BCDEIJK
1
GÉANT Security Baseline Assessment: For
2
3
Instructions
4
Interview an individual based on the questions below organized according to GÉANT Security Baseline Requirements.
5
There are three guidance questions for each requirement, which indicate the degree of achievement of the objectives.
6
Select the best answer from the multiple choice drop down selections in the answer column: None (No), one/two (Partly) or all guidance questions are covered (Yes)
7
Use "Not applicable" only if the subject on a requirement does not apply to your organization, e.g. if an orgainsation does not own federated metadata, it's not possible to sign it.
8
Document additional information such as how and why in the "Interview Notes" column.
9
Once the assessment is complete, go to the "Scorecard" sheet and view a summary of your results.
10
11
organisation:
12
Project:
13
Interview Date:
14
Interviewer:
15
Persons Interviewed:
16
17
Policy and Leadership
18
Management Commitment and MandateAnswerInterview NotesRating
19
MC1Member of organisational leadership team is given a direct mandate for security.0.00
20
Guidance:There is member of top management responsible for security (CISO or equivalent).
21
Guidance:Security is a regular agenda item for executive / board level meetings.
22
Guidance:Executive teams receive regular briefings on security topics from next-level management / operational staff.
23
24
Security policy and objectives are established and clearly linked to organisational strategy.
25
Guidance:Security is clearly addressed in the organisational strategy documentation.
26
Guidance:Each department of organisation has security topics, applicable to department, in it's charter or equivalent workplan.
27
Guidance:It is ensured that all employees are familiarized with security part of organisational strategy.
28
29
Budget and resources for security are clearly defined and set annually.
30
Guidance:There is an annual budget dedicated to security.
31
Guidance:It is possible to provide a figure from previous guidance.
32
Guidance:The planned and realised budget are aligned.
33
34
35
MC2Support is provided for the creation and approval of controls to meet GÉANT Security Baseline.
36
Guidance:CISO or equivalent organises a regular meeting that covers harmonisation with GÉANT Security Baseline.
37
Guidance:There is dedicated person who takes care of harmonisation with GÉANT Security Baseline.
38
Guidance:There is part of the annual security planning dedicated to harmonisation with GÉANT Security Baseline.
39
40
Regular reporting of security controls to top management is in place
41
Guidance:CISO at least quarterly reports to top level management on security.
42
Guidance:Top level management at least quarterly discuss technical security issues.
43
Guidance:Top level management at least quarterly discuss legal or organisation security issues.
44
45
46
MC3The goals for information security and data protection are communicated annually by the top management.
47
Guidance:CEO at least annually addresses all employees concerning security (could be jointly with other topics).
48
Guidance:CISO at least annually addresses all employees specifically about security.
49
Guidance:There is at least one annual security related all hands event (meeting, workshop, webinar…) lead by CEO or CISO.
50
51
The security program is compliant to a national or international standard.
52
Guidance:Organisation is certified according relevant national standard.
53
Guidance:Organisation is certified according relevant international standard.
54
Guidance:Organisation is subject to required re-assessment audits to confirm compliance.
55
56
Internal Security PolicyAnswerInterview NotesRating
57
SP1Information security policy has been approved by management and it is implemented in the NREN.Yes3.00
58
Guidance:IS policy has been approved by top management.
59
Guidance:Organisation have documented plan for implementation of IS policy.
60
Guidance:There is member of management responsible for implementation of IS policy.
61
62
The information security policy is implemented for new and legacy services and systems.Yes
63
Guidance:IS policy is implemented for all new services and systems.
64
Guidance:IS policy is implemented on at least 75% of legacy services and systems.
65
Guidance:There is plan to implement IS policy to all legacy services and systems.
66
67
Physical security and use of mobile and personal devices are addressed in the information security policy.Yes
68
Guidance:Physical security is addressed in IS policy.
69
Guidance:Usage of mobile devices is addressed in IS policy.
70
Guidance:Usage of personal devices is addressed in IS policy.
71
72
73
SP2Violations of the Internal Security Policy are investigated and dealt with by the security officer.Yes
74
Guidance:There is a contact point known to all employees where they can report security incidents.
75
Guidance:There are other means of detecting incidents (e.g. monitoring, helpdesk, IDS…).
76
Guidance:All reported or detected incidents are resolved, security officer is informed about and he/she acts when necessary.
77
78
Information security policy is continuously updated (at least once per year).Yes
79
Guidance:IS policy has been reviewed and updated in last 12 months.
80
Guidance:Approximate time of next review has been fixed.
81
Guidance:There is a person responsible for coordinating of IS policy review and update.
82
83
84
SP3Reliable mechanisms for monitoring information security policy implementation are in place and results are regularly presented to the top management.Yes
85
Guidance:IS officer have regular meetings with service owners concerning implementation of IS policy in their services.
86
Guidance:There is monitoring in place to detect violation of IS policy (monitoring, log analysis, IDS…).
87
Guidance:Status of implementation of IS policy is regularly presented to the top management.
88
89
Internal security policies are accessible to other NRENS or R&E organisations.Yes
90
Guidance:Organisation's IS policy has been shared upon request with at least 2 other NRENs.
91
Guidance:There was at least one meeting/discussion with another organisations about IS policy.
92
Guidance:Results of discussions has been reviewed and implemented in IS policy if applicable.
93
94
Acceptable Use PolicyAnswerInterview NotesRating
95
AU1NREN have AUP based on security policy.0.00
96
Guidance:Organisation has an AUP in place.
97
Guidance:AUP has been aligned with internal security policy.
98
Guidance:AUP is updated with update of internal security policy.
99
100
The AUP has been signed or accepted by all users of information system including new users.