Computer Security - Checklist


In this chapter, we will discuss on an advanced checklist that we will use in order to educate users and IT staff too, when it comes to any security issues, they should come as natural expressions.

Based on all the chapters and especially on the security policies, the following table has a list of checklist that touches most of the components that have been discussed in this tutorial.

Checklist Status of task
Server Room
Server rack installed properly
Air conditioning present
Temperature monitoring and alarm system is in place
Automatic smoke/fire detection is available
Water entry prevention detector is available
Fire extinguisher is in place
Local LAN wiring is done properly
Business Critical Services
Redundant power supplies are available
RAID systems are available
UPS systems are in place
Emergency systems are in place
Documentation is up to date
Professional support is provided
SLAs are signed
Emergency plan is prepared
Business Internet Account
Redundant lines
Insurance for ICT equipment is available
Information Systems
Server is installed according to the Setup Policies Manuals
Standard GPOs are configured on the Server
System security is done
System documentation is up-to-date
Data backup is configured properly and done regularly according to backup policies
To check proper naming of all computers, network devices to be in line with IT Policy
Standard Whitelist Software to be aligned on all PCs
All PCs in domain system
Administrator privileges are taken from computer users
Program privileges are on minimum needed level
Information Security
Identity and access management is configured
Data access possibilities are minimized to needed level
Virus protection software is installed on each PC
Human Factor
ICT System and email Usage Policy is rolled-out (should be checked as per the disciplinary safeguards)
Staff awareness training is provided regularly
Responsibilities are documented
Maintenance of Information Systems
Security updates are installed on all PC’s
ICT internal alert and notification system is configured
Security update action plan is done
Security update roll out plan is in place
Network IP address schema are in line
Network Security
Firewall access rules and open ports are compliant with the firewall policy
Protection of sensitive information is in place
Restriction of communication services is enabled
VPN is configured properly with the partners
WLAN security is enabled on all WIFI devices
Limited internet access is configured
BYOD regulations are implemented
Network Management
Bandwidth Management System is configured
Network Monitoring System is available
DRP files are up to date

Please keep in mind that this list can be modified according to your company needs and staff too.