0% Complete
0 / 0 items
Free Compliance Resource

IT Compliance Audit Checklist
Self-Assessment Tool

Use our interactive checklist to assess your organization's compliance readiness across five major frameworks. Check off completed items, track your progress, and identify gaps before your next audit.

HIPAA
0%
CMMC
0%
NIST 800-171
0%
SOC 2
0%
PCI DSS
0%

HIPAA (Health Insurance Portability and Accountability Act) applies to covered entities and business associates handling protected health information (PHI). Non-compliance can result in fines up to $2.1 million per violation category per year.

Administrative Safeguards 6 items
  • Designated HIPAA Privacy Officer and Security Officer with documented roles and responsibilities
  • Comprehensive Risk Analysis conducted within the last 12 months identifying threats to ePHI
  • Risk Management Plan in place with documented remediation timelines for identified vulnerabilities
  • Workforce security awareness training conducted at hire and annually with documented attendance
  • Written policies and procedures for access management, including termination and role change processes
  • Incident Response Plan that includes breach notification procedures per HHS requirements
Physical Safeguards 4 items
  • Facility access controls with visitor logs and badge/key access for areas housing ePHI systems
  • Workstation security policies specifying physical safeguards (screen locks, cable locks, clean desk policy)
  • Device and media disposal procedures with documented sanitization or destruction of PHI media
  • Hardware inventory tracking all devices that store, process, or transmit ePHI
Technical Safeguards 5 items
  • Unique user identification and authentication for all systems accessing ePHI (no shared credentials)
  • Encryption of ePHI at rest and in transit using FIPS 140-2 validated cryptographic modules
  • Audit controls with logging of all access to ePHI, reviewed at least monthly for anomalies
  • Automatic session timeout and emergency access procedures documented and tested
  • Data integrity controls including multi-factor authentication for remote access to ePHI systems

CMMC 2.0 (Cybersecurity Maturity Model Certification) is required for DoD contractors handling CUI. Level 2 requires implementation of 110 NIST SP 800-171 practices with third-party assessment.

Access Control 5 items
  • Limit system access to authorized users, processes, and devices with documented access control policy
  • Enforce separation of duties to reduce risk of malicious activity without collusion
  • Implement least-privilege access and review user permissions quarterly
  • Multi-factor authentication required for all network access to CUI systems
  • Restrict remote access sessions and encrypt all remote connections to CUI environments
Audit & Accountability 5 items
  • Create and retain system audit logs sufficient to support security incident investigation
  • Ensure individual accountability by tracing actions to unique users (no shared accounts)
  • Review and analyze audit logs for indicators of compromise at least weekly
  • Protect audit information and logging tools from unauthorized access and modification
  • Correlate audit review and reporting processes across multiple systems and time zones
Incident Response 5 items
  • Establish an incident response plan with roles, communication protocols, and escalation procedures
  • Test incident response capability at least annually through tabletop or functional exercises
  • Track, document, and report incidents to designated officials per DFARS 252.204-7012 (72 hours)
  • Implement automated mechanisms to support incident handling and evidence collection
  • Identify and report security incidents involving CUI to DIBCIS within required timeframe

NIST SP 800-171 protects Controlled Unclassified Information (CUI) in non-federal systems. It contains 110 security requirements across 14 families. Required for federal contractors and subcontractors.

System & Communications Protection 5 items
  • Monitor, control, and protect communications at system boundaries with firewalls and IDS/IPS
  • Employ FIPS-validated encryption to protect CUI in transit across all network connections
  • Separate user functionality from system management functionality in system design
  • Prevent remote devices from simultaneously maintaining connections to internal and external networks (split tunneling)
  • Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI at rest
Configuration Management 5 items
  • Establish and maintain baseline configurations and inventories of organizational systems
  • Employ the principle of least functionality by restricting unnecessary functions, ports, and services
  • Apply deny-by-exception policies for software execution on all endpoints
  • Control and monitor user-installed software and enforce change management processes
  • Track, review, and approve all changes to system configurations with documented change logs
Awareness & Training 3 items
  • Ensure all users are aware of security risks associated with their activities and applicable policies
  • Provide role-based security training for personnel with security responsibilities before granting access
  • Document and maintain records of all security training completion with annual refresher requirements

SOC 2 (Service Organization Control 2) evaluates controls relevant to security, availability, processing integrity, confidentiality, and privacy. Required by many enterprise clients for vendor risk management.

Security (Common Criteria) 5 items
  • Logical and physical access controls with centralized identity management and SSO where possible
  • Network and system monitoring with automated alerting for anomalous activity and unauthorized access
  • Change management process with documented approval workflow, testing, and rollback procedures
  • Risk assessment process conducted at least annually with formal risk register and treatment plans
  • Vendor management program with risk assessment of third-party providers handling sensitive data
Availability & Confidentiality 5 items
  • Business continuity and disaster recovery plans documented, tested at least annually, and updated
  • System performance monitoring with capacity planning and defined SLAs for uptime and response
  • Data backup procedures with documented RPO/RTO targets and regular restoration testing
  • Data classification policy identifying confidential, internal, and public data categories
  • Encryption controls for confidential data at rest and in transit with key management procedures
Privacy & Processing Integrity 3 items
  • Privacy policy published and aligned with data collection, use, retention, and disposal practices
  • Data processing controls ensuring completeness, accuracy, timeliness, and authorization of system processing
  • Data retention and disposal schedule aligned with regulatory requirements and documented destruction records

PCI DSS 4.0 (Payment Card Industry Data Security Standard) is required for all organizations that store, process, or transmit cardholder data. Non-compliance can result in fines of $5,000 to $100,000 per month.

