Audit Checklists

Audit teams, whether internal or external, can utilize the audit checklists to determine the maturity of your information assurance program. Each checklist item maps directly to each policy statement and provides a reference to applicable standards and regulations. The intent/purpose of these documents is to provide your organization tools to measure and assess your information assurance program in order to facilitate data protection.

Available Audit Checklists

Access Control and Authorization Audit Checklist
Account and Identity Management Audit Checklist
Anti-Malware Audit Checklist
Auditing and Assessment Audit Checklist
Authentication Audit Checklist
Business Applications Audit Checklist
Business Continuity and Disaster Recovery Audit Checklist
Charter Document Audit Checklist
Certification and Accreditation Audit Checklist
Configuration Management and Change Management Audit Checklist
Cloud Services Audit Checklist
Control Exception Audit Checklist
Data Backup and Archiving Audit Checklist
Data Classification Audit Checklist
Database Security Audit Checklist
Email Security and Acceptable Use Audit Checklist
Encryption Security Audit Checklist
Environmental Security Audit Checklist
Ethics Audit Checklist
Governance Audit Checklist
Green Computing Audit Checklist
Incident Management Audit Checklist
Internet Security and Acceptable Use Audit Checklist
Logging and Monitoring Audit Checklist
Mobile Device and Acceptable Use Audit Checklist
Network Security Audit Checklist
Penetration Testing Audit Checklist
Personnel Security Audit Checklist
Physical Security Audit Checklist
Personally Owned Devices (BYOD) Audit Checklist
Privacy Audit Checklist
Remote Access Audit Checklist
Removable Media Audit Checklist
Risk Management Audit Checklist
Server Security Audit Checklist
Social Media Audit Checklist
Software Development Audit Checklist
Software Update Audit Checklist
System Decommissioning and Data Destruction Audit Checklist
Third-Party and Outsourcing Security Audit Checklist
Training, Education, and Awareness Audit Checklist
Vulnerability Management Audit Checklist
Wireless Security Audit Checklist
Workstation Security Audit Checklist