Compliance Audit Checklist
Audit Scoping & Kickoff
Lock the framework list before evidence collection starts. SOC 2 Type II, HIPAA, PCI DSS, and CMMC each pull a different evidence set — running an audit against the wrong control catalog burns a week of the engineer's time.
Pull the system inventory from the CMDB or RMM (ConnectWise, NinjaOne, Datto). Flag systems that store PHI, cardholder data, or CUI — those carry stricter evidence requirements. Flat networks that haven't been segmented usually expand PCI scope; note it now rather than at fieldwork.
Send the evidence-request matrix to identity, network, endpoint, and backup owners with deadlines. Most evidence gaps trace back to a control owner who didn't see the request — confirm receipt in writing.
Access Control Review
Pull active users from Entra ID (or Okta / JumpCloud) and reconcile against the HRIS active-employee list. Names that appear in IdP but not HRIS are the orphaned-account finding auditors look for first.
Confirm Conditional Access enforces MFA for all users, including admins, and that legacy basic-auth (IMAP, POP, SMTP, ActiveSync basic) is blocked org-wide. MFA-enabled-but-legacy-allowed is the most common finding that gets a SOC 2 control marked exception.
Send role-based access listings to each system owner for attestation. SOX, SOC 2, and HIPAA all require evidence that managers reviewed and approved each user's access — a signed attestation or ticket close-out is the artifact.
List every Domain Admin, Global Admin, root, and service account. Confirm each has a documented owner, a rotation schedule, and a business justification. "Temporary" service accounts running as Domain Admin for 6 years are the textbook pass-the-hash finding.
Sample 10–15% of terminations and walk the offboarding ticket end to end: Entra ID disabled, sessions revoked, mailbox forwarding cleared, SaaS apps deactivated, device returned. Mailbox-forwarded-to-personal-Gmail is the exfiltration finding auditors flag.
Disable orphaned accounts, force MFA on exceptions, revoke residual mailbox forwarding, and rotate service account credentials. Document each fix in the ticket so the auditor sees remediation trail, not just the original finding.
Data Protection & Backup
Pull BitLocker / FileVault compliance from Intune or JAMF and confirm 100% of in-scope endpoints are encrypted with recovery keys escrowed. For servers, verify volume encryption (BitLocker, LUKS) and that the cloud-stored copies use KMS-managed keys.
Run SSL Labs (or internal equivalent) against every internet-facing service. PCI DSS requires TLS 1.2 minimum; weak ciphers and expired certs are common findings. Confirm ACME automation is renewing certs before the 30-day mark.
Pick a representative system (file server, database, or M365 mailbox) and restore into an isolated environment from Veeam, Datto, or the cloud backup service. "Backups green for 18 months, restore fails" is the canonical finding — the drill is the only evidence backups are actually usable.
Verify the 3-2-1 chain: at least one copy is immutable (object lock, hardened repository, write-once tape) and isolated from production credentials. Backups writable from production are the ransomware-day finding nobody recovers from.
Pull DLP hits from Defender / Purview (or third-party DLP) for the audit period and confirm each was triaged. Verify retention policies actually purge data on schedule — auditors check that deletion happens, not just that policy exists.
Network Security & Vulnerability Management
Export the running config from FortiGate, Palo Alto, or Meraki. Flag any-any rules, expired temporary rules, and rules with no hits in 90 days. Document the business justification or remove.
Tenable, Qualys, or Rapid7 against the in-scope network with credentialed scanning enabled. Unauthenticated scans miss most of what auditors care about. PCI DSS also requires a clean ASV external scan from an approved vendor.
Pull patch compliance from Intune, SCCM, or Automox. Confirm critical CVEs are remediated within the SLA defined in policy (commonly 30 days for criticals). Flag servers excluded from auto-patching with no documented exception.
Test that the cardholder-data VLAN cannot reach corporate user VLANs and vice versa. PCI DSS scope reduction depends on this; segmentation failures pull the entire corporate network back into PCI scope.
Confirm Sentinel, Splunk, or QRadar is ingesting logs from every in-scope source — domain controllers, firewalls, EDR, M365, cloud control plane. Missing log sources show up as control gaps; tuned-out alerts show up as detection failures.
Incident Response Readiness
Walk the IR plan against reality: PagerDuty rotation, on-call escalation, MDR vendor contact, cyber insurance hotline, legal counsel. Plans referencing tools the team replaced two years ago are a common SOC 2 finding.
Pick a scenario likely for this org — ransomware on a file server, BEC on a finance lead, or vendor-supply-chain compromise. Document who said what, where the playbook broke down, and the action items. SOC 2 expects an exercise per audit period.
Pull every P1/P2 ticket from ServiceNow, Jira Service Management, or the PSA. Confirm root cause, containment time, and post-incident review for each. Auditors trace incidents end-to-end; missing post-mortems are a soft finding that hardens fast.
