CYBER SECURITY CONTROLS CHECKLIST
This is a simple checklist designed to identify and document the existence and status for a
recommended basic set of cyber security controls (policies, standards, and procedures) for an
organization. Security controls are designed to reduce and/or eliminate the identified
threat/vulnerabilities that place an organization at risk.
PERSONELL SECURITY
Yes
No
1. Does your staff wear ID badges?
2. Is a current picture part of the ID badge?
3. Are authorized access levels and type (employee, contractor, visitor) identified
on the Badge?
4. Do you check the credentials of external contractors?
5. Do you have policies addressing background checks for employees and
contractors?
6. Do you have a process for effectively cutting off access to facilities and
information systems when an employee/contractor terminates employment?
Yes
No
7. Do you have policies and procedures that address allowing authorized and
limiting unauthorized physical access to electronic information systems and the
facilities in which they are housed?
8. Do your policies and procedures specify the methods used to control physical
access to your secure areas, such as door locks, access control systems,
security officers, or video monitoring?
9. Is access to your computing area controlled (single point, reception or security
desk, sign-in/sign-out log, temporary/visitor badges)?
PHYSICAL SECURITY
10. Are visitors escorted into and out of controlled areas?
11. Are your PCs inaccessible to unauthorized users (e.g. located away from public
areas)?
12. Is your computing area and equipment physically secured?
13. Are there procedures in place to prevent computers from being left in a loggedon state, however briefly?
14. Are screens automatically locked after 10 minutes idle?
15. Are modems set to Auto-Answer OFF (not to accept incoming calls)?
16. Do you have procedures for protecting data during equipment repairs?
17. Do you have policies covering laptop security (e.g. cable lock or secure
storage)?
18. Do you have an emergency evacuation plan and is it current?
19. Does your plan identify areas and facilities that need to be sealed off
immediately in case of an emergency?
20. Are key personnel aware of which areas and facilities need to be sealed off and
how?
Yes
No
21. Do you have policies and standards covering electronic authentication,
authorization, and access control of personnel and resources to your
information systems, applications and data?
22. Do you ensure that only authorized personnel have access to your computers?
23. Do you require and enforce appropriate passwords?
24. Are your passwords secure (not easy to guess, regularly changed, no use of
temporary or default passwords)?
25. Are you computers set up so others cannot view staff entering passwords?
Yes
No
ACCOUNT AND PASSWORD MANAGEMENT
CONFIDENTIALITY OF SENSITIVE DATA
26. Do you classify your data, identifying sensitive data versus non sensitive?
27. Are you exercising responsibilities to protect sensitive data under your control?
28. Is the most valuable or sensitive data encrypted?
29. Do you have a policy for identifying the retention of information (both hard and
soft copies)?
30. Do you have procedures in place to deal with credit card information?
31. Do you have procedures covering the management of personal private
information?
32. Is there a process for creating retrievable back up and archival copies of critical
information?
33. Do you have procedures for disposing of waste material?
34. Is waste paper binned or shredded?
35. Is your shred bin locked at all times?
36. Do your policies for disposing of old computer equipment protect against loss
of data (e.g.. by reading old disks and hard drives)?
37. Do your disposal procedures identify appropriate technologies and methods for
making hardware and electronic media unusable and inaccessible (such as
shredding CDs and DVDs, electronically wiping drives, burning tapes) etc.)?
Yes
No
38. Do you have a current business continuity plan?
39. Is there a process for creating retrievable back up and archival copies of critical
information?
40. Do you have an emergency/incident management communications plan?
41. Do you have a procedure for notifying authorities in the case of a disaster or
security incident?
42. Does your procedure identify who should be contacted, including contact
information?
43. Is the contact information sorted and identified by incident type?
44. Does your procedure identify who should make the contacts?
DISASTER RECOVERY
45. Have you identified who will speak to the press/public in the case of an
emergency or an incident?
46. Does your communications plan cover internal communications with your
employees and their families?
47. Can emergency procedures be appropriately implemented, as needed, by
those responsible?
Yes
No
48. Are you providing information about computer security to your staff?
49. Do you provide training on a regular recurring basis?
50. Are employees taught to be alert to possible security breaches?
51. Are your employees taught about keeping their passwords secure?
52. Are your employees able to identify and protect classified data, including paper
documents, removable media, and electronic documents?
