IT security maintenance procedure
|
• Review the log settings per system. Count the instances where administrator and operator log information is relayed less often that once a minute. |
Logs correlation and analysis
|
• Review clock synchronization settings per system. Count systems with a greater period of synchronization than 12 hours.
• Count the systems that have an emergency change management procedure.
• Count the time needed to perform technical review of an application.
• Count the systems that have an emergency change management procedure. |
Logging
|
• Review the procedure for identification of technical vulnerabilities. Count the systems with a non automatic identification process.
• Count the time elapsed between the reporting of a possible information security weakness / event / incident and the response of the organisation. |