Web Application Security Checklist

Use the Web Application Security Checklist to review access control, data protection, encryption, logging, backups, and patching. Assess risks and keep your application audit-ready at all times.

Web Application Security Checklist



Identity, Access & Account Security

1. Are strong password policies enforced for all user accounts?


Photo Comment

2. Is multi-factor authentication enabled for all admin and privileged accounts?


Photo Comment

3. Are inactive, test, and ex-employee accounts disabled or removed?


Photo Comment

4. Are user roles and permissions reviewed regularly to enforce least privilege?


Photo Comment

5. Is access to production systems restricted and audited?


Photo Comment

6. Are service and system accounts limited to only the permissions they require?


Photo Comment
Data Protection & Encryption

1. Is HTTPS enforced across the entire application using valid TLS certificates?


Photo Comment

2. Is TLS 1.2 or higher enforced for all network connections?


Photo Comment

3. Is sensitive data (passwords, tokens, PII) encrypted at rest?


Photo Comment

4. Are secrets and API keys stored in a secure secrets manager or vault?


Photo Comment

5. Are backups encrypted before storage?


Photo Comment

6. Is access to production data restricted and logged?


Photo Comment
Application & Platform Security

1. Are security headers (CSP, HSTS, X-Frame-Options, etc.) configured correctly?


Photo Comment

2. Is CSRF protection enabled on all state-changing requests?


Photo Comment

3. Is user input validated and safely handled across the application?


Photo Comment

4. Are file uploads restricted by type, size, and content?


Photo Comment

5. Are uploaded files scanned for malware?


Photo Comment

6. Are error messages generic and free of sensitive technical details?


Photo Comment
Infrastructure, Patch & Dependency Management

1. Are operating systems, frameworks, and libraries updated regularly?


Photo Comment

2. Are unused packages, plugins, features, and services removed?


Photo Comment

3. Are known vulnerabilities tracked and prioritized for remediation?


Photo Comment

4. Are security patches tested before being deployed to production?


Photo Comment

5. Are firewalls or security groups configured to block unnecessary traffic?


Photo Comment

6. Are unnecessary ports and services disabled?


Photo Comment
Monitoring, Logging & Incident Response

1. Are audit logs enabled for authentication, permission, and configuration changes?


Photo Comment

2. Are logs protected against deletion or tampering?


Photo Comment

3. Are alerts configured for suspicious or high-risk activities?


Photo Comment

4. Are security alerts reviewed and acted upon promptly?


Photo Comment

5. Is there a documented incident response process?


Photo Comment

6. Are vulnerability scans and penetration tests performed regularly?


Photo Comment
Backup, Recovery & Third-Party Risk

1. Are backups stored in a secure, access-controlled location?


Photo Comment

2. Are backup restores tested regularly?


Photo Comment

3. Is a disaster recovery plan documented and up to date?


Photo Comment

4. Are third-party vendors reviewed for security risks?


Photo Comment

5. Are third-party API keys and credentials rotated regularly?


Photo Comment

6. Are third-party integrations limited to the minimum required permissions?


Photo Comment

Is this sample what you are looking for?
Sign up to use & customise this template, or create your own custom checklist:

Checklist by GoAudits.com – Please note that this checklist is intended as an example. We do not guarantee compliance with the laws applicable to your territory or industry. You should seek professional advice to determine how this checklist should be adapted to your workplace or jurisdiction.

Easy inspection app for your digital checklists