR ELECTRICITY REGULATION

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Welcome! Copyright 2017 MAC. All Rights Reserved.

University of Sunderland Business Assurance PCI Security Policy

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Client Computing Security Standard (CCSS)

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

CS 356 Operating System Security. Fall 2013

Tips for Passing an Audit or Assessment

Outbound and Data Loss Prevention in Today s Enterprise

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Embedding GDPR into the SDLC. Sebastien Deleersnyder Siebe De Roovere

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Payment Card Industry (PCI) Data Security Standard

Security Audit What Why

Twilio cloud communications SECURITY

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager.

MIS5206-Section Protecting Information Assets-Exam 1

Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard

INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK

Managing SaaS risks for cloud customers

Security by Default: Enabling Transformation Through Cyber Resilience

INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA and PACIFIC OFFICE ASIA/PAC RECOMMENDED SECURITY CHECKLIST

Ransomware A case study of the impact, recovery and remediation events

Security Principles for Stratos. Part no. 667/UE/31701/004

Policy. London School of Economics & Political Science. Network Connection IMT. Jethro Perkins. Information Security Manager. Version 1.

ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017

Railroad Infrastructure Security

Safety & Cybersecurity of embedded softwares in product and process

Oracle Data Cloud ( ODC ) Inbound Security Policies

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

security mindfulness dwayne.

Version 1/2018. GDPR Processor Security Controls

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Lakeshore Technical College Official Policy

Threat Modeling for System Builders and System Breakers!! Dan Copyright 2014 Denim Group - All Rights Reserved

Secure Access & SWIFT Customer Security Controls Framework

01.0 Policy Responsibilities and Oversight

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

CYBERSECURITY RISK LOWERING CHECKLIST

NOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY. Addendum No. 1 issued September 7, RFI responses are in red bold print

Building a Resilient Security Posture for Effective Breach Prevention

Information Technology Procedure IT 3.4 IT Configuration Management

Server Security Procedure

Information Security In Pakistan. & Software Security As A Quality Aspect. Nahil Mahmood, Chairman, Pakistan Cyber Security Association (PCSA)

Vendor Security Questionnaire

Oracle Security Products and Their Relationship to EBS. Presented By: Christopher Carriero

ISO27001 Preparing your business with Snare

Threat and Vulnerability Assessment Tool

2017 Annual Meeting of Members and Board of Directors Meeting

The Honest Advantage

t a Foresight Consulting, GPO Box 116, Canberra ACT 2601, AUSTRALIA e foresightconsulting.com.

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

PCI DSS. Compliance and Validation Guide VERSION PCI DSS. Compliance and Validation Guide

Data Privacy Breach Policy and Procedure

Transcription:

Security Governance and Management Scorecard Risk Analysis 1 - Please indicate the status of your risk analysis process. 6 - Documented, enforced, reviewed, and 2 - Are all (Network, Data, Apps, IAM, End User Devices, Servers, Physical) security areas covered in your risk analysis? 3 - Is risk analysis conducted for all significant projects (Application and infrastructure adoption, maintenance, outsourcing, etc.)? 4 - Are risk analysis outcomes clearly communicated to project teams for all significant projects (Application and infrastructure adoption, maintenance, outsourcing, etc.)? 5 - Have responsibility and accountability been clearly established for your risk analysis process? Compliance Management 6 - Please indicate the status of your compliance management process. 6 - Documented, enforced, reviewed, and 7 - Are compliance requirements communicated to relevant staff? 8 - Are explicitly approved exceptions audited, monitored, and reported? 9 - Is compliance promoted and enforced? 10 - Are issues investigated to prevent further offenses? 11 - Have responsibility and accountability been clearly established for your compliance management process?

Auditing 12 - Please indicate the status of your auditing process. 6 - Documented, enforced, reviewed, and 13 - How frequently do you audit for compliance with your security policies and processes? 14 - Do your audits cover all (Network, Data, Apps, IAM, End User Devices, Servers, Physical) areas of security? 15 - Have responsibility and accountability been clearly established for your auditing process? Vulnerability Management 16 - Please indicate the status of your vulnerability management process. 6 - Documented, enforced, reviewed, and 17 - Is vulnerability management applied and enforced in all (Network, Data, Apps, IAM, End User Devices, Servers, Physical) areas of security? 18 - Are security considerations included in project planning and change management processes? 19 - Have responsibility and accountability been clearly established for your vulnerability management process? Event and Incident Management 20 - Please indicate the status of your event and incident management process. 6 - Documented, enforced, reviewed, and 21 - Does your event monitoring include all (Network, Data, Apps, IAM, End User Devices, Servers, Physical) areas of security? 22 - Does your incident management include all (Network, Data, Apps, IAM, End User Devices, Servers, Physical) areas of security?

