Laserfiche WebLink
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />21/25 <br />PRIVATE - Controlled by Lumifi Cyber <br />• Do you require secure baseline configurations for all IT systems and do you <br />regular monitor those configurations? <br />• Do you use Network Access Control technologies? <br />• Is your firewall in a Default Deny configuration? <br />• Are all rules documented with a business function? <br />• Are the firewalls and any network ACLs reviewed regularly? <br />• Describe the Monitoring, Alerting and Incident Response systems and <br />processes <br />• Describe the Vulnerability Management systems and processes <br />• Describe the process of gathering security requirements for new or updated <br />technology and infrastructure <br />• Describe the Security Testing systems and processes in use and how the <br />findings are incorporated into the environment and processes <br />• Do you conduct audits on the network and on system to find regulated or <br />classified data and assess if it is being handled correctly? <br />• Do you use any data monitoring technologies or is DLP incorporated into the <br />regulated or classified data protection measures? <br />• How are resets performed and how are identities verified prior to issuance <br />of a new password? <br />• HR Interview Session: Staff who are knowledgeable about hiring, termination, job <br />role change, and training practices, approximately ½ hour. <br />• Hiring process, termination process, training requirements policy <br />enforcement <br />• Do you conduct Background Checks prior to hiring and for what positions? <br />• Describe standard and hostile terminations or job position shifts? <br />• Do you assist in enforcement of Policy violations? Do you use a progressive <br />discipline system? <br />• How does HR notify other departments and the facilities managers of an <br />upcoming separation? Are there forms used to track the collection of assets <br />and the removal of both physical and logical access? <br />• Procurement Interview Session: Purchasing, Contracts, approximately ½ hour. <br />• Describe security in the procurement process - Are security risks weighed <br />as a part of the procurement process?