Paper Cyber Security Program Audit Checklist
Paper Cyber Security Program Audit Checklist
(Version 1.1)
Notes:
Primatech grants a non-exclusive license at no cost to companies who wish to use this
checklist to assist in assessing their own internal cyber security programs. The use of
this checklist for other purposes is prohibited.
Primatech makes no warranties, express or implied, for this checklist and accepts no
liabilities for its use.
This checklist has been organized according to a variety of categories. For consistency,
and more easily understood results, questions are phrased so that all “No” answers are
exceptions.
1.0 Connectivity
1.7 Are dedicated connections to other computer systems avoided where possible?
2.1 Are there policies and procedures to ensure there are no unattended, unsecure
workstations?
2.3 Are computer facilities located away from the facility perimeter?
3.3 Does the account management program employ minimum necessary access
privileges?
5.0 Backups
6.3 Are system vulnerability checks run after installation and maintenance work?
6.10 Are precautions taken against war dialing and war driving?
12.3 Are company newsletters, press releases, and articles screened for security
violations?
12.7 Do vendors control access to hardware and software design and operation
information?
13.3 Does the CSRA reflect the system as actually configured and operated?
14.7 Are cyber security procedures readily accessible by the people who need to use
them?
16.0 Contractors
17.1 Are cyber security systems properly designed, installed, operated, maintained,
inspected and tested?
18.1 Are the possible security impacts of changes in the system considered in a
management of change program?
18.4 Are suitable methods used to evaluate the impact of changes on cyber security?
19.2 Are suspicious events and breaches of the cyber security program reported and
investigated?
20.6 Are there emergency backups for support systems and utilities?