Skip to main content

Redback_E8_ML1_Assessment_Checklist

Last updated by: vivek-shreyas, Last updated on: 22/05/2025

Last updated by: shreyas-vivek, Last updated on: 17/05/2025

Last updated by: shreyas-vivek, Last updated on: 17/05/2025

Instructions

Redback E8 ML1 Assessment Checklist – Instructions
Purpose:
This workbook is designed to support Maturity Level 1 (ML1) assessments across all Essential Eight strategies. Each strategy tab contains ISM-mapped controls, audit test descriptions, and expected artefacts.
What You Need to Fill In (per row):
Compliance Status (Column K): Select from the dropdown list
Findings/Comments (Column L): Describe the audit result or observation
Evidence Location (Column M): File path or reference to supporting artefacts
Date Tested (Column N): Format as DD/MM/YYYY
Assessor (Column O): Your name or initials
Do Not Modify:
Locked columns such as test description, ISM mapping, audit procedure, or control ID
Any formula or data validation dropdowns already in place
Scoring Guidance:
❌ Not Implemented – No evidence the control is in place
⚠️ Partially Implemented – Some implementation but incomplete or inconsistent
✅ Implemented – Fully in place and functioning as described
🔁 Alternate Control – A compensating control exists
⛔ Not Applicable – The control is not relevant in this context
Additional Notes:
Please ensure all evidence referenced is stored in a central location and consistently named
You can review worked examples in the first 3 rows of most tabs
Need Help? Contact:
Shreyas Vivek (ML1 Assessment Lead)

Glossary

TermDefinition
Control AssessmentThe evaluated status of a control (e.g., effective, partially effective, etc.)
Responsible TeamThe team accountable for operating or implementing the control
AssessorThe GRC team member reviewing and recording assessment evidence
Evidence LocationPath or reference to the artefact (e.g., logs, screenshots, configs)
EffectiveFully meets ISM/Essential Eight requirements
Partially EffectiveImplemented but with known limitations or gaps
Alternate ControlA compensating control exists and achieves the same objective
Not ImplementedNo evidence that the control is present or functioning
Not ApplicableThe control does not apply in the system or environment being assessed

Application Control

Control AreaControl IDTest IDISM Control IDTest DescriptionAudit ProcedureEvidence RequiredTools/Method UsedResponsible TeamFrequencyFindings/CommentsEvidence Location
Application ControlML1-ACML1-AC-01ISM-0843Prevent execution of EXE/COM files in user profile directories by standard users.Attempt to run benign EXE/COM file in temp directories or Desktop.Execution logs, screenshots of failed attempts.E8MVT, Manual Execution TestCybersecurity GRCQuarterlyExample: Attempt EXE execution in C:\Users\TestUser\AppData\Local\Temp using E8MVT.Ex: \share\redback-evidence\ML1-AC-04-MSItest.png
Application ControlML1-ACML1-AC-02ISM-1870Block software library files (DLL/OCX) from executing in user profile/temp folders.Place DLL/OCX files in user space and attempt to invoke using standard tools.System logs, execution attempts, allowlist enforcement logs.E8MVTCybersecurity GRCQuarterlyExample: Place DLL in Downloads folder, log execution attempt and result.nan
Application ControlML1-ACML1-AC-03ISM-1657Prevent script file (BAT, PS, VBS, JS) execution in restricted paths.Deploy test scripts into temp folders and execute with user permissions.Screenshots of blocked script runs, log entries showing prevention.ACVT, PowerShellCybersecurity GRCQuarterlyExample: Execute BAT script in temp folder, validate block via ACVT and logs.nan
Application ControlML1-ACML1-AC-04ISM-1657Prevent installation via MSI/MST/MSP in non-privileged locations.Attempt to install dummy MSI via user Desktop or Downloads.E8MVT reports, MSI install logs, endpoint monitoring logs.E8MVTCybersecurity GRCQuarterlyAttempted MSI install from Desktop. Execution blocked by allowlist policy. Logs captured.nan
Application ControlML1-ACML1-AC-05ISM-1657Block execution of Compiled HTML (CHM) files from temp/user locations.Run benign CHM files from various folders and log behavior.Screenshot and CHM handling logs.Manual Test, E8MVTCybersecurity GRCQuarterlyCHM file opened in Downloads. Block confirmed via error dialog and policy log.nan
Application ControlML1-ACML1-AC-06ISM-1657Block execution of HTML applications (HTA) from browser cache or download folders.Attempt to run HTA file from Downloads directory.Browser logs, application policy evidence, HTA test file logs.E8MVT, Manual Browser TestCybersecurity GRCQuarterlyHTA blocked in browser sandbox. Logged via E8MVT and registry policy audit.nan
Application ControlML1-ACML1-AC-07ISM-1657Block Control Panel Applet (CPL) execution from non-system folders.Run benign CPL from Downloads and verify execution is blocked.ACVT reports, Windows logs, allowlist policies.ACVTCybersecurity GRCQuarterlyCPL file blocked from Downloads. Control panel execution policy verified.nan
Application ControlML1-ACML1-AC-08ISM-1657Application allowlisting enforced via policy and managed centrally.Review allowlist management system and policy distribution (e.g., Intune, GPO).Allowlist configuration files, policy logs.Group Policy, Config AuditCybersecurity GRCQuarterlyIntune policy pushes tested. Whitelist entries confirmed via config diff.nan
Application ControlML1-ACML1-AC-09ISM-1657Execution prevention enforced even when file renamed or copied across locations.Rename known executables (e.g., .txt to .exe) and attempt execution.Test logs, screenshots, renamed file handling logs.Manual Tests, E8MVTCybersecurity GRCQuarterlyRenamed .txt to .exe. Block succeeded. Manual trace via endpoint logs.nan
Application ControlML1-ACML1-AC-10ISM-1657File execution control verified against known bypass vectors.Attempt to exploit known paths (e.g., 8.3 name format, symbolic links).Output of exploit test cases, logs from bypass attempts.E8MVT, ACVT, Script ToolkitCybersecurity GRCQuarterlySymbolic link test generated expected block. Logs show rule match.nan

