Food Defense Checklist

Use this Food Defense Checklist to assess and strengthen measures protecting food from contamination, securing facility access, and ensuring integrity.

Food Defense Checklist



Food Defense Plan & Management (Regulatory)

1. Does the facility have and implement a written food defense plan?


Photo Comment

2. Does the written plan include the vulnerability assessment, mitigation strategies, and procedures for monitoring, corrective actions, and verification?


Photo Comment

3. Is the written food defense plan signed and dated by the owner, operator, or agent in charge when first completed and when modified?


Photo Comment

4. Has the food defense plan been reanalyzed as a whole at least once every 3 years?


Photo Comment

5. Has the food defense plan been revised whenever a significant change in activities creates a reasonable potential for a new or increased vulnerability?


Photo Comment
Personnel & Training

1. Do all facility personnel receive training in food defense awareness (as new employees and annually)?


Photo Comment

2. Have employees been trained in security procedures and instructed to report unusual activities?


Photo Comment

3. Are personnel who perform activities associated with food defense under the supervision of, or are they, a qualified individual?


Photo Comment

4. Are individuals assigned tasks like preparing the food defense plan or reanalysis trained externally and qualified specifically for that task?


Photo Comment

5. Are supervisory personnel responsible for food defense compliance clearly assigned and possess the necessary education, training, and experience?


Photo Comment

6. Are new employees' work references, addresses, phone numbers, and information on their criminal record or immigration status verified


Photo Comment

7. Is management alerted for unusual employee behavior (e.g., workers staying after shift or accessing areas outside their responsibility)?


Photo Comment
Vulnerability Assessment & Mitigation Strategies

1. Has the facility conducted a vulnerability assessment for each food type to identify significant vulnerabilities and actionable process steps


Photo Comment

2. Does the vulnerability assessment consider the possibility of an inside attacker?


Photo Comment

3. Does the assessment evaluate the potential public health impact (severity/scale), the degree of physical access, and the attacker’s ability to contaminate?


Photo Comment

4. Are mitigation strategies identified and implemented at each actionable process step?


Photo Comment

5. Is there a written explanation of how the mitigation strategy sufficiently minimizes or prevents the significant vulnerability?


Photo Comment
Physical Security & Receiving

1. Does management conduct a daily walk-through inspection of the operation?


Photo Comment

2. Is the area around the facility well-lit?


Photo Comment

3. Is the facility locked and secured when closed?


Photo Comment

4. Are exterior doors (other than customer entryways) locked at all times?


Photo Comment

5. Is access to the exterior door and storage area keys restricted to management staff?


Photo Comment

6. Are foods purchased only from reputable vendors?


Photo Comment

7. Are deliveries received only while the staff is present?


Photo Comment

8. Is the delivery person escorted while in the food storage and preparation areas?


Photo Comment

9. Are deliveries inspected for damage, tampering, or counterfeiting before acceptance?


Photo Comment

10. Are delivery items matched against order invoices before acceptance/use?


Photo Comment

11. Once received, are foods immediately moved to a secure food storage area?


Photo Comment

12. Are cleaning crews, contractors, or other non-facility personnel supervised while in food storage and preparation areas?


Photo Comment
Operational Controls (Preparation & Service)

1. Are standard operating procedures in place that outline the steps in each job?


Photo Comment

2. Is each ingredient and its packaging inspected for evidence of tampering before use?


Photo Comment

3. Are employees trained not to use any food with an unusual look or smell?


Photo Comment

4. Are self-service stations (like salad bars and buffets) visible to employees at all times?


Photo Comment

5. Are empty food containers removed and replaced by new ones to replenish food at self-service stations?


Photo Comment
Records & Verification

1. Are food defense records accurate, indelible, and legible?


Photo Comment

2. Are records created concurrently with the performance of the activity documented?


Photo Comment

3. Do records contain the actual values and observations obtained during food defense monitoring?


Photo Comment

4. Do records include the signature or initials of the person performing the activity and the date and time?


Photo Comment

5. Must records be retained at the facility for at least 2 years after they were prepared?


Photo Comment

6. Are food defense monitoring and corrective action records reviewed within appropriate timeframes?


Photo Comment

7. Is it verified that mitigation strategies are properly implemented and are significantly minimizing the vulnerabilities?


Photo Comment

Is this sample what you are looking for?
Sign up to use & customise this template, or create your own custom checklist:

Checklist by GoAudits.com – Please note that this checklist is intended as an example. We do not guarantee compliance with the laws applicable to your territory or industry. You should seek professional advice to determine how this checklist should be adapted to your workplace or jurisdiction.

Easy inspection app for your digital checklists