C Tpat Audit Guidelines For IT Part
C Tpat Audit Guidelines For IT Part
The objective of this part is to specify Information Security Policies and Standard to be
adopted by all department of PROJECT STITCH using Information Technology for
service delivery and data processing. It covers the basic and general information
security controls applicable to all functional groups of a business to ensure that
information assets are protected against risk.
User ID Maintenance
Security Seals:
Valid and allowed User ID and Password is mandatory to access any system in
the company.
There should keep detail profile for every correspondent User ID.
For every logon attempts should be kept in the history for future reference.
Access Controls for Outside Service Providers
There are rules for access of outside service provider. Very limited outsiders and only
few listed service providers may have that permission. Authorized persons should
review the access record on periodic basis to ensure only authorized service provider
personnel has access to the appropriate data. The review periods should be as below:
Monthly review,
Half yearly review,
Yearly Review,
At the end of contract or before renewal of any contract with the service
provider.
Network Security
The Network Design and its security are implemented under a documented plan.
Physical security for the network equipment should be ensured. Specifically
access should be restricted and controlled and these should be housed in a
secure environment.
The sensitive information should be kept in restricted area in the networking
environment.
Unauthorized access and Electronic tampering is to be controlled strictly.
Security of the network should be under dual administrative control.
Firewalls are in place on the network for any external connectivity.
Redundant communication links are used for WAN.
Firewall Policy:
The LAN of PROJECT STCH is behind a world well reputed and trusted System LAN
firewall named ‘Check Point’. is a licensed system firewall policy and updates about all
the threats automatically from the origin Organization and help the network pilfer proof
every moment.
Firewall
Security Check:
o System firewall should be latest regularly.
o Authorized person should check the rules of the system LAN firewall
regularly! Periodically to diminish risk.
o Rules should be well documented and each of every change in rules
should be insanely latest in the log book.
Manipulators:
1. Authorized net user administrator or expert of the Organization.
2. No outsider or supplier is allowed.
3. Review Period:
1. Weakly
2. Monthly review
1. Yearly Review
2. As the need arises or in response to any threats.
All the sewers, workstations, laptop or notebooks, etc. are using original operating
system; all of them are protected who the latest system firewall policy provided by the
operating system supplier.
Secure Policy:
1. Organization should use original operating system and software.
2. All the system firewall that comes who the operation system should be
enabled.
3. All the operation system should be latest that the system firewall policy
wall can work suitability.
4. Except net user administrator, no System user should be able
Does the garment factory have procedures in place to limit access to keys, key
cards and computer systems to only those persons who have a job related need
for such access? Are terminated employees immediately denied access to keys,
computer system, etc.?
Are information systems is password protected, and are relevant employees
provided with individually assigned IT system accounts?
Are passwords subject to regular forced changes as a part of C-TPAT security
questionnaire?
Is there an established procedure to conduct periodic unannounced information
access control security checks to ensure that all information access control
security procedures are being performed properly?
CCTV:
Are closed circuit television cameras (CCTV) utilized to monitor the activity
inside/outside the factory?
List of CC-TV camera as per location. List of CCTV camera with location.
includes:
Printers,
Scanners,
Fax Machine,
Video Conference,
CC Cameras,
Controlling &t Monitoring Device,
Time Attendance & Door System access System, etc.
The secures measures need to follow for these system and device should be followed
are as below
All the device should be locked and secured by password, pin no. or any kind of
physical attachments.
The device that are connected through LAN, should be system access
retransformation Communication Technology through DNS system access control
rules or others.
The device that use WAN should be behind the system land firewall. For these
kinds of device there should be special rules in the system lane firewall that are
carefully sated and suitability minored time to time.
The output of these device should only go to only the authenticated employee of
the Organization.
There should have time to time monitoring and documentation for if the outputs
of these device are going to suitable hand or not