1. Common Areas
ALL l/P Add ressed
Hardware Devices
lnternal / External;
Owned / Managed
of Breach Risk,,,
Networked Devices
a.'
Dimver
--8 . t l
@ , J
,.!::&!-;€g;&. t*;-;.t 1:j
-11::
e*:% F'
€=*re Prioritize
81re Aasets
q:=====7
r€======7
T Vulnerability ,r::
F=q Management
*=:g ...: , '-'
INVENTORY ALL ITEMS:
Hardware & Software
Operating System(s)
Application Software
Utilities
Life Cycle -*;.,
t'
I Ate*e l
1i1'
I 1..
l---f3h f-::.V i.alw,t,..i
llt,.l.. ' ..: .1,, 1
1':r' ::-;i
V M. Life Cycle Frequency Determined By Delta
& Frequency Required By Your Standards Policy
Data Breach I ncident Response P I an
What's your written plan in the event of a Data Breach?
Have you identified the roles each employee must play in a response?
Have you had a Data Breach Drill in the past Quarter, 6-Months, Year?
ALL 3'o Pa rty
Databases & Payment
Porta I s
Ensure ALL External
Systems & Software have been remediated
for ALL Known Vulnerabilities
Letter of Certification from
External Vendors
Web / e-Mail Servers Network Servers
Laptops / Notebooks
Multi-Function Machines
&Routers:
Wired & Wireless
Credit Card Reader Smart Phone
Other End-Point Devices
Firewalls
Copyright@ 2015 Global 1 Research & Deveiopment, Ltd, ALL Rights Reserved