Sahara Cyber Tech - Security Assessment Checklist Identity and Access - Require multi-factor authentication for all privileged accounts. - Review administrator access at least monthly. - Disable unused accounts promptly. - Enforce unique, long passwords through a password manager. Endpoint Security - Keep operating systems and applications patched. - Enable endpoint detection and response where possible. - Encrypt laptops and removable media. - Restrict local administrator privileges. Network and Cloud - Segment critical systems from general user networks. - Review firewall rules and exposed services. - Audit cloud identity permissions. - Enable logging for key cloud resources. Backups and Recovery - Maintain at least three copies of important data. - Store one copy offsite or in a separate cloud account. - Test restoration procedures regularly. - Protect backups from ransomware access. Incident Readiness - Define incident severity levels. - Assign response owners and backup contacts. - Prepare internal and external communication templates. - Run tabletop exercises twice per year. Policy and Training - Publish clear security policies. - Train employees on phishing and social engineering. - Review vendor access and third-party risk. - Track remediation work to completion.