Load answers from file:

Infrastructure Security Questionnaire🔗
Questionnaire Options🔗
Select the options that describe your project. These settings configure the questionnaire to fit different scenarios.
Network🔗
Why this section matters: Your network is the foundation of your IT infrastructure and the first line of defense against external attackers. If the devices that make up your network are not adequately maintained and secured, an attacker might gain access to confidential information.
It's essential to have a written set of guidelines for the configuration, maintenance, and use of your network. Written guidelines and rules help preserve the availability, integrity, and confidentiality of the network itself, and well as the information transmitted over it.
Firewalls are a basic network security control. Does your company use firewalls to restrict traffic into and out of your network at strategic points?
Is encryption and integrity protection in place for all internal network traffic that potentially carries sensitive information (including passwords, emails, files, source code, management traffic, etc.)?
Have you implemented monitoring and alerting for your network?
Do you operate wireless networks that allow access to private aspects of your infrastructure (i.e., Wi-Fi networks, excluding networks that only allow guests access to the Internet)?
Do you operate a VPN that allows remote access to your network?
Is the management of your network (or parts thereof) outsourced?
Servers🔗
Why this section is relevant: Servers are an important piece of the overall attack surface of any IT infrastructure. Even seemingly less-sensitive systems should be carefully evaluated, because a single poorly configured system can help an attacker get a foot in the door. From there, they might gain access to more sensitive systems nearby (other servers, clients, etc.).
Do you have operating system hardening in place, or build standards for server systems?
Do you have a process for installing operating system and application updates and security patches on servers?
Are your systems configured to log security-relevant events, such as authentication, data access, etc.?
Administrative Access🔗
Select the operating systems that are currently in use on your servers:
Backups🔗
Do you store backups on disks, tapes, or other kinds of removable media?
Do you have procedures in place for working with customers to determine an appropriate backup frequency?
Do you regularly test your backups?
Is the management of your servers (or parts thereof) outsourced?
Clients (Workstation, Laptops, etc.)🔗
Why this section matters: In most companies, almost all IT-related work is performed from client computers. Even if certain data is stored in the cloud or on highly secure servers, it's the laptops and desktops that are used to access this information. An attacker who manages to compromise a client computer will in most cases be able to completely impersonate the user of the machine, gaining the same access rights. If an administrator's client machine is affected by an attack, the attacker will likely be able to escalate their foothold to many other important systems in your company. It's therefore critical to ensure the security of the client machines used by your employees.
Do you have operating system hardening and/or build standards for client systems?
Do you have a process for installing operating system and application updates and security patches on client systems?
Do you have controls in place to protect client systems from malware?
Are your client systems configured to log security-relevant events, such as authentication, data access, etc.?
What level of access do regular users have on their workstation/laptop?
Do all clients use the same local administrator/root password?
One major risk factor in many corporate environments is the use of older versions of Windows. Does your company still have systems running Windows XP or even earlier versions?
Encryption🔗
Do you fully encrypt the hard disks of laptops and other portable client devices?
Do you allow access to confidential information (e.g., email) from unencrypted mobile devices such as phones and tablets?
Technical Security Testing🔗
Why this section matters: In addition to audits of your information security program, you should perform technical security testing of information systems to make sure they function as intended, and that the data is properly protected. Some security issues, particularly in proprietary software, can only be identified manually; therefore both manual and automated testing should be performed. Even if the project exclusively uses standard off-the-self software, technical security testing helps ensure that software and infrastructure are configured securely and free of known security issues.
Does an independent third party regularly perform penetration tests on all systems used to provide services to customers?
Are all of the systems used in this project scanned for host-level vulnerabilities? (Note: This question does not refer to anti-malware scans. Instead, it refers to scans that look for known vulnerabilities and misconfiguration of the software running on servers.)
In addition to third-party penetration tests and security scans, do you have security know-how internally, and do you use that know-how to conduct in-house security testing?
Security Contact🔗

Feedback🔗

Status: No changes
Download Answers Reset Questionnaire