0% found this document useful (0 votes)
13 views42 pages

Final Recommendation

Uploaded by

pandeysudhish390
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views42 pages

Final Recommendation

Uploaded by

pandeysudhish390
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 42

MAHAKUMBH

Cyber Security
Readiness Assessment Final Recommendation
Confidential

Version 1.0

TLP: Red
Document ID: MAHAKUMBH-CSRA-FR-001-V1.0

Assessed and Recommended by C3iHUB IIT Kanpur in collaboration with


IIIT Allahabad

For Mahakumbh Management’s Internal Use Only

Disclaimer
This Cyber Security Readiness Assessment final recommendation document is exclusively intended for
benefit of Mahakumbh Management & is considered proprietary. If you are not a subscriber or client
Mahakumbh ManagemenL, you are expressly prohibited from accessing, reading, copying, modifyin
distributing, or otherwise utilizing the content contained within this document. Unauthorized use or disc
is strictly prohibited & may be subject to legal action.
Disclaimer
This Cyber Security Readiness Assessment final recommendation document is exclusively intended for
benefit of Mahakumbh Management & is considered proprietary. If you are not a subscriber or client
Mahakumbh ManagemenL, you are expressly prohibited from accessing, reading, copying, modifyin
distributing, or otherwise utilizing the content contained within this document. Unauthorized use or disc
is strictly prohibited & may be subject to legal action.
LI D
TE SC
MI
DI OS
L E,
UR ST
RE T
RI D
C
E
TO E
TH H
MAKU
A H
MB M
CO N
MU Y.
IT

MBH
commendation

R-001-V1.0

r in collaboration with

Use Only

ument is exclusively intended for the


you are not a subscriber or client of Legends
ssing, reading, copying, modifying,
ument. Unauthorized use or disclosure
gal action.
ument is exclusively intended for the
you are not a subscriber or client of
ssing, reading, copying, modifying,
Terms
ument. Unauthorized use or disclosure
TLP: Red
gal action.

ID: MAHAKUMBH-CSRA-
FR-001-V1.0
Meaning
Restricted to recipients only:
CSRA- Cyber Security Readiness Assessment Final
Recommendation
001- Document No. 1
V1.0- Version No. 1
Cyber Security Requirements

N/W Segmentation Policy &


Procedures

N/W Architecture Docs


Server Hardening Procedure

Reviews of Running Server Services

Access Control for Remote Server


Access
Password Policy

MFA Implementation

Secure COMM Policy


SSL/TLS Certificate MGMT
Procedures

Asset MGMT Policy

Flagging & Removing Unauthorized


Devices

Device Authorization Procedure


Logging & Monitoring Unauthorized
Device Connection Attempts

Access Control Policy with Key-Based


Authentication for Remote Access

Patch & Vulnerability MGMT


Procedure

Regular Vulnerability Assessments


Monitoring & Tracking Software
Updates

N/W Security Policy on IP-MAC or


MAC-Port Binding

config in N/W Devices for Binding


Enforcement

ARP Poisoning Test Records


NIDS/NIPS & Firewall Usage

Logs & Reports from NIDS &


Antivirus Tools

IP Whitelisting Guidelines in Firewall


config

Public N/W Access Restriction

Logs of Attempted Connections &


Actions Taken
Physical Access Controls for N/W
Ports

Physical Security Practices for N/W

Backup Procedures Logs, Testing &


Compliance Reviews
Redundancy & High Availability in
critical infrastructure & services

Infrastructure Docs on Redundancy

Failover Testing Records

Training & Awareness, Records &


Certifications, Preparedness
Assessments
EP Security Tool config & Logs

N/W Segmentation Procedures

Firewall & VLAN config


Monitoring Logs for Unauthorized
Access Attempts
Policy/Procedure/Process Should be Incorporated in Governance

Documented policy defining N/W segmentation requirements.

Policy guidelines specifying DMZ placement for public-facing services.


Policy Docs defining DMZ-to-internal N/W access control requirements.

Policy section defining roles & respo. for segmentation MGMT.


Document updated schedules for the segmentation policy.
Policy Docs requiring traffic monitoring within the DMZ.

Policy Docs specifying traffic restrictions for public-facing services.


Policy section describing least privilege guidelines.
Policy section mandating encryption for sensitive data in transit & at rest.

Updated N/W diagram showing DMZ placement.


