Skip to content

Instantly share code, notes, and snippets.

@WimObiwan
Last active January 5, 2017 14:02
Show Gist options
  • Save WimObiwan/b2f5454857227d93f372e38f7c7af93e to your computer and use it in GitHub Desktop.
Save WimObiwan/b2f5454857227d93f372e38f7c7af93e to your computer and use it in GitHub Desktop.

Security Checklist

B. IT

Items marked without a *: applicable only to internal it.
Items marked with a *: applicable to both customers and internal it.

  • Security:
  • [MANDATORY] No empty/default passwords. *
  • [HIGH] Theft-protection of moving equipment containing data, e.g. corporate laptops/phones
  • [MEDIUM] Only allow access to company VPN using trusted equipment (e.g. corporate laptops).
  • [MEDIUM] Encryption: lock-down as needed of company folders created by custom installers (file-system / registry) *
  • Software:
    • [HIGH] Signing of own binaries/installers/scripts *
    • [HIGH] Follow 3rd party security bulletins (by designated responsible) *
    • [MEDIUM] Versioning of configuration changes *
    • [MEDIUM] Tamper protection of configuration & database changes (fingerprint hashes) *
    • [MEDIUM] Supervised security patching on servers instead of “automatic updates” *
  • Virus/Malware protection:
    • [MANDATORY] Company-wide enforced real-time Anti-virus shield
    • [MANDATORY] Only allow trusted equipment on LAN (no smartphones on Wifi-LAN)
    • [HIGH] Virus-scan on FileServers & wiki’s
    • [HIGH] Virus-scan on every incoming e-mail
    • [HIGH] Separate DMZ for non-trusted equipment (BYOD, supplier/customer equipment, test-platform, ...)
  • Operational:
    • [MANDATORY] No shared credentials/passwords (individual authentication of everyone that can access or change the system) *
    • [MANDATORY] When somebody leaves the company, any shared credentials he/she had access to, MUST be changed *
    • [MANDATORY] Physical security (e.g. locked computer room) *
    • [MANDATORY] Logbook / intervention reports *
    • [HIGH] NT-security (single sign-on) on own software *
    • [HIGH] NT-security for all operational actions (dedicated accounts) + single sign-on *
    • [HIGH] Auditing of operational actions *
    • [HIGH] Auditing of user actions *
    • [MEDIUM] List of approved software *
    • [MEDIUM] Other policies (e.g. connecting personal USB-sticks) *
  • Storage:
    • [HIGH] Custom stored passwords: one-way hashing or irreversible encryption *
    • [LOW] Audit of logging *
  • Privacy:
    • [HIGH] Up-to-date documentation of non-system data (storage & transfers) *
    • [MEDIUM] Custom stored sensitive data (e.g. credit card info): two-way encryption *
    • [MEDIUM] Auditing of data access *
  • External communication: (outside company/customer network)
    • [HIGH] Webservice-APIs: https instead of http *
    • [LOW] Support for signed and/or encrypted e-mails containing test-results / test-reports *
    • [MEDIUM] External VoIP traffic: SIPS / RTPS (VoIP over SSL) *
  • Internal communication: (inside company/customer network)
    • [MEDIUM] strong security (SSL) *
    • [MEDIUM] Webservice-APIs: https instead of http *
    • [LOW] Internal VoIP traffic: SIPS / RTPS (VoIP over SSL) *
  • Legal & Risk:
    • [MANDATORY] Automated off-site backup, periodical restore dry-run *
    • [HIGH] Periodical disaster dry-run (set-up of shadow system with all server side components) *
    • [HIGH] No commercially restricted Freeware/Shareware like winrar, winzip, ... *
    • [HIGH] Up-to-date documentation of 3rd party components/sources with their licenses *
    • [HIGH] Ensure virus-scan on all outgoing software (own software that will be installed at and/or by customers)
    • [MEDIUM] Periodical internal escrow of all software used at top 80% customers
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment