|
Risk Management Processes | ✓ | ✓ | ✓ |
Risk Decisions | ✓ | ✓ | ✓ |
Actionable Executive Decision Making | | ✓ | ✓ |
Comprehensive Risk Management | | ✓ | ✓ |
Infosec Risk Defined & Documented | | ✓ | ✓ |
Risk Tolerance Determined & Clear | | | ✓ |
Risk Identified & Prioritized | | | ✓ |
Threats Identified & Documented | | | ✓ |
Tolerance Informed by Infrastructure & Sector | | | ✓ |
|
Evacuation Procedures | ✓ | ✓ | ✓ |
Employee Training | ✓ | ✓ | ✓ |
Formalized Policies & Procedures | | ✓ | ✓ |
Emergency Response Plan | | ✓ | ✓ |
Security Exercises Conducted | | ✓ | ✓ |
Background Checks | | ✓ | ✓ |
Security Guards | | ✓ | ✓ |
Areas of Refuge | | ✓ | ✓ |
Formal Facility Threat Analysis Every 2 Years | | | ✓ |
Regular Facility Physical Risk Assessments | | | ✓ |
|
Firewall Manager | ✓ | ✓ | ✓ |
Firewall Routing | ✓ | ✓ | ✓ |
Data Loss Prevention | | ✓ | ✓ |
DMZ Network | | ✓ | ✓ |
Traffic Reviewed For Malware | | ✓ | ✓ |
Egress Traffic Restrictions | | ✓ | ✓ |
Network-Based Intrusion Protection | | ✓ | ✓ |
Multiple Internet Circuits From Multiple ISPs | | | ✓ |
Redundant Internet Firewall | | | ✓ |
Web Content Filtering | | | ✓ |
|
Blacklists & Whitelists | ✓ | ✓ | ✓ |
Isolated Internal Networks | ✓ | ✓ | ✓ |
Firewall Auditable Change Control | | ✓ | ✓ |
Formal Firewall Change Approval | | ✓ | ✓ |
Documented Firewall Review Schedule | | ✓ | ✓ |
Network-based Intrusion Prevention Systems | | ✓ | ✓ |
Internet-facing Systems Hardening Documented | | ✓ | ✓ |
Unauthorized Firewall Changes -> Incident Management Process | | | ✓ |
Additional Protections on Internet-Accessible and DMZ Servers | | | ✓ |
Egress Traffic Filtering Specifically Authorized | | | ✓ |