|
|
||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
|
|
|||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||
|
Asset Type |
Does this asset process, store or transmit EPHI? |
People/Process or Technology Asset? |
|
|||||||||||||||||||||||||||||||||||||
|
|
||||||
|
Topic |
Question |
Response |
Threat Vulnerability Statement |
Notes/Comments |
||
|
1. Security Program |
||||||
|
1.1 |
Roles & Responsibilities |
[1.1] Has your organization formally appointed a central point
of contact for security coordination? |
|
Management has not defined responsibilities for the information security program. [TVS001] |
|
|
|
1.2 |
External Parties |
[1.2] Do you work with third parties, such as IT service
providers, that have access to your patient's information? |
|
Security breaches occur when dealing with third parties due to a lack of security considerations in the related third party agreement. [TVS002] |
|
|
|
2. Security Policy |
||||||
|
2.1 |
Information Security Policy & Procedures |
[2.1] Do you have documented information security policies and
procedures? |
|
Management does not set a clear policy direction in line with business objectives and demonstrate support for, and commitment to, information security. [TVS003] |
|
|
|
3. Risk Management & Compliance |
||||||
|
3.1 |
Risk Assessment |
[3.1] Do you have a process that addresses: the identification and measurement of potential risks, mitigating controls (measures taken to reduce risk), and the acceptance or transfer (Insurance policies, warranties for example) of the remaining (residual) risk after mitigation steps have been applied? |
|
Information around risks and related control options are not presented to management before management decisions are made. [TVS004] |
|
|
|
3.2 |
Compliance with Legal Requirements - Identification of applicable legislation |
[3.2] Does a process exist to identify new laws and regulations with IT security implications? (e.g., new state breach notification requirements)? |
|
Legislative, statutory, regulatory or contractual obligations related to security are violated due to lack of controls. [TVS005] |
|
|
|
4. Training & Awareness |
||||||
|
4.1 |
During Employment – Training, Education & Awareness |
[4.1] Have your employees been provided formal information security training? Have policies been communicated to your employees? Are periodic security reminders provided? |
|
Applications and technology solutions are not correctly and securely used since a training curriculum for employees has not been established or regularly updated. [TVS006] |
|
|
|
5. Personnel Security |
||||||
|
5.1 |
Background Checks |
[5.1] Does your organization perform background checks to examine and assess an employee’s or contractor’s work and criminal history? |
|
Background verification checks are not carried out and management is not aware of academic, professional, credit or criminal backgrounds of employees. [TVS007] |
|
|
|
5.2 |
Prior to Employment - Terms and Conditions of Employment |
[5.2] Are your employees required to sign a non-disclosure agreement? If so, are employees required to sign the non-disclosure agreement annually? |
|
Employees or contractors do not agree or sign terms or conditions of employment. [TVS008] |
|
|
|
5.3 |
Termination or Change in Employment |
[5.3] Do you have a formal process to manage the termination and or transfer of employees? |
|
Employee, contractor or third party user terminations or change of responsibilities could result in a security breach due to lack of a defined management process for terminations or changes in responsibilities. [TVS009] |
|
|
|
6. Physical Security |
||||||
|
6.1 |
Secure Areas |
[6.1]
Do you have effective physical access controls (e.g., door locks) in place
that prevent unauthorized access to facilities and a facility security plan? |
|
Unauthorized parties gain physical access to facilities due to insufficient physical entry/exit controls. [TVS010] |
|
|
|
7. Network Security |
||||||
|
7.1 |
Application and Information Access Control - Sensitive System Isolation |
[7.1]
Describe your network configuration. Has your IT vendor provided
information regarding how your Electronic Health Record (EHR) system is
protected? |
|
Sensitive systems co-located with less sensitive systems are accessed by unauthorized parties. [TVS011] |
|
|
|
7.2 |
Encryption |
[7.2] Is sensitive information transferred to external recipients? If so, are controls in place to protect sensitive information when transferred (e.g. with encryption)? |
|
Information involved in electronic messaging is compromised. [TVS012] |
|
|
|
7.3 |
Vulnerability Assessment |
[7.3] How often do you perform periodic vulnerability scans on your information technology systems, networks and supporting security systems? |
