The World Bank Technology Risk Checklist | |
From: | Joe Klemmer |
Date: | Sat, 30 Oct 2004 10:56:35 -0400 |
NOTE: The following is quoted from Linux Weekly News (http://lwn.net) subscription section. This issue of LWN's "Weekly Edition" will become publicly accessible on Thursday, November 4th. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- This 31-page document asks a few hundred questions about your security setup. They cover a wide range of topics, including risk management ("Who is responsible for keeping records of cyber intrusions, costs of remediation, response time, and documenting procedures and processes?"), policy management ("Does your information security organization report to the IT organization, or is it a separate organization that maintains its independence and freedom from conflicts of interest?"), cyber intelligence ("When applying a patch to any system vulnerability, do you have a process for verifying the integrity, and testing the proper functioning of the patch?"), access controls ("Do you check for modems attached to PCs, routers, or printers?"), vulnerability testing ("Do your penetration tests encompass social engineering?"), wireless access ("Is someone responsible for tracking the number of employees with WLANs at home?"), and more. http://www.infragard.net/library/pdfs/technologyrisklist.pdf -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- PS: If you have any interest in Linux, open source, Programming or System/Network Security I would highly recommend you subscribe to LWN. The subscription runs $5.00/month.