SlideShare une entreprise Scribd logo
1  sur  5
CNS 397/599 Spring 2014
1
Test Plan for a Key Control
Control Name Control Objective Steps to follow to test if the control,
as designed, will effectively meet
the control objective
Steps to follow to test if the
control is being performed
within the organization
according to the control
design
How often should
control be tested?
Log Off –
Time Interval
To ensure a PC/laptop is
logged off automatically
after a given interval of
time of inactivity.
(Refer to NLEN Training “Security
Awareness” PowerPoint for steps
on how to implement this control)
Employee or whomever can
spot check if the PC/laptop
logs off after a given interval
time limit.
Automatically set to
perform this action on
a given interval of
inactivity.
Log Off –
Desktop Icon
To ensure a PC/laptop is
logged off to prevent
unauthorized access
from the user’s account.
(Refer to NLEN Training “Security
Awareness” PowerPoint for steps
on how to implement this control)
You can spot check a random
sample (let’s say 10) and
check if employees,
volunteers, and clients are
using the desktop icon after
using a PC/laptop.
Twice per Week
Encryption Preventing sensitive
computer file data from
being seen, taken, or
leaked.
(Refer to NLEN Training “Security
Awareness” PowerPoint for steps
on how to implement this control)
You can perform a survey to
see who takes files off-site.
Then make them fill out the
passphrase document sheet.
Would have to ask
employees if
encryption is used,
also refer to
passphrase document
sheet.
CNS 397/599 Spring 2014
2
Access
Controls
To ensure that
employees, volunteers,
clients, and visitors each
their own personal login
Refer to NLEN Information Security
Design and Test Control to view
screenshots on how to create user
accounts
By following the screenshots
an admin at NLEN will be
able to see that they are
following the steps properly
to create users for
volunteers, clients, and
visitors
Monthly by checking
to see what user
accounts have been
disabled, passwords
are being changed and
steps being taken each
time a new volunteer,
client or visitor walk
into NLEN.
File Inventory To ensure that clients
paper files are secured
properly and stored in a
safe area and logged
accurately
Securing the boxes that store client
paper files with masking tape and
creating a log which is available in
the NLEN Training Awareness
PowerPoint
Securing the boxes and
creating the log will allow
NLEN to be able to see who
has accessed the paper files
Weekly by checking
the log to see if
employees have
signed in/out paper
files accurately and
ensuring that the
boxes stayed secured
with masking tape at
all times.
Server Room To ensure that computer
logs are done to make
sure that no system
violations occurred
In command prompt run “sfc
/scannow” this will let you know if a
violation occurred
Have a manual set timer on all
computers and then check a
concatenated log file and
search for and integrity
violations
Daily by checking the
log files every day you
will know if a violation
occurred; addressing
the problem afterwards
ASAP.
CNS 397/599 Spring 2014
3
Inventory To identify network
devices for accountability,
trouble shooting, secure
the devices, and know
which devices are
assigned to staff.
Periodic spot checks by manager(s) or
designated staff member(s) of assets
against the inventory list.
When new assets are added or
removed from the network and
when there is new staff hired
and staff leaving NLEN the
inventory should reflect the
changes.
Upon increase/decrease
of assets and staff.
When no change of
assets or staff at least
once annually.
Temporary
Use of
Equipment
Maintain accountability
of portable devices.
Periodic spot checks by manager(s) or
designated staff member(s) of assets
against the inventory list.
All equipment issued and
accounted for by custody form
completed by user.
Check weekly to
maintain
accountability. If no
issues check monthly.
CNS 397/599 Spring 2014
4
CNS 397/599 Spring 2014
5

Contenu connexe

En vedette

Steve Binger - Resume & Project List
Steve Binger - Resume & Project ListSteve Binger - Resume & Project List
Steve Binger - Resume & Project ListStephen Binger
 
AirAsiaInDilli - RepIndia
AirAsiaInDilli - RepIndia AirAsiaInDilli - RepIndia
AirAsiaInDilli - RepIndia RepIndia
 
Winter_brochure_en
Winter_brochure_enWinter_brochure_en
Winter_brochure_enS Birr
 
The Alpina Gstaad Summer Season 2015 Brochure (Web Version)
The Alpina Gstaad Summer Season 2015 Brochure (Web Version)The Alpina Gstaad Summer Season 2015 Brochure (Web Version)
The Alpina Gstaad Summer Season 2015 Brochure (Web Version)S Birr
 
Την Κυριακή 5 Ιουλιου ψηφίζουμε ΟΧΙ σε αυτή την πρόταση
Την Κυριακή 5 Ιουλιου ψηφίζουμε ΟΧΙ σε αυτή την πρότασηΤην Κυριακή 5 Ιουλιου ψηφίζουμε ΟΧΙ σε αυτή την πρόταση
Την Κυριακή 5 Ιουλιου ψηφίζουμε ΟΧΙ σε αυτή την πρότασηlanceloty
 
LAWAL Resume Edith
LAWAL Resume EdithLAWAL Resume Edith
LAWAL Resume Edithfriday lawal
 
Anexa 6 eos dental_broschure_en
Anexa 6 eos dental_broschure_enAnexa 6 eos dental_broschure_en
Anexa 6 eos dental_broschure_endumitruioanpop
 
หน่วยที่ 2 การสื่อสารข้อมูลและเครือข่ายคอมพิวเตอร์ 1
หน่วยที่ 2 การสื่อสารข้อมูลและเครือข่ายคอมพิวเตอร์ 1หน่วยที่ 2 การสื่อสารข้อมูลและเครือข่ายคอมพิวเตอร์ 1
หน่วยที่ 2 การสื่อสารข้อมูลและเครือข่ายคอมพิวเตอร์ 1อรยา ม่วงมนตรี
 
CNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurityCNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurityTaishaun Owens
 

En vedette (20)

Resume-Harish_Veligandla
Resume-Harish_VeligandlaResume-Harish_Veligandla
Resume-Harish_Veligandla
 
Steve Binger - Resume & Project List
Steve Binger - Resume & Project ListSteve Binger - Resume & Project List
Steve Binger - Resume & Project List
 
AirAsiaInDilli - RepIndia
AirAsiaInDilli - RepIndia AirAsiaInDilli - RepIndia
AirAsiaInDilli - RepIndia
 
Rakesh_resume
Rakesh_resumeRakesh_resume
Rakesh_resume
 
Winter_brochure_en
Winter_brochure_enWinter_brochure_en
Winter_brochure_en
 
Documentos contables
Documentos contablesDocumentos contables
Documentos contables
 
Ley resorte
Ley resorteLey resorte
Ley resorte
 
The Alpina Gstaad Summer Season 2015 Brochure (Web Version)
The Alpina Gstaad Summer Season 2015 Brochure (Web Version)The Alpina Gstaad Summer Season 2015 Brochure (Web Version)
The Alpina Gstaad Summer Season 2015 Brochure (Web Version)
 
Sistema de gestion de contenidos
Sistema de gestion de contenidosSistema de gestion de contenidos
Sistema de gestion de contenidos
 
Web y pagweb
Web y pagwebWeb y pagweb
Web y pagweb
 
Vinblastine 865-21-4-api
Vinblastine 865-21-4-apiVinblastine 865-21-4-api
Vinblastine 865-21-4-api
 
Την Κυριακή 5 Ιουλιου ψηφίζουμε ΟΧΙ σε αυτή την πρόταση
Την Κυριακή 5 Ιουλιου ψηφίζουμε ΟΧΙ σε αυτή την πρότασηΤην Κυριακή 5 Ιουλιου ψηφίζουμε ΟΧΙ σε αυτή την πρόταση
Την Κυριακή 5 Ιουλιου ψηφίζουμε ΟΧΙ σε αυτή την πρόταση
 
Tegaserod 145158-71-0 -api
Tegaserod 145158-71-0 -apiTegaserod 145158-71-0 -api
Tegaserod 145158-71-0 -api
 
LAWAL Resume Edith
LAWAL Resume EdithLAWAL Resume Edith
LAWAL Resume Edith
 
Anexa 6 eos dental_broschure_en
Anexa 6 eos dental_broschure_enAnexa 6 eos dental_broschure_en
Anexa 6 eos dental_broschure_en
 
La internet
La internetLa internet
La internet
 
Sistema de gestion de contenidos
Sistema de gestion de contenidosSistema de gestion de contenidos
Sistema de gestion de contenidos
 
หน่วยที่ 2 การสื่อสารข้อมูลและเครือข่ายคอมพิวเตอร์ 1
หน่วยที่ 2 การสื่อสารข้อมูลและเครือข่ายคอมพิวเตอร์ 1หน่วยที่ 2 การสื่อสารข้อมูลและเครือข่ายคอมพิวเตอร์ 1
หน่วยที่ 2 การสื่อสารข้อมูลและเครือข่ายคอมพิวเตอร์ 1
 
CNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurityCNS599_NLEN_InformationSecurity
CNS599_NLEN_InformationSecurity
 
Loomis Direct
Loomis DirectLoomis Direct
Loomis Direct
 

Similaire à CNS599_TestPlanControl

Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Doryan Mathos
 
Cyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.comCyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.comamaranthbeg95
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comamaranthbeg55
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxRichardSugbo
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigatericharddxd
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Papertafinley
 