23 - Have responsibility and accountability been clearly established for your event monitoring? 24 - Have responsibility and accountability been clearly established for your incident management? Security Culture 25 - Do you use a variety of methods in your security awareness training (Instructional events, awareness campaigns, video-based training, etc.)? 26 - Do you assess the effectiveness of end user training through regular testing (Computer-based testing, mock phishing attacks, social engineering efforts, etc.) and follow up with users who fail these tests? 27 - Does your security awareness training cover IAM, data, application, physical, and end user devices security? 28 - Is security awareness training provided to new staff? 29 - How often is security training provided to existing staff? [Single Select: 1 - Rarely or never, 2 - Every two years, 3 - Annually, 4 - Every six months, 5 - Quarterly, 6 - Continuously (e.g., by way of newsletter or e-mail updates, unannounced phishing testing, etc.)] 30 - How often do your system administrators, database administrators, network administrators, and application developers get special security training? [Single Select: 1 - Rarely or never, 2 - Every two years, 3 - Annually, 4 - Every six months, 5 - Quarterly, 6 - Continuously (e.g., by way of newsletter or e-mail updates, unannounced phishing testing, etc.)] 31 - Is special security training for system administrators, database administrators, network administrators, and application developers assessed (By code review, application penetration testing, network/system penetration testing, patch currency reviews, etc.) and the results of these assessments followed up on? 32 - Have responsibility and accountability been clearly established for your security awareness training?

Network Security - Policies And Processes Governance To what extent are the following policies and processes in place for Network Security? 33a - Network segmentation policy 33b - Who is accountable? (leave blank if no one is accountable) 34a - Inbound and outbound traffic control must include IP filtering/traffic-based access control 34b - Who is accountable? (leave blank if no one is accountable) 35a - Complete a security checklist as part of deployment and decommissioning processes 35b - Who is accountable? (leave blank if no one is accountable) 36a - Audit deployed networks to ensure they still meet requirements 36b - Who is accountable? (leave blank if no one is accountable) Host Security for Servers - Policies And Processes Governance To what extent are the following policies and processes in place for Host Security for Servers? 37a - Internal security standards are defined for each platform

37b - Who is accountable? (leave blank if no one is accountable) 38a - Complete security checklist as part of deployment and decommissioning processes 38b - Who is accountable? (leave blank if no one is accountable) 39a - Perform a risk analysis prior to deploying patches/updates 39b - Who is accountable? (leave blank if no one is accountable) 40a - Audit deployed servers to ensure they still meet security requirements 40b - Who is accountable? (leave blank if no one is accountable) End User Devices - Policies And Processes Governance To what extent are the following policies and processes in place for End User Devices security? 41a - Internal security standards defined for each desktop/laptop platform (Mac, Windows, etc.) [Single Select: 1 - Not in place, 2 - Informal policy in place, inconsistently applied, 3 Informal 41b - Who is accountable? (leave blank if no one is accountable) 42a - Internal security standards defined for each tablet or smartphone platform (Android, ios, etc.)

42b - Who is accountable? (leave blank if no one is accountable) 43a - Complete a security checklist as part of deployment and decommissioning processes 43b - Who is accountable? (leave blank if no one is accountable) 44a - Audit deployed devices to ensure they still meet requirements 44b - Who is accountable? (leave blank if no one is accountable) Application Security - Policies And Processes Governance To what extent are the following policies and processes in place for Application Security? 45a - AppDev projects must include countermeasures to STRIDE (S = Spoofing, T = Tampering, R = Repudiation, I = Information disclosure, D = Denial of service, E = Elevation of privelege) 45b - Who is accountable? (leave blank if no one is accountable) 46a - Network and production data segmentation between Dev/Testing and Production environments 46b - Who is accountable? (leave blank if no one is accountable) 47a - Require security testing prior to deployment for custom and commercial off-the-shelf (COTS) apps

47b - Who is accountable? (leave blank if no one is accountable) 48a - Audit deployed apps to ensure they still meet security requirements 48b - Who is accountable? (leave blank if no one is accountable) Data Security - Policies And Processes Governance To what extent are the following policies and processes in place for Data Security? 49a - Security policies for data at rest 49b - Who is accountable? (leave blank if no one is accountable) 50a - Security policies for data in transit 50b - Who is accountable? (leave blank if no one is accountable) 51a - Data classification definitions 51b - Who is accountable? (leave blank if no one is accountable) 52a - Audit data sources to ensure policies are being followed

52b - Who is accountable? (leave blank if no one is accountable) IAM Security - Policies And Processes Governance To what extent are the following policies and processes in place for IAM Security? 53a - Acceptable use policies for IT services 53b - Who is accountable? (leave blank if no one is accountable) 54a - User access levels defined (includes for temporary staff) 54b - Who is accountable? (leave blank if no one is accountable) 55a - Require management signoff for changes to user access rights 55b - Who is accountable? (leave blank if no one is accountable) 56a - Audit user accounts to ensure they still meet requirements 56b - Who is accountable? (leave blank if no one is accountable) Physical Security - Policies And Processes Governance To what extent are the following policies and processes in place for Physical Security? 57a - Before/after hours access policies

57b - Who is accountable? (leave blank if no one is accountable) 58a - Visitor/guest registration and access policies 58b - Who is accountable? (leave blank if no one is accountable) 59a - Incorporate physical security considerations into other processes (Ensure backup tapes can be secured, ensure telecom closets are secure, etc.) 59b - Who is accountable? (leave blank if no one is accountable) 60a - Audit physical security practices to ensure they are being followed 60b - Who is accountable? (leave blank if no one is accountable)