Network Security 5 items
  • Install and maintain network security controls (firewalls, WAF) between all CDE and untrusted networks
  • Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment
  • Network segmentation isolating the CDE from all other networks, validated at least annually
  • Prohibit direct public access between the internet and any system in the cardholder data environment
  • Inventory all authorized wireless access points and conduct quarterly rogue wireless detection scans
Data Protection 5 items
  • Protect stored cardholder data with encryption, truncation, masking, or hashing with documented key management
  • Do not store sensitive authentication data after authorization (full track, CVV, PIN)
  • Encrypt transmission of cardholder data across open, public networks using strong cryptography (TLS 1.2+)
  • Maintain a data flow diagram showing all cardholder data flows across systems, networks, and applications
  • Implement a data retention and disposal policy with quarterly discovery scans for unauthorized cardholder data
Vulnerability Management 3 items
  • Deploy anti-malware solutions on all systems commonly affected by malware with automated updates
  • Conduct quarterly internal and external vulnerability scans with ASV-approved scanning for external
  • Establish a process for timely patching with critical patches applied within 30 days of release
Frequently Asked Questions

Compliance Audit FAQ

How often should we conduct a compliance audit?

Most regulatory frameworks require at least an annual compliance audit, though some mandate more frequent assessments. HIPAA requires annual risk analyses, PCI DSS mandates quarterly vulnerability scans and annual on-site assessments, and CMMC Level 2 requires triennial third-party assessments. Beyond these minimums, best practice is to conduct internal reviews quarterly and a comprehensive audit annually. Organizations undergoing significant changes — such as cloud migration, mergers, or new system deployments — should conduct additional targeted assessments. Learn more about our compliance services.

What is the difference between an internal and external audit?

An internal audit is conducted by your own staff or a trusted partner to identify gaps, remediate issues, and prepare for formal certification. An external audit is performed by an accredited third-party assessor — such as a C3PAO for CMMC or a QSA for PCI DSS — who issues an official compliance certification or attestation. Internal audits are typically less formal, less expensive, and can be done more frequently, while external audits carry legal weight and satisfy regulatory requirements. Most organizations conduct 2–4 internal audits between each external assessment to maintain continuous compliance.

How long does a typical compliance audit take?

The duration depends on the framework, organization size, and current compliance posture. A focused HIPAA risk assessment for a small medical practice may take 2–4 weeks, while a full CMMC Level 2 assessment for a defense contractor can take 3–6 months including preparation. SOC 2 Type II audits require a minimum observation window of 6 months. The preparation phase — gap analysis, policy development, and remediation — typically takes longer than the audit itself, often 3–12 months depending on the maturity of existing controls.

What are the most common compliance audit findings?

The most frequently cited findings across all frameworks include: incomplete or outdated documentation (policies, procedures, and risk assessments), lack of multi-factor authentication on privileged accounts, insufficient access control reviews, missing or incomplete audit logging, inadequate security awareness training, and poor vendor risk management. HIPAA audits commonly flag missing Business Associate Agreements and incomplete risk analyses. CMMC audits frequently identify gaps in System Security Plans (SSPs) and Plans of Action & Milestones (POA&Ms). Addressing these common issues proactively can significantly streamline the audit process.

How do we prepare for our first compliance audit?

Start by identifying which frameworks apply to your organization based on your industry, data types, and contractual obligations. Conduct a gap analysis comparing your current security posture against the target framework’s requirements. Develop or update policies, procedures, and documentation to address identified gaps. Implement technical controls such as encryption, access management, and logging. Train all employees on security awareness and their compliance responsibilities. Finally, perform an internal audit to validate readiness before engaging an external assessor. A professional risk assessment is the most effective first step.

Which compliance frameworks does Petronella support?

Petronella Technology Group supports the full spectrum of compliance frameworks relevant to small and mid-sized businesses. This includes HIPAA for healthcare organizations, CMMC 2.0 and NIST 800-171 for defense contractors, SOC 2 for technology and service providers, PCI DSS for organizations handling payment card data, and GDPR for companies with EU customer data. We have guided hundreds of organizations through successful assessments and certifications since 2002, providing end-to-end support from gap analysis through remediation to audit readiness.

Need Expert Help?

Get a Professional Compliance Assessment

This self-assessment checklist is a starting point. For a comprehensive, expert-led compliance assessment tailored to your specific environment, contact Petronella Technology Group.

We have guided hundreds of organizations through HIPAA, CMMC, NIST, SOC 2, and PCI DSS assessments and audits since 2002.

BBB Accredited since 2003 | 2,500+ Businesses Served