You are on page 1of 2

Systems (Network) Security Questionnaire

Firewall and network security policies: 


1. Could you describe the characteristics and configuration of the Firewall and other
network security devices used in the network, such as intrusion detection and prevention
systems, antivirus software, and web filtering devices.
f
2. What type of firewall is being used on the network (e.g., hardware, software, cloud-
based)?
Hardware based, SonicWall
3. What is the firewall's configuration (e.g., rules, policies, access control)?

4. What logging and monitoring capabilities does the firewall have (e.g., event logging, real-
time monitoring, reporting)?
Traffic Monitoring

Access control policies: 

1. Could you describe the details about the access control policies in place, including the
authentication and authorization mechanisms and technologies used to control access to
network resources.
Request or authorization needs to be made from the campus manager or directly from
the director.
2. What authentication methods are used on the network?
Single Sign on passwords
VPN credentials for remote users
Multi Factor Authentication app and text/call for Office 365
3. How are user credentials managed and stored?
They are generally not stored, if required, in encrypted tech notes.
4. What measures are in place to prevent unauthorized access to user accounts?
User MFA
Audit logs both for Office 365 and Server to tracking or tracing if certain user account
have been accessed/compromised.

Monitoring and logging:


1. Please provide Information about the network monitoring and logging tools used to track
network activity and identify potential security threats.
Bitdefender Endpoint application installed with each corporate owned device sends us
an alert when suspected file has been quarantined/removed.
2. What security measures are in place to protect the network from unauthorized access?

3. How are network security policies enforced?

Security assessments:

1. Can you provide information about any security assessments that have been conducted
on the network, including vulnerability scans and penetration testing.
2. Could you describe the process of vulnerability identification and risk treatment within
the Acsenda network security system?
3. What kind of procedures are applied in order to handle a cybersecurity crisis?
Investigate Extent of Breach using Audit logs and forensic tools
Scan for Malware on affected devices
Delete affected files and wipe affected devices.
Restore from backup.
Get all systems back up to normal operation state.
4. Describe the process of how an Acsenda responds when faced with a major security
incident.
Identify critical assets.
Identify the attack/nature of the incident.
Contain infection points and disconnect them from the network.

5. How is Assessed the potential damage to the system in case of exposure

Disaster recovery and business continuity: 

1. Can you provide information about the backup, redundancy, and recovery plan to ensure
the availability and integrity of the critical network, data, and functionality in the event of
a disaster or disruption.

2. Could you describe the recovery plan for Acsenda, to bring the system back to normal
with minimal impact/disruption
With network outage
3. What backup and disaster recovery processes are in place for the network?
ISP redundancy, Shaw and Telus
Spare Router devices available, ready to pre-load the routine router configuration
backup and deployed as a temporary replacement.
File and Server backup Redundancy via Cloud, Off-Host Local Backup
UPS for any Unexpected power outage/surge relating to critical equipment.

You might also like