Remove Asset Management Remove Authentication Remove Evaluation
article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

For example, a forensic finding made during an evaluation of Colonial Pipeline noted numerous known and preventable vulnerabilities, such as unpatched and outdated systems, that likely led to the security breach. Having multi-factor authentication also limits unauthorized users to access data. Asset Management.

article thumbnail

IT Audit Checklist for Your IT Department

Reciprocity

Do you require multi-factor authentication? Best practices suggest that the inventory be maintained in an asset management system with a configuration management database (CMDB). Review critical network security practices, too. For example, do remote workers connect to your network via a VPN?

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

CA – Security Assessment and Authorization: Evaluating the effectiveness of security controls and authorizing system operations. PT – PII Processing and Transparency: Managing personal information with transparency and accountability. IA – Identification and Authentication : Verifying the identity of users and devices.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

CA – Security Assessment and Authorization: Evaluating the effectiveness of security controls and authorizing system operations. PT – PII Processing and Transparency: Managing personal information with transparency and accountability. IA – Identification and Authentication : Verifying the identity of users and devices.