I T AU D I T C H EC K L I S T
Application Access Controls Network Access Controls
☐☐ User accounts provisioned ☐☐ Firewall for remote access
☐☐ Access levels modifiable, user privileges limited ☐☐ IDS for remote access
to job function ☐☐ IPS for remote access
☐☐ Periodical access reviews scheduled ☐☐ VPN for remote access
☐☐ Password complexity requirement ☐☐ MFA for remote access
☐☐ Admin activity monitored
Physical Security Controls
Database Access Controls
☐☐ Physical perimeter protections
☐☐ Database admin accounts controlled ☐☐ Locks
☐☐ Admin activity monitored ☐☐ Badge access
☐☐ Application access to database restricted ☐☐ Battery backup up
☐☐ Generators
☐☐ HVAC
Operating System Access Controls
☐☐ System installation checklists or images used
Anti Malware Controls
☐☐ Security and event logs enabled
☐☐ Anti-virus software
☐☐ Unnecessary services turned off
☐☐ Gateway filtering
☐☐ Browser protections
Virtual Access Controls
Vulnerability Management Controls
☐☐ Access to hypervisors restricted
☐☐ Access levels modifiable
☐☐ Scanning and remediation for vulnerabilities
☐☐ Periodical access reviews
☐☐ Patch management program
☐☐ Password complexity requirement
☐☐ Secure configuration guide applied to
hypervisors and SANs
☐☐ Access to services running on host restricted
[Link] | 1
I T AU D I T C H EC K L I S T
Software Development Controls User Awareness Controls
☐☐ Software development lifecycle established ☐☐ Users trained on security
☐☐ Secure coding and web app firewall/security ☐☐ Background checks for new employees
testing ☐☐ Duties separated and documented
☐☐ Security logs collected and reviewed
Change Management Controls
Data Protection Controls
☐☐ Process for change management instated
☐☐ Inventory of IT assets ☐☐ Encryption in transit and at rest
☐☐ Data classification
☐☐ Usb restrictions in place
Disaster Recovery Controls ☐☐ Removal of data from storage media
☐☐ Backups for systems and data
☐☐ Disaster recovery plan established and Asset Management Controls
regularly tested
☐☐ Business impact analysis plan established and ☐☐ Hardware and software inventoried
regularly tested ☐☐ Installation of unauthorized software, utility
and audit tools prohibited
☐☐ System capacity and performance monitored
Vendor Management Controls
☐☐ Security clauses included in contracts Security Program Controls
☐☐ SLA’s are monitored
☐☐ Vendor incident notifications sent to ☐☐ Risk assessments regularly performed
subservice organizations regularly
☐☐ Risks mitigated to acceptable levels
☐☐ Information security policies approved and in place
Incident Management Controls ☐☐ Periodical independent audits performed
☐☐ Incident response plan instated and regularly
tested
☐☐ Customers notified following vendor incidents
[Link] | 2