Security Audit Checklist

Comprehensive checklist to audit your personal or business cybersecurity posture and identify vulnerabilities.

Complete Security Audit Guide

Use this comprehensive checklist to perform a thorough security audit of your digital environment. Work through each section systematically to identify gaps and strengthen your security posture.

Account Security Audit

Password Inventory

List all online accounts and verify each has a unique, strong password with minimum 12 characters.

Two-Factor Authentication

Enable 2FA on all accounts that support it, prioritizing email, banking, and social media.

Recovery Options

Update recovery email addresses and phone numbers to current, secure contact methods.

Inactive Accounts

Identify and close accounts you no longer use to reduce attack surface.

Security Questions

Replace easily guessable security questions with random answers stored in password manager.

Device Security Audit

Operating System Updates

Verify all devices are running latest OS versions with automatic updates enabled.

Antivirus Software

Install and update antivirus/anti-malware on all computers and mobile devices.

Firewall Configuration

Enable firewalls on all devices and verify proper configuration.

Device Encryption

Enable full disk encryption on computers and encryption on mobile devices.

Screen Lock

Set strong passwords/PINs and enable biometric locks on all devices.

Find My Device

Enable remote tracking, lock, and wipe capabilities on all mobile devices.

Network Security Audit

Router Security

Change default router admin password and update to latest firmware.

Wi-Fi Encryption

Use WPA3 encryption (or WPA2 if WPA3 unavailable) with strong password.

SSID Configuration

Change default network name and consider hiding SSID broadcast.

Guest Network

Create separate guest network for visitors and IoT devices.

VPN Usage

Install VPN software and use it on public networks and for sensitive activities.

Application & Software Audit

Installed Applications

Review and uninstall unnecessary or unused applications from all devices.

Software Updates

Update all applications to latest versions, enable automatic updates where possible.

Browser Extensions

Review and remove unnecessary browser extensions, keep only trusted ones.

Mobile Apps

Audit mobile app permissions and revoke unnecessary access to location, contacts, etc.

Pirated Software

Remove any pirated or cracked software that may contain malware.

Data Protection Audit

Backup Strategy

Implement 3-2-1 backup rule: 3 copies, 2 different media, 1 offsite.

Backup Testing

Verify backups are working by performing test restore of important files.

Cloud Storage Security

Enable 2FA on cloud storage accounts and review file sharing settings.

Sensitive Data Encryption

Encrypt sensitive files stored locally and in the cloud.

Secure File Deletion

Use secure deletion tools for permanently removing sensitive files.

Email Security Audit

Spam Filtering

Enable and configure spam filters to block unwanted and malicious emails.

Email Aliases

Use email aliases or disposable addresses for online registrations.

Email Forwarding

Review and remove any unauthorized email forwarding rules.

Connected Apps

Review and revoke access for third-party apps connected to email account.

Phishing Awareness

Train yourself and family to recognize and report phishing attempts.

Social Media Security Audit

Privacy Settings

Review and tighten privacy settings on all social media platforms.

Connected Apps

Audit and remove third-party apps with access to social media accounts.

Public Information

Review what personal information is publicly visible and limit exposure.

Location Sharing

Disable automatic location tagging on posts and photos.

Friend/Follower Review

Remove unknown or suspicious contacts from your networks.

Financial Security Audit

Account Monitoring

Enable transaction alerts and regularly review bank and credit card statements.

Credit Report Check

Review credit reports from all three bureaus for unauthorized accounts.

Credit Freeze

Consider placing security freeze on credit reports to prevent unauthorized accounts.

Digital Wallet Security

Enable biometric authentication and transaction limits on digital payment apps.

Subscription Review

Audit recurring charges and cancel unused subscriptions.

Physical Security Audit

Document Storage

Securely store sensitive documents in locked, fireproof location.

Shredding

Shred documents containing personal information before disposal.

Mail Security

Use locked mailbox and collect mail promptly to prevent theft.

Device Protection

Use cable locks for laptops and keep devices secure when traveling.

Audit Schedule & Maintenance

Regular audits ensure ongoing security. Follow this maintenance schedule:

Monthly

Check for software updates, review account activity, verify backup status

Quarterly

Password review, permission audit, credit report check

Semi-Annual

Full security audit, privacy settings review, inactive account cleanup

Annual

Comprehensive security assessment, update response plans, review insurance

Next Steps

After completing your security audit:

  • Document identified vulnerabilities and prioritize fixes by risk level
  • Create an action plan with specific tasks and deadlines
  • Implement fixes systematically, starting with highest-risk items
  • Schedule follow-up audits to verify improvements
  • Consider professional security assessment for business environments