Laserfiche WebLink
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />19/25 <br />PRIVATE - Controlled by Lumifi Cyber <br />• Describe Mobile device management practices and technologies <br />• Describe VoIP/phone architecture and management practices and <br />technologies including if an IVR is in use <br />• Using PKI or AD certificates? Describe how. <br />• Do you use Shared Accounts such a shared Linux/Unix Root Account or <br />admin on networking gear like switches? <br />• Describe Change control practices <br />• How do you grant and remove access to onsite and SaaS applications? <br />• How do you connect to systems when conducting administrative <br />activities? <br />• Have you documented justification for every rule in your Firewall <br />configurations? <br />• Describe remote access uses and capabilities. <br />• Operational Technologies (OT) <br />• List all OT in use: water, wastewater/sewer, stormwater, electric utility <br />distribution, water production/distribution, Adaptive Traffic <br />Management Systems (ATMS), waste-to-energy plants with <br />technologies such as SCADA, ICS, PLCs, industrial ethernet, RF, HVAC, <br />Card Key, Video Monitoring, parking systems <br />• How is OT in the field, like ATMS cabinets on street corners, secured <br />from tampering? <br />• How are they managed and by whom (Vendor managed?) <br />• How and when are security patches installed on OT systems? <br />• Are Vendors servicing these systems required to get preapproval <br />before working on any OT systems? <br />• Are there employees background checked (usually enforced by <br />contract)? <br />• Are Vendor’s laptops or systems connecting to your network checked <br />for current antivirus protection before being allowed to connect? <br />• CIO/Dir. of IT/CISO/Dir. of Security, Security Personnel: Administrators and <br />Designers of Firewalls, VPNs and Gateways, Intrusion Detection Systems/Intrusion <br />Prevention Systems, Data Loss Prevention, AV/Anti -malware, File Interiority <br />Monitoring, Encryption Systems