Back to Security Audit

Controls Assessment

Current assets

Assets managed by the IT Department include:

  • On-premises equipment for in-office business needs
  • Employee equipment: end-user devices (desktops/laptops, smartphones), remote workstations, headsets, cables, keyboards, mice, docking stations, surveillance cameras, etc.
  • Management of systems, software, and services: accounting, telecommunication, database, security, ecommerce, and inventory management
  • Internet access
  • Internal network
  • Vendor access management
  • Data center hosting services
  • Data retention and storage
  • Badge readers
  • Legacy system maintenance: end-of-life systems that require human monitoring

Administrative Controls

Least Priviledge
Needs to be implemented; High
Preventative; reduces risk by making sure vendors and non-authorized staff only have access to the assets/data they need to do their jobs
Disaster recovery plans
Needs to be implemented; Medium
Corrective; business continuity to ensure systems are able to run in the event of an incident/there is limited to no loss of productivity downtime/impact to system components, including: computer room environment (air conditioning, power supply, etc.); hardware (servers, employee equipment); connectivity (internal network, wireless); applications (email, electronic data); data and restoration
Password policies
Needs to be implemented; Medium
Preventative; establish password strength rules to improve security/reduce likelihood of account compromise through brute force or dictionary attack techniques
Access control policies
Needs to be implemented; High
Preventative; increase confidentiality and integrity of data
Account management policies
Needs to be implemented; High
Preventative; reduce attack surface and limit overall impact from disgruntled/former employees
Separation of duties
Needs to be implemented; High
Preventative; ensure no one has so much access that they can abuse the system for personal gain

Technical Controls

Firewall
Preventative; firewalls are already in place to filter unwanted/malicious traffic from entering internal network
Intrusion Detection System (IDS)
Detective; allows IT team to identify possible intrusions (e.g., anomalous traffic) quickly
Encryption
Needs to be implemented; Medium
Deterrent; makes confidential information/data more secure (e.g., website payment transactions)
Backups
Needs to be implemented; Medium
Corrective; supports ongoing productivity in the case of an event; aligns to the disaster recovery plan
Password management system
Needs to be implemented; Medium
Corrective; password recovery, reset, lock out notifications
Antivirus (AV) software
Needs to be implemented; High
Corrective; detect and quarantine known threats
Manual monitoring, maintenance, and intervention
Needs to be implemented; Medium
Preventative/corrective; required for legacy systems to identify and mitigate potential threats, risks, and vulnerabilities

Physical Controls

Time-controlled safe
Needs to be implemented; Low
Deterrent; reduce attack surface/impact of physical threats
Adequate lighting
Needs to be implemented; Low
Deterrent; limit “hiding” places to deter threats
Closed-circuit television (CCTV) surveillance
Needs to be implemented; High
Preventative/detective; can reduce risk of certain events; can be used after event for investigation
Locking cabinets (for network gear)
Needs to be implemented; High
Preventative; increase integrity by preventing unauthorized personnel/individuals from physically accessing/modifying network infrastructure gear
Signage indicating alarm service provider
Needs to be implemented; Low
Deterrent; makes the likelihood of a successful attack seem low
Locks
Needs to be implemented; Low
Preventative; physical and digital assets are more secure
Fire detection and prevention (fire alarm, sprinkler system, etc.)
Needs to be implemented; High
Detective/Preventative; detect fire in the toy store’s physical location to prevent damage to inventory, servers, etc.