iAuditor Mobile App Preview

Inspection

PEOPLE

Does your staff wear ID badges?

Is a current picture part of the ID badge?

Are authorized access levels and type (employee, contractor, visitor) identified on the badge?

Do you check the credentials of external contractors?

Do you have policies addressing background checks for employees and contractors?

Do you have a process for effectively cutting off access to facilities and information systems when an employee/contractor terminates employment?

PHYSICAL SECURITY

Do you have policies and procedures that address allowing authorized and limiting unauthorized physical access to electronic information systems and the facilities in which they are housed?

Does your policies and procedures specify the methods used to control physical access to your secure areas, such as door locks, access control systems, security officers, or video monitoring?

Is the access to your computing area controlled (single point, reception or security desk, sign-in/sign-out log, temporary/visitor badges)?

Are visitors escorted into and out of controlled areas?

Are your PCs inaccessible to unauthorized users (e.g. located away from public areas)?

Is your computing area and equipment physically secured?

Are there procedures in place to prevent computers from being left in a loggedon state, however briefly?

Are screens automatically locked after 10 minutes idle?

Are modems set to Auto-Answer OFF (not to accept incoming calls)?

Do you have procedures for protecting data during equipment repairs?

Do you have policies covering laptop security (e.g. cable lock or secure storage)?

Do you have an emergency evacuation plan and is it current?

Does your plan identify areas and facilities that needs to be sealed off immediately in case of an emergency?

Are key personnel aware of which areas and facilities need to be sealed off and how?

ACCOUNT AND PASSWORD MANAGEMENT

Do you have policies and standards covering electronic authentication, authorization, and access control of personnel and resources to your information systems, applications and data?

Do you ensure that only authorized personnel have access to your computers?

Do you require and enforce appropriate passwords?

Are your passwords secure (not easy to guess, regularly changed, no use of temporary or default passwords)?

Are your computers set up so others cannot view staff entering passwords?

CONFIDENTIALITY OF SENSITIVE DATA

Do you classify your data, identifying sensitive data versus non sensitive?

Are you exercising responsibilities to protect sensitive data under your control?

Is the most valuable or sensitive data encrypted?

Do you have a policy for identifying the retention of information (both hard and soft copies)?

Do you have procedures in place to deal with credit card information?

Do you have procedures covering the management of personal private information?

Is there a process for creating retrievable back up and archival copies of critical information?

Do you have procedures for disposing of waste material?

Is waste paper binned or shredded?

Is your shred bin locked at all times?

Do your policies for disposing of old computer equipment protect against loss of data (e.g. by reading old disks and hard drives)?

Do your disposal procedures identify appropriate technologies and methods for making hardware and electronic media unusable and inaccessible (such as shredding CDs and DVDs, electronically wiping drives, burning tapes) etc.)?

DISASTER RECOVERY

Do you have a current business continuity plan?

Is there a process for creating retrievable back up and archival copies of critical information?

Do you have an emergency/incident management communications plan?

Do you have a procedure for notifying authorities in the case of a disaster or security incident?

Does your procedure identify who should be contacted, including contact information?

Is the contact information sorted and identified by incident type?

Does your procedure identify who should make the contacts?

Have you identified who will speak to the press/public in the case of an emergency or an incident?

Does your communications plan cover internal communications with your employees and their families?

Can emergency procedures be appropriately implemented, as needed, by those responsible?

SECURITY AWARENESS

Are you providing information about computer security to your staff?

Do you provide training on a regular recurring basis?

Are employees taught to be alert to possible security breaches?

Are your employees taught about keeping their passwords secure?

Are your employees able to identify and protect classified data, including paper documents, removable media, and electronic documents?

Does your awareness and education plan teach proper methods for managing credit card data (PCI standards) and personal private information (Social security numbers, names, addresses, phone numbers, etc.)?

COMPLIANCE

Do you review and revise your security documents, such as: policies, standards, procedures, and guidelines, on a regular basis?

Do you audit your processes and procedures for compliance with established policies and standards?

Do you test your disaster plans on a regular basis?

Does management regularly review lists of individuals with physical access to sensitive facilities or electronic access to information systems?

COMPLETION

Overall Recommendations

IT Personnel (Name and Signature)

Cyber Security Checklist

Created by: SafetyCulture Staff | Industry: General | Downloads: 10

A cyber security checklist helps assess and record the status of cyber security controls within the organization. It is used by IT professionals to secure the workplace and prevent any threats that may take place and hinder operations.

