Previous All Posts Next

Cyber Security Audit Checklist (2026): 60+ Items

Posted: April 16, 2026 to Cybersecurity.

What Is a Cyber Security Audit and Who Needs One?

A cyber security audit is a structured review of your organization's security controls, policies, and configurations against a defined standard or baseline. It answers a simple but difficult question: do your actual defenses match what you think is in place?

Most organizations run one for at least one of these reasons: a compliance requirement (CMMC, HIPAA, SOC 2, PCI DSS), a cyber insurance renewal, a new contract with a security clause, a post-incident review, or a scheduled annual assessment. Some do them proactively before a breach happens.

The audience for this checklist is IT managers, MSPs, and business owners at companies with 10 to 500 employees -- organizations large enough to have real attack surface, small enough that they have not yet formalized their security program. You do not need a dedicated CISO to work through this list. You do need someone who can access your firewall, your AD or Azure AD, your endpoint management console, and your backup logs.

A cyber security audit is not the same as a penetration test. A pen test actively tries to break in. An audit verifies that controls are configured and documented correctly. Both have value. This checklist covers the audit side. If your audit turns up gaps, a pen test is often the next step to confirm whether those gaps are actually exploitable.

Scope Definition: What the Audit Covers

Before you start checking boxes, define what is in scope. An audit without a scope boundary produces incomplete results and false confidence.

Document your scope across four dimensions:

  • Systems in scope: All systems that store, process, or transmit sensitive data. For most SMBs this includes domain controllers, file servers, workstations, cloud storage (SharePoint, Google Drive, S3), SaaS applications that hold customer or employee data, email, and backup infrastructure.
  • Network segments in scope: Internal LAN, DMZ, cloud VPCs, VPN tunnels, wireless networks used by employees or guests.
  • Data types in scope: PII, PHI, CUI (if you are a DoD contractor), financial records, intellectual property, authentication credentials.
  • Frameworks or standards you are auditing against: NIST CSF, CIS Controls, CMMC 2.0, HIPAA Security Rule, SOC 2 Trust Services Criteria, or your own internal policy.

Write this scope statement down before the audit begins. Scope creep mid-audit creates inconsistent results and makes remediation tracking harder.

Pre-Audit Preparation

Three things to complete before you open the checklist:

Asset inventory: You cannot audit what you do not know exists. Pull a current list of all hardware (workstations, servers, printers, network gear, IoT devices) and all software (installed applications, SaaS subscriptions, cloud services). Your endpoint management or MDM platform should generate this automatically. If it does not, that is your first finding.

Access review preparation: Export a current user list from your identity provider -- Active Directory, Azure AD, Okta, Google Workspace -- with last login timestamps and group memberships. You will need this for the IAM section.

Policy document collection: Gather copies of your information security policy, acceptable use policy, incident response plan, and vendor management policy. If any of these do not exist, note it now. Missing documentation is a finding, not a reason to skip the section.

Checklist Section 1: Identity and Access Management

IAM failures are the leading initial access vector in breaches. This section verifies that only the right people can reach the right systems.

MFA on All Admin Accounts

Every account with elevated privileges -- domain admin, cloud console admin, Azure Global Admin, firewall admin -- must require multi-factor authentication. FIDO2 hardware keys or authenticator apps (not SMS) are required for high-value accounts. How to verify: Check your identity provider's sign-in logs and MFA enrollment report. Look for any admin account without an MFA method registered.

MFA on All Standard User Accounts

MFA is not just for admins. Any account with access to email, cloud storage, or business applications is a viable phishing target. How to verify: Pull MFA enrollment report. Flag all accounts with a last-login date in the past 90 days that lack MFA.

Password Policy

NIST SP 800-63B no longer recommends mandatory periodic rotation for most accounts -- complexity requirements are more useful. Minimum 12 characters, check against breached-password databases on set/change, lockout after failed attempts. How to verify: Review your password policy configuration in AD/Azure AD or your SSO provider.

Privileged Access Review Cadence

Someone should review who holds admin rights at least quarterly. Privilege creep -- where users accumulate access over time -- is nearly universal when there is no review process. How to verify: Check when the last formal access review occurred. If no record exists, it has not happened.

Service Account Audit

Service accounts are often over-privileged, rarely rotated, and sometimes used interactively in ways that bypass MFA. List all service accounts, confirm they have the minimum permissions required for their function, and verify they are not used for human login. How to verify: Pull service accounts from AD. Check interactive login flags and last password change dates.

