Information Technology Security (IT Sec) Checklist

PDF Version (203Kb) Help on Alternative Formats

PROTECTED A (when completed)

(see SRCL Part C.11.d)
(see SRCL Part C.11.e)

NOTE: The purpose of this checklist is to provide the Industrial Security Program (ISP) Information Technology Security (IT Sec) Inspector with initial information identifying the company's IT Sec posture in preparation for the on-site inspection in support of the processing, producing and storing of sensitive information for this government contract at the above identified site. This IT Sec Checklist is not to be used by the government department as the Technical Document as required in Security Requirement Check List (SRCL) at Part C.11.d or as the Connectivity Criteria document at Part C.11.e.

Annex A – List of References

Annex B – List of References available only upon request

Annex C – List of Abbreviations and Definitions

INFORMATION SYSTEM (IS) (Check all applicable)

Is the Information System (IS) utilized for this contract currently in place, configured, operational and ready for the IT Sec Inspection?
Is the Information System (IS) utilized for this contract currently in place, configured, operational and ready for the IT Sec Inspection?

NOTE:

Information Technology (IT) in support of this contract.

CORPORATE NETWORK:
CORPORATE NETWORK:



STAND-ALONE:
STAND-ALONE:
(See Annex B)


Closed Local Area Network
Closed Local Area Network
Stand-alone Workstation
Stand-alone Workstation
Stand-alone Laptop
Stand-alone Laptop

THREAT RISK ASSESSMENT (TRA)

1. Has your company completed and documented a Threat/Risk Assessment (TRA) for the processing of the Protected/Classified information?
1. Has your company completed and documented a Threat/Risk Assessment (TRA) for the processing of the Protected/Classified information?
2. Has the IS in support of this contract been Certified and Accredited (C&A)?
2. Has the IS in support of this contract been Certified and Accredited (C&A)?
3. For Classified information processing only: Has emission security been addressed within the TRA?
3. For Classified information processing only: Has emission security been addressed within the TRA?

SYSTEM LOCATION – Identify all sites where Protected and/or Classified information is processed, produced, stored and/or backed up for all aspects of this specific contract or any related subcontracts.

1. Will the Protected/Classified information be electronically sent from the supplier's IT system at this site to an alternate site, a non-government location and/or to a third party supplier?
1. Will the Protected/Classified information be electronically sent from the supplier's IT system at this site to an alternate site, a non-government location and/or to a third party supplier?

(If yes, please provide details)

(Attach separate list as required)

2. If there is connectivity to another site and/or location, was there a subcontract initiated for this purpose?
2. If there is connectivity to another site and/or location, was there a subcontract initiated for this purpose?

(If yes, please provide details)

Contract number:
Contract number:
SRCL 11.d
SRCL 11.d
SRCL 11.e
SRCL 11.e

SYSTEM LOCATION Additional Comments:

COMMUNICATION – Identify all mechanisms used to exchange Protected/Classified information for this specific contract.

1. At this site, does the IS connect to any other information systems? (e.g. Corporate, Government, Home, Internet, etc.)
1. At this site, does the IS connect to any other information systems? (e.g. Corporate, Government, Home, Internet, etc.)
2. Does your company utilize an "IT Link" as a mean of communication?
2. Does your company utilize an "IT Link" as a mean of communication?

(If yes, please check all applicable)

FTP
FTP
VPN
VPN
HTTPS
HTTPS
SSL
SSL
3. Can the IS be accessed remotely?
3. Can the IS be accessed remotely?
4. Do you utilize two factor authentications?
4. Do you utilize two factor authentications?
5. Does your company utilize wireless technology?
5. Does your company utilize wireless technology?
Network
Network (Specify):
Hand-held Devices
Hand-held Devices (Specify):
7. Does you company utilize "Courier" services as a mean of communication?
7. Does you company utilize "Courier" services as a mean of communication?
8. Provide a Network Topology Diagram demonstrating where the Protected and/or Classified information in support of this contract is processed, produced, stored and/or backed up.
Attached:
Attached:
COMMUNICATION 9.Attached:
Attached:
10. Does your company utilize a facsimile (FAX) in support of this contract?
10. Does your company utilize a facsimile (FAX) in support of this contract?

