Public Works and Government Services Canada
PDF Version (203Kb) Help on Alternative Formats
PROTECTED A (when completed)
NOTE: The purpose of this checklist is to provide the Industrial Security Program (ISP) Information Technology Security (IT Sec) Inspector with initial information identifying the company's IT Sec posture in preparation for the on-site inspection in support of the processing, producing and storing of sensitive information for this government contract at the above identified site. This IT Sec Checklist is not to be used by the government department as the Technical Document as required in Security Requirement Check List (SRCL) at Part C.11.d or as the Connectivity Criteria document at Part C.11.e.
Annex A – List of References
Annex B – List of References available only upon request
Annex C – List of Abbreviations and Definitions
NOTE:
Information Technology (IT) in support of this contract.
If yes, please provide details
(Attach separate list as required)
SYSTEM LOCATION Additional Comments:
(If yes, please check all applicable)
COMMUNICATION Additional Comments:
Additional Comments:
Personnel directly involved with the electronic processing, producing and storing of the Protected/Classified information in support of this contract. (Attach separate list as required)
IT Personnel directly involved with the Administration and Support of the IT equipment/software. (Attach separate list as required)
Description: (Check all applicable)
6. What is the Operating Systems (OS) and Service Pack (SP) on the IS?
Servers:
Workstations:
Laptops:
7. How are the OS Updates and Security Patches applied?
8. Are administrative accounts used solely for the administration of the IS?
9. Do you use Active Directory to create User Accounts?
10. Are unique username accounts and unique passwords required to access the IS?
11. Provide details on password policies. (e.g. length, difficulty, life, lock-out policy, etc.)
12. Are users forced to change the temporary password at first login?
13. Does the IS permit users the capability to save passwords at login?
14. Are IS Security Logs maintained and reviewed periodically? (e.g. event viewer)
15. Is antivirus software used?
16. Provide antivirus product details.
18. How are the antivirus updates applied?
19. Is there any Protected/Classified information saved locally on the IS?
20. Is the Protected/Classified information for this contract segregated from corporate information?
24. Do you have encryption capability?
27. Provide encryption product name and version.
Workstation:
4. What is the frequency of the backups? (Check all applicable)
4. Provide "sanitization" product name and version. (e.g. triple-overwrite software)
This completed check list is NOT to be sent by return email unless it has been encrypted. Please contact the IT Sec Inspector for instructions and to confirm transmittal method.