Guest and External Account Review

Guest users in Azure AD or Google Workspace can accumulate access after a project ends. Review all external/guest accounts and confirm they still need access. How to verify: Pull guest user list from your identity provider. Contact the business owner for each account and confirm need.

SSO Coverage

Every SaaS application that supports SSO should be connected to your identity provider. Applications that authenticate independently create shadow credential stores that are hard to manage and impossible to centrally revoke. How to verify: Cross-reference your SaaS inventory against your SSO provider's application list.

Offboarding Workflow

When an employee leaves, all accounts should be disabled within 24 hours of termination. Review your offboarding procedure and check recent terminations against your user list. How to verify: Pull HR termination records from the last 90 days. Cross-reference against enabled AD/Azure AD accounts.

Shared Credential Audit

Shared passwords for systems or applications -- a shared IT admin account, a shared monitoring login -- prevent accountability and make rotation painful. Document all known shared credentials and plan for individual accountability. How to verify: Interview IT staff. Check for generic usernames like "admin," "shared," or "it" in your user directory.

API Key Inventory

API keys are credentials. Untracked API keys are credentials no one is rotating. Maintain an inventory of all API keys, who owns them, what they access, and when they last rotated. How to verify: Pull API key lists from cloud platforms (AWS IAM, Azure, GCP), source code repositories, and SaaS admin consoles. Flag keys older than 90 days without rotation.

Checklist Section 2: Endpoint Security

Endpoints are where breaches begin and where ransomware executes. This section verifies your visibility and control at the device level.

EDR / Antivirus Coverage

Every managed endpoint -- workstations, laptops, servers -- should have endpoint detection and response software installed and reporting to a central console. Coverage gaps (devices in the inventory that are not reporting) are a priority finding. How to verify: Compare your asset inventory against your EDR console's device list. Calculate coverage percentage.

Patch Management: OS

Operating system patches should be applied within 30 days of release for standard patches, within 72 hours for critical or actively exploited vulnerabilities. How to verify: Pull patch compliance report from your patch management tool (WSUS, Intune, Jamf). Flag endpoints more than 30 days behind.

Patch Management: Applications and Firmware

Third-party applications -- browsers, Office, Adobe, VPN clients -- are a primary exploit vector. Firmware on servers and network gear is equally important. How to verify: Check your patch tool for third-party app patching coverage. Check firmware versions on servers, firewalls, and switches against vendor current releases.

Disk Encryption

Every laptop and workstation should have full-disk encryption enabled (BitLocker on Windows, FileVault on macOS). Without it, a stolen device is a data breach. How to verify: Pull encryption status report from Intune or your MDM. Any unencrypted portable device is a critical finding.

Mobile Device Enrollment

Corporate email and data accessed from mobile devices should require MDM enrollment, a PIN, and remote wipe capability. How to verify: Check your MDM or Exchange ActiveSync for device enrollment status. Identify devices accessing corporate mail without enrollment.

Removable Media Policy

USB drives are an exfiltration vector and a malware delivery mechanism. Your policy should either prohibit them or restrict their use to encrypted, company-issued drives. How to verify: Review written policy. Check Group Policy or endpoint management for USB restrictions configuration.

Local Administrator Rights

Standard users should not have local administrator rights on their workstations. Local admin access allows malware to install, persist, and elevate privileges far more easily. How to verify: Pull local group membership report from your endpoint tool. Flag any non-IT account in the local Administrators group.

Checklist Section 3: Network Security

The network is the connective tissue between your endpoints and your data. Weak segmentation means a compromised endpoint can reach everything.

Firewall Rule Review

Firewall rulesets accumulate over years. Rules added for a specific project or vendor often stay long after their purpose expires. Review all inbound allow rules against a documented business need. Remove any rule that cannot be justified. How to verify: Export firewall ruleset. For each allow rule, confirm business owner, purpose, and last review date.

VLAN Segmentation

Critical systems -- servers, payment systems, industrial control systems -- should be on separate network segments with firewall controls between them, not on the same flat network as employee workstations. How to verify: Review network diagram. Confirm servers are on a dedicated VLAN with access controls between user and server segments.

