Information Technology Security (IT Sec) Checklist

PDF Version (203Kb) Help on Alternative Formats

PROTECTED A (when completed)

(see SRCL Part C.11.d)
(see SRCL Part C.11.e)

NOTE: The purpose of this checklist is to provide the Industrial Security Program (ISP) Information Technology Security (IT Sec) Inspector with initial information identifying the company's IT Sec posture in preparation for the on-site inspection in support of the processing, producing and storing of sensitive information for this government contract at the above identified site. This IT Sec Checklist is not to be used by the government department as the Technical Document as required in Security Requirement Check List (SRCL) at Part C.11.d or as the Connectivity Criteria document at Part C.11.e.

Annex A – List of References

Annex B – List of References available only upon request

Annex C – List of Abbreviations and Definitions

INFORMATION SYSTEM (IS) (Check all applicable)

NOTE:

Information Technology (IT) in support of this contract.






THREAT RISK ASSESSMENT (TRA)

1.

2.

3.

SYSTEM LOCATION – Identify all sites where Protected and/or Classified information is processed, produced, stored and/or backed up for all aspects of this specific contract or any related subcontracts.

1.

If yes, please provide details

(Attach separate list as required)

2.

If yes, please provide details

Additional Comments:

COMMUNICATION – Identify all mechanisms used to exchange Protected/Classified information for this specific contract.

1.

2.

(If yes, please check all applicable)

3.

4.

5.

6.

7.

8.

Attached:

9.

Attached:

10.

Additional Comments:

IT MEDIA – Identify all types of IT media used in support of this contract

1.

2.

3.

4.

5.

6.

7.

MEDIA HANDLING in support of this contract

1.

2.

3.

4.

5.

6.

7.

8.

9.

Additional Comments:

PHYSICAL SECURITY in support of this contract

1.

Attached:

2.

3.

4.

5.

6.

7.

Additional Comments:

PERSONNEL SECURITY in support of this contract

Personnel directly involved with the electronic processing, producing and storing of the Protected/Classified information in support of this contract. (Attach separate list as required)

1.

2.

3.

4.

5.

Additional Comments:

IT PERSONNEL SECURITY in support of this contract

IT Personnel directly involved with the Administration and Support of the IT equipment/software. (Attach separate list as required)

1.

2.

3.

4.

5.

6.

Additional Comments:

LIST OF IT EQUIPMENT – List all the IT equipment used in support of this contract and for the complete duration of this contract.

Description: (Check all applicable)

Additional Comments:

INFORMATION TECHNOLOGY SECURITY in support of this contract

1.

2.

3.

4.

5.

6.

What is the Operating Systems (OS) and Service Pack (SP) on the IS?

Servers:

Workstations:

Laptops:

7.

How are the OS Updates and Security Patches applied?







8.

Are administrative accounts used solely for the administration of the IS?

9.

Do you use Active Directory to create User Accounts?

10.

Are unique username accounts and unique passwords required to access the IS?

11.

Provide details on password policies. (e.g. length, difficulty, life, lock-out policy, etc.)

12.

Are users forced to change the temporary password at first login?

13.

Does the IS permit users the capability to save passwords at login?

14.

Are IS Security Logs maintained and reviewed periodically? (e.g. event viewer)

15.

Is antivirus software used?

16.

Provide antivirus product details.

Servers:

Workstations:

Laptops:

17.



18.

How are the antivirus updates applied?







19.

Is there any Protected/Classified information saved locally on the IS?

20.

Is the Protected/Classified information for this contract segregated from corporate information?

21.

22.

23.

24.

Do you have encryption capability?

25.

26.

27.

Provide encryption product name and version.

Servers:

Workstation:

Laptops:

Additional Comments:

SECURITY VIOLATIONS, BREACHES AND COMPROMISES

1.

2.

Additional Comments:

RECOVERY in support of this contract

1.

2.

3.

4.

What is the frequency of the backups? (Check all applicable)

5.

6.

Additional Comments:

DESTRUCTION/DISPOSAL – CSEC – ITSG-06 Refers.

1.

2.

3.

4.

Provide "sanitization" product name and version. (e.g. triple-overwrite software)

5.

6.

7.

Additional Comments:

This completed check list is NOT to be sent by return email unless it has been encrypted. Please contact the IT Sec Inspector for instructions and to confirm transmittal method.

Annex A – List of References

REFERENCES
Long Title and Internet Link
TBS – PGS
Policy on Government Security (Formerly GSP)
http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16578&section=text
TBS – MITS
Operational Security Standard: Management of Information Technology Security
http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12328&section=text
TBS – OSSPS
Operational Security Standard on Physical Security
http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12329
TBS – SCMS
Security and Contracting Management Standard
http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12332
PWGSC/ISP – ISM
CSEC – Industry Program
Advice and Guidance on Commercial Products
http://www.cse-cst.gc.ca/its-sti/services/index-eng.html
CSEC – CITP
CSEC – CSG
CSEC – ITSA
CSEC – ITSB
CSEC – ITSD
CSEC – ITSG
CSEC – ITSPSR
CSEC – HTRA
CSEC – CCCS
Common Criteria

Annex B – List of References available ONLY upon request to your IT Sec Inspector in support of classified contracts.

REFERENCES
Location
CSEC – ITSG-11
Information Technology Security Guidance 11 – COMSEC Installation Planning – TEMPEST Guidance and Criteria
CSEC – ITSG-12
Information Technology Security Guidance 12 – Government of Canada Facility Evaluation Procedures

Annex C – List of Abbreviations and Definitions

ABBREVIATIONS
Long Titles and/or Definitions
ACL
Access Control List
ACSO
Alternate Company Security Officer
AES
Advanced Encryption Standard
C&A
Certification and Accreditation (See below)
CCSO
Corporate Company Security Officer
COTS
Commercial, off-the-shelf
CSEC
Communication Security Establishment Canada
CSO
Company Security Officer
DSC
Document Safeguarding Capability
FTP
File Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
IS
Information System
ISM
Industrial Security Manual
ISP
Industrial Security Program
IT
Information Technology
IT Sec
Information Technology Security
LAN
Local Area Network
MAN
Metropolitan Area Network
OS
Operating Systems
SAN
Storage Area Network
SP
Service Pack
SRCL
Security Requirement Check List
SSL
Secure Sockets Layer
TEMPEST
Transient Electro Magnetic Pulse Emanation Surveillance Technology
TRA
Thread Risk Assessment
USB
Universal Serial Bus
VLAN
Virtual Local Area Network
VoIP
Voice over Internet Protocol
VPN
Virtual Private Network
WAN
Wide Area Network
WLAN
Wireless Local Area Network
DEFINITIONS
Certification and Accreditation (C&A)
C&A is the process of comprehensively evaluating technical and non-technical features of an information system [in its environment] so that it can be determined whether or not the system is ready to operate at an acceptable level of [residual] risk based on the implementation of an approved set of technical, managerial, and procedural safeguards.
Stand-alone device
Refers to any computer device that includes the following, but is not limited to: workstation, laptop, tablet PC or any other device that does not connect to any network; either through a wired, wireless or remote access connection.