|
Technical vulnerabilities are exploited to gain inappropriate or unauthorized access to information systems due to lack of controls for those vulnerabilities. [TVS013] |
|
|
|
7.4 |
Monitoring |
[7.4] Are third party connections to your network monitored and reviewed to confirm authorized access and appropriate usage? |
|
Unauthorized access is given to information over third party connections. [TVS014] |
|
|
|
8. Logical Access |
||||||
|
8.1 |
Identity & Access Management |
[8.1]
Do you have a formal access authorization process based on 'least privilege'
(employees are granted the least amount of access possible in order to
perform their assigned duties) and need to know (access permissions are
granted based upon the legitimate business need of the user to access the
information) ? |
|
Unauthorized access is gained to information systems. [TVS015] |
|
|
|
8.2 |
Identity Management |
[8.2] Are user IDs for your system uniquely identifiable? |
|
Unauthorized users are able to gain access to operating systems by claiming to be an authorized user. [TVS016] |
|
|
|
8.3 |
Entitlement Reviews |
[8.3] Do you have a process to review user accounts and related access? |
|
Users that no longer have a business need for information systems access still have access to the information. [TVS017] |
|
|
|
9. Operations Management |
||||||
|
9.1 |
Antivirus |
[9.1] Has antivirus software been deployed and installed on your computers and supporting systems (e.g., desktops, servers and gateways)? |
|
Systems and data are exposed to malicious software and/or unauthorized use. [TVS018] |
|
|
|
9.2 |
Security Monitoring |
[9.2] Are systems and networks monitored for security events? If so, please describe this monitoring. |
|
Unauthorized information processing activities occur undetected due to lack of consistent logging and monitoring activities. [TVS019] |
|
|
|
9.3 |
Media Handling |
[9.3] Do procedures exist to protect documents, computer media (e.g., tapes, disks, CD-ROMs, etc.), from unauthorized disclosure, modification, removal, and destruction? Is sensitive data encrypted when stored on laptop, desktop and server hard drives, flash drives, backup tapes, etc.? |
|
Media (e.g., documents, computer media (e.g. tapes, disks), input/output data, system documentation) is compromised by unauthorized parties due to ineffective handling procedures. [TVS020] |
|
|
|
9.4 |
Secure Disposal |
[9.4] Are there security procedures for the decommissioning (replacement) of IT equipment and IT storage devices which contain or process sensitive information? |
|
Unauthorized parties access data from discarded media. [TVS021] |
|
|
|
9.5 |
Segregation of Computing Environment |
[9.5] Are development, test and production environments separated from operational IT environments to protect production (actively used) applications from inadvertent changes or disruption? |
|
The production environment is impacted due to the lack of separation of development and production environments. [TVS022] |
|
|
|
9.6 |
Segregation of Duties |
[9.6] Are duties separated, where appropriate, to reduce the opportunity for unauthorized modification, unintentional modification or misuse of the organization's IT assets? |
|
The integrity of a business process is compromised due to the lack of segregation of duties (e.g., maker & checker). [TVS023] |
|
|
|
9.7 |
Change Management |
[9.7] Do formal change management procedures exist for networks, systems, desktops, software releases, deployments, and software vulnerability (e.g., Virus or Spyware) patching activities? |
|
The change management process in place does not adequately protect the environment from disruptive changes in production. [TVS024] |
|
|
|
10. Incident Management |
||||||
|
10.1 |
Process & Procedures |
[10.1] How do you identify, respond to and mitigate suspected or
known security incidents? |
|
Security incidents are not managed with a consistent and effective approach. [TVS025] |
|
|
|
11. Business Continuity Management |
||||||
|
11.1 |
Disaster Recovery Plan & Backups |
[11.1] Do you have a mechanism to back up critical IT systems
and sensitive data? |
|
Information systems cannot be recovered due to a lack of written disaster recovery plans. [TVS026] |
|
|
|
|
|||||||||
|
|
|
Perform Control Analysis |
Exposure |
Assess Risk |
|||||
|
Asset Management Category |
Threat-Vulnerability Statement |
Recommended Control Measures |
Existing Control |
Existing Control Effectiveness |
Exposure Potential |
Likelihood |
Impact |
Risk Rating |
|
|
Security Program |
Management has not defined responsibilities for the information security program. [TVS001] |
