Ids Ips Audit Checklist
Ids Ips Audit Checklist
Document Number: Document Owner: Originally Published: Revision Date: Revision Version:
GRC-0001 Peter Vander Velden 1/1/2019 8/16/2019 1.1.0
Overview
External collaborators must complete this form attesting to security controls on the endpoint used to
access a UW-Madison secure Box folder.
Endpoint Primary
Hostname: ______________________ User: ________________________
Endpoint User’s
Primary Location: ______________________ Organization: ________________________
Operating User’s
System: ______________________ IT Support Org: ______________________
Please review the following cybersecurity controls. If a control is present on the endpoint, initial in the
corresponding box. If the control is not present, DO NOT initial.
Security Control Initials
1. Host-based vulnerability management and configuration compliance software is
installed and enabled.
2. Vulnerability scans of the endpoint are completed (at least) monthly.
3. All available operating system and application security patches are installed.
**In the event the workstation or user becomes compromised (via malware, exploited vulnerability, leaked credentials, etc), or
the workstation is stolen/replaced, contact the UW-Madison Office of Cybersecurity at cybersecurity@cio.wisc.edu.
Office of Cybersecurity
University of Wisconsin–Madison 1210 W Dayton Street Madison, Wisconsin 53706
Email: cybersecurity@cio.wisc.edu https://it.wisc.edu/about/division-of-information-technology/strategic-operations-departments-people/cybersecurity/