IT Audit Checklist- Network and Infrastructure
IT Audit Checklist- Network and Infrastructure
1. General Configuration
• Device Documentation
o Vendor Support: Confirm that the devices are still under active support
from the vendor. Devices out of support may not receive critical
security updates, making them vulnerable to new threats.
o System Time and NTP: Ensure the system time is synchronized with a
reliable Network Time Protocol (NTP) server. Accurate timestamps
are critical for incident response and forensic analysis.
• Access Control
• Rule Review
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
o Default Deny Rule: Confirm that the default rule at the bottom of the
firewall policy set is “Deny All” to block any traffic that doesn’t
explicitly match an allow rule.
• Rule Ordering
• Signature-Based Detection
• Anomaly-Based Detection
4. UTM Features
• Antivirus/Antimalware Protection
• Content Filtering
o Custom URL Blocking: Review the list of custom URLs that are
explicitly blocked or allowed. Ensure this list is updated regularly
and is aligned with company policies.
o Email Filters: Confirm that spam and phishing filters are enabled for
email traffic. Ensure that these filters use real-time blacklists and
threat intelligence to detect and block phishing attempts.
• SSL Decryption/Inspection
• Network Segmentation
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
o Split Tunneling: Ensure that split tunneling (where only certain traffic
goes through the VPN while the rest uses the user's local network) is
disabled unless there is a compelling business case. Split tunneling
can expose sensitive traffic to untrusted networks.
o VPN Access Controls: Verify that VPN users are assigned specific
policies that limit their access to only necessary network resources.
Access should be restricted to prevent lateral movement within the
network.
• Logging Configuration
o Log Retention: Ensure that logs are retained for a period consistent
with legal and regulatory requirements. Check that logs are stored
securely and that access is restricted to authorized personnel.
• Event Correlation
o SIEM Integration: Ensure that the firewall and UTM device logs are
properly integrated with an SIEM system to correlate events and
identify multi-stage attacks that may not be visible from
individual devices.
• Patch Management
8. Backup G Recovery
• Configuration Backup
• Disaster Recovery
• Security Policy
• Regular Audits
• Additional Considerations
• Traffic Monitoring
• Bandwidth Management
o Traffic Shaping G ǪoS: Verify that traffic shaping policies are applied to
ensure critical business applications (like VoIP, ERP, or video
conferencing) are prioritized over less essential services (e.g.,
streaming, social media).
• Sandboxing
unauthorized data.
o Abnormal Behavior Alerts: Ensure that alerts are set up for any
deviations from normal behavior, such as repeated failed login
attempts, unexpected data transfers, or attempts to access
restricted network segments.
• SSL/TLS Inspection
• Privacy Compliance
o Exemptions for Sensitive Traffic: Ensure that the UTM system exempts
certain traffic (such as healthcare or financial data) from SSL
decryption to comply with legal privacy requirements. Review these
exemptions regularly to ensure they don't introduce vulnerabilities.
• Penetration Testing
• Network Segmentation
• MDM Enforcement
o MDM Policy Integration: Verify that the UTM integrates with Mobile
Device Management (MDM) solutions to enforce security policies
on mobile devices. This should include encryption, screen lock,
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• DLP Configuration
o Custom DLP Policies: Create custom DLP rules to reflect the specific
needs of your organization. For example, you may want to protect
proprietary product designs or client records.
o Incident Logging: Ensure that all DLP incidents are logged, including
the source, destination, and nature of the attempted data transfer.
Review logs for trends or potential breaches.
• Industry Compliance
• Data Retention
o Data Retention for Forensics: Ensure that logs, alerts, and network
traffic data are retained for forensic investigations. This data should
be protected from tampering and easily accessible when
conducting incident reviews.
• Administrator Training
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• End-User Awareness
• SIEM Integration
1. Governance G Documentation
• Policies G Procedures
• System Architecture
2. Design G Deployment
• Traffic Visibility
o Blind Spots: Are there areas in the network where traffic is not
visible to the IDS/IPS, such as east-west traffic between virtual
machines or traffic on encrypted tunnels (e.g., VPNs)?
3. Configuration Management
• Baseline Configuration
• Signature Updates
• Threshold Settings
4. Monitoring G Detection
• Real-Time Monitoring
o 24/7 Monitoring: Are security analysts monitoring the IPS/IDS 24/7,
or is it integrated into an automated system that provides real-time
alerts? Are there any delays in responding to detected incidents?
• Alerting Mechanisms
o Correlation with SIEM: Are IPS/IDS alerts integrated with SIEM tools for
correlation with other network and endpoint events? Are there
automated rules to suppress or escalate alerts?
• Anomaly Detection
5. Incident Response
• Response Plan
• Containment
o Integration with Firewalls: Verify that the IPS can communicate with
firewalls or other devices to block traffic or isolate hosts dynamically.
• Forensics
6. Performance G Availability
• System Performance
• Redundancy G Failover
• Latency
7. Logging G Reporting
• Log Management
• Audit Logs
o Access Control Logs: Are access attempts to the IPS/IDS devices and
consoles logged? Are failed access attempts flagged for follow-up?
