Download free Complete System Administrator Checklist. This checklist covers Daily Checklist, Weekly Checklist, Monthly Checklist and Annual Checklist for all system administrator activity within operational and security perspective. This free checklist also give supporting information about tools to be used and further referrence for more information about each task.
Some of the checklist that covered in this checklist are:
Download Free Security Intruder Detection Checklist. This security checklist could be used to manage intrusion or any others unauthorized activities within the system. This checklist cover basic security activity that should be monitored during intrusion and detection process. This also could be used as part of Intrustion Prevention System (IPS) and Intrustion Detection System (IDS).
Download Free IT Security Audit Plan and Deliverables Templates. This templates cover step by step to perform security audit and deliverables that should be submitted to the client/user.
1. Vulnerability Scanning
This involves scanning the infrastructure set up to reveal any existing vulnerabilities.
2. Report Audit
This involves auditing reports that are regularly generated as a part of the Security management process of the organisation. Audits are conducted on: Logs – logs that are maintained within the system (syslogs) by the network, system and database components. IDS Reports – reports that are generated by the Intrusion Detection System on an on-going basis. Any other reports that are maintained/generated by the organisation as part of its security maintenance program.
Download free Business Continuity Planning Audit Checklist. This Checklist based on ISO27001/ISO27002 standard which recommends that the business continuity planning process should ensure that:
- There is a clear description (signed off by the board) of the circumstances in which the procedure is to be carried out.
- There is a clear description (signed off by the board) of what constitutes the maximum acceptable level of loss of information or services, and this criterion should drive all activity.
Download free IT Security Assessment Report. This IT Security Assessment Report covering detail vulnerabilities activities in area Network security, system security, application security, operational security up to physical security