VPN Access Review

Who has VPN access? Does everyone with VPN access still need it? VPN credentials are a common target because they provide direct network access. How to verify: Pull VPN user list. Cross-reference against active employees. Review VPN logs for anomalous access patterns (off-hours, unusual source countries).

Intrusion Detection and Prevention

IDS/IPS systems monitor for known attack patterns in network traffic. They will not catch everything, but they catch a lot of commodity malware and lateral movement. How to verify: Confirm IDS/IPS is enabled and logging. Check that alerts are being reviewed -- a system that fires alerts no one reads provides no value.

DNS Filtering

DNS filtering blocks connections to known malicious domains before any malware can phone home or a user can reach a phishing site. It is one of the highest-value-per-dollar security controls available. How to verify: Confirm a DNS filtering service is configured as the resolver for all devices (Cisco Umbrella, Cloudflare Gateway, NextDNS for business, etc.). Test that category blocking is active.

Wireless Security

Corporate wireless should use WPA3 or WPA2-Enterprise (802.1x authentication), not a shared PSK. Guest wireless should be isolated from the corporate network with no access to internal resources. How to verify: Check wireless controller configuration. Verify guest network VLAN isolation. Confirm no weak authentication protocol (WEP, WPA-TKIP) is in use.

Public IP and Exposed Service Audit

What does your organization expose to the internet? Run a scan of your public IP space and compare results against what you expect to be public. Unexpected open ports -- RDP, SMB, Telnet -- are immediate findings. How to verify: Use Shodan, your firewall's public-facing config, or a port scanner against your public IPs. Close or VPN-restrict anything that does not need to be directly internet-accessible.

Checklist Section 4: Data Protection

A breach that destroys your data or holds it hostage ends businesses. This section verifies your backup posture and data handling practices.

Backup Frequency and Coverage

Critical data should be backed up at minimum daily. Confirm that all systems containing important data are covered by your backup solution -- not just your primary file server. How to verify: Review backup job configuration. Confirm every critical system appears in the backup schedule.

Backup Restore Test

A backup you have never tested is not a backup -- it is a theory. Perform a restore test at least quarterly for critical systems. Document the test date, what was restored, and how long recovery took. How to verify: Review restore test logs. If no test has occurred in the past 90 days, schedule one before the audit closes.

Backup Encryption

Backup data should be encrypted both in transit and at rest. Unencrypted backups stored offsite or in cloud storage are a data exposure risk. How to verify: Check backup software encryption settings. Verify that cloud backup buckets are not publicly accessible.

Immutable or Air-Gapped Backup Copy

Ransomware increasingly targets and destroys online backups before encrypting production systems. An immutable backup -- one that cannot be deleted or modified for a defined retention period -- is your last line of defense. How to verify: Confirm at least one backup copy is stored in an immutable format (AWS S3 Object Lock, Azure Immutable Blob Storage, Veeam immutable repository, or air-gapped media).

Data Classification

You cannot protect data you have not labeled. A data classification policy defines categories (public, internal, confidential, restricted) and the handling requirements for each. Without classification, everything gets treated the same -- which usually means nothing is adequately protected. How to verify: Review your data classification policy. Confirm that sensitive data stores (file shares, databases, cloud storage) have ownership and classification labels.

Retention and Destruction Policy

Keeping data indefinitely is not free -- it increases your breach liability. A retention policy defines how long each data type is kept and how it is destroyed when it is no longer needed. How to verify: Review your data retention policy. Confirm that media destruction and data deletion procedures exist and are being followed.

Checklist Section 5: Email Security

Email is the number one initial access vector for phishing, BEC, and malware delivery. These controls are not optional.

SPF, DKIM, and DMARC

SPF tells receiving mail servers which IPs are authorized to send mail for your domain. DKIM adds a cryptographic signature to outbound mail. DMARC tells receiving servers what to do with mail that fails SPF or DKIM checks -- and sends you a report when that happens. All three should be configured, and DMARC should be at policy=reject or quarantine, not p=none. How to verify: Use MXToolbox or Google Admin Toolbox to check your DNS records. Review DMARC aggregate reports for unauthorized sending sources.

Email Filtering and Phishing Protection

Your email platform (Microsoft 365 or Google Workspace) has built-in anti-phishing controls. Confirm they are enabled at the correct enforcement level -- many organizations leave them at default settings that miss a significant portion of social engineering attempts. Third-party email security gateways provide additional layers. How to verify: Review your email security settings. Check quarantine logs for volume and disposition of flagged messages.

