Skip to main content

Last updated by: Anonixiate, Last updated on: 01/05/2025

info

Document Creation: 17 April, 2025. Last Edited: 17 April, 2025. Authors: Shreyas Vivek, Kim Brvenik.
Effective Date: 17 April 2025. Expiry Date: 17 April 2026.

Monthly Audit Checklist

Multi-Factor Authentication

ML1-MF-01 — MFA is enforced on all internet-facing Redback services (e.g., GitHub, GCP).

  • Audit Procedure:
    Attempt user authentication and verify MFA challenge on login.

  • Evidence Required:
    Access attempt logs, screenshots of MFA prompts, enforcement settings.

  • Tools/Methods:
    GitHub, GCP IAM, Azure Console

  • Responsible Team:
    Cybersecurity GRC

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.


ML1-MF-02 — MFA challenge is triggered for remote desktop access to internal systems.

  • Audit Procedure:
    Perform test RDP session and check for MFA prompt.

  • Evidence Required:
    VPN/RDP access logs, security group enforcement evidence.

  • Tools/Methods:
    Azure AD, Duo, RDP Config

  • Responsible Team:
    DevSecOps

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.


ML1-MF-03 — All other internet-facing systems require MFA on login.

  • Audit Procedure:
    Enumerate services; attempt user login; confirm MFA challenge.

  • Evidence Required:
    MFA logs, system login records, user directory screenshots.

  • Tools/Methods:
    Okta, PingID, Azure MFA

  • Responsible Team:
    Cybersecurity GRC

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.


ML1-MF-07 — MFA bypass policies are reviewed monthly and exceptions require formal approval.

  • Audit Procedure:
    Review all policy exceptions and approvals for validity.

  • Evidence Required:
    Exception tracking sheets, approval forms.

  • Tools/Methods:
    IAM Dashboard, Jira, Confluence

  • Responsible Team:
    Cybersecurity GRC

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.


Office Macros

ML1-OM-10 — Microsoft Office macro usage logs are retained for audit trail and incident investigation.

  • Audit Procedure:
    Verify log retention settings; ensure logs are centralized.

  • Evidence Required:
    Sysmon logs, GPO logging configuration, centralized log exports.

  • Tools/Methods:
    SIEM, Event Viewer, Syslog Server

  • Responsible Team:
    Cybersecurity GRC

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.


Patch Applications

ML1-PA-08 — Patches for internal apps (Office, PDF, browsers) applied within one month.

  • Audit Procedure:
    Review patch cycles and correlate version info with vendor dates.

  • Evidence Required:
    Patch audit reports, software version matrix.

  • Tools/Methods:
    E8MVT, Software Inventory

  • Responsible Team:
    DevSecOps

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.


ML1-PA-09 — Internal applications contain no vulnerabilities older than one month.

  • Audit Procedure:
    Use scanner to verify version compliance.

  • Evidence Required:
    List of vulnerable versions, patch timestamps.

  • Tools/Methods:
    Qualys, Nessus, E8MVT

  • Responsible Team:
    DevSecOps

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.


Patch Operating Systems

ML1-PO-08 — Workstation and server OS patches are applied within one month of release.

  • Audit Procedure:
    Match scan output with patch application dates; check backlog or exceptions.

  • Evidence Required:
    Patch cycle report, dashboard exports.

  • Tools/Methods:
    WSUS, Linux YUM/APT Logs

  • Responsible Team:
    DevSecOps

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.


ML1-PO-09 — No OS vulnerabilities older than one month exist in any production environment.

  • Audit Procedure:
    Run full authenticated vulnerability scan and compare to patch registry.

  • Evidence Required:
    Vulnerability scan logs, remediation reports.

  • Tools/Methods:
    Qualys, Nessus

  • Responsible Team:
    DevSecOps

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.


Regular Backups

ML1-RB-09 — Backup systems are regularly patched and updated to prevent exploitation of backup infrastructure.

  • Audit Procedure:
    Check patch levels, CVEs, and update history of backup systems.

  • Evidence Required:
    Patch management reports, CVE summaries.

  • Tools/Methods:
    Nessus, GVM, Patch Logs

  • Responsible Team:
    DevSecOps

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.


ML1-RB-10 — Backup logs and access events are centrally stored and retained for investigation and forensics.

  • Audit Procedure:
    Verify central logging for backup infrastructure and access.

  • Evidence Required:
    SIEM logs, syslog records, retention policy evidence.

  • Tools/Methods:
    Splunk, CloudWatch Logs, Graylog

  • Responsible Team:
    Cybersecurity GRC

  • Status:
    [ ] Pass
    [ ] Fail
    [ ] N/A

  • Notes:

    Add notes here during audit.