IT Policy Review Checklist
Data Security
Walk the Public / Internal / Confidential / Restricted tiers with the data owners. Update the handling matrix where systems have changed since last review — new SaaS apps, new client data inflows, new repositories. Tag the M365 / Google Workspace sensitivity labels to match.
Confirm BitLocker on every Windows endpoint and FileVault on every Mac, with recovery keys archived in Entra ID / JAMF. Validate TLS 1.2+ on all internal services and database TDE where required. Common gap: legacy SQL servers still negotiating TLS 1.0 — pull the cipher report from your vuln scanner.
Confirm three copies, two media, one offsite — with at least one immutable copy (object lock, write-once tape, or separate cloud account credentials). Backup writable from production is not ransomware-resilient. Pull the Veeam / Datto / Rubrik success report and reconcile against the in-scope system list.
Restore one production-tier system into an isolated network and confirm the application boots, authenticates, and serves data. Backup success metrics go green for years while the actual restore fails on a rotated credential or a vendor format change. Document RTO actual versus RTO target.
Pull the Entra ID / Okta MFA enrollment report and chase any user without a phishing-resistant factor. Confirm conditional access blocks legacy basic-auth (IMAP, POP, SMTP AUTH) — leaving these open is the most common way attackers bypass MFA entirely. Check that service accounts and break-glass accounts are exempted correctly, not accidentally.
Access Control
Compare the role-to-group mapping against the current org chart. Watch for the classic AD bloat pattern — Domain Users granted file-share access for one project five years ago and never removed. Reconcile Tier 0 / Tier 1 / Tier 2 admin separation; helpdesk techs should not hold Domain Admin.
For each SaaS in the SSO catalog, confirm SCIM deprovisioning fires on HR termination — not just license revocation. Test with a sample disabled account: mailbox forwarding rules removed, OneDrive ownership transferred, GitHub org membership revoked. Apps without SCIM go on a manual offboarding list owned by name.
Send each system owner the user-access export and require sign-off in writing. Flag accounts that haven't logged in for 90+ days, service accounts older than the rotation policy, and any access not aligned with current role. SOC 2 and SOX ITGC both expect a documented review with evidence — not a verbal confirmation.
Disable (do not delete) flagged accounts and capture before/after screenshots from the IdP. For service accounts, coordinate rotation with the owning team so dependent jobs don't break — a six-year-old service account may have undocumented consumers.
Confirm legacy full-tunnel VPN access is restricted or replaced by per-app ZTNA. Review CyberArk / BeyondTrust / Delinea session recordings for the privileged sessions sample. Confirm just-in-time elevation is in use for Domain Admin — standing privilege is the pass-the-hash entry point.
Incident Response
Refresh the IR plan against the current tech stack and named contacts. Update the EDR vendor (CrowdStrike / SentinelOne / Defender), the SIEM, the cyber-insurance carrier hotline, and outside counsel. A plan with last year's contacts is worse than no plan during a real Sev 1.
Walk the named Incident Commander, Communications Lead, Forensics Lead, and Legal Liaison roles. Verify PagerDuty / Opsgenie schedules cover after-hours and holidays without a single point of failure. Each role names a primary and a backup.
Use a realistic scenario — ransomware on the file server, BEC on the CFO's mailbox, or a public-facing CVE exploit. Time the response and identify decision-points where the plan was unclear. Capture the after-action notes; SOC 2 auditors expect annual evidence.
For each gap surfaced in the tabletop, assign a named owner and target date. Schedule role-specific training (forensics handoff, evidence preservation, comms templates) within 30 days. Re-run the affected scenario at the next quarterly drill.
Review the high-volume / low-signal alerts and suppress or tune them. Confirm Sev 1 detection (impossible travel, mass mailbox download, EDR isolation event) routes to PagerDuty and pages the on-call within minutes. Quiet noisy alerts before fatigue masks the real one.
Confirm the IR log template captures timestamps, decisions, evidence chain-of-custody, and external notifications. Cyber insurance and counsel will both ask for this in the 24 hours after an incident; reconstructing it from chat scrollback is not acceptable evidence.
Compliance and Legal
Confirm the framework that drives this cycle's evidence — most orgs have one anchor (SOC 2 Type II for B2B SaaS, HIPAA for healthcare clients, PCI DSS for cardholder data, CMMC for DIB). Note any secondary frameworks in the additional notes; controls usually overlap and can be evidenced once.
Confirm the audit period (typically 6–12 months) with the assessor and align the evidence-collection cadence in Vanta / Drata / Secureframe. Lock the kickoff date and the readiness-review date; common slip is starting evidence collection a month before the period closes.
Map notification clocks for each in-scope regime: HIPAA 60 days to affected individuals, GDPR 72 hours to supervisory authority, state laws (CCPA, CTDPA, etc.) layered on top. For MSPs, list the per-client BAA / MSA notification windows — they often differ from the regulatory floor.