All information security responsibilities are clearly documented . This is to ensure timely, safe and effective handling of all situations, administration user accounts- including additions, deletions, and modifications. [RCM001] |
|
|
|
|
|
|
|
|
Security Program |
Security breaches occur when dealing with third parties due to a lack of security considerations in the related third party agreement. [TVS002] |
Agreements
with third parties, such as IT vendors, which involve accessing, processing,
communicating with or managing the organization's information or information
processing facilities, or adding products or services to information
processing facilities cover all relevant security requirements. |
|
|
|
|
|
||
|
Security Policy |
Management does not set a clear policy direction in line with business objectives and demonstrate support for, and commitment to, information security. [TVS003] |
An information security policy is approved by management in accordance with business requirements and all relevant laws and regulations. [RCM003] |
|
|
|
|
|
|
|
|
Risk Management & Compliance |
Information around risks and related control options are not presented to management before management decisions are made. [TVS004] |
Risk assessments are conducted to identify, quantify, prioritize and manage risks. The prioritization is accomplished by creating and using criteria for risk acceptance and objectives which are important to the organization. [RCM004] |
|
|
|
|
|
|
|
|
Risk Management & Compliance |
Legislative, statutory, regulatory or contractual obligations related to security are violated due to lack of controls. [TVS005] |
Controls, which are applicable to each situation, have been applied to avoid violations of any legal obligations (e.g. statutory, regulatory, or contractual), and of any security requirements. Access controls could be door locks or computer passwords, while other controls could be firewalls and anti-virus software. [RCM005] |
|
|
|
|
|
|
|
|
Training & Awareness |
Applications and technology solutions are not correctly and securely used since a training curriculum for employees has not been established or regularly updated. [TVS006] |
A training curriculum for employees has been established to educate and train users for correct and secure use of applications and technology solutions. [RCM006] |
|
|
|
|
|
|
|
|
Personnel Security |
Background verification checks are not carried out and management is not aware of academic, professional, credit or criminal backgrounds of employees. [TVS007] |
Background verification checks on all candidates for employment, contractors and third party computer system users are carried out in accordance with relevant laws, regulations and ethics, and relevant to the business requirements, the classification of the information to be accessed, and the perceived risks. [RCM007] |
|
|
|
|
|
|
|
|
Personnel Security |
Employees or contractors do not agree or sign terms or conditions of employment. [TVS008] |
As part of their terms of employment or contractual agreements, employees, contractors and third party users agree and sign the terms and conditions of their employment contract, which should state their responsibilities and the organizations responsibilities for information security. [RCM008] |
|
|
|
|
|
|
|
|
Personnel Security |
Employee, contractor or third party user terminations or change of responsibilities could result in a security breach due to lack of a defined management process for terminations or changes in responsibilities. [TVS009] |
Procedures are in place to ensure the properly managed exit from the organization of employees, contractors or third parties and that all equipment is returned and the removal of all access rights are completed. [RCM009] |
|
|
|
|
|
|
|
|
Physical Security |
Unauthorized parties gain physical access to facilities due to insufficient physical entry/exit controls. [TVS010] |
A facility security plan is implemented, which protects the facility with appropriate entry/exit controls to ensure that only authorized personnel are allowed access, removal of equipment from the facility is restricted to authorized individuals, and repair/modification of physical components of the facility are documented and monitored. Workstations are protected from removal by unauthorized individuals. A contingency plan is implemented for permitting and enabling physical access to alternate authorized individuals (e.g. in the event primary authorized individuals are sick or not available). [RCM010] |
|
|
|
|
|
|
|
|
Network Security |
Sensitive systems co-located with less sensitive systems are accessed by unauthorized parties. [TVS011] |
If possible sensitive systems have a dedicated, and isolated, computing environment. [RCM011] |
|
|
|
|
|
|
|
|
Network Security |
Information involved in electronic messaging is compromised. [TVS012] |