Patch Applications

Control AreaControl IDTest IDISM Control IDTest DescriptionAudit ProcedureEvidence RequiredTools/Method UsedResponsible TeamFrequencyFindings/CommentsEvidence Location
Patch ApplicationsML1-PAML1-PA-01ISM-1807Automated asset discovery runs at least fortnightly to detect new systems and applications.Review scan configuration and logs; validate schedule enforcement.Scan logs, scheduler output, discovery delta reports.Qualys, Nessus, GVMDevSecOpsFortnightlyDiscovery job ran on full subnet range. Delta logs confirmed new hosts were registered in CMDB.\share\redback-evidence\ML1-PA-02-dbupdate.png
Patch ApplicationsML1-PAML1-PA-02ISM-1808Vulnerability scanner uses an up-to-date vulnerability database.Check database version and last update timestamps in scanner console.Scanner config files, version logs.Qualys, Nessus, Rapid7DevSecOpsDailyScanner auto-update setting verified. Last update 24h from scan. Screenshot in audit folder.nan
Patch ApplicationsML1-PAML1-PA-03ISM-1698Vulnerability scans run daily on all internet-facing applications and services.Validate daily scan logs and alerting mechanisms for exposed services.Daily reports, alerting logs.Nessus, Tenable.ioDevSecOpsDailyDaily job logs confirmed for VPN and GitHub endpoints. Alert emails validated.nan
Patch ApplicationsML1-PAML1-PA-04ISM-1699Fortnightly scans run for office software, email clients, and browsers.Verify credentials, schedules, and scope of scan.Fortnightly reports, credentialed scan logs.GVM, Nessus ProDevSecOpsFortnightlyFortnightly scan covers PDF, Chrome, Outlook. Credentialed access tested.nan
Patch ApplicationsML1-PAML1-PA-05ISM-1876Exploitable vulnerabilities on internet-facing services are patched within 48 hours.Map CVE disclosure date to patch application date and analyze lag.Patch timeline table, remediation logs, CVE tracker screenshots.CVE Scanner, Manual reviewDevSecOpsAs neededLogs show patch was applied within 30h of advisory. Exception process documented.nan
Patch ApplicationsML1-PAML1-PA-06ISM-1876Confirm all known exploitable vulnerabilities older than 48 hours are patched or mitigated.Run patch verification and determine lag beyond allowed window.Remediation evidence, exception logs.Qualys, SysmonDevSecOpsWeeklyPatch validation shows high severity CVE remediated in 36h. Logged in JIRA.nan
Patch ApplicationsML1-PAML1-PA-07ISM-1690All internet-facing apps patched within 2 weeks of patch availability.Compare software patch date with original vendor release.System patch logs, vendor release notes.Patch management dashboardDevSecOpsWeeklyGitHub vulnerability flagged on 12 Mar, patched by 24 Mar. Audit trail captured.nan
Patch ApplicationsML1-PAML1-PA-08ISM-1691Patches for internal apps (Office, PDF, browsers) applied within one month.Review patch cycles and correlate version info with vendor dates.Patch audit reports, software version matrix.E8MVT, Software InventoryDevSecOpsMonthlyVersion diff shows PDF reader patched on time. Screenshot in patch folder.nan
Patch ApplicationsML1-PAML1-PA-09ISM-1691Internal applications contain no vulnerabilities older than one month.Use scanner to verify version compliance.List of vulnerable versions, patch timestamps.Qualys, Nessus, E8MVTDevSecOpsMonthlyNo critical CVEs older than 30d detected. Scanner report archived.nan
Patch ApplicationsML1-PAML1-PA-10ISM-1905All unsupported third-party software removed from internal and internet-facing systems.Scan and inventory all active applications; check vendor support lifecycle.List of deprecated apps, decommission evidence.Nessus, Software Asset ManagementDevSecOpsQuarterlyList cross-checked with vendor lifecycle dates. Deprecated versions uninstalled.nan

