1.
Are there written security policies and procedures in place?
2.
Are password and access controls in place and enforced?
3.
Are anti-virus and anti-malware solutions deployed?
4.
Are system logs regularly reviewed and monitored?
5.
Is data encrypted at transit and rest?
6.
Are security awareness and training programs in place?
7.
Is there a disaster recovery and business continuity plan?
8.
Are network and perimeter defenses in place?
9.
Is vulnerability and patch management a regular practice?
10.
Is there an existing asset inventory for all hardware and software systems, that managed by the company ?
11.
Is multi-factor authentication used for remote access?
12.
Is software up-to-date with security patches?
13.
Are potential cybersecurity incidents identified and reported?
14.
Is email security protection implemented?
15.
Are network and system configurations regularly reviewed and updated?