Free, customisable security audit checklist designed specifically for Australian retail & e-commerce businesses. Copy, customise, and automate - built by Harvard-educated experts.
Setup Time
20 minutes
Complexity
intermediate
Tools
Slack, Notion
Copy this template and customise it for your business.
# Security Audit Checklist - Retail & E-commerce ## Purpose Run quarterly to identify security gaps, maintain compliance, and protect your business from common cyber threats. ## When to Use A cybersecurity checklist covering password policies, access controls, software updates, backup verification, and phishing awareness. ## Instructions 1. Review the template below and familiarise yourself with the structure 2. Replace all [bracketed placeholders] with your retail & e-commerce business details 3. Customise the tone and formatting to match your brand 4. Save in your preferred tool (Slack or Notion) --- ## Security Audit Checklist ### Password & Authentication (Owner: IT Manager) - [ ] Password policy enforced: minimum 12 characters, mix of upper, lower, numbers, symbols - [ ] Multi-factor authentication (MFA) enabled on all business-critical systems - [ ] Default passwords changed on all devices and software - [ ] Password manager in use across the organisation - [ ] Shared accounts eliminated or documented with justification - [ ] Service account passwords rotated within the last 90 days ### Access Control (Owner: IT Manager) - [ ] User access review completed: all current employees have appropriate access levels - [ ] Former employees' accounts deactivated within 24 hours of departure - [ ] Admin and privileged access limited to those who genuinely require it - [ ] Guest and contractor access has defined expiry dates - [ ] Principle of least privilege applied across all systems ### Software & Systems (Owner: IT Manager) - [ ] Operating systems on all devices running the latest stable version - [ ] Antivirus and endpoint protection installed and up to date on all devices - [ ] Business applications updated to latest versions (no end-of-life software) - [ ] Firewall configured and active on all company networks - [ ] VPN required for remote access to internal systems - [ ] Unused applications and services removed or disabled ### Data Protection & Backup (Owner: IT Manager) - [ ] Automated backups running daily for all critical data - [ ] Backup restore tested within the last quarter (actual data recovery verified) - [ ] Backups stored in a separate location from primary data (cloud or off-site) - [ ] Sensitive data encrypted at rest and in transit - [ ] Data retention policy documented and followed - [ ] Client data handling complies with Australian Privacy Principles (APPs) ### Physical Security (Owner: Office Manager) - [ ] Server room or network equipment locked and access-controlled - [ ] Visitor sign-in process in place with escort requirements - [ ] Clean desk policy in place for sensitive documents - [ ] Screens locked when unattended (auto-lock after 5 minutes) ### Staff Awareness (Owner: HR / IT Manager) - [ ] Cybersecurity awareness training completed by all staff within the last 12 months - [ ] Phishing simulation conducted within the last quarter - [ ] Incident reporting procedure documented and communicated to all staff - [ ] Staff aware of social engineering risks (phone scams, impersonation) --- **Complexity:** intermediate | **Setup time:** 20 minutes | **Tools:** Slack, Notion Note: This template has been tailored for retail & e-commerce businesses in Australia. Adjust terminology and compliance references to match your specific context.
Follow these steps to get the most out of this template.
Copy the security audit checklist template below and paste it into your retail & e-commerce preferred tool or document
Save the customised version as a reusable template in your document management system
Review each section to ensure it matches your brand voice and requirements
Train your retail & e-commerce team on when and how to use this template in their daily workflow
Schedule a quarterly review to update the template based on feedback and changing requirements
Make this template your own with these recommendations.
Create multiple versions for different customer segments or use cases
Remove any sections of the security audit checklist that do not apply to your specific use case
Connect dynamic fields to your CRM or automation platform for auto-population
Replace all placeholder text in [brackets] with your retail & e-commerce actual business information
Browse more templates that complement this one.
Let our Harvard-educated team build this into a fully automated workflow for your business. 50+ Australian businesses already trust Clever Ops.