Multi-Factor Authenticatio

Control AreaControl IDTest IDISM Control IDTest DescriptionAudit ProcedureEvidence RequiredTools/Method UsedResponsible TeamFrequencyFindings/CommentsEvidence Location
Multi-Factor AuthenticationML1-MFML1-MF-01ISM-1504MFA is enforced on all internet-facing Redback services (e.g., GitHub, GCP).Attempt user authentication and verify MFA challenge on login.Access attempt logs, screenshots of MFA prompts, enforcement settings.GitHub, GCP IAM, Azure ConsoleCybersecurity GRCMonthlyLogin attempts from unmanaged device prompted MFA. GitHub org settings verified.\share\redback-evidence\ML1-MF-02-dbupdate.png
Multi-Factor AuthenticationML1-MFML1-MF-02ISM-1504MFA challenge is triggered for remote desktop access to internal systems.Perform test RDP session and check for MFA prompt.VPN/RDP access logs, security group enforcement evidence.Azure AD, Duo, RDP ConfigDevSecOpsMonthlyTest RDP connection from home IP required MFA token. Logs captured via Duo dashboard.nan
Multi-Factor AuthenticationML1-MFML1-MF-03ISM-1679All other internet-facing systems require MFA on login.Enumerate services; attempt user login; confirm MFA challenge.MFA logs, system login records, user directory screenshots.Okta, PingID, Azure MFACybersecurity GRCMonthlyWeb portal MFA enforced via PingID. Screenshot of challenge retained.nan
Multi-Factor AuthenticationML1-MFML1-MF-04ISM-1679MFA enforced on third-party services handling sensitive Redback data.Identify third-party vendors and check their MFA configuration.Third-party admin console screenshots, vendor policy docs.Admin Portals, Vendor ReviewsCybersecurity GRCQuarterlyMFA enabled for billing and support platforms. Vendor policy PDF stored.nan
Multi-Factor AuthenticationML1-MFML1-MF-05ISM-1680MFA enabled (where available) on third-party systems even for non-sensitive use cases.Attempt login with a test account; check if MFA can be bypassed or disabled.User access logs, account configuration settings.Google Admin, Microsoft 365Cybersecurity GRCQuarterlyTest account prompted for MFA on Outlook web access.nan
Multi-Factor AuthenticationML1-MFML1-MF-06ISM-1680MFA is enabled by default for external (non-organisational) users accessing Redback services.Simulate an external login; verify default MFA behavior.Login test results, configuration screen evidence.Azure B2B, GitHub OrganizationCybersecurity GRCBi-annuallyGitHub default MFA settings for B2B users validated. Screenshot attached.nan
Multi-Factor AuthenticationML1-MFML1-MF-07ISM-1680MFA bypass policies are reviewed monthly and exceptions require formal approval.Review all policy exceptions and approvals for validity.Exception tracking sheets, approval forms.IAM Dashboard, Jira, ConfluenceCybersecurity GRCMonthly2 active exceptions reviewed; Jira tickets matched with approvals.nan
Multi-Factor AuthenticationML1-MFML1-MF-08ISM-1680MFA logs are collected and reviewed for suspicious login attempts.Inspect SIEM logs and MFA monitoring dashboards.SIEM alerts, login pattern reports.Splunk, Microsoft SentinelCybersecurity GRCWeeklySIEM rule triggered on unusual geo-login. Event closed with follow-up.nan
Multi-Factor AuthenticationML1-MFML1-MF-09ISM-1680Users are periodically trained on recognizing MFA-related phishing and social engineering attempts.Review training logs, completion rates, and test scores from awareness modules.Training records, quiz results.KnowBe4, LMS ReportsCybersecurity GRCAnnuallyCompletion rate was 94% this cycle. Quiz results archived.nan
Multi-Factor AuthenticationML1-MFML1-MF-10ISM-1680Lost or stolen MFA tokens/devices are reported and revoked within 24 hours.Review helpdesk tickets and IAM logs for revocation response time.Incident reports, audit trail of token disablement.Helpdesk Portal, IAM LogsCybersecurity GRCAs neededOne incident reported in last quarter. Response time 3 hours.nan

