220 Managing Network Vulnerability Assessment
Document Included
Not
Available
Policies and Procedures
Information Security Policies
Password & ID policy
Confidential information policies and procedures
Data classification
System Access Policy and Procedures
Mainframe
Network
Internet
Corporate Communication Policies
Electronic/paper communications
Disposal policy
Internet usage policy
Organizational Material
Mission Statements
Organization Charts
Pre-NVA Checklist 221
Priority 2 documents will be needed by <date>.
In the case that a document cannot be delivered, please include an explanation
of why (i.e., does not exist).
Document Included
Not
Available
IS Infrastructure
Detailed System List
Name and location
Description of use
Hardware/software installed
Actual system owner (dept./persons)
System admin (dept./persons)
User access classes
Backup Methods and Procedures
Archival Methods & Procedures
Policies and Procedures
Corporate Security Policy
Employee Handbook
Antivirus Strategy/Policy
Disaster Recovery Plan and Business Continuity Plan
Application Development Procedures
Methodology/SDLC
Promotion to production
Additional Information Needs
Physical Security in Place
Facilities (operations) Plans
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset