- CEO, Compliance Officer, and OpsO: Conduct thorough risk assessment individually; then work together to update the risk matrix and plan implementations to mitigate or improve effectiveness of controls
- Compliance Officer: Conduct thorough security controls assessment with new risk mitigate plan in consideration
- IT Team: Conduct a social engineering exercise to help increase employees' awareness of the risk behind many common actions, habits, and natural tendencies
- IT Team: Conduct technical vulnerability assessment and penetration test
- Compliance Officer: Review access records related to employees who were terminated within last 60 days
- CEO or Delegate: Conduct walk-through exercises for business continuity and disaster recovery plans and evaluate the effectiveness of the planned emergency response actions
- Compliance Officer: Update business continuity plan after walk-through exercises and send copies to key personnel
- Continued:
- IT Team: Conduct comprehensive physical inspection of each workstation
- IT Team: Update requirements in GPOs, browser settings, and firewalls to ensure acceptable cryptographic standards are met by default
- Office Manager: Check fire extinguishers for expiration and acceptable pressure gauge reading
- Office Manager: Update the list of authorized maintenance organizations and personnel
- IT Team: Review warranty and service coverage agreements for information systems
- Compliance Officer: Ensure that system Mean Time Before Fail (MTBF) timelines are covered by warranty or service coverage agreements
- Compliance Officer: Review information systems and data risk or security categorizations. Spot check whether related policies are in place, then update company policies
- Compliance Officer: Request feedback on updated policies from stakeholders and responsible individuals
- Compliance Officer: Conduct company-wide training on policies and procedures
- Compliance Officer: Document and review waivers, exemptions, or exceptions to the security program and the reason for the allowances.
Featured Post
Thinking Out-of-the-Box Does Not Come Out of the Box
Take a step back, change your perspective of the situation, look at the whole picture, and look for what people are ignoring. Think, out-of-...
Wednesday, October 16, 2019
NIST 800-171 Compliance - Yearly Checklist
Every once in a while you’ll need to bring in the big guns. This is one of those times. Company Management plays a key role in the yearly events.
NIST 800-171 Compliance - Quarterly Checklist
Just when you think you’re safe, check again. Complacency kills.
Compliance Officer: Review annual training progress; schedule security training as necessary to ensure all employees meet the requirements.
Compliance Officer: Review annual training progress; schedule security training as necessary to ensure all employees meet the requirements.
- IT Team: Update organizational accounts list; Change organization or service passwords and WiFi pre-shared keys that are older than 120 days old
- IT Team: Review access records for drives and folders that contain CUI, PII, CUI, etc. for the last 90 days
- Compliance Officer or Delegate: Review access records related to employees who were hired within the last 60 days
- IT Team: Review access records and logs related to employees who were terminated within the 60 days; Ensure access records and logs older than 90 days are properly stored in long-term archives
- IT Team: Conduct automated vulnerability assessment on systems that process, store, or transmit sensitive information
- IT Team: Enforce mandated admin account disable for 10%-25% of admin users for 3-7 consecutive days
- IT Team: Review software installed on all systems; remove blacklisted software (games, P2P, VPN, coin miners etc.); ensure required software is installed, and baseline configs are still in place
- Compliance Officer or delegate: Review 25-50% of the Security Policies and note discrepancies or required changes; Record the results of the review so the policies can be updated at the annual review or earlier if necessary
- IT Team: Restore a backup that was conducted within the last 30 days to test the full restoration process, Measure the time it takes to return to full operation
- IT Team: Conduct test restoration of approved randomly chosen essential systems; Update backup inventory listing location, type, coverage, and schedule
- Compliance Officer: Ensure that recovery and restoration actions meet Mean Time to Recovery (MTTR) objectives and that the objectives are reasonable
- Office Manager: Conduct power management test to ensure uninterruptible power supply/systems function properly
- Office Manager: Identify hours that have potential of high risk activity on-site and review 10 hours of surveillance recordings at 5x speed or less
- Continued below:
- IT Team: Update network diagram
- IT Team: Physically check 10% of systems for unapproved peripherals or suspicious devices connected to computers