Firewall config & rules.
Updated N/W architecture document.
N/W architecture Docs & segmentation policy.

ACL config logs.


N/W architecture document with IDS/IPS placement.

N/W architecture document with load balancer & WAF details.


Docs of redundancy mechanisms (failover systems).

N/W architecture document & external connection logs.


Docs of zero trust implementations in the architecture.
Documented procedure outlining server hardening practices.

List of disabled/uninstalled services & applications on servers.


Server accounts list with defaults removed or disabled.
Evidence of enabled encryption protocols for server COMM.
List of minimum system config for each server.

Evidence of disabled unused N/W ports on servers.

Evidence of applied software patches & updates.

List of secured administrative tools & access methods.

Documented guidelines for each operating system (Windows, Linux).

Server logs for running services on critical servers.

Documented review reports for active server services.


Logs showing service status changes with timestamps.

Logs or reports identifying unauthorized services.


Documented COMM records of findings.

Alert config for unauthorized service changes.


Securely stored & protected audit trails.

Logs or reports identifying inactive/obsolete services.

Documented log retention policy with log retention duration.


Evidence of automated log analysis tools like SIEM in use.

Documented Access Control Policy for remote access.

List of authorized users with access rights based on least privilege.


Evidence of IP restrictions in access control lists.

Evidence of MFA enforcement for remote access.

List of RBAC config for server access.

Evidence of secure protocols being used (SSH, RDP).

config of real-time alerting for failed access attempts.


Evidence of remote access config through a bastion host.

Documented Password Policy & employee COMM records.


Documented password length & complexity requirements in the policy.
Evidence of enforced password expiration settings in user accounts.
Settings or logs showing password history enforcement.
Evidence of hashing & salting mechanisms for stored passwords.
Docs recommending password manager tools for employees.
Docs of guidelines for phishing & social engineering protection.
Logs or system settings showing forced PW change on first login.
Evidence of lockout thresholds configured in authentication systems.
Documented records of periodic policy reviews & updates.

MFA Implementation Plan document outlining scope, objectives, & strategy.


Records of MFA-enabled systems, applications, & remote access setups.
Docs of integration procedures & compatibility testing.
Docs of supported MFA methods & user provisioning records.
Audit logs or access control records showing MFA usage for privileged accounts.

Training attendance records, user guides, or awareness materials.


Evidence of secure recovery code issuance & storage policies.

Results of penetration tests or MFA-specific security assessments.

System logs showing authentication events & monitoring activities.


Docs of periodic plan reviews & update logs.

Secure COMM Policy document.


Records of HTTPS implementation across web applications.
Implementation guidelines for encryption protocols.

Cipher usage guidelines & key MGMT policies.

Evidence of end-to-end encryption implementation.


Records of disabled protocols in server config.

Email encryption policy, user awareness records.

VPN config records & remote access guidelines.


SSL/TLS Certificate MGMT Procedure document.

Renewal schedule records & alert mechanisms for expiration.


List of trusted CAs, CA-issued certificates.
Active certificate inventory records.
Incident response plans for key compromise scenarios.
Key storage policy, access control records.
config records for certificate encryption settings.
Records of installation processes & audits.

Asset MGMT Policy document.


Asset classification guidelines.

Asset inventory records with unique identifiers.

Logs of asset updates & change records.

Asset lifecycle MGMT guidelines.


Asset security procedures & risk assessments.

Asset ownership records with assigned owners.

Asset disposal guidelines & records of data wiping are needed.

N/W monitoring procedures & detection reports.

Alert config settings & alert logs.


Asset MGMT system records of flagged devices.

Guidelines for removing unauthorized devices & response records.


Logs of quarantined devices & restriction policies.

Investigation reports & forensic analysis logs.

Documented Device Authorization Procedure.

Device authentication policies & config.


Guidelines for device registration, sample device records.
List of approved devices & vendor agreements.

MDM/EMM enrollment records, config guidelines.


Authentication mechanism config, certificate records.

Exception request forms & approval records.

De-registration guidelines, asset disposal records.

N/W connection logs, logging system config.

Sample log records showing connection attempt details.


Log storage security config, access control records.

Alert config settings, notification logs.


Log review schedules, meeting minutes, review reports.
Incident reports, suspicious activity logs.

Documented Access Control Policy with specific sections on SSH key-based authentication.

Documented key MGMT guidelines & process flow diagrams.


