Page 42 - ITGC_Audit Guides
P. 42

o  Ensuring that network components are secured and configured according to
                              organizational policies that are aligned to applicable regulations and industry best
                              practices.

                          o  Monitoring the dark web for compromised emails/passwords and verifying that
                              passwords are changed frequently.
                          o  Ensuring appropriate anti-malware and anti-phishing software are deployed.

                          o  Conducting mandatory employee awareness training for anti-malware and anti-
                              phishing software.
                      Ensuring appropriate access.

                          o  Ensuring that access to switches is restricted and that technicians routinely maintain
                              and update them for functionality.
                          o  Ensuring that physical access to routers is restricted. Routers almost always have
                              remote access capabilities for the devices themselves. These should be secured with
                              strong passwords and monitored for failed login attempts.
                          o  Verifying that remote users are required to use two-factor authentication.

                      Ensuring patch maintenance. Ensuring the latest security patches and firmware updates
                       are installed on network components (e.g., firewalls, routers, printers, and Voice over Internet
                       Protocol (VoIP) phones).
                      Ensuring appropriate management of third-party network risks. This is applicable if
                       network management is outsourced and if so, ensuring the vendor’s security programs are
                       robust, efficient, effective, and accessible.







































                   34 — theiia.org
   37   38   39   40   41   42   43   44   45   46   47