- IT Team: Review GPO settings for passwords:
- IT / Admin users OU to 60 days
- Domain User OU to 90 days
- Service Accounts OU to 120-365 days"
- IT Team: Update common password list, conduct password hash reviews to ensure these passwords are not used
- IT Provider, Compliance Officer & OpsO: Review user permissions and roles; Ensure they match current job function requirements
- IT Team: Remove temporary or shared accounts that are no longer needed
- IT Team: Verify that technical security controls are functioning. Visit the EICAR website, attempt to log in to applications using guessed credentials, and modify test files on the audited file servers to ensure that audit records are accurate; Make sure logs for all tracked events are aggregated (SIEM) and processed appropriately
- Compliance Officer: Review SIEM tool reports; and evaluate effectiveness of the IT Provider actions
- Operations Officer: Verify the credentials, skills, references for training and certification claims
- Office Manager:Review list of authorized users with physical access to the facility. Review access logs and ensure that only authorized personnel have access to the facility and secure areas
- Data Protection Officer: Review shared documents, company communications, and public announcements to ensure privacy laws are followed
- Compliance Officer: Delete and clean up sensitive or confidential files to ensure only required documents are stored and reduce the footprint of classified documents
NIST 800-171 Compliance - Monthly Checklist
- IT Team: Review employees with Admin Privileges
- IT Team: Review access rights for all users with elevated privileges
- IT Team: Review access records related to users with elevated rights; ensure actions taken are approved and appropriate
- IT Team: Review access records related to employees who were hired within 60 days
- IT Team: Compare the list of employees terminated during last 60 days with a list of current active accounts. Disable any user accounts for terminated employees. Also review list of all system accounts
- IT Team: Review access records related to employees who were terminated within 60 days
- IT Team: Review overall access records and events for drives containing CUI, ensure logging is functioning as expected, and that all user actions on CUI are being tracked and documented
- IT Team: Conduct scan of local network for unknown devices
- IT Team: Ensure necessary updates are completed for all systems that process, store, or transmit CUI
- Compliance Officer: Conduct inventory of hard-copy documents with CUI and compare with previous month's checks to ensure all document copies are destroyed, stored, or delivered appropriately
- IT Team: Sample 10% of systems to ensure backup or alternative systems function properly
- IT Team: Sample 10% of systems to ensure change management policies are valid, that processes are being followed, results of changes are measured, and documentation is complete
- Compliance Officer: Review 75 random hours of surveillance footage at high speed for to ensure that it is functioning as expected during appropriate hours
- IT Team: Review cryptographic connection requirements in GPO, browser settings, and firewall to ensure acceptable standards are met on a sample of 10% of systems
- IT Team: Check hard drive encryption
- Office Manager: Inventory all media containing sensitive or confidential data that is not encrypted. document with reasons for not encrypting it; Determine if stronger protections are available and applicable for each item;
- Compliance Officer: Review files stored in shared drives for sensitive or confidential files
- Compliance Officer: Physically inspect secure areas to ensure locks and protections are in good working order
- Compliance officer: Review all NDAs, ensure they are current, and update as necessary
- IT Team: Bundle all auto generated Antivirus Report tickets for the previous month to compliance check ticket
- IT Team: Verify Group Policy - “gpresult” output on 10% of total workstations; This output should be reported by scripts that run automatically on each workstation. Just review the script output and make sure it's accurate, appropriate, and consistent
- IT Team: Verify Flash is set to "Click to play" on 10% of total workstations
- Compliance Officer: Send email reminder to employees regarding their job related maintenance of required skills and qualifications
- Office Manager: Inventory all plain text media containing sensitive or confidential data with reasons for using lower standards; Determine if stronger protections are available and applicable for each piece of media;
- IT Team: Review sample of 10% of tickets related to servers, firewall, or network architecture. Ensure rollback strategy is being documented in each ticket and that a second individual is reviewing the effectiveness of the changes implemented.
Subscribe to:
Posts (Atom)