📜  计算机安全-清单

📅  最后修改于: 2020-12-07 05:32:52             🧑  作者: Mango


在本章中,我们将讨论一个高级清单,我们还将使用该清单来教育用户和IT员工,当涉及到任何安全问题时,它们应该作为自然的表达。

基于所有章节,尤其是基于安全策略,下表列出了与本教程中讨论的大多数组件相关的清单。

Checklist Status of task
Server Room
Server rack installed properly
Air conditioning present
Temperature monitoring and alarm system is in place
Automatic smoke/fire detection is available
Water entry prevention detector is available
Fire extinguisher is in place
Local LAN wiring is done properly
Business Critical Services
Redundant power supplies are available
RAID systems are available
UPS systems are in place
Emergency systems are in place
Documentation is up to date
Professional support is provided
SLAs are signed
Emergency plan is prepared
Business Internet Account
Redundant lines
Insurance for ICT equipment is available
Information Systems
Server is installed according to the Setup Policies Manuals
Standard GPOs are configured on the Server
System security is done
System documentation is up-to-date
Data backup is configured properly and done regularly according to backup policies
To check proper naming of all computers, network devices to be in line with IT Policy
Standard Whitelist Software to be aligned on all PCs
All PCs in domain system
Administrator privileges are taken from computer users
Program privileges are on minimum needed level
Information Security
Identity and access management is configured
Data access possibilities are minimized to needed level
Virus protection software is installed on each PC
Human Factor
ICT System and email Usage Policy is rolled-out (should be checked as per the disciplinary safeguards)
Staff awareness training is provided regularly
Responsibilities are documented
Maintenance of Information Systems
Security updates are installed on all PC’s
ICT internal alert and notification system is configured
Security update action plan is done
Security update roll out plan is in place
General
Network IP address schema are in line
Network Security
Firewall access rules and open ports are compliant with the firewall policy
Protection of sensitive information is in place
Restriction of communication services is enabled
VPN is configured properly with the partners
WLAN security is enabled on all WIFI devices
Limited internet access is configured
BYOD regulations are implemented
Network Management
Bandwidth Management System is configured
Network Monitoring System is available
DRP files are up to date

请记住,此列表也可以根据您公司的需求和员工进行修改。