0% found this document useful (0 votes)
97 views4 pages

SR - No. Audit Checklists Items Interviewed R/Per. Remarks

This document contains an audit checklist of 95 information security items including policies, reports, diagrams, and inventory lists. For each item, it indicates which staff members or roles are responsible for responding including Networks/System/WEB/Hardware/Application Managers, Database Manager, and Network Manager. The checklist will be used to interview responsible parties and record their responses and any remarks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views4 pages

SR - No. Audit Checklists Items Interviewed R/Per. Remarks

This document contains an audit checklist of 95 information security items including policies, reports, diagrams, and inventory lists. For each item, it indicates which staff members or roles are responsible for responding including Networks/System/WEB/Hardware/Application Managers, Database Manager, and Network Manager. The checklist will be used to interview responsible parties and record their responses and any remarks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Sr.No. AUDIT CHECKLISTS ITEMS INTERVIEWED R/Per.

REMARKS
1.         Access Control Policy

2.         Business Continuity & Disaster Recovery Plan

4.         Data Archiving and Retention Policy

5.         Data Destruction and Disposal Policy

6.         Escalation Process

7.         Incident Response Policy

8.         Information Security Policy

10.     Password Policy

12.     User Access Form for Employees

13.     User Access Form for 3rd Parties

14.     Change Management Policy and Process

15.     Backup Management Policy

16.     Last Month’s Incidents Report

17.     HR Processes (Hiring / Termination)

18.     Vulnerability Assessment Reports

19.     Penetration Testing Reports

20.     Incidents Report Last Months

21.     High Level Network Diagrams

22.     Detailed Low Level Network Diagram

23.     Data Flow Diagrams

24.     NTP Diagrams

25.     Access Control Mechanism


Status of Anti Virus (How many Laptops it is present and
26.     how many it is not)
28.     AD Policy

29.     WSUS report

35.     Inventory List of all Network Devices


Servers Complete list of inventory details, OS details,
46.     versions etc
47.     IPSEC Tunnel details
All admin details who is the admin of what thing (DB
54.     Admin, Servers Admin, Network Devices Admin etc)
55.     Network and Security Devices Admins
Wireless Details Where and at what points wireless is
61.     available
64.     Risk Assessment Report

65.     Change Defaults Security Policy

67.     Data Control and Access Policy

68.     Email Policy

69.     Encryption Policy

70.     Internet Usage Policy

72.     Remote Access Policy

73.     Wireless Security Policy

74.     Acceptable Use Policy

76.     Roles and Responsibilities for each personnel is defined

77.     Router Rules Review on regular basis ?


78.     Firewall Rules Review on regular basis ?

80.     Authentication policy

81.     Data Privacy Policy for Employees

82.     Data Privacy Policy for Clients

83.     NDA Forms for employees

84.     NDA Forms for rd Parties

85.     Password / Secret Sharing Form

86.     Change Request Form

87.     Incident Responce Process

90.     System / Server Record Form

93.     SLAs Available or not, with whom?

94.     Running Services Review Process

95.     Running Configurations Review Process


Corresponding Officer
Networks/System/WEB/Application Manager
Networks/System/WEB/Application Manager
Networks/System/WEB/Hardware/Application Manager
Networks/System/WEB/Hardware/Application Manager
Networks/System/WEB/Hardware/Application Manager
Networks/System/WEB/Hardware/Application Manager
Networks/System/WEB/Hardware/Application Manager
Networks/System/WEB/Hardware/Application Manager
Networks/System/WEB/Hardware/Application Manager
Networks/System/WEB/Hardware/Application Manager
Networks/System/WEB/Hardware/Application Manager
Database Manager/Application Manager/Networks
WEB/SYSTEMS/Networks/Application Manager
WEB/SYSTEMS/Networks/Application Manager
Networks/System/WEB/Application Manager
Networks/System/WEB/Application Manager
Networks/System/WEB/Application Manager
Networks/System/WEB/application Manager
Networks/System/WEB/Application Manager
Networks/System/WEB/Application Manager
Networks Manager
Networks/System/WEB/Hardware/Application Manager
Systems/Networks

Networks Manager
Systems/Networks Manager
Network Manager
Networks/System/WEB/Application Manager

Networks/Application Manager
WEB/SYSTEMS/Networks/Application Manager

WEB/SYSTEM/Networks/Application Manager
Networks manager

WEB/SYSTEM/Networks/Application Manager
WEB/SYSTEM/Networks/Application Manager
Networks/System/WEB/Hardware/Application Manager
Networks/Email server admin/System Admin
Networks/System/WEB/Application Manager
Networks/System Manager
Application/Web/networks Manager
Networks Manager
Networks Manager/Application Manager
Networks/System/WEB/Hardware/Application Manager
Networks Manager
Networks Manager
WEB/SYSTEM/Networks/Application Manager
WEB/SYSTEM/Networks/Application Manager
WEB/SYSTEM/Networks/Application Manager
WEB/SYSTEM/Networks/Application Manager
WEB/SYSTEM/Networks/Application Manager
WEB/SYSTEM/Networks/Application Manager
WEB/SYSTEM/Networks/Application Manager
WEB/SYSTEM/Networks/Application Manager
System/Networks Manager
Networks/System/WEB/Application Manager
Networks/System/WEB/Application Manager
Networks/System/WEB/Application Manager

You might also like