Governance, Compliance, and Risk
BlogInterviewing GuideGovernance Guide
  • Home
  • Governance
    • Policies, Procedures, and Guidelines
      • Policies
        • Policy Life Cycle Steps
        • Creating a Good Policy
        • Types of Policies
      • Procedure
      • Guideline
    • Business
      • Review of Security Requirements for Contracts
        • Request for Proposal (RFP)
        • Request for Quote (RFQ)
        • Request for Information (RFI)
      • Common Business Documents to Support Security
  • Compliance
    • Frameworks
      • ISO 27001
        • Changes from 2013 to 2022
      • SOC 2
        • The Planning Phase
        • Famework Subject Matter
        • Security Management Procedures
        • Prepare for Implementation
        • Initiating a SOC2 Audit
        • Conducting a SOC 2 Audit
      • FedRAMP
      • HITRUST
    • Security Controls
      • Asset Management (AST)
      • Business Continuity and Disaster Recovery (BCD)
      • Change Management (CHG)
      • Compliance (CPL)
    • Auditing
      • Gap Assessment/Analysis
      • Techniques
        • Auditing Cybersecurity Programs
        • Auditing Web Servers and Web Applications
        • Auditing Databases
        • Auditing Storage
        • Auditing End-User Computing Devices
        • Auditing Applications
        • Auditing Cloud Computing
  • Risk
    • Frameworks
  • Customer Security
    • What is Customer Security
    • Security Questionnaires: Questions
      • Security Governance
        • Does your organization conduct an annual independent information security review and act upon the fi
        • Does your organization have a documented Cybersecurity Policy or Information Security Policy?
        • Does your organization have a formal policy on the use of mobile devices?
        • Does your organization have a formal policy for remote working that includes security?
        • Does your organization have a documented Acceptable Use Policy
        • Does your organization have a documented Data Classification Policy?
        • Does your organization have a documented Access Control Policy?
        • Does your organization have a Password Policy?
        • Does your organization have a documented Backup Policy?
        • Does your organization enforce a Clear Desk and Screen Policy?
        • Are your organization's information security policies available to all employees?
      • Risk Assessment and Treatment
        • IT & Infrastructure Risk Governance
        • IT & Infrastructure Risk Assessment Life Cycle
        • Third-Party Risk Management
      • Asset and Information Management
        • Asset Management
        • Information Management
        • Media Security
        • Physical Media Transmission
        • Data Transmission
        • Encryption
        • Page 1
      • HR and Personnel Security
      • Operation Management
        • IT Operational Procedures
        • Change Control
        • System Acceptance Criteria
        • Time Synchronization
      • Access Control
        • Access Provisioning
        • Access Revocation
        • Authentication
        • Access Reviews
        • Password Controls
        • Remote Access
      • Application Security
        • Application Security Roles and Responsibilities
        • Secure Architectural Design Standards
        • SDLC
        • Web Server Security
        • API
        • Mobile Application Security
      • Incident Event and Communications Management
        • Cybersecurity Incident Management
        • Security Event Monitoring
      • Business Resiliency
        • Business Resilience Governance
        • Business Continuity Planning
        • Disaster Recovery Testing
        • Capacity Management and Redundancy
        • Backup and Recovery
      • Compliance
      • End User Device Security
      • Network Security
      • Privacy
      • Threat Management
      • Server Security
      • Cloud Hosting
Powered by GitBook
On this page
  • Purpose
  • Scope
  • Ownership
  • Controls
  • Network Diagrams & Data Flow Diagrams (DFDs)
  • Secure Disposal or Re-Use of Equipment
  1. Compliance
  2. Security Controls

Asset Management (AST)

Purpose

Maintains an inventory of systems and technology assets from purchase through disposition, to ensure secured use, regardless of the asset's location.

Scope

This control applies to all endpoint workstations as well as virtual assets within our hosting providers.

Ownership

  • IT Operations owns the workstation assets portion of this control

  • Infrastructure owns the system and service portions of this control

Controls

Network Diagrams & Data Flow Diagrams (DFDs)

Control Statement: Has implemented mechanisms to maintain network architecture diagrams that:

  • Contain sufficient detail to assess the security of the network's architecture;

  • Reflect the current state of the network environment; and

  • Document all sensitive data flows.

Goal: Does the organization maintain network architecture diagrams that:

  • Contain sufficient detail to assess the security of the network's architecture;

  • Reflect the current state of the network environment; and

  • Document all sensitive data flows?

Test of Design

  1. Inspect formal policies, procedures or other relevant documentation to support the assessment of security against the network architecture and reflect the current state of the network environment and sensitive data flows.

  2. Interview key organizational personnel within FormAssembly to discuss high level workflows that support the assessment of security against the network architecture and the documentation of the current state of the network environment and sensitive data flows.

Test of Operating Effectiveness

  1. Examine relevant documentation and network diagrams to assess that sufficient detail is provide to outline the security of the network architecture.

  2. Examine relevant policies and documentation against the network diagram to determine if it sufficiently defines the current state of the network environment and all sensitive data flows.

Secure Disposal or Re-Use of Equipment

Statement: Mechanisms exist to securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent information being recovered from these components.

Goal: Does the organization securely destroy media when it is no longer needed for business or legal reasons?

Test of Design

  • Inspect formal policies, procedures or other relevant documentation that outline mechanisms used to securely destroy media when no longer needed for business or legal purposes.

Test of Operating Effectiveness

  • Examine data destruction policies, procedures and configurations for evidence that the procedures, policies and configurations facilitate implementation and adherence of media destruction when no longer needed for business or legal purposes.

Definitions

  • Test of Design - (TOD) – verifies that a control is designed appropriately and that it will prevent or detect a particular risk.

  • Test of Operating Effectiveness - (TOE) - used for verifying that the control is in place and it operates as it was designed.

PreviousSecurity ControlsNextBusiness Continuity and Disaster Recovery (BCD)

Last updated 2 years ago

Page cover image