53. Does your awareness and education plan teach proper methods for managing
credit card data (PCI standards) and personal private information (Social
security numbers, names, addresses, phone numbers, etc.)?
COMPLIANCE AND AUDIT
Yes
No
54. Do you review and revise your security documents, such as: policies,
standards, procedures, and guidelines, on a regular basis?
55. Do you audit your processes and procedures for compliance with established
policies and standards?
56. Do you test your disaster plans on a regular basis?
57. Does management regularly review lists of individuals with physical access to
sensitive facilities or electronic access to information systems?
SECURITY AWARENESS AND EDUCATION
Checklist Response Analysis
For each question that is marked No, carefully review its applicability to your organization.
Implementing or improving controls decreases potential exposure to threats/vulnerabilities that may
seriously impact the ability to successfully operate.
CYBER SECURITY THREAT/VULNERABILITY ASSESSMENT
A threat is the potential for a person or a thing to exercise (accidentally trigger or intentionally
exploit) a flaw or weaknesses (vulnerability) within an organization. There are several types of
threats that my occur within an information system or operating environment Threats are usually
grouped into general categories such as natural, human, and environmental, for example:
NATURAL THREATS
Storm damage (e.g.,
flood)
Fire
Lightning strikes
Tornado
HUMAN THREATS
Computer abuse
Unauthorized access to Privacy
Act and proprietary information
Terrorism
Sabotage or vandalism
System tampering
Spoofing
Fraud
Impersonation and social
engineering
Hacking
Negligence or human
error
Theft
Falsified data
ENVIRONMENTAL THREATS
Long-term power failure
Chemical leakage
Pollution
The desired outcome of identifying and reviewing (assessing) threats and vulnerabilities is
determining potential and actual risks to the organization. Risk is a combination of factors or
events (threats and vulnerabilities) that, if they occur, may have an adverse impact on the
organizations. Risk is established by considering the potential impact and likelihood of a
vulnerability being exploited by a threat. Risk only exists when threats have the capability of
triggering or exploiting vulnerabilities. The following formula is used to determine a risk score:
Risk = Impact x Likelihood
For this assessment, numeric rating scales are used to establish impact potential (0-6) and
likelihood probability (0-5).
IMPACT SCALE
LIKELIHOOD SCALE
1. Impact is negligible
0. Unlikely to occur
2. Effect is minor, major agency operations are
not affected
1. Likely to occur less than once per year
3. Organization operations are unavailable for a 2. Likely to occur once per year
certain amount of time, costs are incurred.
Public/customer confidence is minimally
affected
4. Significant loss of operations, significant
impact on pubic/customer confidence
3. Likely to occur once per month
IMPACT SCALE
LIKELIHOOD SCALE
5. Effect is disastrous, systems are down for an
extended period of time, systems need to be
rebuilt and data replaced
4. Likely to occur once per week
6. Effect is catastrophic, critical systems are
5. Likely to occur daily
offline for an extended period; data are lost or
irreparably corrupted; public health and safety
are affected
When determining impact, consider the value of the resources at risk, both in terms of inherent
(replacement) value and the importance of the resources (criticality) to the organizations
successful operation.
Factors influencing likelihood include: threat capability, frequency of threat occurrence, and
effectiveness of current countermeasures (security controls). Threats caused by humans are
capable of significantly impairing the ability for an organization to operate effectively. Human
threats sources include:
SOURCE
SOURCE DESCRIPTION
Insiders:
Employees, owners, stock holders, etc.
General contractors and
subcontractors
Cleaning crew, developers, technical support personnel, and
computer and telephone service repair crew
Former employees:
Employees who have retired, resigned, or were terminated
Unauthorized users:
Computer criminals, terrorists, and intruders (hackers and
crackers) who attempt to access agency/enterprise resources.
Finally, use the following table to determine and understand the potential criticality (risk level) of
each threat/vulnerability based on the calculated risk value.
SCORE
RISK LEVEL
RISK OCCURRENCE RESULT
21-30
High Risk
Occurrence may result in significant loss of major tangible assets,
information, or information resources. May significantly disrupt the
organizations operations or seriously harm its reputation.
11-20
Medium Risk
Occurrence may result in some loss of tangible assets, information,
or information resources. May disrupt or harm the organizations
operation or reputation. For example, authorized users arent able to
access supportive data for several days.
