Baseline Nonbank Cybersecurity Exam Program

Relationships Between Assets and Data Flow – IT-4

a) Network Diagram(s) b) Data Flow Diagram(s) c) Inventory of approved hardware and software assets, including network monitoring tools

11

Vulnerability Management Program – IT-5

a) Written policies and procedures, if not already provided for #1 above b) Vulnerability scans – most recent c) Penetration tests/vulnerability assessments – most recent d) Remediation Actions

12

Made with FlippingBook - Online Brochure Maker