Checklist · Cybersecurity

Cybersecurity Checklist Tools

Checklists for accounts, endpoints, cloud apps, phishing response, and small teams.

Practical outputs

Checklist

Security baseline assessment

Score practical controls, identify gaps, and create a remediation plan for small teams and departments.

Control checklist

Identity

MFA is enforced for critical accounts

Reduces account takeover risk for email, admin, finance, and remote access.

Identity

Admin accounts are separate from daily-use accounts

Limits damage when a normal workstation, browser session, or mailbox is compromised.

Email and Awareness

Phishing reporting path is documented

Fast reporting shortens investigation time and helps warn other users.

Devices

Endpoint updates are monitored

Unsupported or unpatched endpoints create predictable entry points.

Devices

Endpoint protection alerts are reviewed

Security tooling only helps when someone reviews and escalates meaningful alerts.

Resilience

Backups are tested on a schedule

Untested backups often fail when ransomware, deletion, or outage recovery is urgent.

Response

Incident roles and escalation contacts are named

Clear ownership prevents delay during account compromise, data exposure, or outage response.

Third Parties

Vendor access is reviewed

Dormant vendor accounts and shared access paths are common blind spots.

Data Protection

Sensitive data locations are known

Data cannot be protected, retained, or reported properly if nobody knows where it lives.

Baseline snapshot

High-priority baseline gaps

Focus on identity, backups, and incident ownership before expanding scope.

50%

Score

0

Complete

9

Priority gaps

Remediation plan

MFA is enforced for critical accounts

Enable MFA for all privileged and high-risk accounts first, then expand to all users.

Admin accounts are separate from daily-use accounts

Create named admin accounts, remove standing admin rights, and document break-glass access.

Phishing reporting path is documented

Publish a reporting mailbox or button, define triage owner, and add examples to training.

Endpoint updates are monitored

Track update compliance weekly and create an exception process for blocked devices.

Endpoint protection alerts are reviewed

Assign alert review ownership, define severity thresholds, and test one escalation path.

Backups are tested on a schedule

Run a restore test for one critical file set or system and record recovery time.

Incident roles and escalation contacts are named

Name incident lead, communications owner, technical owner, and executive decision owner.

Vendor access is reviewed

List vendors with system access, confirm owners, and remove access no longer needed.

Sensitive data locations are known

Inventory sensitive data stores and map owner, access path, backup, and retention need.

Category scores

Identity

50%

Email and Awareness

50%

Devices

50%

Resilience

50%

Response

50%

Third Parties

50%

Data Protection

50%