0% found this document useful (0 votes)
226 views3 pages

Cybersecurity Assessment Questionnaire V1

The document is a Cybersecurity Assessment Questionnaire designed to identify cybersecurity gaps within an organization and recommend solutions. It includes sections on organization information, asset identification, network security measures, endpoint security, application security, data protection, physical security, governance, risk, compliance, and employee training. The goal is to enhance cybersecurity through comprehensive assessments and policy development.

Uploaded by

teeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
226 views3 pages

Cybersecurity Assessment Questionnaire V1

The document is a Cybersecurity Assessment Questionnaire designed to identify cybersecurity gaps within an organization and recommend solutions. It includes sections on organization information, asset identification, network security measures, endpoint security, application security, data protection, physical security, governance, risk, compliance, and employee training. The goal is to enhance cybersecurity through comprehensive assessments and policy development.

Uploaded by

teeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cybersecurity Assessment Questionnaire

Section 1: Organization Information

1. Organization Name:
____________________________________________________

2. Contact Information:
Who should we contact for follow-up questions?

Name: _____________________________________________

Email: _______________________________________________

Phone number: _____________________________________

3. Assessment Purpose:
To identify major cybersecurity gaps related to critical assets and recommend
solutions, develop policies, procedures, and standards to address these gaps and
enhance cybersecurity.

Section 2: Asset Identification

4. Asset Inventory:
Can you provide a list of all hardware assets (servers, workstations, network
devices) used within your organization?

o (Follow-up: What operating systems do these assets use?)


5. Software Assets:
What software applications are currently in use? Please specify version and
licensing information for each application.

6. Data Sensitivity:
What types of data do you store and process? (e.g., personal information,
financial data, intellectual property)

7. Third-Party Assets:
Do you utilize any third-party services or cloud solutions? If so, please list them
and indicate the type of data processed.

Section 4: Network Security Measures

11. Current Network Security Measures:


What cybersecurity measures are currently in place? (e.g., firewalls, IPS & IDS)
Are there any firewalls in place between internal networks and external-facing
systems?

Section 5: Endpoint Security Measures

12. Current Endpoint Security Measures


Do you have antivirus/antimalware protection on all endpoints (servers,
desktops, mobile devices)?

o (Follow-up: What endpoint detection and response (EDR) solutions do


you have in place for real-time threat detection?)

Section 6: Application Security Measures

13. Current Application Security Measures


Do you have web application?

o (Follow-up: How do you secure and monitor web application security?)

Do you conduct security assessments of third-party services before integrating


them into your systems?

Section 7: Data protection and Privacy Measures

14. Current Data protection and Privacy Measures


Do you have sensitive data?

o (Follow-up: How do you protect your sensitive data?)

Section 8: Physical security

15. Integration of Cyber and Physical Security


Do you have physical access controls to protect critical assets (e.g., surveillance
cameras, access control systems, alarm systems)
How are physical access controls implemented to protect critical infrastructure,
such as data centers, server rooms, and network equipment, from unauthorized
access or tampering?

Section 9: Governance, Risk, and Compliance (GRC)

16. Enterprise GRC


Do you have an enterprise-wide cybersecurity policy and procedure?

o (Follow-up: If yes, what are they? And is it regularly updated?)


Are there any frameworks that your organization has to meet (e.g., NIST, ISO
27001, CIS)?

Section 10: Training and Awareness

17. Employee Training and security culture


Do you conduct regular cybersecurity awareness training for all employees?
Are there specific training programs for IT and security personnel?

You might also like