Cloud Security Checklist
Identity and Access Management
Pull the Entra ID / Okta MFA registration report and reconcile against the HR active-employee list. Flag any account without phishing-resistant MFA (FIDO2, Windows Hello for Business, or number-matching Authenticator); SMS and voice should be retired. Confirm break-glass accounts are excluded but stored in a sealed vault with monitoring on use.
Confirm Conditional Access policies block IMAP, POP, SMTP AUTH, and other basic-auth endpoints org-wide. Attackers password-spray these endpoints to bypass MFA entirely — the most common cloud account compromise pattern. Review the Sign-in logs filtered to legacy auth for the last 30 days before flipping the block.
Export all Global Admin, Privileged Role Admin, AWS root, and GCP Organization Admin assignments. Every standing assignment must justify itself; convert to PIM / just-in-time elevation where possible. Flag any service account holding tenant-level admin.
Verify Okta / Entra ID SCIM connectors to downstream SaaS apps are syncing without errors. Broken SCIM is the most common reason offboarded users retain access to Salesforce, GitHub, or Slack 90 days after departure.
Disable any account inactive 60+ days. Cross-reference against HR's terminations list to catch accounts the offboarding workflow missed. Document each disable in the ticketing system for the audit trail.
Data Protection and Encryption
Run AWS Config, Azure Policy, or GCP Security Command Center to confirm S3, EBS, RDS, Azure Storage, and Cloud Storage buckets are encrypted with customer-managed keys (CMK) where required. Default service-managed keys are acceptable for non-regulated workloads; PHI, PCI cardholder data, and CUI require CMK with rotation.
Scan public load balancers and API gateways with SSL Labs or testssl.sh. TLS 1.0/1.1 must be disabled; weak ciphers (RC4, 3DES, CBC modes) removed. Confirm certificates are managed via ACM / Key Vault with auto-renewal — expired certs erode security culture when users are trained to bypass warnings.
Backup-success-green for 18 months means nothing if restore fails. Pick one production database and one file share, restore into a sandbox account, validate row counts and file integrity. Confirm immutable copy (S3 Object Lock, Azure immutable blob) survives a simulated ransomware scenario.
Open a P1 ticket capturing root cause, scope of affected workloads, interim mitigation, and a target fix date. Loop in the backup vendor's TAM and the workload owner. Restore must be re-tested before this checklist run can close.
Review Microsoft Purview / Google DLP / AWS Macie rules covering PII, PHI, and PCI patterns. Test with a synthetic credit-card number in a OneDrive doc — if the alert doesn't fire, the policy isn't deployed where you think it is.
Network and Perimeter Security
Run AWS Config rule restricted-ssh, Azure Network Watcher, or Prisma Cloud query for any security group / NSG allowing 22, 3389, 1433, 3306, or 5432 from the public internet. Document business justification for each finding or close the rule.
Confirm production, non-production, and shared-services VPCs are isolated by Transit Gateway / Virtual WAN policy, not flat-peered. PCI workloads must sit in a dedicated VPC with explicit egress controls.
Apply pending firmware to FortiGate, Palo Alto, Meraki, and any cloud-deployed NVAs. Cloud-managed services (App Gateway, ALB, Cloud Armor) usually auto-patch but verify the maintenance schedule. Coordinate any reboot through the change advisory board.
Pull AWS WAF / Azure Front Door / Cloudflare WAF metrics for the last quarter. Tune rules generating high false-positive volume; confirm OWASP Top 10 managed rule sets are in block mode (not count) for production.
GuardDuty, Defender for Cloud, and Chronicle findings should route to Sentinel / Splunk / QRadar with severity-based triage. Review last quarter's noisiest detection and either tune or suppress with documented rationale.
Logging, Monitoring, and Incident Response
Confirm CloudTrail (all regions, management + data events for sensitive S3 buckets), Azure Activity Log + diagnostic settings, and GCP Cloud Audit Logs are flowing to the SIEM with at least 12 months retention. Gaps in audit logs are the first thing a forensics investigator asks about and the most common SOC 2 finding.
Pick a realistic scenario — exposed access key on GitHub, compromised admin via session-token theft, ransomware in a backup account. Walk the IR team through detection, containment, eradication, and customer notification. Capture lessons learned in the IR plan.
Each gap gets a ticket in Jira / ServiceNow with a named owner, target date, and link to the tabletop after-action report. Critical gaps require CISO sign-off on the remediation plan before this checklist closes.
Validate PagerDuty / Opsgenie schedules for the security on-call. Page a test alert end-to-end. Confirm the legal and PR escalation contacts are current — most IR plans go stale when org charts change.
