APPENDIX A

Checklists

These checklists are designed to help make certain that all basic steps have been taken for each security measure. They do not give all details about how to take certain steps, nor should a checklist be considered exhaustive; many more steps can be taken after completing the checklist. In fact, these checklists, and similar checklists from various standards bodies and industry advisory groups, can be used to develop your own checklists for your particular organization. Customized checklists ensure that you implement best practices in a way that fits your organizational security goals while utilizing the protection technologies your firm has invested in. A set of checklists needs to be an integral part of your IT policy, ...

Get Information Technology Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.