Send the updated acceptable use, access control, and incident response policies through outside counsel or in-house legal. Capture sign-off in writing — a signature on the policy version is the audit artifact, not a Slack thumbs-up.
Push this cycle's artifacts — access review attestations, restore drill log, tabletop after-action, policy sign-offs — into the GRC platform with the period tag. Auditors will ask for the raw evidence with timestamps; rebuilding it post-hoc is the most expensive part of audit prep.
Software and Hardware Management
Reconcile the NinjaOne / Datto RMM / ConnectWise Automate inventory against HR headcount and the procurement ledger. Flag agents that haven't checked in for 30+ days and devices missing encryption posture. Asset sprawl is the foundation under most license true-up surprises.
Verify Test → Pilot → Production rings on a 7–14 day cadence in Intune / SCCM / Automox. Auto-applying Patch Tuesday to production without a test ring is how a single KB takes down the app servers Monday morning. Confirm the change-window and rollback plan are documented per ring.
Walk the SaaS request workflow with finance — every new tool routes through IT for security review and license assignment. Shadow-IT subscriptions paid on personal cards are the most common gap. Confirm the procurement intake form references the data-classification matrix.
Review devices nearing end-of-warranty and end-of-support. For disposal, confirm BitLocker / FileVault wipe with a certificate of destruction from the e-waste vendor; a re-image without confirmed key destruction is not adequate for regulated data.
Reconcile Microsoft, Adobe, VMware, and Oracle deployments against entitlements before a vendor audit forces the conversation. VMware per-core licensing changes and Microsoft 365 license-tier creep produce six-figure surprises. Pull the SAM report and flag overages with a remediation date.
Use this template in Manifestly
- Cloud Migration Checklist
- Cloud Security Checklist
- User Access Review Checklist
- Data Recovery Checklist
- Containerization Rollout Checklist
- Database Backup Checklist
- Password Management Checklist
- Backup and Restore Checklist
- Network Upgrade Checklist
- Server Backup Checklist
- Business Continuity Plan Checklist
- Problem Management Checklist
- Server Decommissioning Checklist
- Cloud Monitoring Checklist
- Hardware Inventory Checklist
- IT Regulatory Compliance Review
- Release Management Checklist
- Server Maintenance Checklist
- Rollback Plan Checklist
- Customer Support Ticket Workflow
- Software Upgrade Checklist
- Quarterly Compliance Reporting Checklist
- Patch Management Checklist
- Hardware Maintenance Checklist
- Server Security Checklist
- IT Emergency Response Checklist
- Incident Management Checklist
- Disaster Recovery Plan Checklist
- User Role Management Checklist
- Software Installation Checklist
- Compliance Audit Checklist
- Access Control Checklist
- Cloud Cost Management Checklist
- IT Staff Performance Review
- Change Management Checklist
- Firewall Configuration Checklist
- Security Audit Checklist
- Quarterly Network Security Review
- Database Migration Checklist
- Employee Onboarding Checklist
- Capacity Planning Checklist
- IT Budgeting Checklist
- Network Monitoring Checklist
- Cloud Deployment Checklist
- Database Installation Checklist
- IT Service Request Checklist
- Database Security Checklist
- System Monitoring Checklist
- Hardware Troubleshooting Checklist
- IT Strategy Checklist
- Patch Deployment Checklist
- Hardware Upgrade Checklist
- Performance Tuning Checklist
- Application Performance Monitoring Checklist
- Employee Training Checklist
- User Onboarding Checklist
- IT Vendor Management Checklist
- Server Build and Hardening Checklist
- Help Desk Ticket Handling Checklist
- Infrastructure as Code Checklist
- Hardware Disposal Checklist
- IT Resource Allocation Checklist
- Incident Response Checklist
- Network Troubleshooting Checklist
- User Offboarding Checklist
- Risk Management Checklist
- Regulatory Compliance Checklist
- Quarterly Internal Control Review Checklist
- Sales Tax Reporting Checklist
- Legal Entity Management Checklist
- Employee File Audit Checklist
- Anti-Money Laundering Compliance Checklist
- SOX Compliance Checklist
- GDPR Compliance Review Checklist
- IT Security Audit Checklist
- HR Compliance Checklist
- Payroll Processing Checklist
- Building Code Compliance Checklist
- Employee Records Management Checklist
- Legal Document Storage Checklist
- Security Audit Checklist
- Property Risk Assessment Checklist
- Property Safety Inspection Checklist
- Cybersecurity Protocol Checklist
- Fair Housing Compliance Checklist
- Legal Compliance Checklist for New Properties
- Lease Agreement Checklist
- Software Licensing Compliance Checklist
- PCI DSS Compliance Checklist
