Your checklists (
0
)
AI Checklist Generator
From the makers of
Manifestly Checklists
Sign in
Email address
Email me a magic link
Home
> NCA Essential Cybersecurity Controls (ECC-2: 2024)
NCA Essential Cybersecurity Controls (ECC-2: 2024)
1. Governance and Risk Management
Establish a cybersecurity governance framework.
Conduct a risk assessment to identify vulnerabilities and threats.
Develop a risk management strategy.
Ensure compliance with relevant laws and regulations.
2. Asset Management
Maintain an inventory of all hardware and software assets.
Classify assets based on sensitivity and criticality.
Ensure proper management of third-party assets and services.
Regularly review and update asset inventory.
3. Access Control
Implement role-based access control (RBAC).
Enforce strong authentication mechanisms.
Regularly review and update access permissions.
Ensure timely deactivation of access for terminated employees.
4. Data Protection
Classify and label sensitive data.
Implement encryption for data at rest and in transit.
Establish data loss prevention (DLP) measures.
Regularly back up critical data and test recovery procedures.
5. Network Security
Implement firewalls and intrusion detection/prevention systems (IDPS).
Segment networks to minimize attack surfaces.
Regularly update and patch network devices and software.
Monitor network traffic for anomalies and threats.
6. Incident Response
Develop and maintain an incident response plan.
Conduct regular incident response training and simulations.
Establish a communication plan for stakeholders during incidents.
Review and update the incident response plan based on lessons learned.
7. Security Awareness and Training
Implement a cybersecurity awareness training program for all employees.
Regularly update training materials to reflect current threats.
Conduct phishing simulations to test employee awareness.
Ensure training completion is tracked and reported.
8. Continuous Monitoring and Improvement
Implement continuous monitoring of security controls and systems.
Regularly assess and test the effectiveness of security measures.
Establish a process for identifying and addressing security gaps.
Update security policies and procedures based on emerging threats and technologies.
9. Compliance and Audit
Conduct regular audits of cybersecurity controls and practices.
Ensure compliance with industry standards and frameworks.
Maintain documentation of compliance efforts and audit findings.
Develop a process for remediation of audit findings.
10. Communication and Reporting
Establish a communication plan for cybersecurity incidents.
Ensure timely reporting of incidents to relevant stakeholders.
Maintain clear documentation of incidents and responses.
Regularly review and update communication protocols.
Download CSV
Download JSON
Download Markdown
Use in Manifestly