IT Regulatory Compliance Review
Data Privacy and Protection
Pull a BitLocker (Windows) and FileVault (macOS) compliance report from Intune or JAMF. Flag devices reporting unencrypted volumes or missing recovery keys in escrow — both fail SOC 2 CC6.7 and HIPAA §164.312(a)(2)(iv) evidence.
Scan internal web apps, file shares, and admin consoles for TLS 1.0/1.1 listeners and expired or self-signed certificates. Note any service still using SMBv1 or unencrypted LDAP — those need a documented remediation date, not a pass.
Export membership of privileged roles (Global Admin, Privileged Role Admin, Exchange Admin) and high-impact security groups. Look for the classic gotcha: stale members from prior projects, and "Domain Users" granted access to sensitive file shares.
Confirm DLP rules for PII, PHI, and cardholder data are in enforce mode (not test mode) across Exchange Online, SharePoint, OneDrive, and Teams. Pull the last 90 days of policy match reports for the audit binder.
Spot-check Confidential and Highly Confidential sensitivity labels on the top file repositories. Mislabeled or unlabeled folders containing regulated data are the most common audit finding here.
User Authentication and Access
Verify the Entra ID conditional access policy requires MFA for all users including admins, and that legacy authentication (IMAP, POP, SMTP basic auth, ActiveSync basic) is blocked org-wide. Password-spray attacks against the legacy endpoint are the #1 way MFA gets bypassed in the wild.
Build the Block Legacy Auth conditional access policy in report-only mode first. Run sign-in logs for 48 hours to identify any legitimate service or shared mailbox still on basic auth, migrate them to modern auth or app passwords, then flip the policy to enforce.
Reconcile CyberArk, BeyondTrust, or Delinea vault contents against the current admin roster. Rotate any credential past its policy age, and flag service accounts that have been "temporary" for more than two quarters — the classic six-year-old domain admin service account lives here.
Schedule reviewers (managers + system owners) on Entra ID Access Reviews for privileged roles, app assignments, and group memberships. Decisions auto-apply at review close — unreviewed users get removed by default, which catches offboarding gaps.
Cross-check the Okta or Entra ID app catalog against finance's SaaS spend report. Apps paying a per-seat license but not federated are shadow IT — inventory them with a remediation owner and target date.
Security Monitoring and Incident Response
Confirm Splunk, Sentinel, or Sumo Logic is receiving events from domain controllers, firewalls, EDR, and M365 unified audit log within the last 24 hours. Silent log sources are a SOC 2 CC7.2 finding and a real blind spot during incident response.
Run Tenable or Qualys with credentialed scans against servers and endpoints. Unauthenticated scans miss most patch-level findings. Tag the scan as the quarterly evidence run for the audit binder.
Open an emergency RFC in ConnectWise PSA or Jira Service Management, attach the CVSS scores and affected hosts, and route to the CAB lead for expedited approval. Document a tested rollback plan — emergency does not mean unreviewed.
Triage open detections in CrowdStrike Falcon, SentinelOne, or Defender for Endpoint that are older than 7 days. Each one needs a closure reason — false positive, contained, or escalated to IR — not just a stale queue.
Walk IT, security, leadership, and legal through a scenario where production file shares are encrypted and the Veeam repository is also hit. The exercise should surface whether the immutable backup tier (object lock, air-gapped tape, or separate cloud account) is actually isolated from the production attack path.
Pull the patch compliance dashboard from NinjaOne, Datto RMM, or Intune. Target is at least 95% of endpoints within 30 days of the last patch Tuesday. Investigate any device offline more than 14 days — those are usually shipped-out laptops or decommissioned-but-not-retired assets.
Compliance Documentation and Reporting
Attach this quarter's screenshots, exports, and reports to each SOC 2 / HIPAA / PCI control entry. Auditors look for evidence dated within the audit period — last quarter's screenshot reused does not pass sampling.
Reconcile Microsoft, VMware, Adobe, and Veeam license counts against deployed instances from the RMM and vCenter inventories. A surprise vendor audit on an 80-VM overage is a six-figure problem; a quarterly reconciliation is a 30-minute one.
The internal auditor (or vCIO for MSP engagements) samples 10–15 controls and re-tests them independent of the IT team's evidence. Document any deviations with owner, root cause, and remediation date — that exception log is what the external auditor will ask for first.