HIPAA gives 60 days, GDPR 72 hours, several state laws faster. Confirm the IR plan names the timeline applicable to this org's data, the legal owner of the call, and the customer-notification template.
Policy & Awareness
Each policy — acceptable use, access control, change management, incident response, BCP/DR, vendor management — needs a review date within the last 12 months and an approver of record. Policies dated 2019 are an automatic finding.
Pull KnowBe4 / Hoxhunt / Proofpoint completion reports. Confirm 100% completion for in-scope staff and that repeat phishing-simulation clickers had remediation training. Auditors sample names from the HR roster against the training report.
For each in-scope vendor (M365, AWS, backup, MDR, PSA), confirm a current SOC 2 Type II or equivalent attestation is on file. Healthcare clients also need BAAs; PCI clients need an AOC. Missing reports are the easiest control gap to close before fieldwork.
Findings & Sign-Off
One row per finding: control reference, severity, owner, target remediation date, evidence link. Auditors expect this register at fieldwork — having it ready signals a mature control environment.
If critical or high findings cannot be remediated before the assessor arrives, escalate now. A documented compensating control with an executive sign-off lands far better than a finding discovered during fieldwork.
Brief the CIO / CISO and the audit committee on residual risk, compensating controls, and target remediation dates. Capture written acknowledgement so the finding has documented executive ownership.
Final review: evidence pack assembled, findings register complete, remediation tickets linked. The IT/Security lead signs to release the package to the external assessor.
Use this template in Manifestly
- Cloud Migration Checklist
- Cloud Security Checklist
- User Access Review Checklist
- Data Recovery Checklist
- Containerization Rollout Checklist
- Database Backup Checklist
- Password Management Checklist
- Backup and Restore Checklist
- Network Upgrade Checklist
- Server Backup Checklist
- Business Continuity Plan Checklist
- Problem Management Checklist
- Server Decommissioning Checklist
- Cloud Monitoring Checklist
- Hardware Inventory Checklist
- IT Regulatory Compliance Review
- Release Management Checklist
- Server Maintenance Checklist
- Rollback Plan Checklist
- Customer Support Ticket Workflow
- Software Upgrade Checklist
- Quarterly Compliance Reporting Checklist
- Patch Management Checklist
- Hardware Maintenance Checklist
- Server Security Checklist
- IT Emergency Response Checklist
- Incident Management Checklist
- Disaster Recovery Plan Checklist
- User Role Management Checklist
- Software Installation Checklist
- Access Control Checklist
- Cloud Cost Management Checklist
- IT Staff Performance Review
- Change Management Checklist
- Firewall Configuration Checklist
- Security Audit Checklist
- Quarterly Network Security Review
- Database Migration Checklist
- Employee Onboarding Checklist
- Capacity Planning Checklist
- IT Budgeting Checklist
- Network Monitoring Checklist
- Cloud Deployment Checklist
- Database Installation Checklist
- IT Service Request Checklist
- Database Security Checklist
- System Monitoring Checklist
- Hardware Troubleshooting Checklist
- IT Strategy Checklist
- Patch Deployment Checklist
- Hardware Upgrade Checklist
- Performance Tuning Checklist
- Application Performance Monitoring Checklist
- Employee Training Checklist
- User Onboarding Checklist
- IT Vendor Management Checklist
- Server Build and Hardening Checklist
- IT Policy Review Checklist
- Help Desk Ticket Handling Checklist
- Infrastructure as Code Checklist
- Hardware Disposal Checklist
- IT Resource Allocation Checklist
- Incident Response Checklist
- Network Troubleshooting Checklist
- User Offboarding Checklist
- Risk Management Checklist
- Regulatory Compliance Checklist
- Quarterly Internal Control Review Checklist
- Sales Tax Reporting Checklist
- Legal Entity Management Checklist
- Employee File Audit Checklist
- Anti-Money Laundering Compliance Checklist
- SOX Compliance Checklist
- GDPR Compliance Review Checklist
- IT Security Audit Checklist
- HR Compliance Checklist
- Payroll Processing Checklist
- Building Code Compliance Checklist
- Employee Records Management Checklist
- Legal Document Storage Checklist
- Security Audit Checklist
- Property Risk Assessment Checklist
- Property Safety Inspection Checklist
- Cybersecurity Protocol Checklist
- Fair Housing Compliance Checklist
- Legal Compliance Checklist for New Properties
- Lease Agreement Checklist
- Software Licensing Compliance Checklist
- PCI DSS Compliance Checklist
- Real Estate Legal Compliance Checklist
- HIPAA Compliance Checklist
- MLS Listing Review Checklist
- Real Estate License Renewal Checklist
- GDPR Compliance Checklist
- Real Estate Contract Review Checklist
- Fair Housing Compliance Audit