Security Awareness Training Cadence

Technical controls catch what they know to look for. Trained employees catch what technical controls miss. Security awareness training should occur at minimum annually, with phishing simulations at least quarterly. How to verify: Pull training completion records. Review phishing simulation results. If click rates are above 5%, the training program needs adjustment.

Incident Reporting Pathway

Employees need to know how and where to report a suspicious email, a failed phishing simulation click, or a suspected compromise. If the process is unclear, incidents go unreported. How to verify: Confirm a clearly communicated reporting mechanism exists (a dedicated email address, a phone number, a button in the email client). Test that reports actually reach someone who acts on them.

Attachment and Link Sandboxing

Malicious attachments and links should be detonated in a sandbox before reaching the recipient's inbox. Microsoft Defender for Office 365 Safe Attachments and Safe Links provide this. Google Workspace has similar capabilities. How to verify: Confirm sandbox capabilities are enabled and at the correct policy level.

Checklist Section 6: Application Security

Shadow IT and over-privileged SaaS applications create risk that is easy to overlook because it happens outside your network perimeter.

SaaS Application Inventory

Do you know every SaaS application your employees are using to process business data? Most organizations that conduct this exercise find 30 to 50 percent more applications than they were tracking. How to verify: Pull browser history exports, check SSO application lists, review corporate credit card charges for software subscriptions.

SaaS Access Review

For each SaaS application in your inventory, confirm that users with access still need it and that their permission level is appropriate. Former employees with active SaaS logins are a common finding. How to verify: For each critical SaaS app, pull the user list from the admin console and cross-reference against your active employee list.

Third-Party Vendor Risk Assessment

Your vendors have access to your data or systems. Their security posture affects your risk. Critical vendors -- cloud providers, managed service providers, payroll processors -- should have completed a security questionnaire or provided a SOC 2 report. How to verify: Identify vendors with privileged access to your systems. Confirm that a security review has been completed for each within the past 12 months. For CMMC contractors, this requirement is explicit in the CMMC assessment process. For HIPAA entities, business associate agreements are required.

Code Repository Access Review

If your organization maintains software in GitHub, GitLab, or Bitbucket, treat it like any other sensitive system. Review who has access, confirm that no secrets (API keys, passwords, certificates) are stored in the repository, and confirm that branch protection rules require review before merge to main. How to verify: Pull member list from your repository host. Run a secrets scanning tool (GitLeaks, truffleHog) against your repositories.

Web Application Vulnerability Scan

If you operate a customer-facing web application, it should be scanned for common vulnerabilities (OWASP Top 10) at minimum annually, and after significant code changes. How to verify: Review the date of the most recent web application scan or penetration test.

Checklist Section 7: Compliance and Governance

Controls without documentation are unverifiable. This section checks the paper trail that supports everything above.

Information Security Policy

A written, approved, and current information security policy is the foundation of a security program. It should define roles and responsibilities, the acceptable use of company assets, data classification, and the consequences of policy violations. How to verify: Locate the current policy. Check the last review and approval date. If it has not been reviewed in more than 12 months, it is out of date.

Incident Response Plan

Your IR plan defines what happens when a security incident occurs: who is notified, who makes decisions, what actions are taken, and how evidence is preserved. Without a documented plan, incident response is improvised -- and improvised IR is expensive. How to verify: Locate the current IR plan. Confirm it includes breach notification requirements specific to your regulated data types (HIPAA breach notification, state breach notification laws, CMMC reporting).

Acceptable Use Policy

Employees should have signed an acceptable use policy that defines what they can and cannot do with company systems, networks, and data. How to verify: Confirm the AUP exists, is current, and that signed copies or electronic acknowledgments exist for all current employees.

Asset Inventory Currency

The asset inventory you prepared before the audit should be a living document, not a one-time exercise. Confirm that a process exists to add new assets, remove retired assets, and review the inventory at a defined interval. How to verify: Check the last update date of your asset inventory. Verify that asset management is assigned to a named owner.

Risk Register

A risk register documents identified risks, their likelihood and impact, mitigation status, and residual risk acceptance decisions. It makes your security posture visible to leadership and defensible to auditors. How to verify: Locate the risk register. Check that identified risks from previous audits appear with their current remediation status.