Push the next KnowBe4, Hoxhunt, or Proofpoint module and a fresh phishing simulation. Pull the repeat-clicker list and route to managers for targeted remediation — generic org-wide reminders do not move that number.
The IT Manager or vCIO signs the quarterly attestation summarizing controls tested, exceptions, and remediation status. This is the artifact leadership and the external auditor see — the work upstream only counts if it's reflected here accurately.
Use this template in Manifestly
- Cloud Migration Checklist
- Cloud Security Checklist
- User Access Review Checklist
- Data Recovery Checklist
- Containerization Rollout Checklist
- Database Backup Checklist
- Password Management Checklist
- Backup and Restore Checklist
- Network Upgrade Checklist
- Server Backup Checklist
- Business Continuity Plan Checklist
- Problem Management Checklist
- Server Decommissioning Checklist
- Cloud Monitoring Checklist
- Hardware Inventory Checklist
- Release Management Checklist
- Server Maintenance Checklist
- Rollback Plan Checklist
- Customer Support Ticket Workflow
- Software Upgrade Checklist
- Quarterly Compliance Reporting Checklist
- Patch Management Checklist
- Hardware Maintenance Checklist
- Server Security Checklist
- IT Emergency Response Checklist
- Incident Management Checklist
- Disaster Recovery Plan Checklist
- User Role Management Checklist
- Software Installation Checklist
- Compliance Audit Checklist
- Access Control Checklist
- Cloud Cost Management Checklist
- IT Staff Performance Review
- Change Management Checklist
- Firewall Configuration Checklist
- Security Audit Checklist
- Quarterly Network Security Review
- Database Migration Checklist
- Employee Onboarding Checklist
- Capacity Planning Checklist
- IT Budgeting Checklist
- Network Monitoring Checklist
- Cloud Deployment Checklist
- Database Installation Checklist
- IT Service Request Checklist
- Database Security Checklist
- System Monitoring Checklist
- Hardware Troubleshooting Checklist
- IT Strategy Checklist
- Patch Deployment Checklist
- Hardware Upgrade Checklist
- Performance Tuning Checklist
- Application Performance Monitoring Checklist
- Employee Training Checklist
- User Onboarding Checklist
- IT Vendor Management Checklist
- Server Build and Hardening Checklist
- IT Policy Review Checklist
- Help Desk Ticket Handling Checklist
- Infrastructure as Code Checklist
- Hardware Disposal Checklist
- IT Resource Allocation Checklist
- Incident Response Checklist
- Network Troubleshooting Checklist
- User Offboarding Checklist
- Risk Management Checklist
- Regulatory Compliance Checklist
- Quarterly Internal Control Review Checklist
- Sales Tax Reporting Checklist
- Legal Entity Management Checklist
- Employee File Audit Checklist
- Anti-Money Laundering Compliance Checklist
- SOX Compliance Checklist
- GDPR Compliance Review Checklist
- IT Security Audit Checklist
- HR Compliance Checklist
- Payroll Processing Checklist
- Building Code Compliance Checklist
- Employee Records Management Checklist
- Legal Document Storage Checklist
- Security Audit Checklist
- Property Risk Assessment Checklist
- Property Safety Inspection Checklist
- Cybersecurity Protocol Checklist
- Fair Housing Compliance Checklist
- Legal Compliance Checklist for New Properties
- Lease Agreement Checklist
- Software Licensing Compliance Checklist
- PCI DSS Compliance Checklist
- Real Estate Legal Compliance Checklist
- HIPAA Compliance Checklist
- MLS Listing Review Checklist
- Real Estate License Renewal Checklist
- GDPR Compliance Checklist
- Real Estate Contract Review Checklist
- Fair Housing Compliance Audit
- Listing Agreement Intake Checklist
- ISO/IEC 27001 Compliance Checklist
- HR Compliance Checklist
- Real Estate Ethics & Compliance Review
- Brokerage Trust Account Management Checklist
- Real Estate Professional Development Checklist
- Brokerage Technology Inventory Audit
- Real Estate Website Audit Checklist
- Continuing Education Checklist
- Employee Termination Checklist
- Employee Records File Audit
- Regulatory Compliance Checklist
- Brokerage HR Policy Compliance Checklist
- Employee Handbook Annual Review
- Employee Termination Checklist
- Data Privacy Compliance Checklist
- Risk Management Checklist
- Insurance Compliance Checklist
