Skip to content
_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN DE
Let's talk

Security audit checklist

10. 10. 2019 Updated: 27. 03. 2026 1 min read intermediate
This article was published in 2019. Some information may be outdated.

A security audit is not just a penetration test. Here is the complete checklist.

Authentication

  • ☐ Strong password requirements
  • ☐ MFA implemented
  • ☐ Session management (timeout, invalidation)
  • ☐ Rate limiting on login
  • ☐ Secure password reset

Authorization

  • ☐ Principle of least privilege
  • ☐ Role-based access control
  • ☐ API endpoint authorization
  • ☐ IDOR prevention

Data

  • ☐ Encryption at rest
  • ☐ Encryption in transit (TLS 1.2+)
  • ☐ PII classification
  • ☐ Backup encryption
  • ☐ Log sanitization (no tokens in logs)

Infrastructure

  • ☐ Firewall rules reviewed
  • ☐ SSH keys (not passwords)
  • ☐ Secrets in a secrets manager
  • ☐ Container scanning
  • ☐ Dependency scanning (Snyk, Dependabot)

Compliance

  • ☐ GDPR consent and data deletion
  • ☐ Cookie consent
  • ☐ Privacy policy up to date
  • ☐ Data retention policy

Frequency

Full audit at least once a year. Automated scans (dependency, container) in CI/CD.

securityauditdevsecops
Share:

CORE SYSTEMS team

We build core systems and AI agents that keep operations running. 15 years of experience with enterprise IT.