Checklist · Cybersecurity
Cybersecurity Checklist Tools
Checklists for accounts, endpoints, cloud apps, phishing response, and small teams.
Practical outputs
Checklist
Security baseline assessment
Score practical controls, identify gaps, and create a remediation plan for small teams and departments.
Control checklist
Identity
MFA is enforced for critical accounts
Reduces account takeover risk for email, admin, finance, and remote access.
Identity
Admin accounts are separate from daily-use accounts
Limits damage when a normal workstation, browser session, or mailbox is compromised.
Email and Awareness
Phishing reporting path is documented
Fast reporting shortens investigation time and helps warn other users.
Devices
Endpoint updates are monitored
Unsupported or unpatched endpoints create predictable entry points.
Devices
Endpoint protection alerts are reviewed
Security tooling only helps when someone reviews and escalates meaningful alerts.
Resilience
Backups are tested on a schedule
Untested backups often fail when ransomware, deletion, or outage recovery is urgent.
Response
Incident roles and escalation contacts are named
Clear ownership prevents delay during account compromise, data exposure, or outage response.
Third Parties
Vendor access is reviewed
Dormant vendor accounts and shared access paths are common blind spots.
Data Protection
Sensitive data locations are known
Data cannot be protected, retained, or reported properly if nobody knows where it lives.
Baseline snapshot
High-priority baseline gaps
Focus on identity, backups, and incident ownership before expanding scope.
50%
Score
0
Complete
9
Priority gaps
Remediation plan
MFA is enforced for critical accounts
Enable MFA for all privileged and high-risk accounts first, then expand to all users.
Admin accounts are separate from daily-use accounts
Create named admin accounts, remove standing admin rights, and document break-glass access.
Phishing reporting path is documented
Publish a reporting mailbox or button, define triage owner, and add examples to training.
Endpoint updates are monitored
Track update compliance weekly and create an exception process for blocked devices.
Endpoint protection alerts are reviewed
Assign alert review ownership, define severity thresholds, and test one escalation path.
Backups are tested on a schedule
Run a restore test for one critical file set or system and record recovery time.
Incident roles and escalation contacts are named
Name incident lead, communications owner, technical owner, and executive decision owner.
Vendor access is reviewed
List vendors with system access, confirm owners, and remove access no longer needed.
Sensitive data locations are known
Inventory sensitive data stores and map owner, access path, backup, and retention need.
Category scores
Identity
50%
Email and Awareness
50%
Devices
50%
Resilience
50%
Response
50%
Third Parties
50%
Data Protection
50%