TPRA Checklist
TPRA Checklist
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
Is there a periodic user access review for the user profiles by the
1 Access Control
system administrator? Mention the details of the sample evidence.
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
Are the ports blocked for floppy/CD/DVD drives & USB Ports?
11 Access Control Does the Vendor have any centralized mechanism in place to track
the same? Mention the details of the mechanism.
What are the different levels of administrator privileges for system
12 Access Control access on "Company name" specific servers?
Are these access rights periodically reviewed ?
Are the network access points (Wi-Fi) at Vendor's premises available
13 Access Control in public areas like reception, conference rooms etc.?
Can unauthorized personnel connect to Wi-Fi network?
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
Is the movement of assets (used for "Company name" operations)
25 Asset Management
tracked / monitored and reconciled at the Vendor facility ?
Is there a mechanism to ensure that only licensed software /
26 Asset management applications are installed on the systems? Mention the details of the
mechanism.
Is there an alternate/BCP location facility & supporting facility to
continue "Company name" operations?
Business continuity
27 Is testing done for movement of "Company name" operations from
management
primary site to alternate site?
Check the testing report
Does the organization have a documented IT DR plan addressing
Business continuity
28 people, process & systems related to "Company name" operations?
management
Is it communicated to concerned employees?
Can the backed up data be restored and made available at the
Business continuity alternate site at any point in time?
29
management Can the critical data be restored in the time frame as agreed with
"Company name"?
Business continuity Is there secondary network link available which can be used in case
30
management of failure of primary network link?
Does the vendor store, process, transmit "Company name" data
over cloud from cloud service providers?
31 Cloud Security
Where is the data stored within India or overseas ? Please provide
details.
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
Does the Vendor have a provision of shared email account.
38 Email Usage Verify and mention if there is a mechanism in place to ensure
accountability of shared email accounts, if any.
Does the Vendor have a defined Data Leakage Prevention(DLP)
mechanism in place to ensure that the "Company name" data is not
39 Email Usage sent via email to non-"Company name" IDs?
Does the vendor has Mail Authentication System (Like DMARC) in
place? (Based on applicability)
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
1. Do you have a documented and approved Information Security
policy and procedures?
Information Security 2. Is there an owner specified, who is responsible for maintaining
46
Policy & Management the information security policy?
Specify the date (Enter in comments column) on which
management last approved the policy, if applicable.
Do you have an acceptable usage policy (for usage of corporate
computing resources including restriction on using email, USB,
Information Security
47 Internet browsing)?
Policy & Management
Is it mandated to all the employees?
Do you have Internet/Intranet access and Email usage policy?
Does the Vendor have a defined policy for data handling.
Information Security
48 Does the policy cover Data Privacy and Secure usage, storage and
Policy & Management
destruction of confidential data?
Information Security
49 Do you have Key Management or Encryption / Decryption Policy?
Policy & Management
Do you have Security incident management policy?
Does the policy cover the following:
Information Security - Security Incidents
50
Policy & Management - Security Weakness
- Software Malfunctions
- Malicious Software
Do you have Access Control, Physical security policy and
procedure?
Does the policy cover the following(if applicable):
Information Security -physical access, system/user access ( role based access control &
51
Policy & Management structured process for creation of new user account for "Company
name" operations)
-hardware, software, storage media, paper recorders, photo copiers,
mail, fax, facilities(access control)
Do you have Disaster recovery and business continuity plan / policy
Information Security
52 covering people, process & system related to "Company name"
Policy & Management
operation?
Do you have an Asset Management Policy?
Information Security
53 Does the policy includes classification & protection of sensitive IT
Policy & Management
assets covering "Company name" activities/processes?
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
Do you have a backup and recovery policy?(Covering "Company
name" Operations)
Does the Backup & Recovery Policy & Procedure document
considers the following -
- essential business information & software to be backed up?
Information Security
54 - servers to be backed up?
Policy & Management
- audit trail & logs?
- frequency of backup?
- Logging of Backup activity?
- Retention period for backup?
- Roles & responsibilities defined & assigned?
Information Security
55 Do you have Anti-Malware/Anti-Virus Policy?
Policy & Management
Are all the policies communicated to all the employees working for
Information Security
56 "Company name"? If yes, mention the method and frequency of
Policy & Management
communication?
1. Do you have a Risk Management Policy(Assets) ?
Information Security 2. Mention the frequency defined for conducting regular
57
Policy & Management Vulnerability & Risk Assessments.