Restrict Admin Privileges

Control AreaControl IDTest IDISM Control IDTest DescriptionAudit ProcedureEvidence RequiredTools/Method UsedResponsible TeamFrequencyFindings/CommentsEvidence Location
Restrict Admin PrivilegesML1-RAML1-RA-01ISM-0439Access to administrative privileges is granted only with documented and approved justification.Review access request forms and change control logs.Request logs, approval emails, workflow tickets.Active Directory, JIRA, ConfluenceCybersecurity GRCQuarterlyJIRA change requests matched with AD privilege assignments. Confluence records archived.\share\redback-evidence\ML1-RA-01-priv-approval.pdf
Restrict Admin PrivilegesML1-RAML1-RA-02ISM-0402Privileged accounts are restricted from accessing the internet and web services.Attempt to access internet from admin account; validate proxy/firewall blocks.Access logs, proxy blocks, firewall rules.Squid Proxy, FW ACLs, AD GPODevSecOpsQuarterlyAdmin account internet access denied by proxy. Squid logs show block and policy hit.nan
Restrict Admin PrivilegesML1-RAML1-RA-03ISM-0411Privileged accounts are not used for email communication.Test mailbox functionality for admin accounts.User directory exports, mail server configs, admin logs.Exchange Admin Center, ADUCCybersecurity GRCQuarterlyMail server config shows SMTP/IMAP disabled for admin accounts. No active mailboxes.nan
Restrict Admin PrivilegesML1-RAML1-RA-04ISM-0412All privileged activities are performed from a separate, secure administrative environment.Confirm use of separate workstations or virtual environments.Network segmentation plans, admin workstation list.AD Groups, VLAN configs, BloodHoundDevSecOpsQuarterlyPrivileged workstation IPs confirmed isolated. VLAN config and jump server logs validated.nan
Restrict Admin PrivilegesML1-RAML1-RA-05ISM-0403Standard (unprivileged) accounts cannot log into privileged environments.Attempt login using unprivileged account; verify group policy enforcement.AD logs, denied login attempts, policy snapshots.BloodHound, GPO reportsCybersecurity GRCQuarterlyLogin attempt using unprivileged account denied. Policy enforcement verified via AD logs.nan
Restrict Admin PrivilegesML1-RAML1-RA-06ISM-0404Unprivileged users cannot run PowerShell remoting (PSRemote) or elevate through RDP/WinRM.Test PSRemote as a normal user and monitor event logs.Remote command attempt logs, permission settings.PowerShell, Windows Event LogsDevSecOpsQuarterlyPSRemote blocked for non-admin users. Event logs captured failed remoting attempts.nan
Restrict Admin PrivilegesML1-RAML1-RA-07ISM-0414Admin accounts cannot be used to log into unprivileged workstations or environments.Attempt login from domain admin account to standard user machine.Deny login logs, group policy configuration.GPO settings, WinEventLogsCybersecurity GRCQuarterlyGPO policy prevents domain admins from accessing standard endpoints. Logs confirmed.nan
Restrict Admin PrivilegesML1-RAML1-RA-08ISM-0413User cannot elevate privilege from unprivileged session using tools like ‘runas’, RDP, or remote management.Run tests using ‘runas’, RDP tools and remote admin tools from user accounts.Privilege escalation logs, blocked actions, audit logs.Runas, RDP, Local Group PolicyCybersecurity GRCQuarterly‘Runas’ and RDP elevation attempts blocked. Logs show failed escalation events.nan
Restrict Admin PrivilegesML1-RAML1-RA-09ISM-0420All administrative accounts are reviewed quarterly for relevance and activity.Review access logs, AD membership, last login timestamps.Admin account audit logs, usage review records.AD Audit, SplunkCybersecurity GRCQuarterlyInactive admin accounts reviewed and deactivated. AD group membership updated.nan
Restrict Admin PrivilegesML1-RAML1-RA-10ISM-0421Admin accounts are separated from daily-use standard user accounts (no shared accounts).Validate dual-identity enforcement and unique IDs for admin tasks.User ID records, account naming policy, IAM reports.IAM System, ADUCCybersecurity GRCQuarterlyAdmin IDs use +admin suffix. Dual identities verified across IAM and ADUC exports.nan

