IT Examiner School eBook May 2025
Procedure 18 Evaluate the institution’s use of encryption for sensitive institution and customer data at rest and in transit. Consider the following: Databases Mobile devices Email
Back-up media and storage devices Transmissions with third parties Password databases
Click here to enter comments
Baseline Cybersecurity Statements Check if not met (x) All passwords are encrypted in storage and in transit Confidential data are encrypted when transmitted across public or untrusted networks (e.g., Internet) Mobile devices (e.g., laptops, tablets, and removable media) are encrypted if used to store confidential data Wireless network environments require security settings with strong encryption for authentication and transmission Procedure 19 Determine whether adequate physical and environmental monitoring and controls exist. Consider the following: Access to equipment rooms (including telecommunication closets) limited to authorized personnel Adequate HVAC Alarms to detect fire, heat, smoke, and unauthorized physical access Computer/server rooms uncluttered and hazard free Sufficient uninterrupted power supplies (i.e., UPS) Presence of adequate fire suppression Protection of equipment from water damage Environmental sensors where needed (e.g., temperature, humidity, water) Security cameras Click here to enter comments Baseline Cybersecurity Statements Check if not met (x) The physical environment is monitored to detect potential unauthorized access Physical security controls are used to prevent unauthorized access to information systems and telecommunication systems
Made with FlippingBook - Online magazine maker