• Reporting
8. Testing G Validation
• Penetration Testing
• Vulnerability Scans
• Regulatory Compliance
• Data Protection
• Staff Training
• SIEM Integration
• Firewall Integration
• Endpoint Security
• Third-Party Audits
1. Policy G Governance
• Documentation:
o Ensure a formal policy is in place for WAF deployment, including
objectives, scope, and roles. Review the documentation for
comprehensiveness.
• Security Requirements:
• Stakeholder Approval:
• Process Validation:
• Audit Trail:
o Ensure that all changes made to the WAF are logged and can be
traced back to the individual who made the change.
2. WAF Configuration
• Removal of Defaults:
o Ensure that default settings such as admin credentials and default
rule sets have been modified.Review the WAF vendor's
recommendations for secure configuration, and verify compliance.
• Baseline Configuration:
• Certificate Management:
o Verify that all SSL/TLS certificates used by the WAF are up-to-date and
signed by trusted Certificate Authorities (CAs).
o Ensure that key lengths and algorithms used are secure (e.g., 2048-
bit RSA or better).
• SSL/TLS Encryption:
o Ensure that the WAF is operating in the correct mode for each
environment (e.g., monitoring in test environments, blocking in
production).
• Switching Modes:
• Rule Optimization:
• Rule Testing:
• Rule Review:
3. Security Controls
▪ SǪL Injection
▪ Security Misconfigurations
o Review the WAF rule sets that target these vulnerabilities and
ensure they are active and correctly configured.
• False Positives/Negatives:
• Bot Detection:
o Verify whether the WAF can detect and block malicious bots,
scraping, or automated attacks.
• Thresholds:
• Rate-Limit Testing:
4. Logging G Monitoring
• Comprehensive Logging:
o Ensure that the WAF logs all relevant HTTP/S traffic, including details
such as IP address, request type, headers, and body (if required).
• Retention Policies:
o Review log retention policies and ensure they comply with internal
and external requirements (e.g., PCI DSS mandates a minimum of one
year of log retention).
• Log Backup:
• SIEM Integration:
• Regular Reviews:
• Anomaly Detection:
immediate review.
5. Performance G Availability
5.1 Scalability
• Capacity Planning:
o Review the WAF's ability to handle peak loads. Verify that it can
scale to accommodate increased traffic without
performance degradation.
• Performance Benchmarks:
o Confirm that the WAF is deployed with redundancy in mind (e.g., load
balancing, failover capabilities) to ensure minimal downtime.
• Health Checks:
• Traffic Scrubbing:
• Update Schedule:
• Patch Priority:
• Patch Validation:
o Verify that the WAF is set to receive and apply vendor-provided rule
updates (if applicable) for new threats.
7. Testing G Validation
• Test Scope:
• Findings Review:
o Test for false positives (legitimate traffic blocked) and false negatives
(malicious traffic allowed) regularly to fine-tune rule sets.
8. Incident Response
8.1 Alerting
• Real-Time Alerts:
• Alert Delivery:
o Ensure that WAF logs and alerts contain sufficient detail (e.g., time,
source IP, request details, rule triggered) to conduct thorough
incident investigations.
o Confirm that investigation workflows are in place for each type of
WAF event, including who is responsible for investigation,
escalation, and remediation.
• Investigation Tools:
o Verify that a formal root cause analysis process is in place for security
incidents that involve the WAF. Document findings and lessons
learned.
• Improvement of Rules:
• Documentation:
• Data Privacy:
o Ensure that the WAF integrates smoothly with any CDNs being
used. This includes making sure caching policies do not interfere
with WAF rules and that security headers are properly applied to
cached content.
• Edge Protection:
o For cloud WAFs or those working with CDNs, verify that edge
protection mechanisms are aligned to block attacks at the nearest
point of presence (POP) rather than allowing traffic to reach the
application layer.
10. Documentation
• Version Control:
• Security Procedures:
• Regulatory Documentation:
• Admin Training:
o Confirm that administrators and security personnel responsible for
managing and configuring the WAF are trained on its proper use,
including rule creation, monitoring, and incident response.
• Ongoing Education:
• User Feedback:
• Benchmarking:
• Regulatory Audits:
o Confirm that all audit trails are regularly reviewed for discrepancies
or signs of tampering, ensuring full accountability for WAF
changes and actions.
• Independent Review:
o Engage third-party security auditors to assess the WAF's security
controls, configuration, and rule sets to identify weaknesses or
misconfigurations.
• Performance Testing:
o Perform stress tests to evaluate how the WAF handles high traffic
volumes, both legitimate and malicious, and determine any
potential performance bottlenecks.
1. Architecture and
• Network Placement
• HA Configuration
• Failover Testing
o Regularly test failover and failback procedures to confirm that they
function as expected without impacting service availability.
