SFC: Workspace Security | Security Alliance — Security Checklist
Access management, device security, network controls, and data protection.
1. Governance & Inventory
-
Workspace Security OwnerIs there a clearly designated person or team accountable for workspace security?
-
Workspace Security PolicyDo you maintain a workspace security policy that is accessible and understood by all personnel?
-
Asset InventoryDo you maintain an inventory of organizational devices and accounts with defined ownership?
-
System and Data ClassificationDo you classify systems and data by sensitivity to determine appropriate security controls?
Notes:
2. Device Security
-
Device Security StandardsDo you define and enforce security standards for organizational devices?
-
Device Lifecycle ManagementDo you have procedures for device loss, theft, and secure decommissioning?
-
Endpoint ProtectionDo you deploy and monitor endpoint protection on organizational devices?
-
Physical and Travel SecurityDo you maintain physical security requirements for workspaces and travel?
Notes:
3. Account, Access & Credential Management
-
Account Lifecycle ManagementDo you have procedures for provisioning, modifying, and revoking user accounts?
-
Multi-Factor AuthenticationDo you enforce multi-factor authentication across organizational accounts?
-
Organizational Account SecurityDo you maintain security standards for all organizational accounts, including enterprise platforms and external services?
-
Credential Management StandardsDo you enforce credential management standards, including secure storage and individual accountability?
-
Access ReviewsDo you conduct periodic access reviews and promptly adjust permissions when roles change?
Notes:
4. Software & Application Security
-
Software Evaluation and ApprovalDo you evaluate and approve software, extensions, and tools before organizational use?
-
Source Code and Repository SecurityDo you secure source code repositories against unauthorized access and credential exposure?
Notes:
5. Network & Communication
-
Network SecurityDo you enforce secure network access for organizational systems?
-
Secure CommunicationsDo you secure organizational communications and verify identity for sensitive interactions?
Notes:
6. People & Training
-
Security OnboardingDo you verify employee identity and provide security onboarding before granting system access?
-
Security OffboardingDo you have comprehensive offboarding procedures for departing personnel?
-
Security Awareness and TrainingDo you maintain a security awareness program with regular training and testing?
Notes:
7. Monitoring & Risk Management
-
Workspace Security Monitoring and Incident ResponseDo you detect and respond to workspace security incidents?
-
Insider Threat AssessmentDo you assess insider threat risks and enforce least-privilege access for each role?
-
Third-Party Access ManagementDo you manage third-party access with time-limited, purpose-specific permissions?
Notes: