Cyentrix Audit Library
Reusable audit programs you can run today.
Browse curated cybersecurity audit programs — Active Directory reviews, vendor risk, cloud configuration audits, ransomware readiness and more. Each program is runnable end-to-end, scored, and mapped to common frameworks.
- 63 programs curated + growing
- Run end-to-end scored reports
- Framework-mapped NIST · ISO · CIS · NIS2
- All open reuse + adapt
AI Security
LLMs · model risk · AI vendors
AI Red Team & Adversarial Testing
ProYou can not trust an AI system you have not tried to break. Audit of red-team capability covering prompt injection, jailbreaks, data exfil and grounding failures.
AI Coding Assistant Security
ProCopilot / Cursor / Claude Code / Codeium / equivalent — quick audit of how AI code assistants are deployed in your engineering org.
AI Privacy & Training Data Lawfulness
ProQuick check on the privacy + lawfulness side of using or building AI — training-data provenance, lawful basis, DSARs against models, and synthetic data alternatives.
AI Vendor & Data-Sharing Risk
ProMost "AI risk" is really 3rd-party risk: data egress to OpenAI/Anthropic/Google + training opt-outs + retention. Quick check.
AI Model Risk & Governance
ProWhether you train, fine-tune or just consume models, you need governance — inventory, risk classification, human oversight, evaluation.
LLM Application Security
FreeIf you ship an app that calls an LLM (chatbot, copilot, RAG over your data), this is the controls baseline you actually need.
Identity & Access
IAM · MFA · privileged access
API Token & Secrets Audit
ProLeaked API tokens are a top breach vector. Check inventory, scoping, storage and rotation of personal access tokens and machine secrets.
SSO Health Check
ProSingle sign-on is only as strong as the apps it covers and the policies behind it. Quick check on coverage, MFA, conditional access and session controls.
Service Account Hygiene
ProService accounts get over-privileged and never rotated — quick health check on inventory, scoping and credential rotation.
Password Policy Quick Audit
ProCheck your password rules against modern NIST guidance — length, rotation, complexity, password manager use.
Privileged Access Snapshot
ProA 6-question snapshot of privileged-account hygiene: shared admins, breakglass, vaulting, JIT, session recording.
MFA Coverage Quick Check
FreeTell us how multi-factor authentication is rolled out across your workforce, admins and third parties — get a coverage score in under 3 minutes.
Phishing Vulnerability Score
FreeHow exposed your team is to phishing — and how to fix it.
ISO 27001 A.6 — People Controls
ProScreening, training, NDAs, remote work — all 8 A.6 people controls in 3 minutes.
Cloud
AWS · Azure · GCP · SaaS
Kubernetes Security Quick Check
ProA short audit of your k8s cluster against the high-impact controls — RBAC, secrets, network policies, image trust.
Azure Tenant Hardening
ProTenant-wide hardening for Azure subscriptions — identity, networking, logging and Defender for Cloud baseline.
Microsoft 365 Security Posture
ProAudit your M365 tenant for the controls that actually matter: identity, mail flow, sharing, audit logging and admin separation.
SaaS Security Posture
ProHow well is your SaaS estate protected — SSO, MFA enforcement, offboarding, third-party app review?
AWS S3 Bucket Hardening
ProQuick check of public-access, encryption, logging and lifecycle on your S3 estate. Built around the CIS AWS benchmark for S3.
Cloud Security Maturity
ProFind gaps in your cloud security posture.
AppSec & DevSecOps
SDLC · SAST/DAST · dependencies
SAST / DAST / Secret Scanning in CI
ProThe three scanners every CI/CD should run, with finding triage and trend tracking.
Dependency & Supply Chain Audit
ProMost apps are 90% open-source dependencies. Quick check on SBOM, scanning, pinning, and what happens when a high-CVE library drops.
Secure SDLC Maturity
ProAre security activities baked into the development lifecycle, or are they bolted on at the end? A focused maturity snapshot.
Network
firewall · DNS · perimeter
TLS / Certificate Hygiene
ProTLS configuration + cert lifecycle — every breach starts with somebody not noticing a cert expired or a weak cipher enabled.
Wi-Fi Security Audit
ProOffice Wi-Fi quick audit — segmentation, encryption, guest network and rogue AP detection.
VPN Configuration Audit
ProAudit your VPN: who can connect, with what, from where, and what they can reach.
DNS & Email Hygiene
ProSPF, DKIM, DMARC, DNSSEC and recursive-resolver hardening — the basics of internet plumbing you probably forgot to check.
Firewall Rule Hygiene
ProAre your firewall rules documented, reviewed and free of any-any? A 7-question hygiene audit for perimeter + segmentation rules.
Attack Surface & Digital Footprint
ProWhat does the internet know about your organisation that you don't? 5 minutes.
Endpoint
patching · EDR · BYOD
Removable Media & USB Control
ProUSB drives, SD cards and external SSDs are the easiest exfil and infection vector. A focused control set.