1-10
Low Risk
Occurrence may result in minimal loss of tangible assets, information,
or information resources. May adversely affect the organizations
operation or reputation. For example, authorized users arent granted
access to supportive data for an hour.
CYBER SECURITY THREAT/VULNERABILITY ASSESSMENT
HUMAN THREATS
Impact
(0-6)
Probability
(0-5)
Score
(Impact x
Probability)
1. Human Error
Accidental destruction, modification, disclosure, or
incorrect classification of information
Ignorance: inadequate security awareness, lack of
security guidelines, lack of proper documentation,
lack of knowledge
Workload: Too many or too few system
administrators, highly pressured users
Users may inadvertently give information on
security weaknesses to attackers
Incorrect system configuration
Security policy not adequate
Security policy not enforced
Security analysis may have omitted something
important or be wrong.
2. Dishonesty: Fraud, theft, embezzlement, selling of
confidential agency information
3. Attacks by social engineering
Attackers may use telephone to impersonate
employees to persuade users/administrators to
give user name/passwords/modem numbers, etc.
Attackers may persuade users to execute Trojan
Horse programs
Impact
(0-6)
Probability
(0-5)
Score
(Impact x
Probability)
1. Unauthorized use of open computers/Laptops
2. Mixing of test and production data or environments
3. Introduction of unauthorized software or hardware
4. Abuse of privileges/trust
GENERAL THREATS
4. Time bombs: Software programmed to damage a
system on a certain date
5. Operating system design errors: Certain systems were
not designed to be highly secure
6. Protocol design errors: Certain protocols were not
designed to be highly secure. Protocol weaknesses in
TCP/IP can result in:
Source routing, DNS spoofing, TCP sequence
guessing, unauthorized access
Hijacked sessions and authentication
session/transaction replay, data is changed or
copied during transmission
Denial of service, due to ICMP bombing, TCP-SYN
flooding, large PING packets, etc.
7. Logic bomb: Software programmed to damage a
system under certain conditions
8. Viruses in programs, documents, e-mail attachments
Impact
(0-6)
Probability
(0-5)
Score
(Impact x
Probability)
1. Attack programs masquerading as normal programs
(Trojan horses).
2. Attack hardware masquerading as normal commercial
hardware
3. External attackers masquerading as valid users or
customers
4. Internal attackers masquerading as valid users or
customers
5. Attackers masquerading as helpdesk/support
personnel
Impact
(0-6)
Probability
(0-5)
Score
(Impact x
Probability)
IDENTIFICATION AUTHORIZATION THREATS
PRIVACY THREATS
1. Eavesdropping
Electromagnetic eavesdropping / Ban Eck radiation
Telephone/fax eavesdropping (via clip-on
telephone bugs, inductive sensors, or hacking the
public telephone exchanges
Network eavesdropping. Unauthorized monitoring
of sensitive data crossing the internal network,
unknown to the data owner
Subversion of ONS to redirect email or other traffic
Subversion of routing protocols to redirect email or
other traffic
Radio signal eavesdropping,
Rubbish eavesdropping (analyzing waste for
confidential documents, etc.)
Impact
(0-6)
Probability
(0-5)
Score
(Impact x
Probability)
1. Malicious, deliberate damage of information or
information processing functions from external sources
2. Malicious, deliberate damage of information or
information processing functions from internal sources
3. Deliberate modification of information
Impact
(0-6)
Probability
(0-5)
Score
(Impact x
Probability)
1. Password cracking (access to password files, use of
bad blank, default, rarely changed passwords)
2. External access to password files, and sniffing of the
networks
3. Attack programs allowing external access to systems
(back doors visible to external networks)
4. Attack programs allowing internal access to systems
(back doors visible to internal networks)
5. Unsecured maintenance modes, developer backdoors
6. Modems easily connected, allowing uncontrollable
extension of the internal network
7. Bugs in network soft are which can open
unknown/unexpected security holes (holes can be
exploited from external networks to gain access. This
threat grows as software becomes increasingly
complex)
8. Unauthorized physical access to system
Impact
(0-6)
Probability
(0-5)
Score
(Impact x
Probability)
INTEGRITY / ACCURACY THREATS
ACCESS CONTROL THREATS
REPUDIATION THREAT
1. Receivers of confidential information may refuse to
acknowledge receipt
2. Senders of confidential information may refuse to
acknowledge source
LEGAL THREATS
Impact
(0-6)
Probability
(0-5)
Score
(Impact x
Probability)
1. Failure to comply with regulatory or legal requirements
(ie, to protect confidentiality of employee data)
2. Liability for acts of internal users or attackers who
abuse the system to perpetrate unlawful acts (ie,
incitement to racism, gambling, money laundering,
distribution of pornographic or violent material)
3. Liability for damages if an internal user attacks other
sites.
