IT Risk Assessment

SOClogix > IT Risk Assessment
Basic Information – Step 1 of 21

BASIC INFORMATION

OPERATION POLICIES & PROCEDURES

PHYSICAL SECURITY

Check all that apply.

NETWORK CONFIGURATION

Check all that apply.

Check all that apply.

EMAIL CONFIGURATION

TELECOMMUNICATION CONFIGURATION

WIRELESS NETWORK CONFIGURATION

INTERNET OF THINGS (IOT) CONFIGURATION

Check all that apply.

EMPLOYEE ROLES

DATA ACCESS POLICIES

Services such as Active Directory are used to set, authorize, or restrict employee access.Typical techniques include network segmentation and access control lists (ACL) to delineate access rights.

EMPLOYEE TRAINING

ASSET MANAGEMENT

This include workstations, laptops, servers, networking devices, office equipment, etc.

CYBERSECURITY & REGULATORY POLICIES AND PROCEDURES

This includes PCI, FINRA, HIPAA, GDPR, state banking department, etc.A WISP outlines employee requirements or best practices regarding sensitive data.This policy governs the handling of Personally Identifiable Information (PII) by employees and contractors.

RISK MANAGEMENT

This includes the Organization identifying and analyzing potential events that may negatively impact individuals, assets, and/or the environment and making judgments on the Organization’s tolerability.This included categorizing threats and vulnerabilities with the potential to cause a security breach and giving a severity and priority based on the likelihood of occurrence?

POLICIES & PROCEDURES

CYBERSECURITY HISTORY

Check all that apply.

DATA PROTECTION PROCESSES AND PROCEDURES

This data includes Personally Identifiable Information (PII) stored on servers locally or in cloud storage.This includes data transmitted within a private network, or externally to vendors and customers.This process includes electronic waste, archived materials, and printed materials.

PROTECTIVE TECHNOLOGY

AWARENESS TRAINING

Phishing is the act of sending a seemingly official email to maliciously harvest credentials.

NETWORK MONITORING

Penetration tests are used to exploit or discover network weaknesses, and phishing campaigns are used to test user behavior.This includes reviews of access logs, and removable media usage policies.These thresholds are based on network activity baselines. The Organization complies with the time frame to report an incident (successful or unsuccessful) to the appropriate authorities (internal or external).

PATCHING/UPDATES


Loading