Security Checklist

AI Security Audit Checklist

50 critical security checks every business must run.
Know your vulnerabilities before attackers do.

$29
Get the Checklist — $29
Want us to run the audit for you? → SecScan Service

30-day money-back guarantee. Use it yourself or give it to your IT team.

43%
of cyberattacks target small businesses
$200K
average cost of a small business breach
60%
of SMBs close within 6 months of an attack
Access Control (8 checks)Who can access what — and whether they should.
Network Security (10 checks)Firewalls, VPNs, open ports, and traffic monitoring.
Data Protection (9 checks)Encryption, backups, and data handling policies.
Application Security (8 checks)Your website, APIs, and software supply chain.
Email & Phishing (7 checks)The #1 attack vector for small businesses.
Incident Response (8 checks)What happens when (not if) something goes wrong.
Critical — Fix immediately, breach likely within 90 days if not addressed
High — Fix within 30 days
Medium — Fix within 90 days
Low — Best practice, address when possible

🔑 Access Control — 8 Checks

#1CriticalMulti-Factor Authentication on all admin accounts
Every administrator account — email, cloud services, hosting, payment processors, domain registrar — must require MFA. Password alone is not sufficient for any privileged account.
Remediation: Enable MFA on each service individually. Use an authenticator app (Google Authenticator, Authy) rather than SMS where possible. Audit: log into each admin panel and verify MFA is active.
#2CriticalNo shared passwords between team members
Shared credentials make it impossible to audit who did what, and a single departed employee can retain access indefinitely. Every person must have their own login to every system.
Remediation: Migrate to a password manager (1Password Teams, Bitwarden Business). Create individual accounts for each team member. Revoke all shared passwords. Run an audit after any employee departure.
#3HighPrinciple of least privilege enforced
Each employee and service account should have access only to the resources needed for their specific job. Marketing doesn't need database access. Customer service doesn't need billing admin.
Remediation: Audit role assignments in all key systems. Remove excess permissions. Create role-based access control (RBAC) tiers: Read-Only, Editor, Admin, Super-Admin. Document who has what.
#4HighOffboarding checklist executed for all departed employees
Former employees retaining access is one of the most common (and preventable) breach vectors. Google Workspace, GitHub, Slack, CRM, cloud hosting — all must be revoked on the same day someone leaves.
Remediation: Create a written offboarding checklist. Use an identity provider (Okta, Google Workspace SSO) to revoke access in one place. Audit: can you list every system a departed employee could still access?
#5HighAll passwords are 16+ characters, unique, managed in a vault
Password reuse across services means a single breach of any service can cascade into every other. All passwords must be unique, randomly generated, and stored in an encrypted vault — not in a spreadsheet or browser.
Remediation: Audit your password manager. Any weak, reused, or browser-saved passwords should be changed. Run the 1Password "Watchtower" or Bitwarden "Health Reports" to find vulnerabilities automatically.
#6MediumService accounts use API keys, not human credentials
Software integrations (Zapier, Make, your website) should authenticate via dedicated API keys or service accounts, not an employee's personal login. If that employee leaves, everything breaks.
Remediation: Audit all OAuth connections and API integrations. Create dedicated service accounts. Rotate any API keys that have been in use more than 12 months.
#7MediumPrivileged access requires VPN or IP allowlist
Admin panels, databases, and internal tools should not be accessible from any IP address in the world. Requiring VPN or an IP allowlist means stolen credentials alone are not enough to gain access.
Remediation: Set up a business VPN (Tailscale, Cloudflare Access). Add IP restrictions to your hosting control panel, database management tools, and any internal dashboards.
#8LowAccess review conducted quarterly
Permissions accumulate over time. Employees change roles, projects end, contractors finish — but access rarely gets cleaned up automatically. A quarterly audit prevents privilege creep.
Remediation: Schedule a 30-minute calendar block every quarter. Review user lists in your 5 most critical systems. Remove anyone who shouldn't have access.