Workstation Hardening Quick Check
ProAre your laptops actually hardened — disk encryption, local admin, screen lock, USB control?
MDM Coverage Audit
ProMobile devices accessing corporate data should be managed. Quick audit on enrolment, posture and wipe capability.
EDR Coverage Check
ProAre all endpoints actually covered by EDR, and is response automated? Quick coverage + tuning check.
Patch Management Maturity
ProHow fast are you patching workstations, servers, network gear and third-party apps? 8-question maturity check.
Vulnerability Management Maturity
ProHow well does your VM programme find, prioritise, and fix what matters? 5 minutes.
ISO 27001 A.8 — Technological Controls
ProEndpoint, identity, network, data, dev, monitoring — A.8 in 4 minutes.
Data
classification · DLP · backup
File Share Permissions Audit
ProNTFS / SharePoint / Drive permissions silently drift over years. A focused audit on excess access, group cleanliness, owners and stale data.
PII Data Discovery
ProYou cannot protect what you cannot find. Quick check of PII discovery, mapping and minimisation.
Data Classification Snapshot
ProDo you actually classify data — and is the classification reflected in access control, encryption and retention? Quick snapshot.
Incident Response
detect · respond · recover
Cyber Insurance Readiness
ProMost cyber-insurance applications now ask the same 30 questions. Pre-empt them and avoid claim disputes.
SOC Maturity Quick Check
ProWhether you run a SOC in-house or use an MSSP — a quick check on coverage, tooling, response time and reporting.
Incident Response Plan Quick Check
ProIs your IR plan more than a PDF? Test for tabletop exercises, RACI, comms templates, escalation paths and lessons-learned.
Backup Recovery Quick Test
ProWhen did you last actually restore a backup? Audit your backup cadence, immutability, off-site copies and recovery time.
Ransomware Readiness Assessment
FreeHow prepared is your organisation for the #1 cyber threat to businesses?
Crisis Resilience Assessment
FreeHow prepared is your organisation for a cyber crisis?
3rd Party Risk
third-party · supply chain
SOC 2 Vendor Evidence Check
ProQuick check on whether you are reviewing vendor SOC 2 reports properly — not just collecting them.
TPRM Programme Maturity
ProHow mature is the operating model behind your third-party risk management programme? 4 minutes.
Third-Party / Vendor Risk
ProHow well do you assess, contract, and monitor your suppliers? 5 minutes.
OT / ICS
ICS · SCADA · safety systems
Safety Systems & Vendor Remote Access
ProSafety Instrumented Systems (SIS) and vendor remote access are the two paths most likely to take a plant offline. Targeted audit.
ICS Asset Inventory & Patching Constraints
ProInventory for OT looks nothing like IT. Quick check on coverage, criticality, vendor-approved patch windows and risk-acceptance for unpatchable assets.
OT Network Segmentation & DMZ
ProThe Purdue model still matters. Quick check on the boundary between IT and OT, the OT DMZ, and what crosses it.
Social Media & Brand
brand · accounts · impersonation
Brand Monitoring & Lookalike Domain Defence
ProLookalike domains, typo-squatting and brand abuse outside your own perimeter. The cheap part of "attack surface" most people skip.
Executive Impersonation & Account Takeover Defence
ProCEO / CFO LinkedIn clones, executive deepfakes and impersonation accounts targeting your customers and staff. Detect and respond.
Corporate Social Account Security
ProThe Twitter, LinkedIn, Instagram and TikTok accounts your brand depends on get over-shared, under-protected and almost never audited. Quick check.
Compliance & Governance
ISO · NIS2 · NIST · SOC · physical
PCI-DSS Quick Scope
ProEven if you are a SAQ-A merchant, a quick check of CHD scope, segmentation, vendor responsibilities and key PCI controls.
GDPR Readiness Quick Check
ProA practical 30-minute self-check on the GDPR controls that fail most audits — not a full DPIA.
Datacentre Access Walkthrough
ProIf you have on-prem racks anywhere, walk the physical security controls — badge access, CCTV, environment, visitor log.
Small Business Cyber Posture
FreeA practical 30-question check for SMBs without a dedicated security team.
NIST CSF Quick Check
FreeWhere you stand against the NIST Cybersecurity Framework 2.0.
NIS2 Compliance Quick Check
FreeWhere you stand against the EU NIS2 Directive — in 4 minutes.
ITGC Readiness (SOC / SAS 70)
ProIT general controls readiness for SOC 1 / SOC 2 (formerly SAS 70) audits — in 4 minutes.
ISO 27001 A.7 — Physical Controls
ProPerimeter, entry, monitoring, equipment, disposal — the physical side of ISO 27001 in 3 minutes.
ISO 27001 A.5 — Organisational Controls
ProHow well your governance, supplier and incident controls map to ISO 27001:2022 Annex A.5.