List of approved cryptographic algorithms for key generation.
Distribution procedure Docs & key exchange logs.
Role mapping Docs & access control config.
MFA policy documents, MFA config settings.

Audit logs of access reviews, meeting records, & updated access lists.
Logs showing key assignments per user/device/system.

Key revocation logs, exit checklists, & deprovisioning records.


Audit reports, compliance review records, & enforcement logs.

Documented Patch MGMT Policy & Vulnerability MGMT Procedure.

Documented timelines & assigned roles for patch deployment.


Automated patch MGMT system logs, NVD, or CVE subscription.
Vulnerability scan reports & remediation logs.
Vulnerability tracking records, regular review meeting notes.

Vulnerability scan reports, NVD, or scanning platform subscriptions.

Vulnerability assessment reports, CVSS score classifications.


Assessment schedules & documented records of vulnerability assessments.
Vulnerability triage & assignment logs, meeting minutes, & follow-up records.

Remediation effectiveness review reports & meeting notes.

Documented procedures & centralized tracking system reports.

Automated alert config & updated logs with timestamps & administrators.

Patch installation schedules & integration Docs.

Rollback procedure Docs & testing logs.

Audit logs, review meeting records, & compliance reports.

Documented N/W Security Policy.

Policy outlining MAC address binding standards & N/W device config requirements.

Docs of review schedules & defined roles & responsibilities for N/W admins.

N/W segmentation plan, alerting config for binding mismatches.


Remediation procedures, audit & compliance reports.

N/W device config files & port security settings.

Device config settings for dynamic & static IP-MAC bindings.


MAC address table size limits, port security violation settings.
Alert config & integrity check reports.

Device logs for binding enforcement activities & policy violation logs.

Test schedules, ARP poisoning test reports.


ARP poisoning test records, remediation action reports.
Test records documenting man-in-the-middle simulations.
Review meeting records & remediation plans.

Remediation tracking, follow-up assessment records, & audit logs.


Documented Intrusion Detection & Prevention Policy.
Policy guidelines on NIDS & firewall deployment.

Docs on IPS usage, firewall rules, & signature update procedures.


Policy on integration with other security tools & alert threshold guidelines.

Incident response procedures, roles, & responsibilities document.

Logs from NIDS & antivirus tools.

Central log MGMT system & log review procedures.

Docs of log review responsibilities & procedures.

Example logs with metadata (timestamps, IPs, threat severity).


Log retention policy document, log alert config.

Firewall config policy, IP whitelisting guidelines.

Firewall rules for IP whitelisting & N/W segment access list.


IP whitelist review procedure, N/W, & business change Docs.
IP address change approval process, logging of whitelist changes.
Policy review cycle Docs, multi-layered defense strategy.

Public N/W Access Restriction Policy document.

Authentication & access control guidelines in the policy.


Encryption requirements & remediation procedures are in the policy section.

Training schedule & audit/review guidelines.

N/W segmentation guidelines, incident Docs, & archiving procedures.

Access logs with relevant metadata.

Real-time alert config & log entry with mitigation actions.


Centralized log MGMT system & log retention policy.
Logs with records of automated actions & incident responses.
Data retention policy, audit trail.

Physical access controls for N/W ports & signage near ports.

Access control policies for N/W closets & logs of physical access.
Asset inventory for N/W ports & port status records.

CCTV footage & audit reports of N/W ports.

Visitor access control system, incident reports.

Physical Security Policy document.

Guidelines within the policy for restricting access to critical devices.


Access control policy, records of badge, & biometric system usage.
Physical access monitoring procedures & access logs.

CCTV surveillance guidelines in the policy.

Training program Docs & employee awareness training records.


Incident handling procedures in the policy.

Audit schedule & procedures in the policy.

Policy guidelines for securing critical devices in enclosures.


Visitor MGMT procedures in the policy.

Backup logs & reports documenting successful/failed backups.

Sample backup logs showing the date, time, & location of backups.
Backup logs listing files, folders, or databases included.
Backup logs with error/warning records.

Review records & backup administrator/team review logs.


Backup logs with details of failed backups & resolution steps.
Docs on automated backup logging tools & storage methods.

Compliance review reports on backup schedules & retention adherence.


Compliance or security audit reports on backup encryption & transmission security.

Backup log retention policy, stored logs, & compliance review reports.

Approved policy document covering redundancy for systems & infrastructure.

Policy sections on load balancing & data center distribution.


