Vendors eligible for PCI self-validation can use this questionnaire to perform quality assurance and safety checks regarding covering their POS and internal data security systems. Specifically, vendors can check for inadequate access controls that might allow malicious users in, ensure that default system settings and passwords were changed upon system installation, and check if sensitive data is being stored and if this is necessary, among others.
About author
Free 1,000+ Workplace Checklists & Templates created by the SafetyCulture team.
You might also like
- Templateby SafetyCulture
ISO 14001 Self-Assessment Questionnaire
This self-assessment checklist can be used to check significant environmental aspects which need monitoring and focus. It can help businesses gain self-awareness to further improve the environmental management system. This checklist covers evaluation of air emissions, waste and water management systems, handling and storage, soil and groundwater protection, noise control, and other environmental impacts. Capture photo evidence of any issues identified during inspection and generate reports on the spot using SafetyCulture.
1227 downloadsGet - Templateby SafetyCulture
DFARS Compliance Self-Assessment Checklist
This DFARS compliance checklist is used in performing self-assessment on information systems. DoD contractors can use this checklist to evaluate if current information systems provide adequate security by adhering to DFARS requirements and regulations. This checklist is based on the NIST MEP Cybersecurity Self-Assessment Handbook and was converted using SafetyCulture.
400 downloadsGet - Templateby SafetyCulture
Business Impact Assessment Template Questionnaire
Assess readiness of your business unit through this questionnaire and identify if there are issues within your area that needs to be addressed for your BIA.
312 downloadsGet - Templateby SafetyCulture
Information Security Risk Assessment Checklist
This checklist can help Information Security Officers determine the current state of information security in the organization. Determine if an item is High, Medium, Low, or No Risk and assign actions for time-sensitive issues found during assessment. This can be used as a guide to go through the following: Organizational and company practices, Security against physical threats, Data security practices, Information and software integrity, Device security and network protection, Incident response.
1699 downloadsGet