Information involved in electronic messaging is appropriately protected. [RCM012] |
|
|
|
|
|
|
|
|
Network Security |
Technical vulnerabilities are exploited to gain inappropriate or unauthorized access to information systems due to lack of controls for those vulnerabilities. [TVS013] |
Timely information about technical vulnerabilities of information systems being used is obtained, the organization's exposure to the vulnerabilities is evaluated and appropriate measures are taken to address the associated risk. [RCM013] |
|
|
|
|
|
|
|
|
Network Security |
Unauthorized access is given to information over third party connections. [TVS014] |
A formal process is in place to control all external third party network connections. [RCM014] |
|
|
|
|
|
|
|
|
Logical Access |
Unauthorized access is gained to information systems. [TVS015] |
Formal procedures should be in place to control the allocation of access rights to information systems and services. [RCM015] |
|
|
|
|
|
|
|
|
Logical Access |
Unauthorized users are able to gain access to operating systems by claiming to be an authorized user. [TVS016] |
All users are assigned a unique identifier (user ID) for their business use. This unique ID shall be used exclusively on computing systems within the medical practice which process EPHI, and a suitable authentication technique is chosen to validate the identity of a user. [RCM016] |
|
|
|
|
|
|
|
|
Logical Access |
Users that no longer have a business need for information systems access still have access to the information. [TVS017] |
Management reviews and makes the appropriate corrections to the access right(s) of individual users at regular intervals using a formal processą. [RCM017] |
|
|
|
|
|
|
|
|
Operations Management |
Systems and data are exposed to malicious software and/or unauthorized use. [TVS018] |
Policies and procedures are implemented that address the prevention, detection and removal of malicious code in the computer operating environment. This would cover all computers or devices, such as printers and thumb drives, which connect to computers. [RCM018] |
|
|
|
|
|
|
|
|
Operations Management |
Unauthorized information processing activities occur undetected due to lack of consistent logging and monitoring activities. [TVS019] |
Policies and procedures for information system monitoring have been established and implemented. This is done to institute consistency and standards in computer activity logging, computer activity monitoring and reporting of any system events. [RCM019] |
|
|
|
|
|
|
|
|
Operations Management |
Media (e.g., documents, computer media (e.g. tapes, disks), input/output data, system documentation) is compromised by unauthorized parties due to ineffective handling procedures. [TVS020] |
Operating procedures are established to protect documents, computer media (e.g., tapes, disks), input/output data and system documentation. This is done to protect sensitive information from unauthorized disclosure, modification, removal, and destruction. [RCM020] |
|
|
|
|
|
|
|
|
Operations Management |
Unauthorized parties access data from discarded media. [TVS021] |
Equipment containing storage media (e.g. fixed hard disks, CD-ROMs, thumb drives) is checked to ensure that any sensitive data and licensed software has been removed or overwritten prior to disposal. [RCM021] |
|
|
|
|
|
|
|
|
Operations Management |
The production environment is impacted due to the lack of separation of development and production environments. [TVS022] |
Development, test, and operational facilities are separated from one another. This is done to reduce the risks of unauthorized access or unauthorized changes to the computer operational system or to any software applications running upon the operating system. [RCM022] |
|
|
|
|
|
|
|
|
Operations Management |
The integrity of a business process is compromised due to the lack of segregation of duties (e.g., maker & checker). [TVS023] |
Employee duties and employees 'areas of responsibility' are separated; this is to reduce potential opportunities for unauthorized or unintentional modification or misuse of the organization's computing systems or assets. [RCM023] |
|
|
|
|
|
|
|
|
Operations Management |
The change management process in place does not adequately protect the environment from disruptive changes in production. [TVS024] |
Formal 'change policies and procedures' have been established to manage the implementation of changes to assure the adherence to standards and security practices. [RCM024] |
|
|
|
|
|
|
|
|
Incident Management |
Security incidents are not managed with a consistent and effective approach. [TVS025] |
