8.4. NGO IT Audit Checklist
8.4. NGO IT Audit Checklist
2 Security Policy
2.1 Information Security Policy & Procedures
4 Personal Security
4.1 Prior to Employment - Terms and Conditions of
Employment
5 Physical Security
5.1 Secure Area
6 Network Security
6.1 Application and Information Access Control -
Sensitive System Isolation
6.2 Encryption
6.4 Monitoring
7 Logical Access
7.1 Identity & Access Management
7.2 Identity Management
8 Operations Management
8.1 Antivirus / End Point Protection
9 Incident Management
9.1 Process & Procedures
Do you work with third parties, such as IT service providers, that have access to
your information?
b) If not, what controls does your organization have in place to monitor and
assess third parties? i.e. Logging of VPN connections, etc.
b) Have formal acceptable use rules been established for assets? Example
assets include data assets, computer equipment, communications equipment,
etc.
c) Do you have formal processes in place for security policy maintenance and
exceptions?
Do you have effective physical access controls (e.g., door locks) in place that
prevent unauthorized access to facilities?
a) How are physical access controls authorized (who is responsible for ensuring
that only appropriate persons have keys or codes to the facility and to
locations within the facility)?
Has antivirus software been deployed and installed on your computers and
supporting systems (e.g., desktops, servers and gateways)?
a) Product installed? Centrally managed? Updated daily?
Is sensitive data encrypted when stored on laptop, desktop and server hard
drives, flash drives, backup tapes, etc.?
i.e. Data at Rest - Is data encrypted on servers? Backups? Mobile devices?
Do you have a mechanism to back up critical IT systems and sensitive data? i.e.
nightly, weekly, quarterly backups? Taken offsite?
a) Have you had to restore files after a systems outage?
Does a Disaster Recovery plan exist for the organization and does it consider
interruption to, or failure of, critical IT systems?
b) Are disaster recovery plans updated at least annually?
c) If not, has the backup and restoration process been tested?
Status
Client Response
Date:
Remark