Information Security Vulnerability List – 2

No Vulnerability
151 User id’s based on job description
152 No user identification and authentication
153 Weak password management system
154 Unrestricted use of system utilities
155 No provision of duress alarm for employees who mite be susceptible to coercion
156 No terminal timeout for systems in high risk environment
157 No additional controls for systems which cannot have terminal timeout
158 Access not given based on business application requirements
159 Sensitive systems are not kept in isolated environment
160 Auditing is not enabled on the files
161 No monitoring of system use
162 No clock synchronization facility
163 Lack of encryption software on the laptops
164 No guidelines for mobile computing
165 Lack of awareness, training for users for mobile computing
166 No guidelines/policy for teleworking
167 Security requirement specification is not available
168 Input string is not validated for length and type, sanitizing of input is not adequate
169 Weak Design and processing of application
170 Weak Authentication mechanism being used i.e.encryption not in use
171 Improper administration, plausibility checks to test the reasonability of output data are not in place
172 Information being exchanged in plain text
173 Poor Encryption technique is used
174 Adequate cryptographic measures not in place
175 Improper controls and Improper access to the keys
176 No qualified nomination of people who will update the operational software
177 Access to the source code not restricted
178 Improper change implementation or change control procedure not present
179 No technical review of operating system changes
180 Restrictions on changes to software packages are not either set or well communicated to users or implementers
181 Third party software are not procured from a reputable source
182 Third party software is not evaluated/ improper evaluation
183 SLA and NDA not signed with the third party software development firm
184 No escrow agreement with the third party software development firm
185 No pre planning for disaster recovery
186 Geographical location has fault lines (earthquake prone zone)
187 Geographical location is in an area susceptible to floods
188 Geographical location is in an area susceptible to storm
189 Building is located near to area vulnerable to accidents. (e.g., Petrol Pump, Gas station etc.,
190 Building is located near to power generating station
191 No Analysis or well approved business continuity strategy
192 No or poor implementation of BCP
193 No DRP framework present
194 DRP is not tested, implemented or verified
195 Statutory, regulatory and contractual requirements are not clearly defined
196 Copyright, design rights and trademark are not ket restricted
197 Records are not categorised or kep secretly
198 General information of living individuals is not kept secret
199 Warning on critical assets is either not or incorrectly displayed
200 agreements, laws, regulations or other instruments to control the access to or the use of cryptographic controls is not set
201 Evidences pertaining to respective law either civil or criminal are not present
202 Security Ploy is not being complied with legal and other issues
203 Controls of the audit of operational system are not either in place or present
204 Audit tools (software data files) are not protected
205 Unrestricted use of modems to dial in to the network
206 Lack of an inventory of dial-up lines leading to inability to monitor dial up access
207 Lack of audit logs to detect unauthorized access
208 Lack of user authentication
209 Lack of firewall
210 Lack of policies in respect of dial up access and modem use.
211 Lack of policy restricting staff to use of licensed software
212 Inadequate control of software distribution
213 Lack of software auditing
214 Unrestricted copying of software
215 Negligence or insufficient checks (Legal responsibilities and rights etc)
216 Insufficient security training
217 Lack of security awareness
218 Lack of monitoring mechanisms
219 Lack of policies for the correct use of telecommunications media and messaging
220 No removal of access rights upon job termination
221 No procedure to ensure return of asset upon job termination
222 Unmotivated or disgruntled staff
223 Unsupervised work by outside staff or staff working outside normal business hours
224 Personnel are not aware of threats from social engineering
225 No user awareness
226 No protection for office systems
227 Inadequate or careless use of physical access control to buildings, rooms and offices
228 Lack of physical protection for the building, doors, and windows
229 Location in an area susceptible to flood
230 Unprotected storage
231 Insufficient maintenance/faulty installation of storage media
232 Lack of periodic equipment replacement schemes
233 Susceptibility of equipment to humidity, dust, soiling
234 Susceptibility of equipment to temperature variations
235 Susceptibility of equipment to voltage variations
236 Unstable power grid
237 Unrestricted physical access to facilities and computer room
238 Blind spots due of improper placement of camera
239 Security perimeter is not clearly defined
240 Insufficient security man power
241 Insufficient access controls for critical facility