Annual Penetration Test

Many compliance frameworks require an annual penetration test. Beyond compliance, a pen test validates whether the controls you have documented actually work. How to verify: Confirm a penetration test has been conducted within the past 12 months by a qualified external firm. Review the findings report and confirm that critical findings have remediation plans.

Checklist Section 8: Incident Response Readiness

The question is not whether an incident will happen. It is whether your organization is prepared to respond when it does.

IR Plan Documentation

Covered in Section 7, but worth restating: the plan must be written down, accessible to the people who need it during an incident (including when your primary systems are down), and reviewed at least annually. How to verify: Confirm the IR plan is stored in a location accessible offline or outside your primary network (printed copies, a separately hosted document).

Tabletop Exercise

A tabletop exercise walks your response team through a simulated incident scenario to identify gaps before a real event. It should happen at minimum once per year, with different scenarios each time. How to verify: Review tabletop exercise records. If no exercise has occurred in the past 12 months, schedule one. Petronella Technology Group facilitates these exercises for clients -- they surface gaps that documentation reviews alone miss.

Breach Notification Workflow

Know your notification obligations before an incident. If you hold PHI, HIPAA breach notification requires specific timelines. If you hold consumer data, your state's breach notification law applies. If you are a DoD contractor under CMMC, you have a 72-hour reporting obligation for CUI incidents. How to verify: Document the specific notification timelines and recipients for each regulatory framework that applies to your organization.

Cyber Insurance Review

Review your cyber insurance policy. Confirm coverage limits are appropriate for your data volume and revenue, that the policy covers ransomware extortion and business interruption, and that you understand what is required to make a claim (including documentation requirements that must be prepared before an incident). How to verify: Pull your current policy. Review exclusions carefully. Confirm MFA is in place -- many carriers now deny claims when MFA was not enabled on critical accounts.

Legal and PR Contacts

Have the names and after-hours numbers for your breach counsel and PR firm written down and accessible before you need them. The time to find a breach attorney is not the night you discover ransomware. How to verify: Confirm these contacts are documented in your IR plan or a separately maintained contact list.

How to Use This Checklist

Work through each section with a named reviewer for each item. Use a simple status: Pass, Fail, or Not Applicable. For every Fail, document the finding with enough detail to drive remediation: what is wrong, what system it affects, what the risk is, and who owns the fix.

Do not treat this as a pass/fail exercise for the whole organization. A single Pass on MFA does not cancel a Fail on backup restore testing. Each item stands on its own.

Prioritize findings by impact. Exposed RDP to the internet is more urgent than a stale acceptable use policy. Remediate in risk order, not checklist order.

Common gaps SMBs find during a first self-audit:

  • MFA deployed only for Microsoft 365 but not for the VPN, firewall admin, or cloud console
  • Backups configured but never tested -- the restore fails when tried
  • Offboarding missed for contractor accounts, which often stay active indefinitely
  • No asset inventory, or an inventory last updated 18+ months ago
  • DMARC configured at p=none -- which means receiving servers report problems but still deliver the email
  • Firewall rules permitting RDP (3389) or SMB (445) inbound from the internet
  • Service accounts with domain admin rights that have not had their password changed in years

When to Bring In an External Firm

A self-audit is a starting point. It surfaces what your own team can see. An external audit brings an independent perspective -- the controls that seem fine internally often look different to someone who is not used to working around them.

Consider an external assessment when:

  • You are preparing for a CMMC assessment or a HIPAA audit from OCR
  • Your self-audit surfaces findings that require independent verification
  • Your cyber insurance carrier is asking about your security posture at renewal
  • You are onboarding a new enterprise client who requires a security review as a condition of the contract
  • Your last external assessment was more than 12 months ago

External firms bring tools and techniques that catch what internal reviews miss: configuration analysis at the technical level, comparison against current threat intelligence, and validation that your documented controls match your actual implementation. That gap -- between policy and reality -- is where most breaches start.

Petronella Technology Group provides independent cyber security assessments for businesses across North Carolina, including gap assessments tied to CMMC compliance and HIPAA. Organizations that want a senior-level security advisor embedded without a full-time hire can explore our virtual CISO program. For a scoped quote, call Petronella Technology Group at (919) 348-4912.

Related reading: Network Security Assessment Checklist for Small Businesses (2026) | HIPAA Audit Checklist: Prepare Before OCR Comes Calling | CMMC Compliance Checklist: 110-Control Guide 2026

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now