IT Audit

Physical Security

Controlled access to sensitive locations and hardware

Account Management

Does the organization avoid allowing individuals to user Service Accounts used by multiple people?
Does the organization have general rules such as “User X is a member of Group Y, therefore they get inherited privileges with their Group membership”
Do the organization administrators have separate Admin and User accounts?
An example of this would be a manager needs to temporarily be granted additional privileges to complete a task, are those privileges then promptly revoked once that task is complete?
RADIUS, LDAP, Kerberos, other

Infrastructure

Servers

Workstations and Software

Cloud

Cybersecurity

Network

These could be solutions such as CradlePoint failover, ring protected networks, etc.