Your checklists (
0
)
AI Checklist Generator
From the makers of
Manifestly Checklists
Sign in
Email address
Email me a magic link
Home
> IT general controls
IT general controls
1. Access Controls
Review user access rights to systems and applications.
Ensure that user accounts are created, modified, and deleted according to policy.
Verify that access is restricted based on the principle of least privilege.
Conduct regular access reviews and audits to identify unauthorized access.
Ensure multi-factor authentication is implemented where applicable.
2. Change Management
Establish a formal change management policy and procedure.
Document all changes to systems, applications, and infrastructure.
Review and approve changes through a change advisory board (CAB) process.
Conduct testing and validation of changes before deployment.
Maintain a rollback plan for critical changes in case of failure.
3. Data Backup and Recovery
Implement a data backup policy that defines backup frequency and retention.
Test backup and recovery processes regularly to ensure effectiveness.
Secure backup data to prevent unauthorized access.
Document and maintain an up-to-date disaster recovery plan.
Ensure that backup procedures are followed consistently across the organization.
4. Incident Management
Establish an incident response policy and procedure.
Train staff on incident detection and reporting mechanisms.
Maintain a log of all incidents and responses for analysis.
Conduct post-incident reviews to identify lessons learned and areas for improvement.
Communicate incident response plans to all relevant stakeholders.
5. System Development Life Cycle (SDLC) Controls
Define and document SDLC processes and standards.
Ensure that security requirements are integrated into the SDLC.
Conduct code reviews and testing for vulnerabilities before deployment.
Maintain documentation of system changes and development activities.
Train development staff on secure coding practices.
6. Physical and Environmental Controls
Restrict physical access to critical IT infrastructure and data centers.
Monitor physical access through surveillance and access control systems.
Ensure that environmental controls (e.g., HVAC, fire suppression) are in place and functional.
Conduct regular physical security assessments and audits.
Maintain an inventory of IT assets and their physical locations.
7. Monitoring and Logging
Implement logging policies for critical systems and applications.
Regularly review logs for signs of unauthorized access or anomalies.
Ensure that logs are retained according to compliance and regulatory requirements.
Utilize automated tools for log analysis and threat detection.
Establish procedures for responding to suspicious or anomalous log entries.
8. Compliance and Audit
Identify applicable laws, regulations, and standards for IT controls.
Conduct regular internal and external audits of IT controls.
Document findings and ensure timely remediation of identified issues.
Maintain records of compliance activities and audit results.
Review and update policies and procedures based on audit findings and changes in regulations.
Download CSV
Download JSON
Download Markdown
Use in Manifestly