Compliance and Governance Review
Update the control mapping for SOC 2, HIPAA, PCI DSS, or CMMC as applicable. AWS Audit Manager, Azure Compliance Manager, and Vanta / Drata can pre-populate evidence. Note any control marked 'not applicable' with the scoping rationale.
Pull current findings from Wiz, Prisma Cloud, Defender for Cloud, or Security Command Center. Triage criticals to a 7-day SLA, highs to 30 days. Track exception requests with documented compensating controls.
Pull license reports from M365 admin center, AWS Cost Explorer, and SaaS management (Torii, Zylo). Flag unlicensed VMs and unused per-user licenses. Vendor true-ups (Microsoft, Oracle, VMware) become six-figure surprises when this slips.
The IT director or CISO reviews the completed checklist, outstanding remediation tickets, and CSPM trend. Sign-off goes to the audit folder for SOC 2 / ISO evidence.
Use this template in Manifestly
- Cloud Migration Checklist
- User Access Review Checklist
- Data Recovery Checklist
- Containerization Rollout Checklist
- Database Backup Checklist
- Password Management Checklist
- Backup and Restore Checklist
- Network Upgrade Checklist
- Server Backup Checklist
- Business Continuity Plan Checklist
- Problem Management Checklist
- Server Decommissioning Checklist
- Cloud Monitoring Checklist
- Hardware Inventory Checklist
- IT Regulatory Compliance Review
- Release Management Checklist
- Server Maintenance Checklist
- Rollback Plan Checklist
- Customer Support Ticket Workflow
- Software Upgrade Checklist
- Quarterly Compliance Reporting Checklist
- Patch Management Checklist
- Hardware Maintenance Checklist
- Server Security Checklist
- IT Emergency Response Checklist
- Incident Management Checklist
- Disaster Recovery Plan Checklist
- User Role Management Checklist
- Software Installation Checklist
- Compliance Audit Checklist
- Access Control Checklist
- Cloud Cost Management Checklist
- IT Staff Performance Review
- Change Management Checklist
- Firewall Configuration Checklist
- Security Audit Checklist
- Quarterly Network Security Review
- Database Migration Checklist
- Employee Onboarding Checklist
- Capacity Planning Checklist
- IT Budgeting Checklist
- Network Monitoring Checklist
- Cloud Deployment Checklist
- Database Installation Checklist
- IT Service Request Checklist
- Database Security Checklist
- System Monitoring Checklist
- Hardware Troubleshooting Checklist
- IT Strategy Checklist
- Patch Deployment Checklist
- Hardware Upgrade Checklist
- Performance Tuning Checklist
- Application Performance Monitoring Checklist
- Employee Training Checklist
- User Onboarding Checklist
- IT Vendor Management Checklist
- Server Build and Hardening Checklist
- IT Policy Review Checklist
- Help Desk Ticket Handling Checklist
- Infrastructure as Code Checklist
- Hardware Disposal Checklist
- IT Resource Allocation Checklist
- Incident Response Checklist
- Network Troubleshooting Checklist
- User Offboarding Checklist
- Risk Management Checklist
- Regulatory Compliance Checklist
- Quarterly Internal Control Review Checklist
- Sales Tax Reporting Checklist
- Legal Entity Management Checklist
- Employee File Audit Checklist
- Anti-Money Laundering Compliance Checklist
- SOX Compliance Checklist
- GDPR Compliance Review Checklist
- IT Security Audit Checklist
- HR Compliance Checklist
- Payroll Processing Checklist
- Building Code Compliance Checklist
- Employee Records Management Checklist
- Legal Document Storage Checklist
- Security Audit Checklist
- Property Risk Assessment Checklist
- Property Safety Inspection Checklist
- Cybersecurity Protocol Checklist
- Fair Housing Compliance Checklist
- Legal Compliance Checklist for New Properties
- Lease Agreement Checklist
- Software Licensing Compliance Checklist
- PCI DSS Compliance Checklist
- Real Estate Legal Compliance Checklist
- HIPAA Compliance Checklist
- MLS Listing Review Checklist
- Real Estate License Renewal Checklist
- GDPR Compliance Checklist
- Real Estate Contract Review Checklist
- Fair Housing Compliance Audit
- Listing Agreement Intake Checklist
- ISO/IEC 27001 Compliance Checklist
- HR Compliance Checklist
- Real Estate Ethics & Compliance Review
- Brokerage Trust Account Management Checklist
- Real Estate Professional Development Checklist
- Brokerage Technology Inventory Audit
