Controls Assessment & Compliance

Current assets

Assets managed by the IT Department include:

  • On-premises equipment for in-office business needs 
  • Employee equipment: end-user devices (desktops/laptops, smartphones), remote workstations, headsets, cables, keyboards, mice, docking stations, surveillance cameras, etc.
  • Management of systems, software, and services: accounting, telecommunication, database, security, ecommerce, and inventory management
  • Internet access
  • Internal network
  • Vendor access management
  • Data center hosting services 
  • Data retention and storage
  • Badge readers
  • Legacy system maintenance: end-of-life systems that require human monitoring
Administrative Controls
Control NameControl type and explanation    Needs to be implemented (X)Priority  
Least PrivilegePreventative; reduces risk by making sure vendors and non-authorized staff only have access to the assets/data they need to do their jobsXHigh
Disaster recovery plansCorrective; business continuity to ensure systems are able to run in the event of an incident/there is limited to no loss of productivity downtime/impact to system components, including: computer room environment (air conditioning, power supply, etc.); hardware (servers, employee equipment); connectivity (internal network, wireless); applications (email, electronic data); data and restorationXHigh
Password policiesPreventative; establish password strength rules to improve security/reduce likelihood of account compromise through brute force or dictionary attack techniquesXHigh
Access control policiesPreventative; increase confidentiality and integrity of dataXHigh
Account management policiesPreventative; reduce attack surface and limit overall impact from disgruntled/former employeesXHigh/ Medium
Separation of dutiesPreventative; ensure no one has so much access that they can abuse the system for personal gainXHigh
Technical Controls
Control NameControl type and explanation  Needs to be implemented (X)Priority  
Firewall  Preventative; firewalls are already in place to filter unwanted/malicious traffic from entering internal networkNANA
Intrusion Detection System (IDS)Detective; allows IT team to identify possible intrusions (e.g., anomalous traffic) quicklyXHigh
Encryption  Deterrent; makes confidential information/data more secure (e.g., website payment transactions)XHigh/ Medium
BackupsCorrective; supports ongoing productivity in the case of an event; aligns to the disaster recovery planXHigh
Password management systemCorrective; password recovery, reset, lock out notificationsXHigh/ Medium
Antivirus (AV) softwareCorrective; detect and quarantine known threatsXHigh
Manual monitoring, maintenance, and interventionPreventative/corrective; required for legacy systems to identify and mitigate potential threats, risks, and vulnerabilitiesXHigh
Physical Controls
Control NameControl type and explanation  Needs to be implemented (X)Priority  
Time-controlled safeDeterrent; reduce attack surface/impact of physical threatsXMedium/ Low
Adequate lightingDeterrent; limit “hiding” places to deter threatsXMedium/ Low
Closed-circuit television (CCTV) surveillancePreventative/detective; can reduce risk of certain events; can be used after event for investigationXHigh/ Medium
Locking cabinets (for network gear)Preventative; increase integrity by preventing unauthorized personnel/individuals from physically accessing/modifying network infrastructure gearXMedium
Signage indicating alarm service providerDeterrent; makes the likelihood of a successful attack seem lowXLow
LocksPreventative; physical and digital assets are more secureXHigh
Fire detection and prevention (fire alarm, sprinkler system, etc.)Detective/Preventative; detect fire in the toy store’s physical location to prevent damage to inventory, servers, etc.XMedium/ Low

Compliance checklist

_ The Federal Energy Regulatory Commission – North American Electric        
     Reliability Corporation (FERC-NERC)

This regulation applies to organizations that work with electricity or that are  involved with the U.S. and North American power grid. Organizations have an obligation to prepare for, mitigate, and report any potential security incident that can negatively affect the power grid. Organizations are legally required to adhere to the Critical Infrastructure Protection Reliability Standards (CIP) defined by the Federal Energy Regulatory Commission (FERC).

Explanation: NA

__X__ General Data Protection Regulation (GDPR)

GDPR is a European Union (E.U.) general data regulation that protects the processing of E.U. citizens’ data and their right to privacy in and out of E.U. territory. Additionally, if a breach occurs and a E.U. citizen’s data is compromised, they must be informed within 72 hours of the incident.

Explanation: Botium Toys is obligated to comply with the General Data Protection Regulation (GDPR) due to its global

__X__ Payment Card Industry Data Security Standard (PCI DSS)

PCI DSS is an international security standard meant to ensure that organizations storing, accepting, processing, and transmitting credit card information do so in a secure environment.

Explanation: Botium Toys is required to comply with the Payment Card Industry Data Security Standard (PCI DSS) because the company engages in the storage, acceptance, processing, and transmission of credit card information both in physical locations and via online platforms. Adherence to PCI DSS is crucial for safeguarding sensitive financial data and maintaining consumer trust.

_____ The Health Insurance Portability and Accountability Act (HIPAA)

HIPAA is a federal law established in 1996 to protect U.S. patients’ health information. This law prohibits patient information from being shared without their consent. Organizations have a legal obligation to inform patients of a breach.

Explanation: NA

__X__ System and Organizations Controls (SOC type 1, SOC type 2)

The SOC1 and SOC2 are a series of reports that focus on an organization’s user access policies at different organizational levels. They are used to assess an organization’s financial compliance and levels of risk. They also cover confidentiality, privacy, integrity, availability, security, and overall data safety. Control failures in these areas can lead to fraud.

Explanation: Botium Botium Toys is required to implement and enforce robust user access controls for both internal staff and external personnel, such as third-party vendors. This is essential to mitigate cybersecurity risks and ensure the safety and integrity of sensitive data. By setting appropriate access levels, the company can limit the exposure of critical information only to those who absolutely need it for their job functions. This is a fundamental aspect of a layered security strategy and is crucial for compliance with various data protection regulations.

      

Leave a comment