Additional Comments:

IT MEDIA – Identify all types of IT media used in support of this contract

1. CD/DVD
1. CD/DVD:
2. Mobile USB Storage Device:
2. Mobile USB Storage Device:
3. USB External Hard Drive:
3. USB External Hard Drive:
4. Removable Hard Drive:
4. Removable Hard Drive:
5. Audio/Video Media:
5. Audio/Video Media:
6. Backup Media:
6. Backup Media:

MEDIA HANDLING in support of this contract

1. Is the IT Equipment (Servers, Workstations and/or Laptops) used in support of this contract marked to the highest sensitivity level?
1. Is the IT Equipment (Servers, Workstations and/or Laptops) used in support of this contract marked to the highest sensitivity level?
2. Is the IT Media used in support of this contract marked to the highest sensitivity level?
2. Is the IT Media used in support of this contract marked to the highest sensitivity level?
3. If you use IT media as a backup method, do the backups have the level of sensitivity, the contract number and the government department marked on them?
3. If you use IT media as a backup method, do the backups have the level of sensitivity, the contract number and the government department marked on them?
4. Is the location of all media used in support of this contract known by the Company Security Officer (CSO) and/or Alternate CSO (ACSO) at all times?
4. Is the location of all media used in support of this contract known by the Company Security Officer (CSO) and/or Alternate CSO (ACSO) at all times?
5. Is all IT media used in support of this contract kept separate from all other corporate IT media?
5. Is all IT media used in support of this contract kept separate from all other corporate IT media?
6. How is the location of all media known by the CSO and/or ACSO at all times?
6. How is the location of all media known by the CSO and/or ACSO at all times?
7. Is all IT media used in support of this contract kept separate from other contracts' IT media.
7. Is all IT media used in support of this contract kept separate from other contracts' IT media.
8. When transporting Protected/Classified information on IT media to an outside location, is it encrypted?
8. When transporting Protected/Classified information on IT media to an outside location, is it encrypted?
9. When transporting Protected/Classified information on IT media to an outside location, is it transported in accordance with the Industrial Security Manual (ISM) Chapter 5?
9. When transporting Protected/Classified information on IT media to an outside location, is it transported in accordance with the Industrial Security Manual (ISM) Chapter 5?

Additional Comments:

PHYSICAL SECURITY in support of this contract

1. Provide a floor plan identifying where the processing, producing, and the storing of the Protected/Classified information in support of this contract.
1. Provide a floor plan identifying where the processing, producing, and the storing of the Protected/Classified information in support of this contract.
Attached:
2. Will any additional physical location(s) at this site that was not identified during the physical inspection for the company’s Document Safeguarding Capability (DSC) be used for IT processing, producing and/or storing of Protected/Classified information in support of this contract?
2. Will any additional physical location(s) at this site that was not identified during the physical inspection for the company’s Document Safeguarding Capability (DSC) be used for IT processing, producing and/or storing of Protected/Classified information in support of this contract?
3. Are all IT media stored in the ISP approved security container?
3. Are all IT media stored in the ISP approved security container?
4. Do you have an Access Control List (ACL) within your Security and your High-Security Zones when processing Classified information?
4. Do you have an Access Control List (ACL) within your Security and your High-Security Zones when processing Classified information?
5. Does your company maintain a Visitor Log?
5. Does your company maintain a Visitor Log?
6. Does your company issue Visitors Passes?
6. Does your company issue Visitors Passes?
7. Are visitors escorted in the locations while the processing, producing, and storing of the Protected/Classified information is being performed?
7. Are visitors escorted in the locations while the processing, producing, and storing of the Protected/Classified information is being performed?

