Your checklists (
0
)
AI Checklist Generator
From the makers of
Manifestly Checklists
Sign in
Email address
Email me a magic link
Home
> access control
access control
Physical Access Control
Physical Barriers*: Are there physical barriers in place to restrict unauthorized access?
Doors and Entry Points*: Are all doors and entry points properly secured and controlled?
Locking Mechanisms*: Are the locking mechanisms strong and tamper-proof?
Keys and Key Management*: Are keys properly managed, with restricted access and regular audits?
Video Surveillance*: Is there a comprehensive video surveillance system in place?
Alarm Systems*: Are alarm systems installed and functional to alert unauthorized access attempts?
Visitor Management*: Is there a process for visitor registration and tracking?
Security Guards*: Are security guards deployed to monitor and control access?
Logical Access Control
User Accounts*: Are user accounts created based on the principle of least privilege?
Passwords*: Are strong and unique passwords enforced for all user accounts?
Multi-Factor Authentication*: Is multi-factor authentication implemented for critical systems?
User Access Reviews*: Are regular reviews conducted to ensure user access is still necessary and appropriate?
Account Lockouts and Suspensions*: Is there a mechanism to lock out or suspend accounts after a certain number of failed login attempts?
Audit Logs*: Are audit logs enabled and monitored to detect unauthorized access attempts?
Network Access Control*: Is network access controlled through firewalls, VLANs, or other mechanisms?
Data Encryption*: Is sensitive data encrypted both at rest and in transit?
Administrative Access Control
Access Control Policies*: Are access control policies defined, communicated, and regularly updated?
Role-Based Access Control*: Is role-based access control implemented to ensure users have access based on their job responsibilities?
Access Control Training*: Do employees receive training on access control best practices?
Incident Response*: Is there an incident response plan in place to address access control breaches?
Vendor Access*: Are access controls in place for vendor and third-party access to systems?
Data Backup and Recovery*: Are regular data backups performed and tested for recovery?
Physical and Digital Asset Inventory*: Is there an inventory of all physical and digital assets, and are access controls in place for their protection?
Compliance and Auditing
Compliance with Regulations*: Are access control measures aligned with relevant industry regulations and compliance requirements?
Regular Audits*: Are regular audits conducted to evaluate the effectiveness of access control measures?
Vulnerability Assessments*: Are vulnerability assessments performed to identify potential access control weaknesses?
Penetration Testing*: Are periodic penetration tests conducted to simulate real-world attacks on access controls?
Security Incident Reporting*: Is there a process to report and investigate security incidents related to access control?
Note: This checklist is provided as a general guide and may need to be customized based on specific organizational requirements and industry regulations.
Download CSV
Download JSON
Download Markdown
Use in Manifestly