You are on page 1of 2

INTERNAL AUDIT DEPARTMENT

AUDIT PROGRAM FOR

LTE FIREWALL AUDIT

Date Initiated: 8/29/2017

Date Completed: Click here to enter a date.

Reviewed By: _____________________ _____________________ __________________


Print Name Signature Date

Approved by: _____________________ _____________________ __________________


Print Name Signature Date
Page 2
AUDIT PROGRAM
LTE Firewall Audit

DEPARTMENT: Internal Audit Audit ID:


SECTION: IT Audit PERIOD REVIEWED: Sept 2017

OBJECTIVES:
1. Identify and obtain the current architecture of the LTE Network
2. Identify and review Policies and Procedures in place for Firewall Security.
3. Identify and review General Controls in place for Firewall Security.
4. Review the filters and conditional filter handling on the Firewalls.

NO. CONTROL OBJECTIVE CONTROL TEST REF PERFORMED


BY/
DATE
1 Identify and obtain the a. Obtain LTE Network diagram to highlight all
current architecture of the nodes, Routers, Servers, Firewalls, Switches,
LTE Network Base stations, etc.
b. Identify Internet Facing Firewalls and
potential critical points.

2 Identify and review Policies a. Obtain and review the security policy in
and Procedures in place for place.
Firewall Security. b. What software and procedures are in place to
address detection and remediation of Viruses,
Worms, Spoofers, and Sniffers
c. Determine the intrusion detection system used
and actions taken based upon the intrusion
detection.

3 Identify and review General a. Establish how many people have access to the
Controls in place for Firewalls and view their permissions and
Firewall Security. roles to justify access.
b. Establish the frequency of updates and
patches applied to Firewalls and by whom.
c. Identify the methodology used to monitor the
Network and Firewall performance.
d. Establish the frequency of Backups and the
last recovery executed on Firewalls.

4 Review the filters and a. How are security rules set and enforced?
conditional filter handling on b. Obtain Firewall rules and verify if
the Firewalls. unnecessary TCP/IP services been
deactivated.
c. Review host and client host services to ensure
that host is configured for only those
necessary services.

You might also like