Security curator presentation_eng
Security curator presentation_engSecurity curator presentation_eng
Security curator presentation_engatompark2
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstractsncct
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromiseCal Bryant
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
Planning for a successful access control system installation
Planning for a successful access control system installationPlanning for a successful access control system installation
Planning for a successful access control system installationUmbrella Technologies
 
Intro To Continuous Delivery
Intro To Continuous DeliveryIntro To Continuous Delivery
Intro To Continuous DeliveryBhanu Musunooru
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration TestingKiwiQA
 
3 windowssecurity
3 windowssecurity3 windowssecurity
3 windowssecurityricharddxd
 

Similaire à CNS599_TestPlanControl (20)

Testing
TestingTesting
Testing
 
Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014
 
Engica Q4 Safety brocure - Permit to Work - ISSOW
Engica Q4 Safety brocure - Permit to Work - ISSOWEngica Q4 Safety brocure - Permit to Work - ISSOW
Engica Q4 Safety brocure - Permit to Work - ISSOW
 
Cyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.comCyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.com
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.com
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Paper
 
Security curator presentation_eng
Security curator presentation_engSecurity curator presentation_eng
Security curator presentation_eng
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
 
Effective Software Test Case Design Approach
Effective Software Test Case Design ApproachEffective Software Test Case Design Approach
Effective Software Test Case Design Approach
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Planning for a successful access control system installation
Planning for a successful access control system installationPlanning for a successful access control system installation
Planning for a successful access control system installation
 
Intro To Continuous Delivery
Intro To Continuous DeliveryIntro To Continuous Delivery
Intro To Continuous Delivery
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
 
Web application security measures
Web application security measuresWeb application security measures
Web application security measures
 
3 windowssecurity
3 windowssecurity3 windowssecurity
3 windowssecurity
 

CNS599_TestPlanControl

  • 1. CNS 397/599 Spring 2014 1 Test Plan for a Key Control Control Name Control Objective Steps to follow to test if the control, as designed, will effectively meet the control objective Steps to follow to test if the control is being performed within the organization according to the control design How often should control be tested? Log Off – Time Interval To ensure a PC/laptop is logged off automatically after a given interval of time of inactivity. (Refer to NLEN Training “Security Awareness” PowerPoint for steps on how to implement this control) Employee or whomever can spot check if the PC/laptop logs off after a given interval time limit. Automatically set to perform this action on a given interval of inactivity. Log Off – Desktop Icon To ensure a PC/laptop is logged off to prevent unauthorized access from the user’s account. (Refer to NLEN Training “Security Awareness” PowerPoint for steps on how to implement this control) You can spot check a random sample (let’s say 10) and check if employees, volunteers, and clients are using the desktop icon after using a PC/laptop. Twice per Week Encryption Preventing sensitive computer file data from being seen, taken, or leaked. (Refer to NLEN Training “Security Awareness” PowerPoint for steps on how to implement this control) You can perform a survey to see who takes files off-site. Then make them fill out the passphrase document sheet. Would have to ask employees if encryption is used, also refer to passphrase document sheet.
  • 2. CNS 397/599 Spring 2014 2 Access Controls To ensure that employees, volunteers, clients, and visitors each their own personal login Refer to NLEN Information Security Design and Test Control to view screenshots on how to create user accounts By following the screenshots an admin at NLEN will be able to see that they are following the steps properly to create users for volunteers, clients, and visitors Monthly by checking to see what user accounts have been disabled, passwords are being changed and steps being taken each time a new volunteer, client or visitor walk into NLEN. File Inventory To ensure that clients paper files are secured properly and stored in a safe area and logged accurately Securing the boxes that store client paper files with masking tape and creating a log which is available in the NLEN Training Awareness PowerPoint Securing the boxes and creating the log will allow NLEN to be able to see who has accessed the paper files Weekly by checking the log to see if employees have signed in/out paper files accurately and ensuring that the boxes stayed secured with masking tape at all times. Server Room To ensure that computer logs are done to make sure that no system violations occurred In command prompt run “sfc /scannow” this will let you know if a violation occurred Have a manual set timer on all computers and then check a concatenated log file and search for and integrity violations Daily by checking the log files every day you will know if a violation occurred; addressing the problem afterwards ASAP.
  • 3. CNS 397/599 Spring 2014 3 Inventory To identify network devices for accountability, trouble shooting, secure the devices, and know which devices are assigned to staff. Periodic spot checks by manager(s) or designated staff member(s) of assets against the inventory list. When new assets are added or removed from the network and when there is new staff hired and staff leaving NLEN the inventory should reflect the changes. Upon increase/decrease of assets and staff. When no change of assets or staff at least once annually. Temporary Use of Equipment Maintain accountability of portable devices. Periodic spot checks by manager(s) or designated staff member(s) of assets against the inventory list. All equipment issued and accounted for by custody form completed by user. Check weekly to maintain accountability. If no issues check monthly.