Signup for a free iAuditor account to download and edit this checklist. It will be added to your free account and you will be able to conduct inspections from your mobile device.

Download and edit this free checklist

Browse for other checklists


iauditor logo

The World's #1 Cloud-Based Inspection Software and App

chevron logo
coles logo
emirates logo
overground logo
tesla logo
toyota logo

Inspection

PEOPLE

Does your staff wear ID badges?

Is a current picture part of the ID badge?

Are authorized access levels and type (employee, contractor, visitor) identified on the badge?

Do you check the credentials of external contractors?

Do you have policies addressing background checks for employees and contractors?

Do you have a process for effectively cutting off access to facilities and information systems when an employee/contractor terminates employment?

PHYSICAL SECURITY

Do you have policies and procedures that address allowing authorized and limiting unauthorized physical access to electronic information systems and the facilities in which they are housed?

Does your policies and procedures specify the methods used to control physical access to your secure areas, such as door locks, access control systems, security officers, or video monitoring?

Is the access to your computing area controlled (single point, reception or security desk, sign-in/sign-out log, temporary/visitor badges)?

Are visitors escorted into and out of controlled areas?

Are your PCs inaccessible to unauthorized users (e.g. located away from public areas)?

Is your computing area and equipment physically secured?

Are there procedures in place to prevent computers from being left in a loggedon state, however briefly?

Are screens automatically locked after 10 minutes idle?

Are modems set to Auto-Answer OFF (not to accept incoming calls)?

Do you have procedures for protecting data during equipment repairs?

Do you have policies covering laptop security (e.g. cable lock or secure storage)?

Do you have an emergency evacuation plan and is it current?

Does your plan identify areas and facilities that needs to be sealed off immediately in case of an emergency?

Are key personnel aware of which areas and facilities need to be sealed off and how?

ACCOUNT AND PASSWORD MANAGEMENT

Do you have policies and standards covering electronic authentication, authorization, and access control of personnel and resources to your information systems, applications and data?

Do you ensure that only authorized personnel have access to your computers?

Do you require and enforce appropriate passwords?

Are your passwords secure (not easy to guess, regularly changed, no use of temporary or default passwords)?

Are your computers set up so others cannot view staff entering passwords?

CONFIDENTIALITY OF SENSITIVE DATA

Do you classify your data, identifying sensitive data versus non sensitive?

Are you exercising responsibilities to protect sensitive data under your control?

Is the most valuable or sensitive data encrypted?

Do you have a policy for identifying the retention of information (both hard and soft copies)?

Do you have procedures in place to deal with credit card information?

Do you have procedures covering the management of personal private information?

Is there a process for creating retrievable back up and archival copies of critical information?

Do you have procedures for disposing of waste material?

Is waste paper binned or shredded?

Is your shred bin locked at all times?

Do your policies for disposing of old computer equipment protect against loss of data (e.g. by reading old disks and hard drives)?

Do your disposal procedures identify appropriate technologies and methods for making hardware and electronic media unusable and inaccessible (such as shredding CDs and DVDs, electronically wiping drives, burning tapes) etc.)?

DISASTER RECOVERY

Do you have a current business continuity plan?

Is there a process for creating retrievable back up and archival copies of critical information?

Do you have an emergency/incident management communications plan?

Do you have a procedure for notifying authorities in the case of a disaster or security incident?

Does your procedure identify who should be contacted, including contact information?

Is the contact information sorted and identified by incident type?

Does your procedure identify who should make the contacts?

Have you identified who will speak to the press/public in the case of an emergency or an incident?

Does your communications plan cover internal communications with your employees and their families?

Can emergency procedures be appropriately implemented, as needed, by those responsible?

SECURITY AWARENESS

Are you providing information about computer security to your staff?

Do you provide training on a regular recurring basis?

Are employees taught to be alert to possible security breaches?

Are your employees taught about keeping their passwords secure?

Are your employees able to identify and protect classified data, including paper documents, removable media, and electronic documents?

Does your awareness and education plan teach proper methods for managing credit card data (PCI standards) and personal private information (Social security numbers, names, addresses, phone numbers, etc.)?

COMPLIANCE

Do you review and revise your security documents, such as: policies, standards, procedures, and guidelines, on a regular basis?

Do you audit your processes and procedures for compliance with established policies and standards?

Do you test your disaster plans on a regular basis?

Does management regularly review lists of individuals with physical access to sensitive facilities or electronic access to information systems?

COMPLETION

Overall Recommendations

IT Personnel (Name and Signature)