计算机安全 – 清单
计算机安全 – 清单
在本章中,我们将讨论一个高级检查表,我们将使用它来教育用户和 IT 人员,当涉及到任何安全问题时,它们应该是自然的表达。
基于所有章节,尤其是安全策略,下表列出了一份清单,其中涉及本教程中讨论的大多数组件。
Checklist | 任务状态 |
---|---|
Server Room | |
Server rack installed properly | |
Air conditioning present | |
Temperature monitoring and alarm system is in place | |
Automatic smoke/fire detection is available | |
Water entry prevention detector is available | |
Fire extinguisher is in place | |
Local LAN wiring is done properly | |
Business Critical Services | |
Redundant power supplies are available | |
RAID systems are available | |
UPS systems are in place | |
Emergency systems are in place | |
Documentation is up to date | |
Professional support is provided | |
SLAs are signed | |
Emergency plan is prepared | |
Business Internet Account | |
Redundant lines | |
Insurance for ICT equipment is available | |
Information Systems | |
Server is installed according to the Setup Policies Manuals | |
Standard GPOs are configured on the Server | |
System security is done | |
System documentation is up-to-date | |
Data backup is configured properly and done regularly according to backup policies | |
To check proper naming of all computers, network devices to be in line with IT Policy | |
Standard Whitelist Software to be aligned on all PCs | |
All PCs in domain system | |
Administrator privileges are taken from computer users | |
Program privileges are on minimum needed level | |
Information Security | |
Identity and access management is configured | |
Data access possibilities are minimized to needed level | |
Virus protection software is installed on each PC | |
Human Factor | |
ICT System and email Usage Policy is rolled-out (should be checked as per the disciplinary safeguards) | |
Staff awareness training is provided regularly | |
Responsibilities are documented | |
Maintenance of Information Systems | |
Security updates are installed on all PC’s | |
ICT internal alert and notification system is configured | |
Security update action plan is done | |
Security update roll out plan is in place | |
General | |
Network IP address schema are in line | |
Network Security | |
Firewall access rules and open ports are compliant with the firewall policy | |
Protection of sensitive information is in place | |
Restriction of communication services is enabled | |
VPN is configured properly with the partners | |
WLAN security is enabled on all WIFI devices | |
Limited internet access is configured | |
BYOD regulations are implemented | |
Network Management | |
Bandwidth Management System is configured | |
Network Monitoring System is available | |
DRP files are up to date |
请记住,此列表也可以根据贵公司的需要和员工进行修改。