• Geographical Distribution
2. Configuration
Management Configuration
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
Backup
• Backup Automation
• Backup Testing
Change Control
• Version Control
• Change Verification
3. Access
Controls
Authentication
• Centralized Authentication
• Role Definition
• Access Reviews
Session Management
• Timeout Settings
• Session Logging
4. Network
Security SSL/TLS
Configuration
• Certificate Management
• Certificate Validation
Virtual IP Configuration
• VIP Usage
• Service Exposure
o Ensure that only necessary services are exposed through VIPs and that
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
Firewall Rules
•Rule Configuration
Review and configure firewall rules to allow only the necessary traffic to and from the
load balancer.
• Traffic Filtering
5. Application
Security
• WAF Configuration
• Rule Updates
Content Filtering
• Filtering Rules
• Regular Reviews
Secure Cookies
• Cookie Flags
o Ensure that cookies are configured with security flags (e.g., HttpOnly,
Secure) to protect against cross-site scripting (XSS) and other
attacks.
• Cookie Management
o Review cookie policies and settings to ensure they align with best
practices for security and privacy.
• Configuration Review
• Performance Impact
o Assess the performance impact of session persistence on load
balancing efficiency and server resource usage.
• Algorithm Selection
• Algorithm Configuration
Health Checks
• Configuration
7. Logging and
Monitoring Centralized
Logging
• Log Aggregation
o Ensure that logs from the load balancer are aggregated into a
centralized logging system for easier analysis and correlation.
• Log Formats
Log Retention
• Retention Policies
• Archiving
o Archive logs securely and ensure they are accessible for forensic
analysis if needed.
• Monitoring Tools
o Deploy monitoring tools to track load balancer performance metrics
(e.g., traffic volume, response times) and security events.
• Alert Configurations
o Configure alerts for critical events (e.g., high traffic spikes, failed health
checks) and establish thresholds for timely notifications.
Intrusion Detection
• IDS/IPS Integration
• Anomaly Detection
8. DDoS Protection
• Configuration
• Policy Review
• Protection Services
• Configuration Verification
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• Mitigation Strategies
Updates
• Patch Management
• Patch Testing
Vulnerability Management
• Vulnerability Scanning
• Remediation
Documentation Compliance
Standards
• Regulatory Requirements
• Audit Readiness
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
Audit Logs
• Log Review
• Evidence Collection
Documentation
• Configuration Documentation
o Maintain detailed documentation of the load balancer’s
configuration, including network settings, security policies, and
operational procedures. Ensure it is regularly updated.
• Version History
• Plan Documentation
• Recovery Objectives
Failover Testing
• Test Scenarios
o Regularly test failover scenarios to ensure that the load balancer can
switch to a backup instance or configuration seamlessly in case of
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
failure.
• Test Documentation
Backup Configurations
• Backup Procedures
• Secure Storage
• Optimization
• Performance Monitoring
Capacity Planning
• Traffic Analysis
• Resource Allocation
Traffic Analysis
• Historical Data
• Usage Patterns
o Ensure that APIs used to manage the load balancer are secured
with strong authentication (e.g., API keys, OAuth) and proper
authorization mechanisms.
• Rate Limiting
Third-Party Services
• Security Assessments
14. Operational
Procedures Incident
Response Plan
• Plan Development
• Incident Simulation
Operational Support
• Support Procedures
• Documentation
• Policy Creation
• Review Schedule
• Policy Enforcement
• Awareness Campaigns
16. Data
Protection Data
Encryption
• Encryption Standards
• Key Management
Data Privacy
• Test Planning
• Result Analysis
Scalability Testing
• Scaling Scenarios
Recovery Backup
Verification
• Testing Procedures
• Backup Frequency
o Ensure that backup frequency aligns with the criticality of the load
balancer and its data, balancing between data protection and
storage costs.
• Drill Scenarios
• Plan Refinement
• Anomaly Detection
• Baseline Establishment
Threat Intelligence
• Integration
• Threat Analysis
Reporting Detailed
Documentation
• Configuration Records
• Change Logs
Audit Reports
• Audit Planning
• Reporting Findings
Compliance Reporting
• Regulatory Reporting
• Internal Reporting
• Security Reviews
• Third-Party Audits
Third-Party Contracts
• Contractual Clauses
22. Configuration
Surface
• Service Minimization
• Default Settings
Secure Configuration
• Hardening Guidelines
• Regular Reviews
1. Accounts G Permissions
User Accounts
• Review last logon dates and ensure they are recent for active accounts.
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• Check for nested groups and ensure correct permissions are inherited.
• Verify that group policies are applied based on role and security
• Review access for remote administration tools and ensure only trusted
systems have this capability.
2. Policies G Settings
Password Policies
• Check account lockout policy (e.g., lockout after 3-5 failed login attempts).
• Ensure that audit policies are enabled for user login attempts (successful and
failed).
• Verify that group policy changes, and privilege use are logged.
• Review user rights (via Local Security Policies or Group Policy) for sensitive
operations like:
o Backup/Restore
o Debug Programs
o Log on as a service
o Log on locally
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• Review GPO permissions to ensure only authorized users can create, edit,
or delete GPOs.
4. AD Security Configurations
DNS C AD Replication
• Ensure DNS settings are correctly configured for redundancy and security.
• Verify NTLM usage is minimized and not used for sensitive systems
(enforce use of Kerberos).