Additional Comments:

PERSONNEL SECURITY in support of this contract

Corporate Company Security Officer (CCSO)
Corporate Company Security Officer (CCSO)

Personnel directly involved with the electronic processing, producing and storing of the Protected/Classified information in support of this contract. (Attach separate list as required)

1. Does your company utilize Call Center personnel in support of this contract?
1. Does your company utilize Call Center personnel in support of this contract?
2. Are all personnel with access to the IS cleared to the security level of the information processed within this contract?
2. Are all personnel with access to the IS cleared to the security level of the information processed within this contract?
3. Do all personnel with access to the IS have a need-to-know for the information processed?
3. Do all personnel with access to the IS have a need-to-know for the information processed?
4. Is there a documented Security Awareness program for all personnel involved with this contract?
4. Is there a documented Security Awareness program for all personnel involved with this contract?
5. Are all personnel aware of the handling of information as defined in the ISM?
5. Are all personnel aware of the handling of information as defined in the ISM?

Additional Comments:

IT PERSONNEL SECURITY in support of this contract

IT Personnel directly involved with the Administration and Support of the IT equipment/software. (Attach separate list as required)

1. Does your company utilize Help Desk personnel in support of this contract?
1. Does your company utilize Help Desk personnel in support of this contract?
2. Are all IT personnel, with access to the IS, cleared to the security level of the information processed within this contract?
2. Are all IT personnel, with access to the IS, cleared to the security level of the information processed within this contract?
3. Because of their elevated access privileges, have all IT personnel received a security awareness briefing on the handling of information as defined in the ISM?
3. Because of their elevated access privileges, have all IT personnel received a security awareness briefing on the handling of information as defined in the ISM?
4. Have all IT personnel received, as part of their security awareness briefing, specific instructions on the handling of the hardware in support of the Protected/Classified information?
4. Have all IT personnel received, as part of their security awareness briefing, specific instructions on the handling of the hardware in support of the Protected/Classified information?
5. Have all IT personnel received specific instructions on the updating of the software in support of the Protected/ Classified information as part of their security awareness briefing.
5. Have all IT personnel received specific instructions on the updating of the software in support of the Protected/ Classified information as part of their security awareness briefing.
6. Does your company utilize a third party company and/or single technician to perform IT support tasks on the above identified IS?
6. Does your company utilize a third party company and/or single technician to perform IT support tasks on the above identified IS?
Registered in the ISP:
Registered in the ISP:

Additional Comments:

LIST OF IT EQUIPMENT – List all the IT equipment used in support of this contract and for the complete duration of this contract.

Description: (Check all applicable)

Desktop(s):
Desktop(s):
Laptop(s):
Laptop(s):
Application Server(s)
Application Server(s)
SAN Server(s)
SAN Server(s)
Files and Print Server(s)
Files and Print Server(s)
Email Servers(s)
Email Servers(s)
Multi-function Printers
Multi-function Printers
(Printer/Copier/Scanner/Fax)
Printer(s)
Printer(s)
Printer(s) with/without wireless
Printer(s)
Scanner(s)
Scanner(s)
Fax(es)
Fax(es)
Photocopier(s)
Photocopier(s)
Tape Backup Appliance(s)
Tape Backup Appliance(s)
Router(s)/Switch(es)
Router(s)/Switch(es)
Router
Router
Firewall Appliance
Firewall Appliance
Wireless Transceiver(s)
Wireless Transceiver(s)
Cable Modem to connect with the ISP
Cable Modem to connect with the ISP
VoIP – Management phone system
VoIP – Management phone system

Additional Comments:

INFORMATION TECHNOLOGY SECURITY in support of this contract

1. Is there an IT Security Policy in place?
1. Is there an IT Security Policy in place?
2. Do you utilize a Firewall solution?
2. Do you utilize a Firewall solution?
>Type
3. Is the Firewall configuration documented?
3. Is the Firewall configuration documented?

6. What is the Operating Systems (OS) and Service Pack (SP) on the IS?

Servers:

Workstations:

Laptops:

7. How are the OS Updates and Security Patches applied?

7. How are the OS Updates and Security Patches applied? Servers:
Servers:


7. How are the OS Updates and Security Patches applied? Workstations:
Workstations:


7. How are the OS Updates and Security Patches applied? Laptops:
Laptops:


8. Are administrative accounts used solely for the administration of the IS?

8. Are administrative accounts used solely for the administration of the IS? Servers:
Servers:
8. Are administrative accounts used solely for the administration of the IS? Workstations:
Workstations:
8. Are administrative accounts used solely for the administration of the IS? Laptops:
Laptops:

