Master Checklists


The following tables summarize the steps listed herein for auditing data centers and disaster recovery.

Auditing Data Centers

Checklist for Auditing Data Centers

  1. qReview data center exterior lighting, building orientation, signage, and neighborhood characteristics to identify facility related risks.

  2. qResearch the data center location for environmental hazards and to determine the distance to emergency services.

  3. qReview exterior doors and walls to determine if they protect data centers facilities adequately.

  4. qEvaluate physical authentication devices to determine if they are appropriate for the manner in which they are being used and are working properly.

  5. qReview security guard building rounds logs and other documentation to evaluate the effectiveness of the security personnel function.

  6. qVerify that sensitive areas are secured adequately.

  7. qVerify that heating, ventilation, and air-conditioning systems maintain constant temperatures within the data center.

  8. qEvaluate the data center's use of electronic shielding to verify that radio emissions do not affect computer systems or that system emissions cannot be used to gain unauthorized access to sensitive information.

  9. qDetermine whether the data center has redundant power feeds.

  10. qVerify that ground to earth exists to protect computer systems.

  11. qEnsure that power is conditioned to prevent data loss.

  12. qVerify that battery backup systems are providing continuous power during momentary black-outs and brown-outs.

  13. qEnsure that generators protect against prolonged power loss and are in good working condition.

  14. qEnsure that a burglar alarm is protecting the data center from physical intrusion.

  15. qVerify that a fire alarm is protecting the data center from the risk of fire.

  16. qEnsure that a water alarm system is configured to detect water in high-risk areas of the data center.

  17. qEnsure that a humidity alarm is configured to notify data center personnel of either high or low-humidity conditions.

  18. qReview the alarm monitoring console(s) and alarm reports to verify that alarms are monitored continually by data center personnel.

  19. qEnsure that data center building construction incorporates appropriate fire suppression features.

  20. qEnsure that data center personnel are trained in hazardous materials handling and storage and that hazmat procedures are appropriate.

  21. qVerify that fire extinguishers are placed every 50 ft within data center isles and are maintained properly.

  22. qEnsure that fire suppression systems are protecting the data center from fire.

  23. qVerify that surveillance systems are designed and operating properly.

  24. qEnsure that physical access control procedures are comprehensive and being followed by security staff.

  25. qReview facility monitoring procedures to ensure that alarm conditions are addressed promptly.

  26. qVerify that network, operating system, and application monitoring procedures provide adequate information to identify potential problems.

  27. qEnsure that roles and responsibilities of data center personnel are clearly defined.

  28. qVerify that duties and job functions of data center personnel are segregated appropriately.

  29. qEnsure that emergency response procedures address reasonably anticipated threats.

  30. qVerify that data center facility-based systems and equipment are maintained properly.

  31. qEnsure that data center personnel are trained properly to perform their job functions.

  32. qEnsure that data center capacity is planned to avoid unnecessary outages.

  33. qVerify that procedures are present to ensure secure storage and disposal of system media.

Auditing Disaster Recovery

Checklist for Auditing Disaster Recovery

  1. qEnsure that hardware redundancy is used to provide high availability where required.

  2. qVerify that redundant systems at separate sites are used where very high system availability is required.

  3. qEnsure that backup procedures are appropriate for respective systems.

  4. qVerify that systems can be restored from backup media.

  5. qEnsure that backup media can be retrieved promptly from off-site storage facilities.

  6. qEnsure that a disaster recovery plan exists and is comprehensive and that key employees are aware of their roles in the event of a disaster.

  7. qEnsure that disaster recovery plans are updated and tested regularly.

  8. qVerify that parts inventories and vendor agreements are accurate and current.

  9. qEnsure that emergency operations plans address various disaster scenarios adequately.



IT Auditing. Using Controls to Protect Information Assets
It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
ISBN: B001TI1HNG
EAN: N/A
Year: 2004
Pages: 159

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net