Information Technology Governance

Local Government Management Guide

Security Self-Assessment: Questions

Information Technology Governance
Local Government Management Guide

Information Technology Governance: Security Self-Assessment Questions

A fillable form is available for download and completion online at https://www.osc.ny.gov/files/local-government/publications/pdf/IT-Governance-Self-Assessment-Form.pdf

IT Policy

1aAre IT policies adopted, distributed and updated as necessary?YesNoN/A
          List policies, their (physical or electronic) locations and the dates adopted and last revised:
1bWas a breach notification policy adopted?YesNoN/A
          Date adopted:
Date last revised:
1cWas a data security and privacy policy adopted?YesNoN/A
          Date adopted:
          Date last revised:

IT Security Training and Awareness

2aWere all computer users provided IT security training?YesNoN/A
          Date(s) of training:
          Who attended the training?
2bHave all officers and employees with access to personally identifiable information (PII), and specifically in schools, those with access to student, teacher or principal PII, been provided with data privacy and security awareness training within the past year?YesNoN/A
          Date(s) of training:
          Who attended the training?
2cAre there other efforts to raise IT security awareness?YesNoN/A
          Describe awareness efforts:

Computer Hardware, Software and Data Inventories

3aIs a detailed, up-to-date inventory of computer hardware maintained?YesNoN/A
          Review a copy of the hardware inventory and note when last updated:
3bIs a detailed, up-to-date inventory of authorized software maintained?YesNoN/A
          Review a copy of the software inventory and note when last updated:
3cHas data been assigned to categories (data classification) that will help determine the appropriate level of controls?YesNoN/A
          Review a copy of the data classification, noting the categories and types of information in each:
3dIs a detailed, up-to-date inventory of data maintained?YesNoN/A
          Review a copy of the data inventory and note when last updated:

Contracts and Service Level Agreements for IT Services

4aDo contracts and SLAs for IT services specify the level of service to be provided by the vendor and specific remedies if those requirements are not met?YesNoN/A
          Review the contract(s) and note the date signed:
4bDoes any contract that involves sharing student, teacher or principal PII with the third-party contractor include all required elements?YesNoN/A
          Confidentiality requirement:
          Bill of rights supplement:
          Contractor’s data security and privacy plan:

Malware Protection

5aIs antivirus software up-to-date on all computers?YesNoN/A
          Describe the process for updating antivirus software:
          Date of last antivirus software update:
5bAre removable devices, such as USB flash drives and digital cameras, automatically scanned for viruses and other malware when connected to a local government or school computer?YesNoN/A
5cIs the AutoPlay feature turned off (e.g., in network security settings) for all removable devices?YesNoN/A

Patch Management

6Are operating system and other software programs maintained at vendor-supported versions and are patches and updates applied and installed in a timely manner?YesNoN/A
          Describe the process for upgrading an operating system or other software program when it is no longer supported by               the vendor:
          Describe the process for identifying, applying and installing relevant software patches and updates:

Access Controls

7aAre unique network user accounts created for each user?YesNoN/A
7bAre unique application user accounts created for each user where applicable?YesNoN/A
7cDo any accounts exist that cannot be tied to an authorized user or process?YesNoN/A
          Describe the process for disabling unneeded user accounts:
7dIs a current list of authorized users and their levels of access maintained and periodically reviewed?YesNoN/A
          Review the list of authorized users and their levels of access:
7eHave password expectations been established for administrators configuring passwords or users creating passwords?YesNoN/A
          Describe expectations and how those expectations are communicated:
7fHave password requirements been defined related to for example, password comparisons, invalid attempts or encryption?YesNoN/A
          Identify the requirements and describe how each is enforced:

Online Banking

8aDo you have an online banking policy?YesNoN/A
          Review the policy:
8bAre online banking duties properly segregated?YesNoN/A
          Who has access to prepare, approve, process and record transactions for each online bank account?
8cAre online bank accounts monitored?YesNoN/A
          Who monitors the accounts?
          How often are online accounts monitored?

Wireless Network

9aAre wireless access points set up to limit broadcasting from beyond your offices?YesNoN/A
          Where are the wireless access points located?
          How far does the wireless signal broadcast?
9bHas the service set identifier (SSID or name of the wireless network) been changed from the factory default?YesNoN/A
          What is/are the SSID(s)?
9cIs the most secure encryption available used?YesNoN/A
          Note type of encryption used:

Firewalls and Intrusion Detection

10aIs a firewall(s) in place to control network communications?YesNoN/A
          Who is responsible for maintaining firewall rules and settings?
10bAre firewall activities/events logged?YesNoN/A
          Who reviews the logs?
10cHas intrusion detection been automated using modern antivirus software, a firewall(s) or a dedicated intrusion detection system (IDS)?YesNoN/A
          Who is responsible for reviewing and investigating any unauthorized, unusual or sensitive access activity identified?
          What process is followed to determine whether any security violation constitutes a breach requiring notification of                     affected individuals?

Physical Controls

11aIs physical access to IT system resources including servers, computers, network devices and wiring closets (if any) restricted?YesNoN/A
          View the server, computer, network device and wiring closet areas/rooms. How is access granted to those areas/rooms             (e.g., key, security code, access card)?
11bAre areas with IT system resources including servers, computers, network devices and wiring closets protected from fire and water damage?YesNoN/A
11cIs there an uninterrupted power source?YesNoN/A
11dAre inspections conducted for physical security control weaknesses?YesNoN/A
          Who conducted the last inspection and on what date?

Information Technology Contingency Planning

12aHas an IT contingency plan been developed?YesNoN/A
          Review the plan and note the date adopted:
12bHas the plan been distributed to responsible parties?YesNoN/A
12cWhen was the last time the plan was tested?YesNoN/A
          What was the outcome of the testing?
12dIs the plan periodically reviewed and revised as necessary to ensure it still meets local government or school needs?YesNoN/A
          Date plan last revised:
12eAre all critical data files and software programs periodically backed up?YesNoN/A
          How often are backups performed?
          Date/time of last backup:
          Date data was last restored successfully from a backup:
12fAre backups stored offline and offsite?YesNoN/A
          How are backups protected against the electronic threats (e.g., cyberattacks such as ransomware) to which the original           is exposed?
          Where is the offsite storage and how is it secured?

A fillable form is available for download and completion online at https://www.osc.ny.gov/files/local-government/publications/pdf/IT-Governance-Self-Assessment-Form.pdf


The Information Technology Governance LGMG can be downloaded at https://www.osc.ny.gov/files/local-government/publications/pdf/information-technology-governance.pdf