9. Do you use Active Directory to create User Accounts?

9. Do you use Active Directory to create User Accounts? Servers:
Servers:
9. Do you use Active Directory to create User Accounts? Workstations:
Workstations:
9. Do you use Active Directory to create User Accounts? Laptops:
Laptops:

10. Are unique username accounts and unique passwords required to access the IS?

10. Are unique username accounts and unique passwords required to access the IS? Servers:
Servers:
10. Are unique username accounts and unique passwords required to access the IS? Workstations:
Workstations:
10. Are unique username accounts and unique passwords required to access the IS? Laptops:
Laptops:

11. Provide details on password policies. (e.g. length, difficulty, life, lock-out policy, etc.)

12. Are users forced to change the temporary password at first login?

12. Are users forced to change the temporary password at first login? Servers:
Servers:
12. Are users forced to change the temporary password at first login? Workstations:
Workstations:
12. Are users forced to change the temporary password at first login? Laptops:
Laptops:

13. Does the IS permit users the capability to save passwords at login?

13. Does the IS permit users the capability to save passwords at login? Servers:
Servers:
13. Does the IS permit users the capability to save passwords at login? Workstations:
Workstations:
13. Does the IS permit users the capability to save passwords at login? Laptops:
Laptops:

14. Are IS Security Logs maintained and reviewed periodically? (e.g. event viewer)

14. Are IS Security Logs maintained and reviewed periodically? Servers:
Servers:
14. Are IS Security Logs maintained and reviewed periodically? Workstations:
Workstations:
14. Are IS Security Logs maintained and reviewed periodically? Laptops:
Laptops:

15. Is antivirus software used?

15. Is antivirus software used?
Servers:
15. Is antivirus software used? Workstations:
Workstations:
15. Is antivirus software used? Laptops:
Laptops:

16. Provide antivirus product details.

Servers:

Workstations:

Laptops:

17. What is the frequency of the virus protection software updates?
17. What is the frequency of the virus protection software updates?


18. How are the antivirus updates applied?

18. How are the antivirus updates applied? Servers:
Servers:


18. How are the antivirus updates applied? Workstations:
Workstations:


18. How are the antivirus updates applied? Laptops:
Laptops:


19. Is there any Protected/Classified information saved locally on the IS?

19. Is there any Protected/Classified information saved locally on the IS? Servers:
Servers:
19. Is there any Protected/Classified information saved locally on the IS? Workstations:
Workstations:
19. Is there any Protected/Classified information saved locally on the IS? Laptops:
Laptops:
19. Is there any Protected/Classified information saved locally on the IS? Elsewhere:
Elsewhere:

20. Is the Protected/Classified information for this contract segregated from corporate information?

20. Is the Protected/Classified information for this contract segregated from corporate information? Servers:
Servers:
20. Is the Protected/Classified information for this contract segregated from corporate information? Workstations:
Workstations:
20. Is the Protected/Classified information for this contract segregated from corporate information? Laptops:
Laptops:
22. Do you have any other current Government contracts at this site with an IT component requirement?
22. Do you have any other current Government contracts at this site with an IT component requirement?

24. Do you have encryption capability?

24. Do you have encryption capability? Servers:
Servers:
24. Do you have encryption capability? Workstations:
Workstations:
24. Do you have encryption capability? Laptops:
Laptops:
25. Who provides the encryption product?
25. Who provides the encryption product?

27. Provide encryption product name and version.

Servers:

Workstation:

Laptops:

Additional Comments:

SECURITY VIOLATIONS, BREACHES AND COMPROMISES

1. Do you have a process to report security breaches or incidents?
1. Do you have a process to report security breaches or incidents?
2. Do you apply sanctions to IT Sec incidents when in the opinion of Senior Management there has been misconduct or negligence?
2. Do you apply sanctions to IT Sec incidents when in the opinion of Senior Management there has been misconduct or negligence?
)

Additional Comments:

RECOVERY in support of this contract

1. Do you backup the information for the Protected/Classified information in support of this contract?
1. Do you backup the information for the Protected/Classified information in support of this contract?
2. Do you have a documented backup procedure plan for the Protected/Classified information in support of this contract?
2. Do you have a documented backup procedure plan for the Protected/Classified information in support of this contract?

