| |
Information Type: Company-Wide Sample Format
STE - Strawman Security, Test, and Evaluation
This document is very detailed and when completed will provide
a complete Security, Test and Evaluation of your company information security.
For obvious reasons "Complete with Purchase" has been inserted in most
of the document.
Method
A - ANALYSIS
I – INSPECTION
T - TEST
D - DEMO
Hardware Utilization
1.
|
Are operations monitored for compliance with schedule for:
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
c.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
d.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
e.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
2.
|
Are all periods of downtime verified?
|
Y
|
N
|
NA
|
I
|
3.
|
Is a Standard Operating Procedure (SOP) manual used for configuring
the system/network hardware for secure operations?
|
Y
|
N
|
NA
|
I
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
A
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
A
|
|
c.
|
Complete with Purchase
|
Y
|
N
|
NA
|
A
|
Remote Terminals (Thin Clients - CITRIX)
4.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, D, T
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
5.
|
Complete with Purchase
|
Y
|
N
|
NA
|
A, T
|
6.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, D
|
7.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
8.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
9.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
10.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
11.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
12.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, D, T
|
13.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
14.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
15.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
16.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
Access Control - Network
17.
|
Is access to programs and software systems restricted to a
need-to-know basis by file passwords and file permissions?
|
Y
|
N
|
NA
|
I, D, T
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
|
18.
|
Are data bases, files or data sets subjected to data integrity and/or
segregation requirements, so that individual access is controllable?
|
Y
|
N
|
NA
|
I
|
19.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
20.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, D
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, D
|
21.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
22.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
23.
|
Are passwords or similar access controls changed or deleted for an
individual user when:
|
|
|
|
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
c.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
24.
|
Whenever more than one site is involved in a network, are other sites
notified when one of the conditions in 23a., b., c. occur?
|
Y
|
N
|
NA
|
I
|
25.
|
Have persons using access controls been instructed on the regulations
pertaining to their responsibilities of the security of ADP information?
|
Y
|
N
|
NA
|
I
|
26.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
27.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
28.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
29.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
30.
|
Where applicable, is a network access revalidation performed at least
annually?
|
Y
|
N
|
NA
|
I
|
31.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, D, T
|
32.
|
Do local procedures require that a system access and activity be
monitored (audit trail)?
|
Y
|
N
|
NA
|
I, D, T
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, D, T
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
33.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
34.
|
Can passwords be seen during log-in?
|
Y
|
N
|
NA
|
I, T
|
35.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
36.
|
Is the operating system software protected and controlled against
unauthorized modification?
|
Y
|
N
|
NA
|
I
|
37.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
c.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
ADP Products
38.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
39.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
40.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
41.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
42.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
43.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
44.
|
Do policies make the user responsible for reporting all security
discrepancies or incidents to the CFM, CSO, CIO, CFO, CEO or their
designated representative?
|
Y
|
N
|
NA
|
I, A
|
45.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
46.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
47.
|
When privileged instructions (supervisory, master mode, or control
state instructions) are used:
|
Y
|
N
|
NA
|
I
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
48.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
49.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
Magnetic Media
50.
|
Is there a procedure for accounting for all:
|
|
|
|
|
|
a.
|
Fixed mass storage media (disk, core, system files)?
|
Y
|
N
|
NA
|
I, A
|
|
b.
|
Removable mass storage media (disk, tape)?
|
Y
|
N
|
NA
|
I, A
|
51.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
52.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
53.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
54.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, A, D
|
55.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
56.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
Clearing and Declassification of company data
57.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, A, D
|
58.
|
Are the necessary programs, equipment, and procedures available and
adequate for the clearing of Automatic Data Processing Equipment (ADPE)?
|
Y
|
N
|
NA
|
I, A, D
|
59.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
60.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
61.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
Application Programs
62.
|
Are programming changes and maintenance well controlled and
documented?
|
Y
|
N
|
NA
|
I
|
63.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
64.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
Communications Security (COMSEC)
65.
|
Do all communications links meet... Complete with Purchase
|
Y
|
N
|
NA
|
I
|
66.
|
Is there a positive... Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
67.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
Physical-Personnel Information Access Control
68.
|
Is access to the computer facility restricted to selected personnel
who have a justifiable need to be there?
|
Y
|
N
|
NA
|
I
|
69.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
70.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
71.
|
Are escorts provided for maintenance personnel who are not
appropriately cleared?
|
Y
|
N
|
NA
|
I
|
72.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
73.
|
Complete with Purchase
|
Y
|
N
|
NA
|
T
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, D, T
|
74.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
People - Organization
75.
|
Have individuals been designated to be responsible for computer
security?
|
Y
|
N
|
NA
|
I
|
76.
|
Complete with Purchase
|
|
|
|
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
77.
|
Are individuals in positions to commit errors or perpetrate
irregularities not in a position which would enable them to conceal the
errors or irregularities?
|
Y
|
N
|
NA
|
I
|
78.
|
Is there an active Education, Training and Awareness Program?
|
Y
|
N
|
NA
|
I
|
79.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
80.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T, D
|
Configuration Management
81.
|
Is the security hardware and software configuration recorded for:
|
|
|
|
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
82.
|
Is approval required for hardware and software configuration changes?
|
Y
|
N
|
NA
|
I
|
Network Security
83.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
84.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
a.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
|
b.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
85.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
86.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
87.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
88.
|
Did the Network Manager (NM) approve the initial connection and continued operation of
remote terminals and workstations?
|
Y
|
N
|
NA
|
I
|
89.
|
Did the NM conduct a network risk analysis?
|
Y
|
N
|
NA
|
I
|
90
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
91.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
92.
|
Does the NM recertify the adequacy of network security at least every
three years or upon significant modification?
|
Y
|
N
|
NA
|
I
|
93.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
94.
|
Is all network security training documented?
|
Y
|
N
|
NA
|
I
|
95.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
96.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
97.
|
Is the Network Security Officer (NSO) appointed in writing for all
remote areas NOT under the NSMs management control?
|
Y
|
N
|
NA
|
I
|
98.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I, T
|
99.
|
Complete with Purchase
|
Y
|
N
|
NA
|
I
|
File Owner: Jim Tracy
Organization: INTEK
Phone: (314) 596-8750
E-mail: jimt@intek.net
Date Last Reviewed: NOV 2002
For the "Do it yourself folks" get the
"Complete Security Planning Package". Get all three templates
ready for your Information Technology experts to fill-in the blanks and answer
the questions. Network Security Plan, Risk Analysis Assessment and
Security Test and Evaluation,- $1,250.00 - Purchase any one template for
$500.00 each.
BACK
|