• Confirm OUs and containers are organized logically (users, devices, etc.).
5. Security G Monitoring
Logging C Monitoring
• Review event logs for suspicious activity (e.g., multiple login failures, changes
to group memberships).
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• Verify that all domain controllers, servers, and connected devices are updated
with the latest security patches.
• Enable MFA for sensitive user accounts, especially those with access to
• Ensure privileged accounts are only used for administrative purposes and
not for daily tasks.
8. Compliance G Documentation
• Document and review all changes made during the audit process.
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
1. System Configuration
o List Users:
▪ Use commands like cat /etc/passwd to list all user accounts.
o Password Policies:
▪ Review /etc/login.defs for password aging and complexity
settings.
o Sudo Configuration:
▪ Examine /etc/sudoers using visudo to ensure that users have
only the required privileges.
o PAM Configuration:
▪ Review /etc/pam.d/* for correct PAM modules and settings.
o Multi-Factor Authentication:
▪ Verify MFA configurations if using tools like Google Authenticator
or Duo.
• Patch Management:
• Firewall Configuration:
o Review Firewall Rules:
▪ For iptables, use iptables -L to list current rules.
• SELinux/AppArmor:
o SELinux:
▪ Check SELinux status with sestatus.
o AppArmor:
▪ Check status with aa-status.
• System Services:
• File Permissions:
• File Integrity:
o Review ACLs:
▪ Use getfacl to view ACLs on files and directories.
• System Logs:
• Log Rotation:
o Check Configuration:
▪ Review /etc/logrotate.conf and /etc/logrotate.d/ for proper log
rotation settings.
o Configure IDS/IPS:
▪ Ensure tools like Snort, OSSEC, or Suricata are active and
properly configured.
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
o Review Alerts:
▪ Regularly check for and investigate alerts or suspicious activities.
5. Network Security
• Network Configuration:
o SSH Configuration:
▪ Review /etc/ssh/sshd_config for settings like
PermitRootLogin, PasswordAuthentication, and
AllowUsers.
• Remote Access:
• Backup Procedures:
o Check Storage:
▪ Ensure backup data is stored securely and protected
against unauthorized access.
• Recovery Plan:
o Test Recovery:
▪ Perform regular recovery tests to ensure backups can be
restored.
7. System Hardening
• Kernel Parameters:
• Security Policies:
o Review Policies:
▪ Ensure policies for password strength, account lockout, and
session timeouts are in place.
o Check /etc/security/limits.conf:
▪ Ensure proper limits are set for user resources.
• Security Tools:
o Apply Recommendations:
▪ Follow recommendations from security tools and perform
remediation.
8. Application
Security
• Installed Software:
• Configuration Files:
o Review Configurations:
▪ Check configuration files for applications and ensure sensitive
data (e.g., passwords) is not exposed.
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
G. Physical Security
• Hardware Access:
o Physical Controls:
▪ Ensure server rooms or data centers are locked and access is
restricted.
o Server Security:
▪ Verify that servers are physically secured against tampering.
• Compliance:
o Verify Requirements:
▪ Ensure compliance with relevant standards or regulations (e.g.,
PCI-DSS, ISO 27001).
o Conduct Audits:
▪ Perform regular compliance audits to ensure adherence.
• Documentation:
o Maintain Records:
▪ Document system configurations, changes, and audit findings.
o Update Procedures:
Hardening of Linux OS
• Regular Updates:
o Use package managers (apt, yum, dnf, etc.) to regularly update the
system.
o Configure automatic updates where feasible to ensure timely
application of security patches.
• Security Patches:
• User Accounts:
• File Permissions:
o Set correct permissions for critical files and directories. For example,
/etc/shadow should have permissions 600, and /etc/passwd should be
644.
• File Integrity:
o Ensure that ACLs are used only where necessary and are properly
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
configured.
4. Network Security
• Firewall Configuration:
o Define rules to only allow necessary traffic and block all others by
default.
o Regularly review and update firewall rules.
• Network Services:
o Review open ports using netstat -tuln or ss -tuln and close any
that are not needed.
• Secure Communication:
5. System Hardening
• Kernel Parameters:
• System Services:
o Service Security:
▪ Ensure services are up-to-date and have minimal exposure.
• System Logs:
• Log Rotation:
• Intrusion Detection:
o Implement an Intrusion Detection System (IDS) like OSSEC, Snort, or
Suricata to monitor for suspicious activities.
• Backup Strategy:
8. Application Security
• Application Hardening:
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• Secure Boot:
• Documentation:
• Disable Unused Services: Turn off any services or features not in use to
minimize attack vectors. For example, if SSH is not used, disable it.
Access Control:
Firmware Updates:
2. Network Security
Network
Segmentation:
Firewall Rules:
• Inbound/Outbound Rules: Define rules that control both inbound and
outbound traffic. Ensure that rules are restrictive by default and only allow
necessary traffic.
Intrusion Detection/Prevention:
3. Access Controls
Remote
Management:
SNMP:
4. Logging and
Monitoring Syslog
Configuration:
• Log Retention: Define and enforce policies for log retention and disposal in
accordance with organizational and regulatory requirements.
