Create scoring checklist to show what cybersecurity tools a business have implemented

Network Security Tools

Endpoint Security Tools

  • Install and configure antivirus/anti-malware software on all endpoints.
  • Regularly update antivirus/anti-malware software definitions.
  • Schedule regular scans of endpoints for viruses and malware.
  • Install and configure HIDS on all endpoints.
  • Set up alerts for suspicious activity on endpoints.
  • Regularly review and analyze HIDS logs for potential security incidents.
  • Implement DLP policies to prevent sensitive data loss.
  • Monitor and control data transfers on endpoints.
  • Regularly audit and review DLP policy effectiveness.
  • Deploy EDR solutions on endpoints to detect and respond to threats.
  • Configure EDR to collect endpoint data for analysis.
  • Create incident response plans based on EDR alerts.
  • Enroll all mobile devices in MDM for centralized management.
  • Implement MDM policies for device security and data protection.
  • Enable remote wipe and lock capabilities for mobile devices.
  • Create a list of approved applications for endpoints.
  • Implement application control to block unauthorized software.
  • Regularly update application whitelists based on business needs.
  • Enable full disk encryption on all endpoints.
  • Enforce encryption policies for removable media.
  • Regularly audit devices to ensure encryption compliance.
  • Implement a patch management system for endpoints.
  • Regularly apply security patches and updates to endpoints.
  • Test patches before deployment to prevent system issues.
  • Enable remote wipe functionality on all devices.
  • Document procedures for remote wiping lost or stolen devices.
  • Test remote wipe capabilities to ensure effectiveness.
  • Deploy behavioral analysis tools to detect unusual endpoint behavior.
  • Implement sandboxing technology to isolate suspicious files.
  • Regularly review behavioral analysis and sandboxing alerts.
  • Implement secure VPN or remote desktop solutions for remote access.
  • Enforce multi-factor authentication for remote access.
  • Monitor and log remote access sessions for security purposes.

Security Information and Event Management (SIEM) Tools

Data Security Tools

Cloud Security Tools

Web Application Security Tools

Physical Security Tools

Compliance and Governance Tools

Incident Response Tools

Vendor Risk Management Tools

Related Checklists