- Real Estate Legal Compliance Checklist
- HIPAA Compliance Checklist
- MLS Listing Review Checklist
- Real Estate License Renewal Checklist
- GDPR Compliance Checklist
- Real Estate Contract Review Checklist
- Fair Housing Compliance Audit
- Listing Agreement Intake Checklist
- ISO/IEC 27001 Compliance Checklist
- HR Compliance Checklist
- Real Estate Ethics & Compliance Review
- Brokerage Trust Account Management Checklist
- Real Estate Professional Development Checklist
- Brokerage Technology Inventory Audit
- Real Estate Website Audit Checklist
- Continuing Education Checklist
- Employee Termination Checklist
- Employee Records File Audit
- Regulatory Compliance Checklist
- Brokerage HR Policy Compliance Checklist
- Employee Handbook Annual Review
- Employee Termination Checklist
- Data Privacy Compliance Checklist
- Risk Management Checklist
- Insurance Compliance Checklist
- Complaint Resolution Checklist
- Financial Audit Checklist
- Data Security Checklist
- Risk Mitigation Checklist
- Claims Auditing Checklist
- Quarterly Industry Standards Compliance Review
- Insurance Training and Development Checklist
- Anti-Money Laundering Checklist
- Training Evaluation Checklist
- Manufacturing Regulatory Compliance Checklist
- Training Needs Assessment Checklist
- Skills Development Checklist
- Audit Preparation Checklist
- Network Security Checklist
- Employee Offboarding Checklist
- IT Asset Inventory Management Checklist
- Regulatory Reporting Checklist
- Compliance Audit Checklist
- Insurance Program Initiation Checklist
- Insurance Program Launch Project Monitoring Checklist
- Training Materials Checklist
- Quarterly Risk Monitoring Checklist
- System Backup Checklist
- Employee Benefits Checklist
- Insurance Program Launch Execution Checklist
- Insurance Marketing Campaign Checklist
- Email Compliance Checklist
- Law Firm Compliance Checklist
- Anti-Money Laundering Compliance Checklist
- Law Firm Compliance Checklist
- Professional Responsibility Compliance Review
- Data Privacy Compliance Checklist
- Law Firm Risk Management Checklist
- HR Audit Checklist
- HR Compliance Checklist
- Email Deliverability Checklist
- Law Firm Ethics Compliance Review
- Document Retention Policy Checklist
- Employee File Audit Checklist
- Law Firm Risk Management Checklist
- Cloud Security Checklist
- User Access Review Checklist
- IT Regulatory Compliance Review
- Compliance Audit Checklist
- Security Audit Checklist
- Business Continuity Checklist
- Employee Termination Checklist
- Quarterly Operations and Compliance QA Review
- Expense Management Checklist
- Advisor and Employee Onboarding Checklist
- Client Satisfaction Survey Checklist
- Operational Risk Checklist
- Know Your Customer (KYC) Checklist
- Litigation Preparation Checklist
- Contract Review Checklist
- New Hire Onboarding Checklist
- Client Onboarding Checklist
- Contract Review Checklist
- Regulatory Compliance Checklist
- Monthly Financial Reporting Checklist
- Regulatory Reporting Checklist
- Intellectual Property Management Checklist
- Internal Audit Checklist
- Lead Generation Checklist
- Annual Financial Reporting Checklist
- Annual Compliance Program Review
- Annual Risk Assessment Checklist
- Data Security Review Checklist
- Quarterly Performance Measurement Checklist
- Financial Services Project Initiation Checklist
- Data Protection Checklist
- E-commerce Sales Tax Reporting Checklist
- Project Execution Checklist
- Project Planning Checklist
- Project Monitoring Checklist
- Financial Statement Review Checklist
- Quarterly Compliance Monitoring Checklist
- Cybersecurity Risk Assessment Checklist
- Project Closure Checklist
- Financial Services IT Security Audit Checklist
- PCI DSS Compliance Checklist
- Advisor and Staff Onboarding Checklist
- Cybersecurity Incident Response Checklist
- E-commerce Risk Management Checklist
- CRM Data Entry Checklist
- Business Continuity Plan Checklist
- E-commerce Legal Compliance Checklist
- Vendor Contract Review Checklist
- Annual Risk Management Review Checklist
- Risk Assessment Checklist
- Agency Compliance and Risk Management Checklist
- Annual School Compliance Audit
- School First Aid and Emergency Medication Audit
- Motor Carrier TSA Security Compliance Checklist
- Internal Controls Checklist
- Client Communication Checklist
- Restaurant Permit and Licensing Renewal Checklist
- New Hire Paperwork Checklist
- Restaurant Policy Update Checklist
- Restaurant New Hire Checklist
- Annual Attorney Professional Conduct Review
- International Fuel Tax Agreement (IFTA) Quarterly Filing Checklist
- Restaurant Licensing Renewal Checklist
- Marketing Strategy Checklist
- Department of Transportation (DOT) Audit Checklist
- Retail Policy Update and Compliance Checklist
Ready to take control of your recurring tasks?
Start Free 14-Day TrialUse Slack? Sign up with one click