- Real Estate Website Audit Checklist
- Continuing Education Checklist
- Employee Termination Checklist
- Employee Records File Audit
- Regulatory Compliance Checklist
- Brokerage HR Policy Compliance Checklist
- Employee Handbook Annual Review
- Employee Termination Checklist
- Data Privacy Compliance Checklist
- Risk Management Checklist
- Insurance Compliance Checklist
- Complaint Resolution Checklist
- Financial Audit Checklist
- Data Security Checklist
- Risk Mitigation Checklist
- Claims Auditing Checklist
- Quarterly Industry Standards Compliance Review
- Insurance Training and Development Checklist
- Anti-Money Laundering Checklist
- Training Evaluation Checklist
- Manufacturing Regulatory Compliance Checklist
- Training Needs Assessment Checklist
- Skills Development Checklist
- Audit Preparation Checklist
- Network Security Checklist
- Employee Offboarding Checklist
- IT Asset Inventory Management Checklist
- Regulatory Reporting Checklist
- Compliance Audit Checklist
- Insurance Program Initiation Checklist
- Insurance Program Launch Project Monitoring Checklist
- Training Materials Checklist
- Quarterly Risk Monitoring Checklist
- System Backup Checklist
- Employee Benefits Checklist
- Insurance Program Launch Execution Checklist
- Insurance Marketing Campaign Checklist
- Email Compliance Checklist
- Law Firm Compliance Checklist
- Anti-Money Laundering Compliance Checklist
- Law Firm Compliance Checklist
- Professional Responsibility Compliance Review
- Data Privacy Compliance Checklist
- Law Firm Risk Management Checklist
- HR Audit Checklist
- HR Compliance Checklist
- Email Deliverability Checklist
- Law Firm Ethics Compliance Review
- Document Retention Policy Checklist
- Employee File Audit Checklist
- Law Firm Risk Management Checklist
- User Access Review Checklist
- IT Regulatory Compliance Review
- Compliance Audit Checklist
- Security Audit Checklist
- Business Continuity Checklist
- Employee Termination Checklist
- Quarterly Operations and Compliance QA Review
- Expense Management Checklist
- Advisor and Employee Onboarding Checklist
- Client Satisfaction Survey Checklist
- Operational Risk Checklist
- Know Your Customer (KYC) Checklist
- Litigation Preparation Checklist
- Contract Review Checklist
- New Hire Onboarding Checklist
- Client Onboarding Checklist
- Contract Review Checklist
- Regulatory Compliance Checklist
- Monthly Financial Reporting Checklist
- Regulatory Reporting Checklist
- Intellectual Property Management Checklist
- Internal Audit Checklist
- Lead Generation Checklist
- Annual Financial Reporting Checklist
- Annual Compliance Program Review
- Annual Risk Assessment Checklist
- Data Security Review Checklist
- Quarterly Performance Measurement Checklist
- Financial Services Project Initiation Checklist
- IT Policy Review Checklist
- Data Protection Checklist
- E-commerce Sales Tax Reporting Checklist
- Project Execution Checklist
- Project Planning Checklist
- Project Monitoring Checklist
- Financial Statement Review Checklist
- Quarterly Compliance Monitoring Checklist
- Cybersecurity Risk Assessment Checklist
- Project Closure Checklist
- Financial Services IT Security Audit Checklist
- PCI DSS Compliance Checklist
- Advisor and Staff Onboarding Checklist
- Cybersecurity Incident Response Checklist
- E-commerce Risk Management Checklist
- CRM Data Entry Checklist
- Business Continuity Plan Checklist
- E-commerce Legal Compliance Checklist
- Vendor Contract Review Checklist
- Annual Risk Management Review Checklist
- Risk Assessment Checklist
- Agency Compliance and Risk Management Checklist
- Annual School Compliance Audit
- School First Aid and Emergency Medication Audit
- Motor Carrier TSA Security Compliance Checklist
- Internal Controls Checklist
- Client Communication Checklist
- Restaurant Permit and Licensing Renewal Checklist
- New Hire Paperwork Checklist
- Restaurant Policy Update Checklist
- Restaurant New Hire Checklist
- Annual Attorney Professional Conduct Review
- International Fuel Tax Agreement (IFTA) Quarterly Filing Checklist
- Restaurant Licensing Renewal Checklist
- Marketing Strategy Checklist
- Department of Transportation (DOT) Audit Checklist
- Retail Policy Update and Compliance Checklist
Ready to take control of your recurring tasks?
Start Free 14-Day TrialUse Slack? Sign up with one click
