1. Access Control:
This audit item examines the methods used to control access to computers, networks, and applications to ensure that only authorized personnel have access. It also ensures that users are assigned appropriate permissions according to their roles and responsibilities.
2. Data Backup & Recovery Plan:
A data backup system should be in place for recovering lost or corrupted data due to disasters or other events beyond regular operations such as malware attacks. This audit item reviews the existing plan for regularly backing up important data and ensuring it can be quickly recovered in case of an emergency.
3. Asset Inventory Management:
An accurate inventory of hardware, software, and other IT assets is essential for organizations to track usage and prevent security risks from unauthorized hardware or software use. This audit item reviews the existing inventory management system to ensure the accuracy and completeness of records.
4. Network Security Management:
This audit item examines network security policies, procedures, and tools that protect against unauthorized access or malicious activity. It also ensures that any changes made to the network are properly documented and monitored for security compliance.
5. Change Control:
Unauthorized changes to IT systems can cause serious damage if not managed correctly. This audit item evaluates processes in place to control changes such as configurations, software installations, hardware upgrades, and user access requests.
6. Software Licensing & Compliance:
It is important to keep track of all software licenses to maintain legal compliance when using commercial software products. This audit item verifies license status and examines procedures in place to ensure compliance when purchasing, installing, and using the software.
7. Security Awareness Training:
Employees should be trained on security best practices and policies to reduce the risk of data breaches or other malicious activities from within the organization. This audit item evaluates existing security awareness training programs for adequacy and effectiveness.
8. Incident Response Plan:
An incident response plan outlines processes for responding quickly and efficiently to any security incidents that may occur. This audit item reviews existing plans for identifying an appropriate response procedure as well as personnel responsible for executing each step of the plan.