EN - Checklists

Cybersecurity checklist

Issue link: https://resources.genetec.com/i/1480711

Contents of this Issue

Navigation

Page 1 of 5

Cybersecurity checklist Best practices □ Do I have a proper cybersecurity strategy plan in place? □ Have I assessed cybersecurity in the scope of my physical security system? □ Did I conduct a vulnerability assessment to identify gaps that can be closed through the convergence of physical and cybersecurity? □ Did I perform a thorough vulnerability assessment of all connected physical security devices to identify models and manufacturers of concern? □ Am I only using genuine products and avoiding counterfeit and unlicensed products? Certifications and regulations □ Which data protection regulations, directives, or frameworks apply to my specific situation? □ Have I assessed what we need to do to comply with the GDPR, NIS2, PIPEDA, or other applicable data protection regulations and directives? □ Do the solutions considered include any international or relevant certifications? □ Does the solution architecture align with industry- specific compliance standards and also support relevant regulatory authority compliance standards (ISO 27001)? □ Do the chosen solutions come with tools and features that can support us in meeting regulatory compliance and maintaining cybersecurity best practices? □ Is there evidence that can be provided that due diligence mapping of regulations and standards to controls/ architecture/processes has been done? Risk management □ Do I have a comprehensive risk management strategy in place? □ Did I create new baseline protocols to guide security operations and incident management? □ Are my IT and physical security teams aligned on a comprehensive security program? □ Have I identified all users who can access physical security devices and systems? □ Am I using edge devices from trusted manufacturers? □ Do I have a breach management policy and procedure? □ Do I need cyber insurance? □ Do I have a plan to back up my important data and protect it against disasters? □ How do I ensure my system is available when I need it? Are you implementing or adding a new system to your physical security infrastructure? Be sure to set yourself up for success. This checklist will help you assess your vendors, optimize your deployment plan, and mitigate potential risks. Pre-deployment checklist

Articles in this issue

view archives of EN - Checklists - Cybersecurity checklist