- Complaint Resolution Checklist
- Financial Audit Checklist
- Data Security Checklist
- Risk Mitigation Checklist
- Claims Auditing Checklist
- Quarterly Industry Standards Compliance Review
- Insurance Training and Development Checklist
- Anti-Money Laundering Checklist
- Training Evaluation Checklist
- Manufacturing Regulatory Compliance Checklist
- Training Needs Assessment Checklist
- Skills Development Checklist
- Audit Preparation Checklist
- Network Security Checklist
- Employee Offboarding Checklist
- IT Asset Inventory Management Checklist
- Regulatory Reporting Checklist
- Compliance Audit Checklist
- Insurance Program Initiation Checklist
- Insurance Program Launch Project Monitoring Checklist
- Training Materials Checklist
- Quarterly Risk Monitoring Checklist
- System Backup Checklist
- Employee Benefits Checklist
- Insurance Program Launch Execution Checklist
- Insurance Marketing Campaign Checklist
- Email Compliance Checklist
- Law Firm Compliance Checklist
- Anti-Money Laundering Compliance Checklist
- Law Firm Compliance Checklist
- Professional Responsibility Compliance Review
- Data Privacy Compliance Checklist
- Law Firm Risk Management Checklist
- HR Audit Checklist
- HR Compliance Checklist
- Email Deliverability Checklist
- Law Firm Ethics Compliance Review
- Document Retention Policy Checklist
- Employee File Audit Checklist
- Law Firm Risk Management Checklist
- Cloud Security Checklist
- User Access Review Checklist
- Compliance Audit Checklist
- Security Audit Checklist
- Business Continuity Checklist
- Employee Termination Checklist
- Quarterly Operations and Compliance QA Review
- Expense Management Checklist
- Advisor and Employee Onboarding Checklist
- Client Satisfaction Survey Checklist
- Operational Risk Checklist
- Know Your Customer (KYC) Checklist
- Litigation Preparation Checklist
- Contract Review Checklist
- New Hire Onboarding Checklist
- Client Onboarding Checklist
- Contract Review Checklist
- Regulatory Compliance Checklist
- Monthly Financial Reporting Checklist
- Regulatory Reporting Checklist
- Intellectual Property Management Checklist
- Internal Audit Checklist
- Lead Generation Checklist
- Annual Financial Reporting Checklist
- Annual Compliance Program Review
- Annual Risk Assessment Checklist
- Data Security Review Checklist
- Quarterly Performance Measurement Checklist
- Financial Services Project Initiation Checklist
- IT Policy Review Checklist
- Data Protection Checklist
- E-commerce Sales Tax Reporting Checklist
- Project Execution Checklist
- Project Planning Checklist
- Project Monitoring Checklist
- Financial Statement Review Checklist
- Quarterly Compliance Monitoring Checklist
- Cybersecurity Risk Assessment Checklist
- Project Closure Checklist
- Financial Services IT Security Audit Checklist
- PCI DSS Compliance Checklist
- Advisor and Staff Onboarding Checklist
- Cybersecurity Incident Response Checklist
- E-commerce Risk Management Checklist
- CRM Data Entry Checklist
- Business Continuity Plan Checklist
- E-commerce Legal Compliance Checklist
- Vendor Contract Review Checklist
- Annual Risk Management Review Checklist
- Risk Assessment Checklist
- Agency Compliance and Risk Management Checklist
- Annual School Compliance Audit
- School First Aid and Emergency Medication Audit
- Motor Carrier TSA Security Compliance Checklist
- Internal Controls Checklist
- Client Communication Checklist
- Restaurant Permit and Licensing Renewal Checklist
- New Hire Paperwork Checklist
- Restaurant Policy Update Checklist
- Restaurant New Hire Checklist
- Annual Attorney Professional Conduct Review
- International Fuel Tax Agreement (IFTA) Quarterly Filing Checklist
- Restaurant Licensing Renewal Checklist
- Marketing Strategy Checklist
- Department of Transportation (DOT) Audit Checklist
- Retail Policy Update and Compliance Checklist
- Employee Data Security Checklist
- Security Review Checklist
- Change Management Checklist
- Security Best Practices Checklist
- Employee Offboarding Checklist
- Disaster Recovery Plan Checklist
- Quarterly Security Review Checklist
- Server Security Checklist
- Compliance Audit Checklist
- Database Security Checklist
Ready to take control of your recurring tasks?
Start Free 14-Day TrialUse Slack? Sign up with one click
