Public Works and Government Services Canada
PDF Version (203Kb) Help on Alternative Formats
PROTECTED A (when completed)
NOTE: The purpose of this checklist is to provide the Industrial Security Program (ISP) Information Technology Security (IT Sec) Inspector with initial information identifying the company's IT Sec posture in preparation for the on-site inspection in support of the processing, producing and storing of sensitive information for this government contract at the above identified site. This IT Sec Checklist is not to be used by the government department as the Technical Document as required in Security Requirement Check List (SRCL) at Part C.11.d or as the Connectivity Criteria document at Part C.11.e.
Annex A – List of References
Annex B – List of References available only upon request
Annex C – List of Abbreviations and Definitions
NOTE:
Information Technology (IT) in support of this contract.
(If yes, please provide details)
(Attach separate list as required)
SYSTEM LOCATION Additional Comments:
(If yes, please check all applicable)
Additional Comments: COMMUNICATIONAdditional Comments:
Additional Comments: Additional Comments:
Additional Comments: PHYSICAL SECURITY 7 Additional Comments:
Personnel directly involved with the electronic processing, producing and storing of the Protected/Classified information in support of this contract. (Attach separate list as required)
Additional Comments: PERSONNEL SECURITY (CSO) Additional Comments:
IT Personnel directly involved with the Administration and Support of the IT equipment/software. (Attach separate list as required)
Additional Comments: IT PERSONNEL SECURITY in support of this contract Additional Comments:
Description: (Check all applicable)
Additional Comments: LIST OF IT EQUIPMENT Additional Comments:
6. What is the Operating Systems (OS) and Service Pack (SP) on the IS?
Servers:
Workstations:
Laptops:
7. How are the OS Updates and Security Patches applied?
8. Are administrative accounts used solely for the administration of the IS?
9. Do you use Active Directory to create User Accounts?
10. Are unique username accounts and unique passwords required to access the IS?
11. Provide details on password policies. (e.g. length, difficulty, life, lock-out policy, etc.)
12. Are users forced to change the temporary password at first login?
13. Does the IS permit users the capability to save passwords at login?
14. Are IS Security Logs maintained and reviewed periodically? (e.g. event viewer)
15. Is antivirus software used?
16. Provide antivirus product details.
18. How are the antivirus updates applied?
19. Is there any Protected/Classified information saved locally on the IS?
20. Is the Protected/Classified information for this contract segregated from corporate information?
24. Do you have encryption capability?
27. Provide encryption product name and version.
Workstation:
Additional Comments: 27. Provide encryption product name and version. Laptops: Additional Comments:
Additional Comments: 2. Do you apply sanctions to IT Sec incidents when in the opinion of Senior Management there has been misconduct or negligence? Additional Comments:
4. What is the frequency of the backups? (Check all applicable)
Additional Comments: RECOVERY Additional Comments:
4. Provide "sanitization" product name and version. (e.g. triple-overwrite software)
Additional Comments: 7. Do you maintain a record of destruction/disposal? Additional Comments:
This completed check list is NOT to be sent by return email unless it has been encrypted. Please contact the IT Sec Inspector for instructions and to confirm transmittal method.