Impact
(0-6)
Probability
(0-5)
Total
(Impact x
Probability)
1. Major natural disasters, fire, smoke, water, earthquake,
storms/hurricanes/tornadoes, power outages, etc
2. Minor natural disasters, of short duration, or causing
little damage
3. Major human-caused disasters: war, terrorist incidents,
bombs, civil disturbance, dangerous chemicals,
radiological accidents, etc.
4. Equipment failure from defective hardware, cabling, or
communications system.
5. Equipment failure from airborne dust, electromagnetic
interference, or static electricity
RELIABILITY OF SERVICE THREATS
6. Denial of Service:
Network abuse: Misuse of routing protocols to
confuse and mislead systems
Server overloading (processes, swap space,
memory, tmp directories, overloading services)
Email bombing
Downloading or receipt of malicious Applets, Active
X controls, macros, PostScript files, etc
7. Sabotage: Malicious, deliberate damage of information
or information processing functions.
Physical destruction of network interface devices,
cables
Physical destruction of computing devices or
media
Destruction of electronic devices and media by
electromagnetic radiation weapons (HERF Gun,
EMP/T Gun)
Deliberate electrical overloads or shutting off
electrical power
Viruses and/or worms. Deletion of critical systems
files
Next Steps
After completing a review of current security controls and along with a review and rating of
potential threats/vulnerabilities, a series of actions should be determined to reduce risk (threats
exploiting vulnerabilities) to and acceptable level. These actions should include putting into place
missing security controls, and/or increasing the strength of existing controls.
Security controls should ideally reduce and/or eliminate vulnerabilities and meet the needs of the
business. Cost must be balanced against expected security benefit and risk reduction. Typically,
security remediation efforts and actions will be focused on addressing identified high risk
threat/vulnerabilities
The following table identifies a set of remediation activities designed to focus on the commonly
identified High risk threats and vulnerabilities. Actions are ranked in priority order of effectiveness.
Example Recommended Security Risk Remediation Actions
No.
Remediation Action
Cost
Benefit
Risk
Develop a foundation of Security Policies,
Practices and Procedures, especially in the
area of Change Control
Low
High
High
Establish and enforce a globally-accepted
password policy
Low
High
High
Address vulnerability results in order of high
risk to low risk
Low
High
High
Establish an Operations group facilitated
discussion to improve processes and
communications, and to eliminate any
misunderstandings
Low
High
High
Establish router configuration security
standards, forming baseline practices
Low
High
High
Harden servers on the internal network
Low
High
High
No.
Remediation Action
Cost
Benefit
Risk
More closely integrate worker termination
activities between HR and IT. Incorporate newhire orientation and annual security refresher
for all employees.
Low to
Moderate
High
High
No.
Remediation Action
Cost
Benefit
Risk
Redesign the internet perimeter, incorporating
concepts of N-tier architecture and defense in
depth into the redesign of the Internet
perimeter and Enterprise Architecture
Low to
Moderate
High
High
Migrate to a more centralized and integrated
model of operations management, including
centralized logging, event correlation, and
alerting
Low to
Moderate
High
High
10
Complete the intrusion detection infrastructure
Moderate
High
High
11
Install encryption on mobile computers to
protect the confidentiality and integrity of data.
Moderate to
Expensive
High
High
12
Perform data classification to determine
security levels to protect that data
Moderate to
Expensive
High
High
13
Institute vulnerability scanning as a regular
scheduled maintenance task
Moderate to
Expensive
High
High
14
Reclassify email as a mission critical
application
Low
Moderate
Medium
15
Complete security staffing for the ISO Security
Group
Expensive
High
High
16
Complete Computer Security Incident
Response Team (CSIRT) capability
Moderate to
Expensive
High
High