🛡️ SECURITY ASSESSMENT
Cybersecurity
Audit Checklist
Check off security controls you have in place. Your score updates in real-time.
0%
Security Score
0
Items Checked
Access Control
0/5
Multi-factor authentication (MFA) for all users
Require MFA for email, cloud services, and VPN access
Role-based access control (RBAC)
Users only have access to what they need
Password policy enforced
Minimum 12 characters, complexity requirements, no reuse
Regular access reviews
Quarterly review of who has access to what
Privileged access management
Admin accounts are controlled and monitored
Data Protection
0/5
Data encryption at rest
Databases, files, and backups are encrypted
Data encryption in transit
TLS/SSL for all data transfers
Regular backups
Automated daily backups with offsite storage
Backup testing
Regular restore tests to verify backups work
Data classification policy
Know what data is sensitive and where it lives
Network Security
0/5
Firewall configured and monitored
Next-gen firewall with active threat detection
Network segmentation
Critical systems isolated from general network
VPN for remote access
Secure VPN required for remote connections
Intrusion detection/prevention
IDS/IPS monitoring network traffic
DDoS protection
Protection against denial of service attacks
Endpoint Security
0/5
Endpoint protection (EDR)
Advanced antivirus/anti-malware on all devices
Automatic patching
OS and software updates applied promptly
Device encryption
Full disk encryption on laptops and workstations
Mobile device management
MDM for company and BYOD devices
USB/removable media controls
Policy for external storage devices
Want a Professional Assessment?
Our security experts can conduct a comprehensive audit and provide remediation guidance.
🛡️ Request Security Audit