Office Macros

Control AreaControl IDTest IDISM Control IDTest DescriptionAudit ProcedureEvidence RequiredTools/Method UsedResponsible TeamFrequencyFindings/CommentsEvidence Location
Office MacrosML1-OMML1-OM-01ISM-1710Microsoft Office macros are disabled for all users without a documented business requirement.Run RSOP or review Group Policy settings; test macro execution on unapproved user accounts.GPO config screenshots, test results, approved user list.RSOP, GPMC, OfficeCybersecurity GRCQuarterlyGPO restricts macro execution; unapproved user account blocked from running macro in Word.\share\redback-evidence\ML1-OM-01-disabled.png
Office MacrosML1-OMML1-OM-02ISM-1710A record is maintained of users approved to run macros, which matches policy enforcement.Compare macro-enabled group membership to access approval list.Approval requests, group membership exports.Active Directory, ConfluenceCybersecurity GRCQuarterlyAD group matches Confluence approval table. No mismatches detected.nan
Office MacrosML1-OMML1-OM-03ISM-1711Macros embedded in files downloaded from the internet are blocked by default.Download Office files with macros and verify execution is blocked.E8MVT output, file logs, macro execution error screenshots.Office, GPO, E8MVTCybersecurity GRCQuarterlyE8MVT flagged macro execution error for web-downloaded document. Policy working.nan
Office MacrosML1-OMML1-OM-04ISM-1711Office is configured via Group Policy to block macros in internet-sourced files.Review registry keys and GPO settings enforcing internet macro blocking.Registry export, Group Policy screenshots.RegEdit, GPMCCybersecurity GRCQuarterlyMacroPolicy reg key value = 6 verified across Word, Excel, PowerPoint.nan
Office MacrosML1-OMML1-OM-05ISM-1712Antivirus scans are triggered when Office macros are run.Attempt to execute a macro with EICAR test string; check AV response.AV logs, EICAR detection report, alerting configuration.E8MVT, Windows Defender, McAfeeDevSecOpsQuarterlyEICAR macro detected. Alert raised and blocked by AV.nan
Office MacrosML1-OMML1-OM-06ISM-1713AV engine detects and blocks known macro-based malicious payloads.Inject known safe malicious pattern and confirm detection and alerting.SIEM alerts, AV block logs.AV Console, EICAR MacrosCybersecurity GRCQuarterlyEICAR test macro blocked. SIEM alert received and logged.nan
Office MacrosML1-OMML1-OM-07ISM-1714Standard users are restricted from changing macro security settings in the Trust Center.Attempt to modify Trust Center settings in Word, Excel, PowerPoint.Screenshots of locked settings, GPO config.Office Apps, GPMCCybersecurity GRCQuarterlyTrust Center config greyed out for standard users. GPO confirmed locked state.nan
Office MacrosML1-OMML1-OM-08ISM-1714All Office apps are configured consistently to enforce macro policy across Word, Excel, and PowerPoint.Review registry or Group Policy enforcement across all Office components.Consistency checks, registry snapshots.Office Deployment Tool, RegEditCybersecurity GRCQuarterlyRegistry export confirmed uniform settings across all Office apps.nan
Office MacrosML1-OMML1-OM-09ISM-1715Updates to Office macro policy are documented, reviewed, and approved.Inspect change management and policy versioning records.Change logs, approval emails, version control history.Confluence, SharePoint, GitHubCybersecurity GRCAnnuallyMacro policy versioning tracked via GitHub; approvals in Confluence.nan
Office MacrosML1-OMML1-OM-10ISM-1716Microsoft Office macro usage logs are retained for audit trail and incident investigation.Verify log retention settings; ensure logs are centralized.Sysmon logs, GPO logging configuration, centralized log exports.SIEM, Event Viewer, Syslog ServerCybersecurity GRCMonthlyLog retention enabled; logs synced to central SIEM every 24h.nan

