Laserfiche WebLink
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />18/25 <br />PRIVATE - Controlled by Lumifi Cyber <br />• Describe IT and IS policies that apply to your work <br />• Describe desktop and server build and management practices and <br />technologies as well as laptop/mobile workstation build and <br />management practices and technologies <br />• Secure configuration baseline from CIS, NIST, MSFT? <br />• Do you use Shared Accounts such as the Local Administrative Password <br />or Root Account? <br />• Is the Windows Firewall up by default or controlled by the network <br />profile? <br />• What Antivirus is used and how are alerts, missed signature updates and <br />missed software updates alerted and resolved? <br />• Is full disk encryption, such as BitLocker, in use and are Additional <br />Decryption Keys managed by IT? <br />• Describe your AD/LDAP management practices? <br />• Is Role-Based Access Control (RBAC) used for access in <br />applications? Are AD groups used to provide Role -Based Access Control <br />(RBAC) for users access to systems, file shares or applications? How <br />about machines being restricted to what other machines they can access <br />using AG groups? <br />• Are AD Domain Admin and other highly privileged accounts provided <br />limited to only those needing that level of access to do their job? <br />• Do users have local administrator rights on their workstations and are <br />they able to install their own software? <br />• How does the staff find out about the publication of security patches, <br />updates and security fixes and how are they tested, implemented, and <br />validated? <br />• Is local software, like Adobe Acrobat, Flash, Java, etc. patched along <br />with other software on workstations, laptops and servers? <br />• GPOs applied to enforce security: <br />• Password requirements <br />• Account lockout requirements <br />• Logging configuration for servers and workstations <br />• Firewall policy