Policy document specifying monitoring & failover testing criteria.
Policy section on roles & responsibilities & RTO/RPO targets.
Policy update schedule, redundancy config Docs.

Updated infrastructure diagrams.

Docs of UPS, generators, & replication methods.

Records of ISP contracts & failover N/W config.

Change logs, contact lists, & updated Docs.

Access logs & secure storage mechanisms for Docs.

Test schedule, recent failover test reports.


Detailed failover test records.

Test reports with success rates, issue logs, & time-to-recovery records.
Test records with real-world failure simulation details.
MGMT review records, action logs for test findings.

Certificates or completion records for relevant cybersecurity certifications.

Approved Training & Awareness Policy.

Policy section outlining training frequency & schedule.

Role-specific training content, including advanced security topics.


Records of tabletop exercises, participation logs.
Policy section on incident response training.

Training content on config MGMT & system hardening.


Policy section on privileged access MGMT training.

Policy section for updating training content.


Policy section & records of training evaluations.

Approved EP Security Policy document.

config settings for EP security tools or group policy objects (GPOs).


Policy section on whitelisting & approval workflows.

Policy section on encryption standards for devices.


Incident reporting guidelines in the policy.

EP security settings, including device control policies.


Policy section on user group coverage.

Policy review logs & revision history.

Policy section defining enforcement & disciplinary measures.


EP logs showing device connection attempts.
config details for real-time monitoring capabilities.

Physical access audit reports, access logs for critical areas.

Approved N/W Segmentation Policy document.

Sections of the policy referencing VLANs, firewalls, DMZs, & segmentation techniques.

Specific access control rules for third parties & unauthorized users.

Policy section addressing IoT, guest N/Ws, & high-risk asset segmentation.
Policy provisions for periodic reviews & testing.

Firewall config & ACLs.


VLAN config Docs & switch settings.
Firewall rule sets & policy Docs.
Firewall logs capturing traffic details (allowed/denied).
N/W diagrams & segmentation Docs showing isolated sensitive systems.

SIEM tool logs, firewall logs, & IDS logs showing unauthorized access attempts.

Firewall, SIEM, & IDS logs containing detailed access attempt records.

SIEM or firewall alert config Docs.

Firewall & IDS logs indicating blocked traffic with timestamps & actions taken.

Incident response & escalation procedures with logs or tickets of escalated events.
Recommendation for Policy Governance and Technical I

Technical Controls Should be Implemented/Defined/Placed in Asset

N/W diagrams

DMZ config. in firewalls


DMZ config. in firewalls
Firewall rules
ACL config
Not applicable (policy-based control).
Change MGMT records for policy reviews.
IDS/IPS Config
N/W Monitoring Tools/SIEM logs.
Firewall & Web Application Firewall (WAF) config.
User Access Control (UAC), RBAC, & server access logs.
TLS/SSL certificate, encryption protocols on servers/applications.

DMZ config. in firewalls


Firewall rules & ACLs on routers.
Firewall config, router rules, & IDS/IPS placement.
VLAN config., firewall segmentation rules, & logical N/W zones.

Router & firewall ACL config.


IDS/IPS config & deployment topology.

Load balancer & WAF config.


High-availability config & failover testing logs.

VPN config, dedicated links, & secure gateway logs.


Zero trust access controls, micro-segmentation config, & MFA implementations.
Server config MGMT tools, Docs review

Server OS config, service MGMT tools


User account MGMT systems, audit logs
Encryption settings, web server config
config MGMT, system baseline checks

N/W config, firewall settings

Patch MGMT tools, OS software update logs

Admin tool access controls, user access logs

OS-specific security config, guidelines, Docs

Log MGMT system, syslog config

Audit logs, review schedules, access control systems


Service monitoring tools, logging config

Intrusion detection systems (IDS), log analysis tools


COMM MGMT systems, security report templates

Intrusion detection systems (IDS), event MGMT tools


Log storage solutions, encryption tools

Service MGMT systems, server config settings

Log retention config, storage policies


SIEM tools, log aggregation platforms

Access control systems, policy Docs

User MGMT system/RBAC


Firewall settings, access control config

MFA config, authentication systems

RBAC systems, user access controls

SSH/RDP settings, VPN config

Security information & event MGMT (SIEM) tools


Bastion host config, remote access logs

Policy repository, email/COMM system


User account settings, password policy enforcement tools
Active Directory or IAM config, system policy settings
Password history settings in IAM or directory services
Hashing algorithms (SHA-256), database storage settings
Password manager tool usage & config
Awareness training materials, phishing simulation tools
User account MGMT systems, policy enforcement tools
Account lockout policies in IAM, authentication tools
Document MGMT system, policy review schedule