User App Hardening

Control AreaControl IDTest IDISM Control IDTest DescriptionAudit ProcedureEvidence RequiredTools/Method UsedResponsible TeamFrequencyFindings/CommentsEvidence Location
User App HardeningML1-AHML1-AH-01ISM-1701Web browsers do not process Java from internet-based websites.Attempt to load Java content in Edge from known test sites.Screenshot of blocked Java content, registry key verification.Edge browser, RegEdit, test websiteDevSecOpsQuarterlyEdge failed to load Java applet from test site. Registry setting confirmed.\share\redback-evidence\ML1-AH-01-java-block.png
User App HardeningML1-AHML1-AH-02ISM-1701Java content is disabled in Google Chrome.Attempt Java content execution and verify result in Chrome.Chrome plugin settings, screenshots, blocked content logs.Chrome, test site, GPODevSecOpsQuarterlyChrome plugin blocked Java by default. Screenshot shows blocked alert.
User App HardeningML1-AHML1-AH-03ISM-1701Java content is disabled in Mozilla Firefox.Test Java plugin activation and loading behavior.Firefox about:config, Java plugin settings.Firefox browser, plugin auditDevSecOpsQuarterlyJava plugin disabled in about:config. No prompt to run Java content.
User App HardeningML1-AHML1-AH-04ISM-1702Web ads from the internet are blocked in Microsoft Edge.Load ad-heavy test page in Edge and inspect rendering.Screenshots, ad-blocking extension configs, browser policy.Edge, test pages, GPO settingsDevSecOpsQuarterlyEdge blocked banner and popup ads on test domain. Extension enabled.
User App HardeningML1-AHML1-AH-05ISM-1702Ads from the internet are blocked in Google Chrome.Visit known ad sites in Chrome and validate ad blocking functionality.Browser policy, plugin settings, screenshots.Chrome, uBlock Origin, test domainsDevSecOpsQuarterlyuBlock enforced via GPO. Chrome blocked all ad scripts.
User App HardeningML1-AHML1-AH-06ISM-1702Web ads are blocked in Mozilla Firefox.Test ad rendering in Firefox with/without plugin enabled.AdBlock logs, Firefox settings, screenshots.Firefox, plugin, GPODevSecOpsQuarterlyFirefox blocked inline and popup ads. Policy enforcement confirmed.
User App HardeningML1-AHML1-AH-07ISM-1703Internet Explorer 11 is unable to access internet sites or is removed.Attempt to open external websites using IE11 and inspect firewall/proxy logs.Screenshots, blocked network logs, registry settings.Proxy logs, curl/IE header spoofingDevSecOpsQuarterlyIE11 uninstalled via policy. Access blocked in logs and UI.
User App HardeningML1-AHML1-AH-08ISM-1704Standard users cannot modify security settings in Microsoft Edge.Attempt to change Edge security settings and document access limitations.Locked setting indicators, GPO evidence.GPMC, Edge browserCybersecurity GRCQuarterlySettings grayed out in Edge; verified GPO lock applied.
User App HardeningML1-AHML1-AH-09ISM-1704Security settings in Google Chrome are managed and cannot be changed by standard users.Attempt changes to Chrome proxy or security settings.Screenshot of locked settings, policy verification.Chrome Admin Console, GPOCybersecurity GRCQuarterlyChrome settings locked. Banner shows "managed by organization".
User App HardeningML1-AHML1-AH-10ISM-1704Mozilla Firefox security settings are centrally controlled and cannot be altered by users.Try to change TLS/JavaScript/network settings as user; verify GPO enforcement.About:config snapshot, policy enforcement logs.Firefox Policy Templates, RegEditCybersecurity GRCQuarterlyabout:config locked. Registry policy in place for browser security.

