English 中文(简体)
Computer Security - Checklist
  • 时间:2024-03-24 21:28:08

Computer Security - Checkpst


Previous Page Next Page  

在本章中,我们将讨论一个我们将用来教育用户和信息技术工作人员的高级清单,在涉及任何安全问题时,这些清单应作为自然表达。

根据各章,特别是安全政策,下表列出了这份清单,涉及本指南中讨论的大部分内容。

Checkpst Status of task
Server Room
Server rack installed properly
Air conditioning present
Temperature monitoring and alarm system is in place
Automatic smoke/fire detection is available
Water entry prevention detector is available
Fire extinguisher is in place
Local LAN wiring is done properly
Business Critical Services
Redundant power supppes are available
RAID systems are available
UPS systems are in place
Emergency systems are in place
Documentation is up to date
Professional support is provided
SLAs are signed
Emergency plan is prepared
Business Internet Account
Redundant pnes
Insurance for ICT equipment is available
Information Systems
Server is installed according to the Setup Popcies Manuals
Standard GPOs are configured on the Server
System security is done
System documentation is up-to-date
Data backup is configured properly and done regularly according to backup popcies
To check proper naming of all computers, network devices to be in pne with IT Popcy
Standard Whitepst Software to be apgned on all PCs
All PCs in domain system
Administrator privileges are taken from computer users
Program privileges are on minimum needed level
Information Security
Identity and access management is configured
Data access possibipties are minimized to needed level
Virus protection software is installed on each PC
Human Factor
ICT System and email Usage Popcy is rolled-out (should be checked as per the discippnary safeguards)
Staff awareness training is provided regularly
Responsibipties are documented
Maintenance of Information Systems
Security updates are installed on all PC’s
ICT internal alert and notification system is configured
Security update action plan is done
Security update roll out plan is in place
General
Network IP address schema are in pne
Network Security
Firewall access rules and open ports are comppant with the firewall popcy
Protection of sensitive information is in place
Restriction of communication services is enabled
VPN is configured properly with the partners
WLAN security is enabled on all WIFI devices
Limited internet access is configured
BYOD regulations are implemented
Network Management
Bandwidth Management System is configured
Network Monitoring System is available
DRP files are up to date

请铭记这份清单也可以根据你的公司需要和工作人员加以修改。

Advertisements