Questions generic
1. What is the company’s network topology, and are critical servers segmented from user devices to prevent unauthorized access?
2. What operating systems run on servers and user devices, and are they fully patched to address known vulnerabilities?
3. How is network traffic monitored, and are intrusion detection systems (IDS) or intrusion prevention systems (IPS) in use?
4. What specific cyber threats (e.g., malware, suspicious logins) have been detected recently, and how were they identified?
5. What user access control policies are in place, such as multi-factor authentication (MFA) or role-based access control (RBAC)?
6. How are user accounts managed, and is there a process to deactivate accounts of former employees promptly?
7. What remote access methods are used (e.g., VPN, RDP), and are they secured with endpoint checks and encryption?
8. Are there sufficient remote access licenses or resources to support the company’s current or planned workforce?
9. What firewall configurations are in use, and do they include real-time monitoring or updated rules to block threats?
10. Are data on servers encrypted, and what backup procedures ensure recovery from data loss?
11. What anti-malware or endpoint protection software is deployed on servers and user devices?
12. What employee training programs exist to prevent phishing or social engineering attacks, and how often are they updated?
13. Are there physical security measures (e.g., locks, CCTV) protecting server rooms or network infrastructure?
14. What incident response plan is in place to handle cyber threats, and how was it applied during recent incidents?
15. How is compliance with data protection laws like GDPR ensured, particularly for customer or personal data?
16. Are wireless access points used, and are they secured with WPA3 or isolated guest networks?
17. What network protocols are permitted, and are outdated ones (e.g., SMBv1) disabled to reduce risks?
18. How is patch management handled for servers, devices, and software, and were unpatched vulnerabilities linked to threats?
19. Are regular security audits or penetration tests conducted, and what were the findings of the last audit?
20. What logging mechanisms (e.g., Windows Event Logs, Syslogs) are monitored to detect unauthorized access?
21. Are any cloud services or virtualized environments used, and how are they secured against threats?
22. What hardware (e.g., PCs, laptops, servers) is in use, and is it compatible with modern security software?
23. How are peripheral services (e.g., print services) secured to prevent unauthorized access to sensitive data?
24. What steps have been taken to address recent cyber threats, and are temporary measures in place?
25. What security measures are planned to support future growth or changes, such as increased staff or new locations?
Comments
Post a Comment