A consistent approach to managing information security incidents, consistent with applicable law, is in place to handle information security events and weaknesses once they are reported. Activities such as incident reporting, organizational response, relocation of operations, evidence collection and system recovery are all components of incident response. [RCM025] |
|
|
|
|
|
|
|
|
Business Continuity Management |
Information systems cannot be recovered due to a lack of written disaster recovery plans. [TVS026] |
Backup and Recovery plans are documented, distributed through the organization and easily obtained by office personnel in the event that an event occurs. The DR Plan must identify the required actions to undertake following interruption to, or failure of, critical IT systems. [RCM026] |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Technology (Step 2b) |
|||||||||
|
|
|||||||||
|
|
|
Perform Control Analysis |
Exposure |
Assess Risk |
|||||
|
Asset Management Category |
Threat-Vulnerability Statement |
Recommended Control Measures |
Existing Control |
Existing Control Effectiveness |
Exposure Potential |
Likelihood |
Impact |
Risk Rating |
|
|
Security Program |
Security breaches occur when dealing with third parties due to a lack of security considerations in the related third party agreement. [TVS002] |
Agreements
with third parties, such as IT vendors, which involve accessing, processing,
communicating with or managing the organization's information or information
processing facilities, or adding products or services to information
processing facilities cover all relevant security requirements. |
|
|
|
|
|
|
|
|
Risk Management & Compliance |
Information around risks and related control options are not presented to management before management decisions are made. [TVS004] |
Risk assessments are conducted to identify, quantify, prioritize and manage risks. The prioritization is accomplished by creating and using criteria for risk acceptance and objectives which are important to the organization. [RCM004] |
|
|
|
|
|
|
|
|
Training & Awareness |
Applications and technology solutions are not correctly and securely used since a training curriculum for employees has not been established or regularly updated. [TVS006] |
A training curriculum for employees has been established to educate and train users for correct and secure use of applications and technology solutions. [RCM006] |
|
|
|
|
|
|
|
|
Personnel Security |
Employees or contractors do not agree or sign terms or conditions of employment. [TVS008] |
As part of their terms of employment or contractual agreements, employees, contractors and third party users agree and sign the terms and conditions of their employment contract, which should state their responsibilities and the organizations responsibilities for information security. [RCM008] |
|
|
|
|
|
|
|
|
Personnel Security |
Employee, contractor or third party user terminations or change of responsibilities could result in a security breach due to lack of a defined management process for terminations or changes in responsibilities. [TVS009] |
Procedures are in place to ensure the properly managed exit from the organization of employees, contractors or third parties and that all equipment is returned and the removal of all access rights are completed. [RCM009] |
|
|
|
|
|
|
|
|
Physical Security |
Unauthorized parties gain physical access to facilities due to insufficient physical entry/exit controls. [TVS010] |
A facility security plan is implemented, which protects the facility with appropriate entry/exit controls to ensure that only authorized personnel are allowed access, removal of equipment from the facility is restricted to authorized individuals, and repair/modification of physical components of the facility are documented and monitored. Workstations are protected from removal by unauthorized individuals. A contingency plan is implemented for permitting and enabling physical access to alternate authorized individuals (e.g. in the event primary authorized individuals are sick or not available). [RCM010] |
|
|
|
|
|
|
|
|
Network Security |
Sensitive systems co-located with less sensitive systems are accessed by unauthorized parties. [TVS011] |
If possible sensitive systems have a dedicated, and isolated, computing environment. [RCM011] |
|
|
|
|
|
|
|
|
Network Security |
Information involved in electronic messaging is compromised. [TVS012] |
Information involved in electronic messaging is appropriately protected. [RCM012] |
|
|
|
|
|
|
|
|
Network Security |
Technical vulnerabilities are exploited to gain inappropriate or unauthorized access to information systems due to lack of controls for those vulnerabilities. [TVS013] |
Timely information about technical vulnerabilities of information systems being used is obtained, the organization's exposure to the vulnerabilities is evaluated and appropriate measures are taken to address the associated risk. [RCM013] |