Policy repository, document MGMT system


Authentication systems, VPNs, IAM tools
Authentication server config, system compatibility tests
MFA solutions supporting OTPs, tokens, biometrics
Privileged account access controls, MFA usage logs

Awareness & training programs, phishing simulation results


Secure vaults for recovery codes, policies for recovery mechanism usage

Phishing-resistant MFA mechanisms, vulnerability assessment tools

SIEM solutions, authentication event logs


Document versioning system, change MGMT records

Policy repository, document MGMT system


Web servers, application settings
TLS config, encryption libraries

Cipher suite settings, key MGMT systems

Messaging platforms, email servers, encryption mechanisms


Protocol config in servers & applications

Email servers, encryption plugins

VPN servers, remote access logs


Policy repository, document MGMT system

Certificate monitoring tools, certificate expiry alerts


Public Key Infrastructure (PKI), certificate authority checks
Certificate inventory systems
Certificate revocation systems, incident MGMT systems
Hardware Security Modules (HSMs), key MGMT solutions
Certificate details, encryption algorithm standards (RSA, ECC)
Server config, SSL/TLS validation tools

Policy repository, document MGMT systems


Asset inventory database, categorization schema

Asset tagging systems, inventory MGMT tools

config MGMT Database (CMDB), inventory logs

Asset MGMT tools


Security controls, access logs

Asset ownership tracking systems

Disposal records, secure erasure tools

NAC tools, intrusion detection systems

SIEM tools, NAC alert config


Asset MGMT tools, incident tracking systems

Incident response tools, NAC quarantine settings


NAC systems, quarantine policies

Forensic analysis tools, incident MGMT systems

Policy repository, document MGMT systems

N/W Access Control (NAC), identity MGMT systems


Asset MGMT tools, MDM/EMM systems
NAC systems, approved device repository

MDM/EMM platforms, config MGMT databases


NAC systems, device certificate MGMT systems

Exception tracking systems, request MGMT tools

Asset lifecycle MGMT tools, decommissioning logs

SIEM tools, NAC systems, logging servers

SIEM tools, intrusion detection systems (IDS)


Log MGMT systems, SIEM tools

SIEM tools, alert config tools


Incident MGMT tools, review tracking systems
SIEM systems, anomaly detection systems

Policy repository, document MGMT system

Key MGMT systems, secure key storage solutions


SSH config files, cryptographic policy settings
Secure file transfer tools, key exchange mechanisms
NAC systems, RBAC-enabled directory services (LDAP, AD)
MFA tools, authentication logs

IAM tools, review & recertification workflows


Key MGMT systems, SSH server config

IAM systems, access provisioning/deprovisioning tools


SIEM tools, audit MGMT systems

Policy repository, patch MGMT system Docs

IT task MGMT system, team assignments, patch scheduling tool


Patch MGMT software, vulnerability tracking tools
Vulnerability scanning tools, ticketing systems for remediation
Vulnerability MGMT systems, meeting minutes, remediation workflows

Vulnerability scanning tools, NVD subscriptions

Vulnerability MGMT system, CVSS risk classification system


Vulnerability MGMT system, risk MGMT Docs
Ticketing systems, vulnerability MGMT systems, meeting minutes

Remediation MGMT system, meeting Docs

Centralized software update MGMT system, update logs

Patch MGMT tools, monitoring tools

Patch MGMT system, vulnerability tracking tools

Testing environment, change MGMT system

Audit MGMT tools, software update logs

N/W security policy document, ARP poisoning & MAC spoofing prevention measures

N/W device config settings (switches, routers)

Administrative access & monitoring tools, policy review process

N/W segmentation controls, alerting systems (SIEM)


Auditing tools, N/W MGMT systems

N/W device config (switches, routers, firewalls)

config MGMT tools, N/W device settings


Switch config settings, port security settings
SIEM system, N/W monitoring tools

Logging tools, N/W device logs, SIEM

Testing tools (ARP spoofing test tools), test reports


Test logs, vulnerability MGMT system
Testing tools (MITM attack simulators)
Incident response system, remediation tracking

Vulnerability MGMT system, audit log systems


NIDS, IPS, firewall config, policy document
NIDS config, firewall rules

IPS config, firewall signature MGMT, NIDS rules


SIEM integration, NIDS alert thresholds

Incident response Docs, audit logs, NIDS, & firewall logs

Log MGMT system, NIDS, antivirus tools

SIEM systems, log aggregation tools

SIEM, ticketing systems for incident response

Logging config, log data standards.