Regular Backups

Control AreaControl IDTest IDISM Control IDTest DescriptionAudit ProcedureEvidence RequiredTools/Method UsedResponsible TeamFrequencyFindings/CommentsEvidence Location
Regular BackupsML1-RBML1-RB-01ISM-0455Identify and document important data, software, and configuration items in BCP for backup inclusion.Review BCP and confirm data classification for backup.Business Continuity Plan (BCP), asset register.Confluence, Excel, Asset ManagerCybersecurity GRCAnnuallyBCP inventory reviewed; backup-relevant config and databases listed.\share\redback-evidence\ML1-RB-01-bcp-assets.xlsx
Regular BackupsML1-RBML1-RB-02ISM-0456Important data and configuration settings are backed up per BCP frequency and retention policies.Inspect backup logs and compare to policy schedule.Backup job reports, retention policy, storage logs.Veeam, GCP Snapshot, AWS BackupDevSecOpsWeeklySchedule aligned with policy. Logs show successful daily backup.nan
Regular BackupsML1-RBML1-RB-03ISM-0457Backups are performed in a synchronised manner, enabling restoration to a common point in time.Confirm snapshot coordination across systems.Timestamps of snapshots, recovery point reports.ZFS, RAID Logs, Cloud Sync ReportsDevSecOpsWeeklyAll systems show synced snapshots within defined RPO.nan
Regular BackupsML1-RBML1-RB-04ISM-0458Backups are stored securely and resiliently (e.g., encrypted, geographically separate).Review encryption settings and storage redundancy mechanisms.Encryption logs, offsite storage reports.GCP, AWS S3, Backup VaultsDevSecOpsWeeklyOffsite encryption enabled; S3 logs confirm cross-region replication.nan
Regular BackupsML1-RBML1-RB-05ISM-0459Disaster recovery tests include restoration of data to confirm reliability.Review DR test results and associated recovery reports.Restoration logs, test reports, screenshots.DR Runbooks, Simulated Restore LogsCybersecurity GRCQuarterlyTest restore completed successfully. Screenshot attached.nan
Regular BackupsML1-RBML1-RB-06ISM-0460Only authorised users can access backups; unprivileged users are restricted.Attempt access using standard user account and verify access denial.Access logs, file permission maps, IAM policy screenshots.IAM Roles, ACLs, File ExplorerDevSecOpsQuarterlyAccess denied for test user; IAM role confirmed.nan
Regular BackupsML1-RBML1-RB-07ISM-0461Backups are immutable or protected against deletion/modification by unprivileged accounts.Attempt deletion or modification from unprivileged account; confirm logs.Audit logs, ACLs, storage-level controls.Object Locking, WORM PoliciesDevSecOpsQuarterlyDelete attempt logged and blocked. Immutable flag enforced.nan
Regular BackupsML1-RBML1-RB-08ISM-0462Backup job failures are logged and promptly alerted to responsible personnel.Review failure alerting mechanism and past alert logs.Alert notification logs, escalation flowcharts.SIEM, Opsgenie, PagerDutyDevSecOpsWeeklyPagerDuty alert triggered on missed job. Resolved in under 2h.nan
Regular BackupsML1-RBML1-RB-09ISM-0463Backup systems are regularly patched and updated to prevent exploitation of backup infrastructure.Check patch levels, CVEs, and update history of backup systems.Patch management reports, CVE summaries.Nessus, GVM, Patch LogsDevSecOpsMonthlyNessus scan passed. All backup nodes patched this cycle.nan
Regular BackupsML1-RBML1-RB-10ISM-0464Backup logs and access events are centrally stored and retained for investigation and forensics.Verify central logging for backup infrastructure and access.SIEM logs, syslog records, retention policy evidence.Splunk, CloudWatch Logs, GraylogCybersecurity GRCMonthlyLogs centralised in Splunk. Retention policy: 180 days.nan

