Cyber Security Checklist Template

Use this Cyber Security Checklist Template to evaluate your organization's security measures, covering areas like network protection, data privacy, and more.

Cyber Security Checklist Template



Network Security

1. Are firewalls properly configured and actively monitored?


Photo Comment

2. Is your Wi-Fi network secured with strong encryption (e.g, WPA3)?


Photo Comment

3. Have you disabled unused network ports and protocols?


Photo Comment

4. Are intrusion detection or prevention systems in place and regularly reviewed?


Photo Comment
Access Control & User Management

1. Are all user accounts assigned the principle of least privilege?


Photo Comment

2. Do users use multi-factor authentication (MFA) for system access?


Photo Comment

3. Are accounts for former employees or inactive users promptly deactivated?


Photo Comment

4. Are password policies enforced (length, complexity, expiration)?


Photo Comment
Endpoint Protection

1. Is antivirus/anti-malware software installed and up to date on all devices?


Photo Comment

2. Are company laptops and mobile devices encrypted and password-protected?


Photo Comment

3. Are the USB or external devices restricted or monitored?


Photo Comment

4. Are all systems patched regularly, including third-party applications?


Photo Comment
Data Protection & Privacy

1. Is sensitive or personal data encrypted in transit and at rest?


Photo Comment

2. Are data retention and deletion policies clearly defined and enforced?


Photo Comment

3. Are regular backups performed, stored securely, and tested for restoration?


Photo Comment

4. Are privacy notices and consents in place for personal data collection?


Photo Comment
Email & Communication Security

1. Are employees trained to identify phishing and social engineering attempts?


Photo Comment

2. Is spam and malicious content filtering active on all email accounts?


Photo Comment

3. Is sensitive data prohibited from being shared via unsecured communication channels?


Photo Comment

4. Are outbound emails scanned for data leaks or unauthorized attachments?


Photo Comment
Physical Security

1. Are servers and network equipment housed in secure, access-controlled areas?


Photo Comment

2. Is there a visitor log or badge system for access to sensitive zones?


Photo Comment

3. Are laptops and removable media stored securely when not in use?


Photo Comment
Incident Response & Recovery

1. Is there a documented cyber incident response plan in place?


Photo Comment

2. Are roles and responsibilities clearly defined in the event of a cyber incident?


Photo Comment

3. Has the response plan been tested or simulated recently?


Photo Comment

4. Are incidents logged, reported, and reviewed for future mitigation?


Photo Comment
Compliance & Auditing

1. Are you compliant with relevant standards (e.g., GDPR, HIPAA, ISO 27001)?


Photo Comment

2. Are regular cybersecurity audits or penetration tests conducted?


Photo Comment

3. Is there a record of past breaches or near misses and lessons learned?


Photo Comment

4. Are third-party vendors assessed for cybersecurity practices?


Photo Comment
Training & Awareness

1. Have all staff received up-to-date cyber security awareness training?


Photo Comment

2. Are policies on internet use, social media, and remote work clearly communicated?


Photo Comment

3. Do employees know how to report a suspected breach or vulnerability?


Photo Comment
Review & Sign-Off

1. When was the last full cybersecurity review conducted?


Photo Comment

2. Who is responsible for maintaining cybersecurity compliance?


Photo Comment

3. What corrective actions have been assigned and tracked?


Photo Comment

4. When is the next cybersecurity audit scheduled?


Photo Comment

Is this sample what you are looking for?
Sign up to use & customise this template, or create your own custom checklist:

Checklist by GoAudits.com – Please note that this checklist is intended as an example. We do not guarantee compliance with the laws applicable to your territory or industry. You should seek professional advice to determine how this checklist should be adapted to your workplace or jurisdiction.

Easy inspection app for your digital checklists