Your checklists (
0
)
AI Checklist Generator
From the makers of
Manifestly Checklists
Sign in
Email address
Email me a magic link
Home
> Security Architecture review
Security Architecture review
Governance and Compliance
Review security policies and procedures.
Verify alignment with regulatory requirements (e.g., GDPR, HIPAA).
Assess risk management practices.
Evaluate incident response plan effectiveness.
Network Security
Analyze network segmentation and zoning.
Review firewall configurations and rules.
Assess intrusion detection and prevention systems (IDPS).
Evaluate secure remote access solutions.
Identity and Access Management
Review user access controls and permissions.
Evaluate authentication mechanisms (e.g., MFA).
Assess identity lifecycle management processes.
Verify user activity monitoring and logging.
Application Security
Review secure development lifecycle practices.
Assess application vulnerability management processes.
Evaluate web application firewalls (WAF).
Verify security testing (e.g., penetration testing, code reviews).
Data Protection
Review data classification and handling policies.
Assess encryption practices for data at rest and in transit.
Evaluate data loss prevention (DLP) mechanisms.
Verify backup and recovery processes.
Physical Security
Assess physical access controls to facilities.
Review environmental security measures (e.g., fire suppression).
Evaluate surveillance and monitoring systems.
Verify visitor access policies and procedures.
Security Operations
Review security monitoring and incident response capabilities.
Assess log management and analysis processes.
Evaluate threat intelligence integration.
Verify security awareness training programs.
Continuous Improvement
Assess mechanisms for security architecture reviews.
Evaluate feedback loops for incident lessons learned.
Review metrics and KPIs for security posture.
Verify alignment with emerging security trends and technologies.
Download CSV
Download JSON
Download Markdown
Use in Manifestly