|
|
|
|
|
|
|
|
Network Security |
Unauthorized access is given to information over third party connections. [TVS014] |
A formal process is in place to control all external third party network connections. [RCM014] |
|
|
|
|
|
|
|
|
Logical Access |
Unauthorized access is gained to information systems. [TVS015] |
Formal procedures should be in place to control the allocation of access rights to information systems and services. [RCM015] |
|
|
|
|
|
|
|
|
Logical Access |
Unauthorized users are able to gain access to operating systems by claiming to be an authorized user. [TVS016] |
All users are assigned a unique identifier (user ID) for their business use. This unique ID shall be used exclusively on computing systems within the medical practice which process EPHI, and a suitable authentication technique is chosen to validate the identity of a user. [RCM016] |
|
|
|
|
|
|
|
|
Logical Access |
Users that no longer have a business need for information systems access still have access to the information. [TVS017] |
Management reviews and makes the appropriate corrections to the access right(s) of individual users at regular intervals using a formal processą. [RCM017] |
|
|
|
|
|
|
|
|
Operations Management |
Systems and data are exposed to malicious software and/or unauthorized use. [TVS018] |
Policies and procedures are implemented that address the prevention, detection and removal of malicious code in the computer operating environment. This would cover all computers or devices, such as printers and thumb drives, which connect to computers. [RCM018] |
|
|
|
|
|
|
|
|
Operations Management |
Unauthorized information processing activities occur undetected due to lack of consistent logging and monitoring activities. [TVS019] |
Policies and procedures for information system monitoring have been established and implemented. This is done to institute consistency and standards in computer activity logging, computer activity monitoring and reporting of any system events. [RCM019] |
|
|
|
|
|
|
|
|
Operations Management |
Media (e.g., documents, computer media (e.g. tapes, disks), input/output data, system documentation) is compromised by unauthorized parties due to ineffective handling procedures. [TVS020] |
Operating procedures are established to protect documents, computer media (e.g., tapes, disks), input/output data and system documentation. This is done to protect sensitive information from unauthorized disclosure, modification, removal, and destruction. [RCM020] |
|
|
|
|
|
|
|
|
Operations Management |
The production environment is impacted due to the lack of separation of development and production environments. [TVS022] |
Development, test, and operational facilities are separated from one another. This is done to reduce the risks of unauthorized access or unauthorized changes to the computer operational system or to any software applications running upon the operating system. [RCM022] |
|
|
|
|
|
|
|
|
Operations Management |
The change management process in place does not adequately protect the environment from disruptive changes in production. [TVS024] |
Formal 'change policies and procedures' have been established to manage the implementation of changes to assure the adherence to standards and security practices. [RCM024] |
|
|
|
|
|
|
|
|
Incident Management |
Security incidents are not managed with a consistent and effective approach. [TVS025] |
A consistent approach to managing information security incidents, consistent with applicable law, is in place to handle information security events and weaknesses once they are reported. Activities such as incident reporting, organizational response, relocation of operations, evidence collection and system recovery are all components of incident response. [RCM025] |
|
|
|
|
|
|
|
|
Business Continuity Management |
Information systems cannot be recovered due to a lack of written disaster recovery plans. [TVS026] |
Backup and Recovery plans are documented, distributed through the organization and easily obtained by office personnel in the event that an event occurs. The DR Plan must identify the required actions to undertake following interruption to, or failure of, critical IT systems. [RCM026] |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Findings-Remediation (Step 3) |
|||||
|
|
|||||
|
Number of High Risks |
0 |
||||
|
Number of Medium Risks |
0 |
||||
|
Total Number of High and Medium Risks |
0 |
||||
|
High and Medium Risks Findings and Remediation |
|||||
|
Risks Found |
Risk Rating |
Existing Control Measures Applied |
Recommended Control Measures |
Additional Steps |
|
|
People and Processes |
|||||
|
Technology |
|||||