4. What is the frequency of the backups? (Check all applicable)

4. What is the frequency of the backups? Daily
Daily
4. What is the frequency of the backups? Weekly
Weekly
4. What is the frequency of the backups? Monthly
Monthly
5. Are backups stored off-site?
5. Are backups stored off-site?
6. Do you have a Documented Disaster Recovery Plan in place?
6. Do you have a Documented Disaster Recovery Plan in place?

Additional Comments:

DESTRUCTION/DISPOSAL – CSEC – ITSG-06 Refers.

1. Upon completion of contract, do you retain any electronic information?
1. Upon completion of contract, do you retain any electronic information?
2. Upon completion of contract, are all IT equipment and media sanitized?
2. Upon completion of contract, are all IT equipment and media sanitized?

4. Provide "sanitization" product name and version. (e.g. triple-overwrite software)

7. Do you maintain a record of destruction/disposal?
7. Do you maintain a record of destruction/disposal?

Additional Comments:

This completed check list is NOT to be sent by return email unless it has been encrypted. Please contact the IT Sec Inspector for instructions and to confirm transmittal method.

Annex A – List of References

REFERENCES
Long Title and Internet Link
TBS – PGS
Policy on Government Security (Formerly GSP)
http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=16578&section=text
TBS – MITS
Operational Security Standard: Management of Information Technology Security
http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12328&section=text
TBS – OSSPS
Operational Security Standard on Physical Security
http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12329
TBS – SCMS
Security and Contracting Management Standard
http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12332
PWGSC/ISPISM
CSEC – Industry Program
Advice and Guidance on Commercial Products
http://www.cse-cst.gc.ca/its-sti/services/index-eng.html
CSEC – CITP
CSEC – CSG
CSEC – ITSA
CSEC – ITSB
CSEC – ITSD
CSEC – ITSG
CSEC – ITSPSR
CSEC – HTRA
CSEC – CCCS
Common Criteria

Annex B – List of References available ONLY upon request to your IT Sec Inspector in support of classified contracts.

REFERENCES
Location
CSEC – ITSG-11
Information Technology Security Guidance 11 – COMSEC Installation Planning – TEMPEST Guidance and Criteria
CSEC – ITSG-12
Information Technology Security Guidance 12 – Government of Canada Facility Evaluation Procedures

Annex C – List of Abbreviations and Definitions

ABBREVIATIONS
Long Titles and/or Definitions
ACL
Access Control List
ACSO
Alternate Company Security Officer
AES
Advanced Encryption Standard
C&A
Certification and Accreditation (See below)
CCSO
Corporate Company Security Officer
COTS
Commercial, off-the-shelf
CSEC
Communication Security Establishment Canada
CSO
Company Security Officer
DSC
Document Safeguarding Capability
FTP
File Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
IS
Information System
ISM
Industrial Security Manual
ISP
Industrial Security Program
IT
Information Technology
IT Sec
Information Technology Security
LAN
Local Area Network
MAN
Metropolitan Area Network
OS
Operating Systems
SAN
Storage Area Network
SP
Service Pack
SRCL
Security Requirement Check List
SSL
Secure Sockets Layer
TEMPEST
Transient Electro Magnetic Pulse Emanation Surveillance Technology
TRA
Threat Risk Assessment
USB
Universal Serial Bus
VLAN
Virtual Local Area Network
VoIP
Voice over Internet Protocol
VPN
Virtual Private Network
WAN
Wide Area Network
WLAN
Wireless Local Area Network
DEFINITIONS
Certification and Accreditation (C&A)
C&A is the process of comprehensively evaluating technical and non-technical features of an information system [in its environment] so that it can be determined whether or not the system is ready to operate at an acceptable level of [residual] risk based on the implementation of an approved set of technical, managerial, and procedural safeguards.
Stand-alone device
Refers to any computer device that includes the following, but is not limited to: workstation, laptop, tablet PC or any other device that does not connect to any network; either through a wired, wireless or remote access connection.