My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2025-05-27-minutes-it-study-session
>
Meetings
>
2025
>
10. October
>
2025-10-07 10:00 AM - Commissioners' Agenda
>
2025-05-27-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/2/2025 3:46:32 PM
Creation date
10/2/2025 3:44:53 PM
Metadata
Fields
Template:
Meeting
Date
10/7/2025
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
136417
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
90
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />17/25 <br />PRIVATE - Controlled by Lumifi Cyber <br />Appendix A: Interview Guide <br />Virtual Meetings <br />• Personnel for Interviews, time commitments and questions: <br />• IT Administration / Network Ops / Telecom / Infrastructure / Wireless <br />Networking / Desktop Support / InfoSec Interview Session: Desktop admins, <br />AD admins, Helpdesk, Network Admins, Wireless admins, architects (add <br />InfoSec staff if the same people of if we want to combine efforts) meet for up <br />to 2 hours (or 3-4 hours if we include the Information Security Operations staff <br />if you have that role, which is up to you but might be a good idea. At many <br />places, InfoSec is the same as IT, so these happen together anyway.) <br />• Network Team <br />• Go over network diagram or whiteboard <br />• Describe the use of VPNs <br />• Describe WAN connections <br />• Are VLANs used and are they ACLed? <br />• Do you control what network services and protocols are allowed on the <br />inside of your network? <br />• How do you grant and remove administrative access to network devices? <br />• How do you maintain the patch levels and update to new versions for the <br />network devices? <br />• Do you apply role -based access to network devices? <br />• Do you follow the Principle of Least Privilege when assigning access <br />roles? <br />• Do you follow the manufacturers configuration guides or other secure <br />configuration benchmark like The Center for Internet Security or NIST? <br />• Do you conduct security testing of the network after every significant <br />update or major configuration change? <br />• Describe any RADIUS implementations <br />• Do you use secure configuration benchmarks such as NIST or CIS for <br />guiding configuration of security and network devices? <br />• IT Administrators
The URL can be used to link to this page
Your browser does not support the video tag.