Event Logging:
• Key Events: Ensure logging includes critical events such as successful and
failed login attempts, configuration changes, and system errors. Review
logs regularly for suspicious activity.
Regular Reviews:
5. Security Features
• VPN Policies: Define and enforce policies for VPN usage, including who
can connect and from where.
6. Physical
Security Physical
Access:
Device Integrity:
7. Backup and
Recovery
Configuration
Backups:
Recovery Procedures:
Documentation:
Penetration Testing:
• Test Coverage: Ensure that penetration tests cover all aspects of the router’s
security, including management interfaces and network exposure.
Vulnerability Scanning:
• Security Training: Provide regular security training for staff responsible for
managing the router. Topics should include security best practices, threat
awareness, and incident response.
Awareness Programs:
1. Physical Security
• Access Control: Ensure that only authorized personnel have physical
access to the switch.
• Locking Mechanism: Ensure that physical ports not in use are disabled or
protected with port blockers.
• Firmware Version: Confirm the switch is running the latest stable firmware
version.
3. Access Control
• Password Policies:
o Ensure that only encrypted protocols (SSH for CLI, HTTPS for GUI) are
used to manage the switch.
4. Port Security
• Port Security Features: Enable port security features, such as limiting the
number of MAC addresses per port and setting actions (like shutting down
the port) if the limit is exceeded.
• VLAN Segmentation: Use VLANs to segment the network and isolate sensitive
systems.
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
5. Network Security
o Apply ACLs to control and filter traffic between different parts of the
network.
o Ensure ACLs are up to date and follow the principle of least privilege.
• DHCP Snooping: Enable DHCP snooping to prevent rogue DHCP servers from
operating on the network.
• Dynamic ARP Inspection (DAI): Enable DAI to protect against ARP spoofing attacks.
• Audit Logs: Review switch audit logs for unauthorized access or configuration
changes.
• Failover Mechanism: Test and verify failover mechanisms (HSRP, VRRP, etc.) to
ensure network redundancy.
• Rollback Configuration: Keep historical configurations to roll back in case of
failure or misconfiguration.
• VPN: For remote management, ensure that VPN access is used to securely
connect to the switch.
• Cooling Systems: Check that the switch’s environment has proper cooling
to prevent overheating.
• Security Event Alerts: Ensure that alerts for critical events are set up
(e.g., port violations, login failures).
• Locking Mechanism: Ensure that physical ports not in use are disabled or
protected with port blockers.
• Firmware Version: Confirm the switch is running the latest stable firmware
version.
3. Access Control
• Password Policies:
o Ensure that only encrypted protocols (SSH for CLI, HTTPS for GUI) are
used to manage the switch.
4. Port Security
• Port Security Features: Enable port security features, such as limiting the
number of MAC addresses per port and setting actions (like shutting down
the port) if the limit is exceeded.
• VLAN Segmentation: Use VLANs to segment the network and isolate sensitive
systems.
5. Network Security
o Apply ACLs to control and filter traffic between different parts of the
network.
o Ensure ACLs are up to date and follow the principle of least privilege.
• DHCP Snooping: Enable DHCP snooping to prevent rogue DHCP servers from
operating on the network.
• Dynamic ARP Inspection (DAI): Enable DAI to protect against ARP spoofing attacks.
• Audit Logs: Review switch audit logs for unauthorized access or configuration
changes.
• VPN: For remote management, ensure that VPN access is used to securely
connect to the switch.
• Cooling Systems: Check that the switch’s environment has proper cooling
to prevent overheating.
• Security Event Alerts: Ensure that alerts for critical events are set up
(e.g., port violations, login failures).
• Database Version: Check for the latest stable version of the database.
Ensure that no outdated versions are in use.
• Patches G Updates: Verify that all relevant security patches and updates
are applied regularly.
• User Authentication: Ensure all users authenticate with strong methods, such
as multi- factor authentication (MFA) where possible.
• Account Expiry: Ensure that old and unused accounts are disabled or
removed, especially if contractors or ex-employees have left.
• Audit Logging: Confirm that database activity logging is enabled (e.g., SELECT,
INSERT, UPDATE, DELETE).
• Error Logging: Check that error logs are properly configured to capture all
necessary events.
• Log Retention Policy: Review log retention policy to ensure that logs are stored
securely for the necessary amount of time.
• Log Protection: Ensure logs are securely stored, rotated, and protected from
tampering.
4. Database Backup G Recovery
• Backup Access Control: Review who has access to backups and ensure strict
controls over their use.
• Disaster Recovery Testing: Validate that disaster recovery plans are in place
and are regularly tested.
5. Data Protection
• Data Retention Policy: Ensure data retention policies are in place for sensitive
data and are strictly followed.
6. Network Security
• VPN/SSH for Remote Access: Verify that remote database access is done only
through secure channels such as VPN or SSH.
7. Vulnerability Management
8. Auditing Compliance
• Audit Trails: Confirm that all user activities and transactions are tracked and
auditable for compliance purposes.
