A few things we’re great at
Zero-Trust compliance
Are you looking for a Zero Trust compliance assessor? If so, here are some key questions you can use to evaluate an organization’s compliance with Zero Trust principles:
Identity and Access Management:
Does the organization have a centralized identity management system?
Is multi-factor authentication (MFA) implemented for user access?
Are strong password policies in place?
Are user access rights reviewed and updated regularly?
Is there a process for revoking access when employees leave the organization?
Least Privilege Access:
Is access granted on a need-to-know basis?
Are user roles and permissions clearly defined and documented?
Is there a process to regularly review and update access privileges?
Is there a separation of duties enforced to minimize conflicts of interest?
Network Segmentation and Micro-Segmentation:
Is the network divided into isolated segments or micro-segments?
Are network segments logically separated and restricted?
Is there strict enforcement of traffic flow and access control between segments?
Is there a process to monitor and manage network segmentation effectively?
Continuous Monitoring and Analytics:
Is there a system in place for continuous monitoring of user activities and network traffic?
Are security logs and events regularly collected, analyzed, and audited?
Is there a process to detect and respond to anomalous behavior or security incidents promptly?
Are security incidents and breaches properly documented and investigated?
Data Protection:
Are data encryption mechanisms employed to protect sensitive information?
Are data loss prevention (DLP) controls implemented to prevent unauthorized data exfiltration?
Is there a process to classify and categorize data based on sensitivity levels?
Are there mechanisms in place to monitor and control data access and movement?
Secure Remote Access:
Are secure remote access mechanisms, such as VPNs or secure gateways, implemented?
Is there strong authentication required for remote access?
Are there policies and procedures in place to govern remote access and enforce security measures?
Remember to tailor these questions to fit the specific needs and industry requirements of the organization you’re assessing. Stay up-to-date with the latest Zero Trust principles, guidelines, and best practices to ensure a comprehensive assessment.
PSPF compliance
Are you a compliance assessor involved in evaluating an organization’s compliance with the Australian Protective Security Policy Framework (PSPF)? Look no further! Here’s a general framework you can adapt to assess compliance effectively:
Governance and Policy:
Has the organization established a governance structure for managing cyber security, with clear roles, responsibilities, and accountability?
Are there documented policies and procedures aligned with the PSPF requirements?
Has a formal risk assessment been conducted, accompanied by a robust risk management plan?
Information Security:
Are there measures in place to safeguard sensitive government information from unauthorized access, disclosure, and modification?
Have access controls been implemented to ensure appropriate user privileges and authentication mechanisms?
Is there a process for encrypting sensitive information, both in transit and at rest?
Are incident response procedures well-defined, including reporting, analysis, and remediation?
Personnel Security:
Does the organization have documented processes for personnel security, covering background checks, security clearances, and ongoing training?
Are there procedures to manage access rights and privileges based on employees’ roles and responsibilities?
Is awareness training provided to employees regarding cyber security threats and best practices?
Physical Security:
Are physical security measures in place to protect government facilities, assets, and infrastructure?
Is controlled access implemented in sensitive areas, including visitor management processes?
Are surveillance systems and other monitoring mechanisms deployed effectively?
Business Continuity:
Does the organization have a comprehensive business continuity plan that includes provisions for cyber security incidents?
Are there backup and recovery procedures for critical systems and data?
Is there a process for periodically testing and updating the business continuity plan?
Incident Management:
Does the organization have an incident response plan aligned with PSPF guidelines?
Are there procedures for detecting, responding to, and recovering from cyber security incidents?
Is there a streamlined process for incident reporting and coordination with relevant authorities?
Remember, this is a general framework, and customization is key to meet specific organizational requirements. Stay up-to-date with the latest PSPF version and related guidelines from the Australian Government Security Policy Division.
Essential-8 compliance
As an Essential Eight compliance professional, you can use the following template as a starting point to verify an organization’s compliance with the Essential Eight cybersecurity controls. This template covers key aspects of each control and can be customized to suit your specific needs:
Application Whitelisting:
Verify if a documented application whitelisting policy is in place.
Check if all systems have application whitelisting enabled.
Assess if the whitelisting solution is effectively implemented and managed.
Ensure that regular reviews are conducted to update the whitelist and remove unnecessary entries.
Patching Applications:
Verify if there is a documented patch management policy and procedure.
Check if patching is performed regularly and consistently across all applications.
Assess if critical patches are prioritized and applied in a timely manner.
Review the process for testing and validating patches before deployment.
Restricting Administrative Privileges:
Verify if there is a documented policy for managing administrative privileges.
Check if administrative accounts are limited and assigned only to authorized personnel.
Assess if administrative privileges are properly controlled and monitored.
Review the process for granting, revoking, and reviewing administrative access rights.
Patching Operating Systems:
Verify if there is a documented patch management policy and procedure for operating systems.
Check if operating system patches are applied regularly and consistently.
Assess if critical patches are prioritized and applied promptly.
Review the process for testing and validating patches before deployment.
Disabling Untrusted Microsoft Office Macros:
Verify if there is a policy or procedure in place to disable untrusted macros in Microsoft Office.
Check if macros sourced from the internet or untrusted locations are disabled by default.
Assess if there are mechanisms to educate users about the risks of enabling macros.
Review the process for handling exceptions and ensuring trusted macros are properly managed.
Using Multi-Factor Authentication:
Verify if multi-factor authentication (MFA) is implemented for all relevant systems and applications.
Check if MFA is properly configured and enforced for user authentication.
Assess if there are documented procedures for managing MFA settings and exceptions.
Review the process for user enrollment, authentication, and revocation of MFA credentials.
Backing Up Data:
Verify if there is a documented backup policy that covers critical data.
Check if backups are performed regularly and automatically.
Assess if backup integrity and recoverability are tested periodically.
Review the process for data restoration and ensuring backups are stored securely.
Monitoring and Responding to Intrusions:
Verify if there is a documented incident response plan in place.
Check if systems are monitored for intrusions and security events.
Assess if there are processes for incident detection, analysis, and response.
Review the process for reporting incidents, conducting investigations, and implementing remediation actions.
Remember, this template provides a general framework, and you should customize it based on the specific requirements of the organization you are assessing. Additionally, ensure that you stay updated with the latest guidelines and resources provided by the Australian Cyber Security Centre (ACSC) regarding the Essential Eight controls.