- Listing Agreement Intake Checklist
- ISO/IEC 27001 Compliance Checklist
- HR Compliance Checklist
- Real Estate Ethics & Compliance Review
- Brokerage Trust Account Management Checklist
- Real Estate Professional Development Checklist
- Brokerage Technology Inventory Audit
- Real Estate Website Audit Checklist
- Continuing Education Checklist
- Employee Termination Checklist
- Employee Records File Audit
- Regulatory Compliance Checklist
- Brokerage HR Policy Compliance Checklist
- Employee Handbook Annual Review
- Employee Termination Checklist
- Data Privacy Compliance Checklist
- Risk Management Checklist
- Insurance Compliance Checklist
- Complaint Resolution Checklist
- Financial Audit Checklist
- Data Security Checklist
- Risk Mitigation Checklist
- Claims Auditing Checklist
- Quarterly Industry Standards Compliance Review
- Insurance Training and Development Checklist
- Anti-Money Laundering Checklist
- Training Evaluation Checklist
- Manufacturing Regulatory Compliance Checklist
- Training Needs Assessment Checklist
- Skills Development Checklist
- Audit Preparation Checklist
- Network Security Checklist
- Employee Offboarding Checklist
- IT Asset Inventory Management Checklist
- Regulatory Reporting Checklist
- Compliance Audit Checklist
- Insurance Program Initiation Checklist
- Insurance Program Launch Project Monitoring Checklist
- Training Materials Checklist
- Quarterly Risk Monitoring Checklist
- System Backup Checklist
- Employee Benefits Checklist
- Insurance Program Launch Execution Checklist
- Insurance Marketing Campaign Checklist
- Email Compliance Checklist
- Law Firm Compliance Checklist
- Anti-Money Laundering Compliance Checklist
- Law Firm Compliance Checklist
- Professional Responsibility Compliance Review
- Data Privacy Compliance Checklist
- Law Firm Risk Management Checklist
- HR Audit Checklist
- HR Compliance Checklist
- Email Deliverability Checklist
- Law Firm Ethics Compliance Review
- Document Retention Policy Checklist
- Employee File Audit Checklist
- Law Firm Risk Management Checklist
- Cloud Security Checklist
- User Access Review Checklist
- IT Regulatory Compliance Review
- Security Audit Checklist
- Business Continuity Checklist
- Employee Termination Checklist
- Quarterly Operations and Compliance QA Review
- Expense Management Checklist
- Advisor and Employee Onboarding Checklist
- Client Satisfaction Survey Checklist
- Operational Risk Checklist
- Know Your Customer (KYC) Checklist
- Litigation Preparation Checklist
- Contract Review Checklist
- New Hire Onboarding Checklist
- Client Onboarding Checklist
- Contract Review Checklist
- Regulatory Compliance Checklist
- Monthly Financial Reporting Checklist
- Regulatory Reporting Checklist
- Intellectual Property Management Checklist
- Internal Audit Checklist
- Lead Generation Checklist
- Annual Financial Reporting Checklist
- Annual Compliance Program Review
- Annual Risk Assessment Checklist
- Data Security Review Checklist
- Quarterly Performance Measurement Checklist
- Financial Services Project Initiation Checklist
- IT Policy Review Checklist
- Data Protection Checklist
- E-commerce Sales Tax Reporting Checklist
- Project Execution Checklist
- Project Planning Checklist
- Project Monitoring Checklist
- Financial Statement Review Checklist
- Quarterly Compliance Monitoring Checklist
- Cybersecurity Risk Assessment Checklist
- Project Closure Checklist
- Financial Services IT Security Audit Checklist
- PCI DSS Compliance Checklist
- Advisor and Staff Onboarding Checklist
- Cybersecurity Incident Response Checklist
- E-commerce Risk Management Checklist
- CRM Data Entry Checklist
- Business Continuity Plan Checklist
- E-commerce Legal Compliance Checklist
- Vendor Contract Review Checklist
- Annual Risk Management Review Checklist
- Risk Assessment Checklist
- Agency Compliance and Risk Management Checklist
- Annual School Compliance Audit
- School First Aid and Emergency Medication Audit
- Motor Carrier TSA Security Compliance Checklist
- Internal Controls Checklist
- Client Communication Checklist
- Restaurant Permit and Licensing Renewal Checklist
- New Hire Paperwork Checklist
- Restaurant Policy Update Checklist
- Restaurant New Hire Checklist
- Annual Attorney Professional Conduct Review
- International Fuel Tax Agreement (IFTA) Quarterly Filing Checklist
- Restaurant Licensing Renewal Checklist
- Marketing Strategy Checklist
- Department of Transportation (DOT) Audit Checklist
- Retail Policy Update and Compliance Checklist
- Employee Data Security Checklist
- Security Review Checklist
- Change Management Checklist
- Security Best Practices Checklist
- Employee Offboarding Checklist
- Disaster Recovery Plan Checklist
- Quarterly Security Review Checklist
- IT Regulatory Compliance Review
- Server Security Checklist
- Database Security Checklist
Ready to take control of your recurring tasks?
Start Free 14-Day TrialUse Slack? Sign up with one click