Information Security What is the data retention and purging policy or procedure? Is it
58
Policy & Management same or different for encrypted, decrypted and un-encrypted data?
Does the vendor have a comprehensive Mobile Device and
Information Security Communications Policy covering use of Handheld devices, portable
59
Policy & Management devices, mobiles, laptops, tablets etc. for Operations including
"Company name".
Do you have repository of customer complaints reported to the
60 Miscellaneous Checks
bank?(if applicable)
61 Miscellaneous Checks Do you have appropriate mechanism to prevent & detect fraud ?
Does the vendor have a comprehensive network architecture
diagram covering infrastructure used for "Company name"
62 Network Management
operations? Mention the details for the same.(E.g. Design approval
details)
63 Network Management Are all internet facing servers placed in DMZ?
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
Is the firewall configured for the stateful inspection/dynamic packet
67 Network Management filtering? (That is, only “established” connections are allowed into
the network.)
Is VA / PT of network devices performed periodically? If yes, verify
68 Network Management
and specify the periodicity.
Is there a proactive mechanism to monitor unauthorized network
access attempts?(Internal /external )
69 Network Management External : Check if there IDS/IPS implemented in the environment ?
If yes, ask for make and model of device.
Mention the details for the same.
Has the vendor maintained redundancy for firewall & other network
70 Network Management components? Mention the details of the redundant major devices, if
applicable.
Are the modification in the firewall rule for "Company name"
71 Network Management operations follow the change management process. Mention the
details of the sample evidence.
What is the mechanism used for securing the connectivity between
the Vendor and the "Company name". Mention the details for the
72 Network Management same?
E.g. Lease line connectivity (with data sent in encrypted form) or
VPN.
Are the network devices and servers used for providing services to
73 Network Management the "Company name" are physically and logically segregated?
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
Is there a change management process, for activities of "Company
name" and related assets, approved by the vendor's management?
Does it include some of the following:
• Request, review and approval of proposed changes
• Review for potential security impact
• Security approval
80 Operation Management
• Review for potential operational impact
• Approval from "Company name" (when applicable)
• Documentation of changes
• Pre-implementation testing
• Post-implementation testing
• Rollback procedures
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
91 Operation Management Are backup media stored offsite?
Is there a secure process for onsite & offsite backup media
protection during storage pertaining to "Company name"
92 Operation Management
operations?
How is integrity assured for offsite backups?
Does vendor have media labeling procedure in place, with sufficient
93 Operation Management
information?
Does the organization reuse, test & restore backups on regular
94 Operation Management
basis?
Is the data downloaded from uniken/seclore/sftp is stored securely
95 Operation Management after being downloaded and decrypted?(for both automated spool
input files and the manual excel input files)
Does the vendor have a secure mechanism for destruction &
96 Operation Management disposal of media / hardware used for "Company name"
operations? Mention the details of the sample evidence.
Do you perform background verification for employees and
contractors/temporary staff related to "Company name" scope of
work?
97 Personnel Security - Academic & professional Qualification
- Police Verification
- Reference check
- Identification Check
The employment contract signed with the employees working on
"Company name" scope of work should contain
98 Personnel Security -Non-Disclosure Agreement;
-Information Security responsibilities
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
Is the physical entry / exit from the premises to "Company name"
data processing facility & critical site monitored? If yes, specify the
mechanism.
Physical &
104
Environmental Security
Physical & Are CCTV footages recorded and stored? What is the retention
111
Environmental Security period defined for storing Access\CCTV logs?
Physical & Is there a role based access control for accessing critical facilities
112
Environmental Security used for "Company name" operations?
What are the fire protection & detection mechanisms placed in
critical IT locations including Data Center/ Server Room pertaining
to "Company name" operations?
Physical & Are environmental protection equipment's (heat detection, smoke
113
Environmental Security detection, fire suppression, fireproofing, water flooding, heat,
humidity, air conditioning, power supply) installed, tested, and
monitored?
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
Physical &
115 Are the network and the power cable lines segregated physically?
Environmental Security
Sr.
Control Area Control Activity Auditor's Remark Auditee's Remark
no.
Are the vendor-supplied default passwords changed before
installing a system on the network?
125 System Security Are unnecessary accounts deleted on the network devices, servers
and database etc. ?
Mention the details of the sample evidence.
Is there only one primary function per server implemented to
prevent functions that require different security levels from co-
existing on the same server? (For example, web servers, database
126 System Security
servers, and DNS should be implemented on separate servers) for
critical process/activities