• Data Access Auditing: Ensure that records are maintained for who accessed
sensitive data, when, and for what purpose.
G. Incident Response
• Security Alerts: Ensure alerts are configured for anomalous behavior (e.g.,
repeated login failures, unexpected privilege escalations).
• Incident Logging: Confirm that all incidents are logged, and responses are
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• Server Room Access: Review who has physical access to database servers
and ensure appropriate access controls are in place.
• Security vs. Performance Trade-offs: Verify that any database tuning for
performance does not compromise security controls (e.g., disabling
SSL/TLS for speed).
12. Third-Party Integrations
• API Security: Review and audit security for APIs accessing the database,
ensuring secure authentication and encryption.
• Data Sharing Agreements: Verify that there are data sharing agreements in
place with third parties, detailing security responsibilities.
• User Training: Ensure that all users with database access have undergone
security awareness training related to database threats.
1. Administrative Controls
• Policy Distribution: Ensure employees and third parties are informed and
sign off on understanding security policies.
• Internal Audit Programs: Validate the frequency, scope, and findings of internal
audits.
• Threat Identification and Risk Assessment: Review the risk register and
confirm identified risks (e.g., insider threats, phishing attacks).
• Risk Acceptance: For any risks not mitigated, ensure there’s documented
acceptance from senior management.
1.4. Security Awareness Training
• Specialized Training for Key Roles: Roles like IT administrators or C-level execs
should receive additional security training specific to their responsibilities.
2. Technical Controls
These involve the technical tools and configuration mechanisms designed to protect
against security breaches.
• Segregation of Duties (SoD): Confirm that critical tasks require two or more
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
individuals to prevent misuse of access (e.g., one person can't both initiate and
approve payments).
• Disk Encryption: Validate that full disk encryption is used on all devices
containing sensitive data (e.g., laptops, mobile devices).
• Unused Services and Ports: Ensure that unnecessary services, ports, and
protocols are disabled.
2.5. Logging and Monitoring
3. Physical Controls
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• Visitor Logs: Ensure physical visitor logs are maintained, and verify that
unauthorized personnel are not accessing critical areas.
• Laptop and Mobile Device Security: Ensure all devices have encryption,
remote wipe capabilities, and endpoint detection systems installed.
These controls focus on ensuring the organization can quickly recover from a disaster.
• Offsite and Immutable Backups: Ensure backups are stored offsite and,
where possible, use immutable storage for additional protection
against ransomware.
• Backup Testing Frequency: Document and verify the frequency and results
of backup restore tests (e.g., quarterly restore tests).
5. Incident Response
• Chain of Custody for Evidence: Ensure that the chain of custody for digital
evidence is documented and maintained in the event of an investigation.
• Root Cause Analysis (RCA): Perform a root cause analysis after every
significant incident and ensure lessons learned are implemented.
• KPIs for Incident Management: Track key performance indicators (KPIs), such
as mean time to detection (MTTD) and mean time to recovery (MTTR).
• Vendor Access Controls: Ensure vendors only access the systems they require
and use separate accounts for each user (not shared credentials).
These are specific controls to ensure data is managed securely and in line with privacy
regulations.
These controls ensure systems are continuously monitored for security gaps.
• Third-Party Software Patch Management: Ensure that not just OS-level but third-
party applications (e.g., Adobe, Java) are included in patch management
procedures.
G. Cloud Security
• Data Loss Prevention (DLP): Ensure DLP solutions are applied to cloud
environments to prevent sensitive data leaks.
Security should be integrated into the development lifecycle (DevSecOps), not just an
afterthought.
• Security in DevOps Pipelines: Ensure that security checks (e.g., static code
analysis, dependency checks) are automated into CI/CD pipelines.
• Rate Limiting and Throttling: Implement rate limiting and throttling on APIs
to prevent abuse or Distributed Denial of Service (DDoS) attacks.
• Firmware Updates: Ensure that IoT devices are regularly patched and that
firmware updates are managed centrally.
• Isolated IoT Networks: Ensure that IoT devices are segmented into their own
network to limit their exposure to the main corporate network.
• Sensitive Data Handling: Ensure that AI/ML models are not inadvertently
exposed to sensitive or personal data, particularly if using production
datasets for training.
IAM is crucial to ensure that users have the correct levels of access.
Data governance ensures that data is managed securely and in compliance with laws
and regulations.
• Cloud DLP: For cloud environments, ensure that cloud-native DLP solutions
are in place to monitor and restrict sensitive data movement.
16. Cryptography and Key Management
• Key Rotation and Expiry: Ensure that encryption keys are regularly rotated,
and key expiration policies are enforced.
o Ensure that all applicable legal standards (e.g., GDPR, HIPAA, PCI-
DSS) are identified early and form part of the audit.
• Resources G Stakeholders:
2. IT Governance
• IT Policy Review:
• Roles G Responsibilities:
o Verify that roles within the IT department and across business units
are clearly defined, with responsibilities for systems, security, and
data management formally assigned.
• IT Strategy Alignment:
• Risk Management:
• Authentication G Authorization:
• Privileged Access:
• Segregation of Duties:
o Ensure that remote access solutions, like VPNs, are secure, and that
encryption protocols (e.g., SSL, TLS) are used to protect
communication.
