Title Page

  • Site conducted

  • Conducted on

  • Prepared by

  • Location

Audit

Access control. Objective: To limit access to information and information processing facilities.

  • Access control policy. Is an access control policy established, documented and reviewed based on business and information security requirements.<br>

  • Access to networks and network services. Are users only be provided with access to the network and network services that they have been specifically authorised to use<br>

User access management. To ensure authorised user access and to prevent unauthorised access to systems and services.

  • User registration and de­registration. Is a formal user registration and de­registration process shall be implemented to enable assignment of access rights.<br>

  • User access provisioning. Is a formal user access provisioning process shall be implemented to assign or revoke access rights for all user types to all systems and services.<br>

  • Management of privileged access rights. Is the allocation of secret authentication information controlled through a formal management process.

  • Management of secret authentication information of users. Does management review users’ access rights at regular intervals using a formal process?

  • Review of user access rights. Do asset owners review users’ access rights at regular intervals

  • Removal or adjustment of access rights. Do the access rights of all employees and external party users to information and information processing facilities shall be removed upon termination of their employment, contract or agreement, or adjusted upon change.<br>

User responsibilities. To make users accountable for safeguarding their authentication information.

  • Use of secret authentication information. Are users required to follow the organisation’s practices in the use of secret authentication information.<br>

System and application access control. To prevent unauthorised access to systems and applications.

  • Information access restriction. Is access to information and application system functions shall be restricted in accordance with the access control policy.

  • Secure log­on procedures. Where required by the access control policy, is access to systems and applications controlled by a secure log-on procedure.

  • Password management system. Are password management systems interactive and ensure quality passwords.

  • Use of privileged utility programs. Does the use of utility programs that might be capable of overriding system and application controls restricted and tightly controlled.<br>

  • Access control to program source code. Is access to program source code restricted.

The templates available in our Public Library have been created by our customers and employees to help get you started using SafetyCulture's solutions. The templates are intended to be used as hypothetical examples only and should not be used as a substitute for professional advice. You should seek your own professional advice to determine if the use of a template is permissible in your workplace or jurisdiction. You should independently determine whether the template is suitable for your circumstances.