Cybersecurity audit checklist and digital protection shield for business security

Why Every Indian Business Needs a Cybersecurity Audit in 2026

India ranked as the most cyber-attacked country in 2025, with 1.3 billion attacks recorded — a 92% increase from the previous year. The Digital Personal Data Protection Act (DPDP Act) is now enforceable, with penalties up to ₹250 crores for data breaches. Cyber insurance claims from Indian SMEs tripled in 2025, and 60% of small businesses that suffer a significant breach close permanently within six months.

A cybersecurity audit is not a luxury — it is business survival. This checklist covers every critical area: network security, application security, data protection, access control, cloud security, and incident response. Use it to assess your current security posture and build a prioritized remediation plan.

Network Security Checklist

Firewall & Perimeter Defense

☐ Next-generation firewall (NGFW) deployed and configured with deny-by-default rules
☐ Firewall rules reviewed quarterly — remove unused rules, verify open ports are necessary
☐ Intrusion Detection/Prevention System (IDS/IPS) active and alert thresholds configured
☐ DNS filtering enabled to block known malicious domains
☐ Network segmentation separates critical systems (finance, HR, customer data) from general network

Wi-Fi Security

☐ WPA3 encryption on all wireless access points (WPA2 minimum, WEP never)
☐ Separate guest network isolated from corporate network
☐ Hidden SSID for corporate network (optional but recommended)
☐ MAC address filtering on sensitive network segments
☐ Wireless access points physically secured and inventory maintained

VPN & Remote Access

☐ VPN required for all remote access to corporate resources
☐ Split tunneling disabled (all traffic routes through corporate VPN)
☐ VPN access logs reviewed weekly for anomalies
☐ Two-factor authentication required for VPN connections
☐ Remote desktop (RDP) never exposed directly to internet — always behind VPN

Access Control & Identity

Authentication

☐ Multi-Factor Authentication (MFA) enforced on ALL business accounts — email, cloud, CRM, banking
☐ Password policy: minimum 12 characters, no common passwords, no password reuse
☐ Password manager deployed company-wide (Bitwarden, 1Password, or Keeper)
☐ Single Sign-On (SSO) implemented where possible to reduce password fatigue
☐ Privileged access accounts have separate, stronger authentication requirements

User Access Management

☐ Principle of least privilege — users only access what they need for their role
☐ User access reviewed quarterly — remove dormant accounts, adjust permissions for role changes
☐ Immediate deprovisioning process when employees leave (same-day account deactivation)
☐ Admin accounts limited to absolute minimum number of users
☐ Third-party/vendor access tracked with expiration dates and limited scope

Application & Website Security

☐ SSL/TLS certificates valid and auto-renewing on all domains and subdomains
☐ Web Application Firewall (WAF) protecting all public-facing applications
☐ OWASP Top 10 vulnerabilities tested: SQL injection, XSS, CSRF, broken authentication
☐ All software dependencies scanned for known vulnerabilities (npm audit, pip-audit, Snyk)
☐ Security headers implemented: Content-Security-Policy, X-Frame-Options, HSTS, Referrer-Policy
☐ API endpoints authenticated, rate-limited, and input-validated
☐ File upload functionality restricted by type, size, and scanned for malware
☐ Error pages do not expose stack traces, server versions, or internal paths
☐ All CMS platforms (WordPress, etc.) updated to latest version with unused plugins removed

Data Protection & Backup

Data Classification & Encryption

☐ Data classified by sensitivity: public, internal, confidential, restricted
☐ Encryption at rest for all databases storing personal or financial data (AES-256)
☐ Encryption in transit for all communications (TLS 1.2+, no SSL 3.0 or TLS 1.0/1.1)
☐ Encryption keys stored separately from encrypted data with access controls
☐ Personal data handling compliant with DPDP Act 2023 requirements

Backup & Recovery

☐ 3-2-1 backup rule: 3 copies, 2 different media, 1 offsite/cloud
☐ Automated daily backups for all critical systems and databases
☐ Backup restoration tested monthly — actually restore and verify data integrity
☐ Backups encrypted and access-controlled separately from production systems
☐ Recovery Time Objective (RTO) and Recovery Point Objective (RPO) defined and achievable

Cloud Security

☐ Cloud account root/admin credentials secured with hardware MFA tokens
☐ IAM policies follow least privilege — no wildcard (*) permissions
☐ Cloud storage buckets (S3, GCS) not publicly accessible unless explicitly required
☐ Cloud security posture management (CSPM) tool deployed (AWS Security Hub, GCP SCC)
☐ Cloud activity logging enabled (CloudTrail, Cloud Audit Logs) with 90+ day retention
☐ Unused cloud resources identified and decommissioned to reduce attack surface

Incident Response Plan

☐ Documented incident response plan exists and is known to all relevant staff
☐ Incident response team identified with clear roles and contact information
☐ Communication plan for notifying customers, regulators, and stakeholders during a breach
☐ Incident response drills conducted at least annually (tabletop exercises)
☐ Post-incident review process to capture lessons learned and improve defenses
☐ Cyber insurance policy in place with adequate coverage limits

Employee Security Awareness

☐ Security awareness training conducted quarterly for all employees
☐ Phishing simulation tests conducted monthly with measurable improvement targets
☐ Clear acceptable use policy for company devices and networks
☐ Social engineering awareness — recognizing pretexting, baiting, and tailgating
☐ Reporting mechanism for suspicious activities (easy, anonymous, no-blame culture)

Prioritized Action Plan

Fix These First (Critical — Week 1)

1. Enable MFA on all accounts (stops 99.9% of automated attacks)
2. Update all software to latest versions (patches known vulnerabilities)
3. Verify backup systems work (restore test)
4. Remove access for departed employees
5. Scan for exposed data (public S3 buckets, open databases)

Questions and Answers

How often should a business conduct a cybersecurity audit?

Small businesses should conduct a comprehensive cybersecurity audit at least annually, with quarterly vulnerability scans and continuous monitoring. Businesses handling sensitive data (healthcare, finance, e-commerce) should audit semi-annually. Additionally, conduct an immediate audit after any security incident, major infrastructure change, new software deployment, or employee departure with system access.

How much does a cybersecurity audit cost in India?

A basic security assessment for a small business (under 50 employees, simple infrastructure) costs ₹50,000–₹1.5 lakhs. A comprehensive audit including penetration testing, vulnerability assessment, compliance review, and remediation roadmap costs ₹2–₹8 lakhs. Enterprise-level audits with red team exercises and continuous monitoring run ₹10–₹25+ lakhs annually. The cost is a fraction of what a breach costs — the average data breach in India costs ₹19.5 crores (IBM 2025).

Can a small business do a basic cybersecurity audit themselves?

Yes, you can perform a basic audit using this checklist. Focus on the highest-impact items first: enable MFA on all accounts, update all software, review user access permissions, verify backup systems, check SSL certificates, and scan for known vulnerabilities using free tools like Qualys SSL Labs, Mozilla Observatory, and OWASP ZAP. However, for penetration testing and advanced threat assessment, professional expertise is essential — automated tools miss configuration errors and business logic vulnerabilities that human auditors catch.

Need a Professional Cybersecurity Audit?

I conduct comprehensive security audits covering your network, applications, cloud, and data — with a detailed remediation roadmap.