• Network Segmentation:
• Data Classification:
• Encryption:
o Verify that encryption is used to protect sensitive data both at rest and
in transit (e.g., SSL/TLS for data transmission, AES for stored data).
• Backup G Recovery:
• Privacy Regulations:
• SDLC Review:
• Change Management:
• Patch Management:
• Software Licensing:
o Verify that security logs are monitored in real-time, using tools such
as SIEM (Security Information and Event Management), to detect
suspicious behavior.
• Incident Logging:
o Confirm that all incidents are logged, categorized, and tracked from
detection to resolution.
• Backup Testing:
o Confirm that backups are regularly tested to verify their integrity and
ensure that they can be successfully restored.
• Alternate Sites:
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
o Ensure that alternate recovery sites (hot, warm, or cold) are ready for
activation in the event of a disaster, and that connectivity and
hardware configurations have been tested.
G. Application Security
• Input Validation:
• Application Testing:
• Environmental Controls:
• Hardware Security:
o Confirm that all servers, workstations, and portable devices (e.g.,
laptops, USB drives) are physically secured and encrypted where
necessary.
• Asset Inventory:
• Industry Standards:
• Regulatory Compliance:
• Audit Logs:
• Audit Findings:
o Document audit findings and categorize them based on severity
(e.g., critical, high, medium, low), ensuring prioritization of critical
vulnerabilities.
• Recommendations:
• Management Review:
• Post-Audit Follow-Up:
• Data Migration:
o Rollback Plans: Ensure that rollback plans are in place in case migration
fails or data corruption occurs during the process.
• Multi-Tenancy Risks:
• Virtualization Controls:
o Virtual Machine (VM) Security: Confirm that VMs are securely configured,
including up- to-date OS patches, strong access controls, and network
isolation.
o Backup Policies: Verify that backups of cloud-based systems and data are
regularly taken, encrypted, and stored in geographically separate
locations.
15. Mobile Device Management (MDM) G Bring Your Own Device (BYOD)
o Device Enrollment: Review the process for enrolling devices into the MDM
system, ensuring that only approved and authenticated devices gain
access to corporate networks.
o Lost Device Protocols: Ensure the MDM solution can remotely wipe lost
or stolen devices to prevent unauthorized access to sensitive
information.
o Selective Wiping: Review the ability to perform selective wipes, which only
remove corporate data, leaving personal data intact for BYOD devices.
• APT Detection:
o IaC Security: Validate that infrastructure defined through code (e.g., AWS
CloudFormation, Terraform) is properly configured with security in mind,
such as using secure default configurations.
• Secret Management:
o Secure Storage: Verify that secrets (e.g., API keys, passwords) are securely
stored using secret management tools like HashiCorp Vault or AWS Secrets
Manager.
o Secret Rotation: Ensure that secrets are regularly rotated and that access
to them is monitored and logged.
o Data In Transit: Confirm that DLP solutions monitor data in transit, especially
outbound communications like emails, file transfers, and uploads to cloud
services.
• Exfiltration Protections:
o File Type Controls: Ensure that DLP systems enforce controls on the types
of files allowed to leave the organization, such as blocking sensitive
document formats or data fields.
o Firewalls G Access Control: Use firewalls and access control lists (ACLs) to
restrict communication between IoT/OT devices and other network
segments.
o Patch Management: Ensure that IoT and OT devices receive timely security
patches and updates, with a process in place to monitor and apply them.
o Bias and Fairness: Evaluate AI/ML models for biases and fairness to ensure that
they do not unintentionally discriminate or produce unfair outcomes.
o Data Handling: Ensure that data used for training AI/ML models is handled
according to privacy regulations, including data anonymization and
minimization practices.
o Model Outputs: Review how the outputs of AI/ML models are used and
ensure they do not reveal sensitive or personal information inadvertently.
• Adversarial Attacks:
o Model Drift: Watch for model drift, where the performance of AI/ML models
degrades over time due to changes in data patterns or operational
conditions.
• Training Programs:
• Phishing Simulations:
• Policy Acknowledgment:
o Acknowledgment Forms: Require employees to formally acknowledge
understanding and acceptance of security policies and procedures.
• Security Culture:
• Compliance Audits:
deficiencies.
• Regulatory Updates:
• Documentation G Reporting:
• Integrity Checks:
• Change Management:
o Change Control: Ensure that all changes to systems and data are
controlled through formal change management processes, including
documentation and approval.
• Audit Trails:
o Log Retention: Implement policies for the secure storage and retention
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• Data Accuracy:
• Access Controls:
• Environmental Controls:
o Fire Protection: Install and regularly test fire suppression systems (e.g.,
sprinklers, gas- based systems) to protect against fire damage.
• Data Residency: Check where your data is physically stored and processed.
Ensure it complies with regional data residency requirements and legal
regulations.
2. Security Management
• Identity and Access Management (IAM): Review IAM policies to ensure that
users and services have appropriate permissions. Regularly audit and
update IAM configurations to prevent privilege creep.