🌐 Network Security — 10 Checks

#9CriticalNo unnecessary open ports on production servers
Every open port is a potential entry point. Production servers should expose only the ports required for their function (80, 443, and SSH on a non-standard port). Database ports (3306, 5432, 27017) must never be publicly accessible.
Remediation: Run nmap against your server: nmap -sV your-server-ip. Any port open that isn't required should be closed via firewall rules. Move SSH to a non-standard port (e.g., 2222).
#10CriticalAll web traffic encrypted with valid HTTPS
Any page that receives form submissions, login credentials, or payment info must use HTTPS. Mixed content (HTTP resources on HTTPS pages) is also a violation. SSL certificates must not be expired.
Remediation: Use SSL Labs (ssllabs.com/ssltest) to test your domain. Get a free cert via Let's Encrypt/Caddy if you don't have one. Redirect all HTTP to HTTPS. Fix any mixed content warnings.
#11HighFirewall active and configured on all servers
A server without a firewall is a server with every door unlocked. UFW (Linux) or Windows Defender Firewall must be active with default-deny rules, allowing only explicitly required traffic.
Remediation: Run ufw status on Linux servers. If inactive, enable it: ufw default deny incoming, ufw allow 22 (or your SSH port), ufw allow 80, ufw allow 443, ufw enable.
#12HighSSH uses key authentication, password login disabled
Brute-force attacks against SSH password authentication are constant. If your server accepts password-based SSH logins, it's being attacked right now. Key-based auth eliminates this attack vector entirely.
Remediation: In /etc/ssh/sshd_config: set PasswordAuthentication no and PubkeyAuthentication yes. Ensure your SSH keys are backed up before restarting SSH.
#13HighDDoS protection active on public-facing services
A basic DDoS attack can take your website offline for days, costing you customers and revenue. Cloudflare's free tier provides substantial protection against volumetric attacks.
Remediation: Put your domain behind Cloudflare (free tier). Enable "Under Attack Mode" if experiencing active attacks. Configure rate limiting rules for API endpoints.
#14MediumNetwork traffic monitored and logged
Without logging, you have no way to know when a breach happened, what was accessed, or how the attacker got in. Logs are required for incident response and often for compliance.
Remediation: Enable access logging on your web server (Nginx, Caddy, Apache). Forward logs to a SIEM or simple cloud storage (CloudWatch, Logtail). Set up alerts for suspicious patterns.
#15MediumGuest WiFi separated from internal network
A customer or visitor connecting to your main WiFi has potential access to internal systems, printers, and network shares. Guest networks must be isolated from your business network.
Remediation: Enable "Guest Network" on your router. Ensure client isolation is turned on (clients on guest network cannot see each other or your main network). Never give guests your main WiFi password.
#16MediumRemote workers required to use VPN
Employees working from coffee shops, hotels, or home networks are on untrusted connections. A VPN encrypts their traffic and ensures access to internal resources is controlled.
Remediation: Deploy Tailscale (free for small teams) or Cloudflare Access. Require VPN for access to any internal tool. Document the policy and enforce it.
#17LowSecurity headers configured on all web applications
HTTP security headers (CSP, HSTS, X-Frame-Options, etc.) are free mitigations against XSS, clickjacking, and data injection attacks. Most businesses have them missing entirely.
Remediation: Test at securityheaders.com. Configure in your web server or CDN. Aim for an A rating. Caddy users: add headers to Caddyfile. Cloudflare users: use Transform Rules.
#18LowPenetration test conducted in past 12 months
A pen test finds vulnerabilities before attackers do. Annual testing is considered best practice and is required for some compliance frameworks (PCI-DSS, SOC2).
Remediation: Use automated tools first: OWASP ZAP, Burp Suite Community. For critical infrastructure, hire a firm. Budget: $2K-10K for a small business assessment.

🔒 Data Protection — 9 Checks

#19CriticalAll customer data encrypted at rest
Customer PII, payment info, and credentials stored in plain text in a database is a compliance violation and a catastrophic breach risk. All sensitive data must be encrypted using AES-256 or equivalent.
Remediation: Enable encryption at rest in your database (AWS RDS, PostgreSQL pgcrypto, or application-level encryption for sensitive fields). Audit: can you read customer passwords in plain text? If yes — critical breach.
#20CriticalAutomated backups tested and verified
Untested backups are not backups — they're false confidence. Ransomware attacks are only recoverable if you have verified, offline backups. The test is whether you can restore, not just whether the backup runs.
Remediation: Configure daily automated backups to a separate storage account (S3, Backblaze B2). Monthly: actually restore a backup to a test environment and verify data integrity. Document the RTO/RPO.
#21–27Checks 21–277 More Data Protection Checks Included
Data retention policy, GDPR/CCPA compliance, third-party data processor audit, employee data handling training, data breach notification procedure, secrets/API key rotation, and database access logging. Full details in paid version.

⚙️ Application Security — 8 Checks

#28–35Checks 28–358 Application Security Checks Included
SQL injection protection, XSS prevention, dependency vulnerability scanning, secrets not in source code, rate limiting on all APIs, input validation at every boundary, CORS policy configuration, and software update policy. Full details in paid version.

📧 Email & Phishing — 7 Checks

#36CriticalSPF, DKIM, and DMARC configured correctly
Without these DNS records, attackers can send email that appears to come from your domain — tricking customers, partners, and employees. SPF+DKIM+DMARC is the baseline for email security.
Remediation: Test at dmarcanalyzer.com or mxtoolbox.com. Add SPF record to DNS. Enable DKIM in your email provider (Google Workspace, Microsoft 365). Deploy DMARC with p=reject policy after monitoring phase.
#37–42Checks 37–426 More Email Security Checks Included
Phishing simulation training, email filtering active, business email compromise (BEC) protection, wire transfer authorization policy, suspicious email reporting procedure, and executive impersonation protection. Full details in paid version.

🚨 Incident Response — 8 Checks

#43HighWritten incident response plan exists
When a breach happens, panic is your enemy. A written IR plan with clear roles, communication templates, and step-by-step procedures means your team responds effectively instead of improvising.
Remediation: Document: who to contact (legal, IT, customers, regulators), how to isolate affected systems, how to preserve evidence, notification timeline requirements (GDPR: 72 hours). Test the plan annually.
#44–50Checks 44–507 More Incident Response Checks Included
Security incident log, cyber insurance coverage, legal counsel identified, PR communication plan, customer notification templates, forensic evidence preservation, and post-incident review process. Full details in paid version.

Want Us to Run This Audit For You?

Our SecScan AI agent runs through all 50 checks automatically, generates a prioritized remediation report, and flags your critical vulnerabilities — in under 24 hours. Starting at $299.

Hire SecScan Agent →

Get the Full 50-Point Checklist

All 50 checks with risk ratings, remediation steps, and tool recommendations. PDF + interactive HTML format.

$29
Buy Now — $29

Secure checkout via Stripe. 30-day money-back guarantee.