Log MGMT & retention system, alert config

Firewall rules for IP whitelisting, inbound/outbound traffic filters

Firewall access control lists (ACLs), IP whitelisting rules


N/W change MGMT procedures, IP whitelisting audit logs
Change MGMT logs, firewall config audit logs
IP whitelisting practices, VPN & MFA config

N/W monitoring tools, access control policies

802.1X config, MAC filtering, role-based access controls


SSL/TLS config, remediation procedures

Staff training records, audit, & review reports

N/W segmentation, incident MGMT process

Log MGMT systems & N/W access control logs.

Intrusion detection systems, SIEM integration, alert config


Log MGMT system, retention policy settings
Security tools' automated action logs, incident response records
Data retention policy, audit system logs

Physical security controls, signage policies

Physical access control logs, locked access points


Switch port config, asset inventory MGMT

CCTV surveillance systems, audit records

Access control systems, incident response system

Physical access controls, policy Docs

Access control procedures for critical devices


Badge systems, biometric access control systems
Access logs, physical access monitoring tools

CCTV systems, surveillance footage review

Training logs, employee awareness programs


Incident response procedures, reporting systems

Audit reports, audit schedules

Equipment enclosures, lock mechanisms


Visitor logs, escort procedures

Backup logging tools, report generation tools

Backup software, log MGMT system


Backup software logs, data inventory
Error logging in backup software

Log review process, access control for log files.


Backup failure alerts, resolution Docs
Backup automation tools, encryption protocols for log storage

Compliance review records, backup schedule adherence


Encryption tools, transmission security protocols

Data retention policy, log storage compliance.

Policy documents repository

Load balancing tools, data center architecture


Monitoring tools, automated failover testing tools
Role assignment matrix, alignment with BCP Docs
Version control systems for policy updates

Asset inventory, N/W diagrams

Power supply logs, data replication software

ISP agreements, N/W failover plans

Version control systems, support contact databases

Access control policies, business continuity plans

Test schedules, failover logs


Test records, incident simulation scripts

Monitoring tools, failover testing metrics


Simulated test environments, incident playbooks
Action plans, test review records

Certification tracking system, HR records

Training policy repository, HR policy database

Training MGMT tools, administrator training logs

Training content repository


Incident response tabletop simulation tools
Incident response training tools

Secure config checklists, system hardening guides


PAM systems, privileged access audit tools

Audit logs, incident reports, training content change logs


Training feedback forms, assessment reports, LMS analytics

Policy repository, EP security compliance checklist

EP MGMT tools (Microsoft Intune, CrowdStrike)


Whitelisting logs, device MGMT systems

Encryption tools (BitLocker, VeraCrypt), EP policies


Incident MGMT systems (ServiceNow)

EP tools with USB blocking (Symantec, ESET, MS Defender)


Role-based access control (RBAC) settings

Policy version control records

HR policy integration, compliance logs


Centralized logging systems (SIEM tools like Splunk LogRhythm)
EP tools supporting real-time response (CrowdStrike, Sentinel One)

Physical access systems, CCTV logs, physical security policies

N/W architecture & security policies

VLAN & firewall config, DMZ layout

Access control lists (ACLs), firewall rule sets, user access controls

VLAN config, N/W segmentation reports


Docs of reviews, testing logs, update records

Firewall rule sets, N/W segmentation logs


VLAN config, switch logs
Firewall ACLs, N/W access policies
Log MGMT tools, SIEM system integrations
N/W segmentation setup, firewall config

SIEM system, IDS/IPS logs, firewall logs

Log aggregation tools (Splunk, ELK Stack), SIEM integrations

SIEM alert rules, firewall IDS/IPS config

Log MGMT tools, firewall & IDS logs

Incident MGMT systems, escalation workflows, ticketing systems


lementation for M/S ------------

Evidence Submitted for Compliance Evidence


(Governance) with Evidence No. Number
Evidence Submitted for Technical Implementation
Evidence Number

You might also like