3. Data Management
• Patching and Updates: Ensure that all systems and applications are regularly
updated with security patches. Implement a process for timely application
of patches and updates.
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• Logging: Confirm that logging is enabled for critical systems and activities.
Logs should capture sufficient detail to support security investigations and
audits.
6. Vendor Management
7. Risk Management
• Disaster Recovery Plan: Review and test the disaster recovery plan to
ensure it addresses potential disaster scenarios and outlines recovery
procedures. Regularly update the plan based on changes in the
environment.
• Cost Tracking: Implement tools and processes to monitor and track cloud
usage and expenses. Review billing statements regularly to identify
unexpected charges.
• Cost Optimization: Evaluate and implement cost optimization
strategies, such as rightsizing instances, using reserved instances, and
leveraging cost-saving features provided by the cloud provider.
• API Security: Review the security of APIs used for integrating with cloud
services. Implement secure coding practices and validate that APIs
are protected against common threats (e.g., injection attacks, data
breaches).
• Performance Metrics: Define KPIs for cloud services and monitor them to
ensure that performance meets expectations. Metrics may include response
times, throughput, and availability.
• EOL Policies: Review and enforce policies for managing end-of-life cloud
services and components. Ensure that outdated or unsupported services
are phased out in a controlled manner.
• Data Migration: Develop procedures for migrating data from EOL services to
new platforms or services. Ensure data integrity and minimal disruption
during the migration process.
• Audit Trail Verification: Ensure that audit trails are maintained for all critical
activities and transactions. Verify that logs are secure, tamper-proof, and
accessible for audits.
1. Information Gathering
• Architecture Review:
• Threat Modeling:
o Identify potential threats and vulnerabilities specific to the application.
o Review attack vectors such as data flow, user inputs, and integration
points.
2. Authentication G Authorization
• Authentication Mechanisms:
o Check for secure password policies and storage (e.g., hashing with
bcrypt).
• Session Management:
3. Input Validation
• Sanitization G Validation:
4. Data Protection
• Encryption:
o Verify the use of strong encryption for data at rest and in transit.
o Review encryption key management practices.
• Data Privacy:
5. Secure Communication
• SSL/TLS:
o Check for proper implementation of SSL/TLS certificates and
configurations.
o Ensure use of strong cipher suites and protocols.
• API Security:
6. Application Security
• Code Review:
• Dependencies:
7. Security Testing
• Penetration Testing:
8. Logging G Monitoring
• Logging:
G. Configuration Management
o Check for regular updates and patching of the application and its
components.
o Review the process for handling security advisories and updates.
• Backup Practices:
11. Compliance
• Regulatory Requirements:
• Documentation:
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
o IDS/IPS Configuration:
▪ Ensure IDS/IPS is configured to monitor and analyze traffic for
suspicious activities.
▪ Verify that IDS/IPS rules are up-to-date with the latest threat
signatures and anomaly detection capabilities.
o Alert Management:
▪ Check that alerts from IDS/IPS are monitored in real-
time and appropriate actions are taken based on
severity.
▪ Assess integration with incident management systems for
automated response.
• Anomaly Detection:
o Behavioral Analysis:
▪ Implement tools that use machine learning to analyze
patterns and detect deviations from normal behavior.
o Baseline Establishment:
▪ Establish a baseline for normal application behavior to
better identify anomalies.
• Threat Intelligence:
o Integration:
▪ Integrate threat intelligence feeds that provide information on
emerging threats, vulnerabilities, and attack trends.
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
o Actionable Insights:
▪ Use threat intelligence to inform defensive strategies, update
security policies, and improve detection capabilities.
• Database Configuration:
o Hardening:
▪ Disable unnecessary features and services in the database (e.g.,
remote access, unused ports).
o Secure Accounts:
▪ Use strong, unique passwords for database accounts.
o ORM Tools:
▪ Use ORM tools that abstract direct database access and
mitigate the risk of SǪL injection.
o Logging:
▪ Enable detailed logging of database activities, including query
execution and user actions.
o Alerting:
▪ Set up alerts for suspicious database activities, such as
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
• CDN Configuration:
• Cloud Configuration:
• Cloud-specific Vulnerabilities:
o Assess cloud resources for misconfigurations such as open storage
buckets, unsecured databases, or excessive permissions.
o Review cloud audit logs and cloud-specific security services (e.g., AWS
Security Hub).
• Race Conditions:
o Check for proper certificate pinning and encryption of data sent from
the mobile app.
o Review how quickly and effectively the Blue Team can detect,
contain, and mitigate attacks.
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
o Ensure that all backups, logs, and remnants of sensitive data are
securely deleted in line with data retention policies.
• Decommissioning of Resources:
• Third-Party Services:
• Application Configuration:
• Infrastructure Configuration:
• Rate Limiting:
• CSP Implementation:
• CSRF Tokens:
INFORMATIONAL TECHNOLOGY AUDIT CHECKLIST: INFRASTRUCTURE & NETWORK
o Verify that uploaded files are scanned for malware and stored
securely (e.g., outside the webroot).
• File Download:
• Container Security: