Your checklists (
0
)
AI Checklist Generator
From the makers of
Manifestly Checklists
Sign in
Email address
Email me a magic link
Home
> IT general controls
IT general controls
1. Access Controls
Review user access permissions and ensure they align with job roles.
Gather current user access data.
Compare access levels with job descriptions.
Identify any discrepancies or unauthorized access.
Document findings and necessary adjustments.
Communicate changes to relevant stakeholders.
Implement strong password policies (length, complexity, expiration).
Define minimum password length and complexity requirements.
Set up password expiration timelines.
Educate users on creating strong passwords.
Enforce policies through technical controls.
Regularly assess compliance with password policies.
Ensure multi-factor authentication is in place for critical systems.
Identify critical systems requiring additional security.
Select appropriate multi-factor authentication methods.
Implement the chosen methods across systems.
Train users on how to use multi-factor authentication.
Monitor and adjust as needed for effectiveness.
Regularly review and disable inactive user accounts.
Establish criteria for account inactivity.
Schedule regular reviews of user accounts.
Identify and document inactive accounts.
Disable accounts per established policies.
Notify users of account status changes.
Conduct periodic access reviews and audits.
Define the frequency of access reviews.
Create a checklist for audit criteria.
Gather access data for all users.
Analyze data for compliance with policies.
Report findings and recommend improvements.
2. Change Management
Establish a formal change management policy.
Document all changes with appropriate approvals.
Test changes in a controlled environment before deployment.
Monitor and review changes made to critical systems.
Maintain an inventory of all system configurations and changes.
3. Data Backup and Recovery
Implement regular data backup procedures.
Test backup restoration processes on a scheduled basis.
Ensure offsite storage of backups for disaster recovery.
Document backup schedules and retention policies.
Review and update the disaster recovery plan annually.
4. System Development and Maintenance
Follow a structured development methodology (e.g., Agile, Waterfall).
Conduct security assessments during the development lifecycle.
Document system specifications and architecture.
Ensure adequate testing (unit, integration, user acceptance).
Maintain documentation for system maintenance and updates.
5. Incident Management
Establish an incident response policy and procedure.
Train staff on incident detection and reporting.
Document and analyze incidents to identify root causes.
Review and update the incident response plan regularly.
Conduct drills and simulations to test incident response effectiveness.
6. Physical and Environmental Security
Control physical access to critical IT infrastructure.
Implement environmental controls (temperature, humidity monitoring).
Regularly assess physical security measures and vulnerabilities.
Maintain a visitor log for access to secure areas.
Ensure proper disposal of sensitive materials and equipment.
7. Monitoring and Logging
Implement logging for critical systems and applications.
Regularly review logs for anomalies and unauthorized access.
Ensure log retention policies comply with regulatory requirements.
Use automated tools for log analysis and monitoring.
Document and respond to identified security events promptly.
8. Compliance and Risk Management
Conduct regular risk assessments to identify vulnerabilities.
Ensure compliance with relevant regulations and standards (e.g., GDPR, HIPAA).
Maintain documentation of compliance efforts and audits.
Train staff on compliance requirements and best practices.
Review and update compliance policies regularly.
Download CSV
Download JSON
Download Markdown
Use in Manifestly