Patch Operating Systems

Control AreaControl IDTest IDISM Control IDTest DescriptionAudit ProcedureEvidence RequiredTools/Method UsedResponsible TeamFrequencyFindings/CommentsEvidence Location
Patch Operating SystemsML1-POML1-PO-01ISM-1807An automated method of asset discovery is run and reviewed at least fortnightly.Validate discovery tool schedule, logs, and exception handling.Discovery logs, schedule screenshots, output files.Qualys, Nessus, CMDBDevSecOpsFortnightlyCMDB updated via Nessus discovery every 14 days. Log verified.\share\redback-evidence\ML1-PO-01-asset-discovery.pdf
Patch Operating SystemsML1-POML1-PO-02ISM-1808Vulnerability scanner used has an up-to-date vulnerability database.Check scanner config and verify update frequency.Scanner version info, update logs.Nessus, OpenVAS, GVMDevSecOpsDailyUpdate job runs daily. Version and CVE feed logs attached.nan
Patch Operating SystemsML1-POML1-PO-03ISM-1698Daily scans are performed on operating systems of internet-facing services.Validate daily scan frequency; review issue triage and response logs.Daily scan reports, incident tickets.Nessus Pro, InsightVMDevSecOpsDailyNightly scan targets public-facing IPs. SIEM logs confirm regular execution.nan
Patch Operating SystemsML1-POML1-PO-04ISM-1699Fortnightly scans are conducted for workstations, servers, and network devices.Check scan history and review report completeness across all environments.Full vulnerability scan report logs.Qualys, GVMDevSecOpsFortnightlyScan reports confirm coverage across servers, desktops, network gear.nan
Patch Operating SystemsML1-POML1-PO-05ISM-1876Exploited vulnerabilities on internet-facing OSs are patched or mitigated within 48 hours.Compare known exploit CVE release vs. patch implementation time.CVE timelines, patch logs, incident response summary.CVE Tracker, Patch Management ToolsDevSecOpsAs neededCVE-2024-XXXX patched 34h after advisory. Logs validated.nan
Patch Operating SystemsML1-POML1-PO-06ISM-1876Vulnerabilities with known exploits older than 48 hours are not present in the environment.Scan systems for open CVEs 48 hours and validate patch presence.Vulnerability reports, scan logs, system patch status.Nessus, GVMDevSecOpsWeeklyWeekly scan confirms 0 open high-severity CVEs 48h.nan
Patch Operating SystemsML1-POML1-PO-07ISM-1690Vulnerabilities in internet-facing operating systems are patched within two weeks.Compare OS patch levels to vendor release schedules.Update history, vendor advisories.OS Patch Logs, GCP/AWS ConsoleDevSecOpsWeeklyPatch timelines matched vendor release for all critical fixes.nan
Patch Operating SystemsML1-POML1-PO-08ISM-1691Workstation and server OS patches are applied within one month of release.Match scan output with patch application dates; check backlog or exceptions.Patch cycle report, dashboard exports.WSUS, Linux YUM/APT LogsDevSecOpsMonthlyAll systems patched within 30-day window. No exceptions pending.nan
Patch Operating SystemsML1-POML1-PO-09ISM-1691No OS vulnerabilities older than one month exist in any production environment.Run full authenticated vulnerability scan and compare to patch registry.Vulnerability scan logs, remediation reports.Qualys, NessusDevSecOpsMonthlyScan logs confirm 0 critical vulnerabilities 30 days.nan
Patch Operating SystemsML1-POML1-PO-10ISM-1905Unsupported operating systems are replaced or removed from the environment.Compare list of active systems with vendor lifecycle documentation.System inventory, vendor EOL documentation.CMDB, OS Scan ToolsDevSecOpsQuarterlyLegacy Windows 2012 decommissioned. CMDB updated.nan