242 Servers are stored in a unsafe location with no access control mechanisms
243 Critical devices are not placed in controlled environment
244 Server is not stored in a rack or a cage
245 Critical devices are left carelessly lying around
246 Loading and unloading areas are not secured
247 Inadmissible temperature and humidity
248 No process for cleaning of equipment s
249 Lack of fire detection devices
250 Lack of automatic fire suppression system
251 Fire drills are not conducted
252 Fire fighting equipment s are not appropriate for electric fires/ equipment s in the Data Center
253 Stabilized power not available
254 Surge in electric current
255 Voltage variations
256 Redundant power supplies are not available
257 Power and telecommunication lines are exposed
258 Lack of redundancy and back-ups for the communication services
259 Lack of planning and implementation of communication cabling
260 Network cabling exposed and carelessly laid
261 Power cables not segregated from telecommunication cables
262 The maintenance for firefighting equipment’s are not performed on a periodic basis
263 Testing of the fire equipment’s are not performed
264 Lack of proper maintenance process for all critical equipment’s. (HVAC, Servers, etc.,)
265 Critical devices left unattneded in public palces
266 Destruction mechanism such as shredders not used
267 Hard copies are available freely
268 Critical devices (common hardware tokens) are taken home
269 Backup media are not kept in a fireproof safe
270 Off-site backup facility is not present
271 Backup medias are not secured
272 Unsafe storage
273 Medias are not erased at its end of life
274 Medias are not safely disposed
275 No information labeling
276 No access restriction
277 Paper information is not protected during distribution through courrier
278 Media is not protected
279 Media is not physically secured
280 Goodwill / Reputation Loss
281 Improper Disposal of documents
282 Lack of proper access rights management of removable and external storage media
283 Inappropriate access rights management
284 Inadequate classification present for the documentation
285 Employees not educated / unaware of security threats and counter measures
286 No policies and Procedures pertaining to access control, password management, secure disposal of data in place
287 Inadequate backup and restoration procedures in place
288 Usage of removable storage media
289 Improper retention of documents as per the contractual/regulatory requirements applicable
290 Public emails used for sharing organization information
291 Improper information sharing between employees
292 No security related roles and responsibilities defined for employee of POSOCO
293 Inadequate classification present for the documentation
294 Sensitive or confidential information is not appropriately protected
295 Files containing business  confidential information are kept out in open
296 Visitor baggage not being frisked
297 Inadequate backup and restoration procedures in place
298 Improper retention of documents as per the contractual/regulatory requirements applicable
299 Improper disposal of project documentation
300 Improper privilege (administrator level) set on all the machines
301 Monitors are not locked when employee is not on his/her desk
302 Users have privilege to download and install any software on their systems.
303 No access rights management on removable storage media
304 Personal and non business related information stored in the systems
305 No procedure in place to ensure that applications, systems and devices are updated and patched regularly
306 No policies and procedures in place (for example password management policy, backup and retrieval policy, physical and environmental policy, access control policy, email and internet usage policy, data retention and purging policy, etc.)
307 Improper files and folder sharing practices followed
308 Lack of security awareness.
309 No service level or confidentiality agreement signed with the vendors
310 No proof or records maintained for testing conducted
311 No Change management procedure in place
312 No process in place to ensure active monitoring of network device logs
313 No fault recording and capacity management is not carried out
314 Lack of structured cabling
315 No BCP/ DR planning in place
316 No backup of the configurations of the devices
317 No content filtering enabled to block unwanted traffic
318 No policies and procedures in place for network management
319 No procedure in place to track people entering and leaving a server room / ups room
320 No policies and procedures in place for server management
321 Inadequate back and restoration procedure
322 No procedure in place to track people entering and leaving a server/ups room
323 Department SOP Not present
324 No service level or confidentiality agreement signed with the vendors
325 Inadequate SLA monitoring
326 No policies and procedures in place for the software acceptable use
327 No proof or records maintained for testing conducted
328 No Change management procedure in place
329 Inadequate back and restoration procedure
330 Lack of security awareness.
331 No procedure in place to ensure that applications, systems and devices are updated and patched regularly