S 2.10 Audit of the hardware and software inventory

Initiation responsibility: Supervisor, IT Security Officer, Head of IT, Top Management

Implementation responsibility: IT Security Officer

In order to be able to detect any infringements of the ban on the use of non-approved software, regular checks of the hardware and software inventory must be carried out. If the number of IT systems is very large, random checks may be made. The results of such checks must be documented in order to detect repeated violations.

If non-approved hardware is found during such checks, it must be ensured that the IT components are no longer operated contrary to regulations. In addition, it must be determined who is responsible for operating such non-approved components to be able to take appropriate action. In specific cases of suspicion, when checking the hardware, attention must be paid to manipulations and additional devices that are used, for example, to record keyboard strokes.

If non-approved software is found during such checks, arrangements should be made for its removal. In order to be able to carry out these checks, the reviewing authority must be vested with adequate powers by the top management. In addition, the reviewing authority must be informed of which software is approved for which IT system (software inventory list).

In order to be able to efficiently maintain a software inventory list where a large number of software products are usually used, an appropriate tool should be used. For the typical client/server environment, this tool should be network-capable.

Prior to specifying procedures for checking the hardware and software inventory, the Personnel and/or Supervisory Board should be involved.

For IT systems that are not necessary for the actual operation of the IT network, e.g. test systems, instead of regular checks, event-triggered checks may be carried out. For example, checking on such IT systems can always be carried out when changes are made to the configuration or when the IT system is restored to service after an extended interval. However, a prerequisite to this is that safeguard S 2.9 Ban on using non-approved hardware and software is in force for all IT systems.

Review questions: