CAS Implementation Group 1 Audit Questions

A “Yes” equates to a pass and a “No” equates to a fail. If “Yes”, the location or specific answer is needed in the second part of the audit question. For example, for 1.4 - Maintain Detailed Asset Inventory, if the answer is yes, then you must answer the second part of the audit question about the location of the policy or policy statement. Please note there is a 160 character limit for each answer.

Audit Question Answer
1.4 - Maintain Detailed Asset Inventory No
1.4: Location of Policy or Policy Statement None
1.6 - Unauthorized assets are removed No
1.6: Timeframe for removing/updating assets 999
10.1 - Ensure Regular Automated Backups No
10.1: Location of List of which services are in use None
10.2 - Perform Complete System Backups

No

10.4 - Protect Backups No
10.5 - Ensure All Backups Have Offline Backup Destination No
12.1 - Maintain an Inventory of Network Boundaries No
12.1: Location of the diagram/plan None
12.4(a) - Deny Communications Over Unauthorized Ports No
12.4(a): Location of the list/document None
12.4(b) - Deny Communications Over Unauthorized Ports No
12.4(b): Location of Policy or Policy Statement None
13.1 - Maintain an Inventory of Sensitive Information No
13.1: Location of Policy or Policy Statement None
13.2 - Remove Sensitive Data on Systems Not Accessed No
13.2: Location of Policy or Policy Statement None
13.6 - Encrypt Mobile Device Data No
13.6: Location of Policy or Policy Statement None
14.6 - Protect Information Through Access Control Lists No
14.6: Location of Policy or Policy Statement None
2.1(a) - Maintain an Inventory of Authorized Software None
2.1(a): Location of List of Approved Software None
2.1(b)) - Maintain Inventory of Authorized Software No
2.1(b): Location of Policy or Policy Statement None
3.4(a) - Deploy Automated OS Patch Management Tools No
3.4(a): Location of Policy or Policy Statement None
3.4(b) - Deploy Automated OS Patch Management Tools No
3.4(b): Location of the exception policy None
3.4(b): Location of the list of endpoints that have an exception None
3.4(c)) - Deploy Automated OS Patch Management Tools None
3.4(c): Location of Policy or Policy Statement None
3.6(a) - Deploy Automated Software Patch Management Tools No
   
3.6(a): Location of Policy or Policy Statement None
3.6(b) - Deploy Automated Software Patch Management Tools No
3.6(b): Location of the exception policy None
3.6(b): Location of the list of endpoints that have an exception None
4.2 - Change Default Passwords No
4.2: Location of Policy or Policy Statement None
4.3 - Ensure the Use of Dedicated Administrative Accounts No
5.1 - Establish Secure Configurations No
5.1: Location of the Secure Configuration documentation No
6.2(a) - Activate Audit Logging No
6.2(a): Location of Policy or Policy Statement None
6.2(b) - Activate Audit Logging No
7.7 - Use of DNS Filtering Services No
7.7: Location of List of which services are in use None
8.4 - Configure Anti-Malware Scanning of Removable Media No
8.5 - Configure Devices to Not Auto Run Content No
16.8(a) - Does the Organization have a list of all business roles? No
16.8(a) - Location of Policy or Policy Statement None
16.8(b) - Does the Organization have a list of all computer and applications accounts? No
16.8(b) - Location of Policy or Policy Statement None
Attesting user to the answers provided for this report. Attesting User