Printed from CheckTick DSPT Compliance Documentation
Annual Compliance Checklist 2026
Organisation: CheckTick Year: 2026 Owner: SIRO & CTO Status: Living Document - Update Monthly
January 2026
Week 1-2 (Jan 1-15)
- Annual Security Validation (ASV) - Complete validation of network defenses, access controls, and vulnerability management Annual Security Validation Procedure
- Review GitHub Action logs (past 12 months)
- Review pip-audit history
- Configuration audit of Northflank settings
- Verify zero unpatched 'Critical' vulnerabilities in production
- Confirm sub-processor security certifications (Northflank, ISO/SOC2)
- Asset Register Review - Update and SIRO approval Asset Register
- Verify all software versions
- Confirm 100% estate support status
-
Update OS versions and support status
-
Board Security Statement - SIRO sign-off on unsupported systems status Board Security Report
- Contract Compliance Review (Q1) - Review Article 28 compliance for all suppliers Contract Compliance Review
- Northflank DPA status
- Mailgun DPA status
- GitHub DPA status
- Supplier Assurance Annual Audit - Re-download and verify latest ISO/SOC2 certificates Supplier Assurance Procedure
- Confirm no major security breaches reported
- Update Supplier Register with next review dates
Week 3-4 (Jan 16-31)
- Unused Software & Service Removal - Annual review and cleanup Software Security Assessment
- Desktop/Mobile: Review and uninstall unused applications from all laptops (macOS & Windows 11) and mobile device (iPhone)
- Cloud Services: Review and cancel unused SaaS/PaaS subscriptions
- Development: Remove unused dependencies from requirements.txt and package.json
- Disable unused system services and mobile apps (macOS, Windows 11, iOS)
- Document removals in Technical Change Log
- Software Asset Register Reconciliation (Q1) - Quarterly review Software Assets
- Verify all software in register matches actual deployments
- Remove decommissioned tools from register
- Update version numbers and support status
- VAULT_SECRET_ID Rotation (Q1) - Quarterly 90-day rotation Key Rotation Policy
- Generate new secret ID:
vault write -f auth/approle/role/checktick-app/secret-id - Update .env file with new VAULT_SECRET_ID
- Restart webapp:
docker compose restart web - Verify webapp can authenticate to Vault
- Document completion date in Infrastructure Technical Change Log
- Business Continuity Plan Review - Annual review and update Business Continuity Plan
- Risk Register Review - Board-level annual review Risk Register
- Vulnerability Management Policy Review - SIRO approval Vulnerability Management Policy
- Board Meeting - January - Review all annual reports and approve policies for 2026
- Data Security & Protection policies approval
- DSPT preparation review
- Document minutes for DSPT evidence
Ongoing Monthly (January)
- Monthly Access Review - GitHub and Northflank user lists (CTO) Access Control Policy
- Flag any accounts inactive for >90 days for review/disabling (Access Control Policy Section 6.4)
- Privileged Account Inventory Update - Update inventory with any account changes (new hires, role changes, leavers) Access Audit Logs
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal) External Service Authentication
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
February 2026
Week 1-2 (Feb 1-15)
- Annual Infrastructure & Firewall Review (Cyber Essentials) - Annual audit per CE requirements Infrastructure Technical Change Log
- Verify router security (unique admin password, remote management disabled, UPnP disabled, no port forwarding)
- Verify all device firewalls enabled with stealth mode
- Device User Account Audit: Verify only necessary accounts on all devices
- Confirm Guest accounts DISABLED on all laptops (macOS & Windows 11)
- Verify single standard user per device + separate admin account
- Remove any test/temporary/unused accounts
- Device Security Configuration (Cyber Essentials): Standard Build Specification
- Automatic Login DISABLED on all devices
- Screen lock: Password/Touch ID required immediately after sleep (laptops max 10min inactivity, mobile max 2min)
- FileVault encryption enabled on all Macs
- Safari: Verify 'Open safe files after downloading' DISABLED
- Chrome: Verify all auto-open file preferences CLEARED
- Gatekeeper: Verify enabled (
spctl --status) - XProtect: Verify malware scanning active and up-to-date
- Failed login throttling: Verify 10-attempt limits active
- Audit cloud service user accounts (GitHub, Northflank)
- Verify user/admin separation on cloud services
- Document completion in Infrastructure Technical Change Log
- External Service Authentication Review (Cyber Essentials) - Annual verification per CE Control 5.4 & 5.5 External Service Authentication
Organisation Compliance (CE Scope - Staff Admin Access): - Verify MFA enabled for all staff administrative accounts (CheckTick backend/admin portal) - Confirm 12-character minimum passwords on staff admin accounts (exceeds CE 8-char requirement) - Test common password blocking (100,000+ NCSC deny list active) - Verify django-axes brute force protection functioning (5 failed attempts lockout) - Confirm rate limiting active (10 attempts/minute per IP) - Review staff authentication logs for suspicious patterns (past 12 months)
Application Maintenance (DSPT Scope - Customer/User Authentication): - Verify MFA enforcement for customer Organisation Owner and Data Custodian roles - Review RBAC role assignments for least privilege - Confirm session timeout settings (24 hours) - Document completion in External Service Authentication policy - [ ] DSPT Submission Preparation - Begin compiling evidence for annual submission - Review all policies updated in January - Compile training records - Gather backup logs and restoration evidence - Collect security audit reports
Week 3-4 (Feb 16-28)
- Staff Training Review - Verify all mandatory training current Training Log
- NHS Data Security Awareness (Level 1) - All staff
- OWASP/Secure Coding - Technical staff
- Review training log completion status (target: 100%)
- Password Policy Compliance Check - Verify MFA enforcement Password Policy
Ongoing Monthly (February)
- Monthly Access Review - GitHub and Northflank user lists (CTO) Access Control Policy
- Flag any accounts inactive for >90 days for review/disabling (Access Control Policy Section 6.4)
- Privileged Account Inventory Update - Update inventory with any account changes (new hires, role changes, leavers) Access Audit Logs
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal) External Service Authentication
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
March 2026
Week 1-2 (Mar 1-15)
- Annual Disaster Recovery Drill - Full restoration test Annual DR Drill
- Simulate vault data corruption scenario
- Test PostgreSQL database restoration from backup
- Verify Vault unseal process with Shamir keys
- Test end-to-end decryption for Individual Tier users
- Document actual vs. planned time for each step
- Verify RTO status (target: 1 hour)
- Identify and document improvements
- Backup Restoration Test Record - Complete annual DSPT requirement Backup Log
- Restore to temporary staging instance
- Verify data integrity
- Document recovery time
Week 3-4 (Mar 16-31)
- DSPT Annual Submission - Complete and submit (if due)
- Final SIRO sign-off
- Submit via DSPT portal
- Quarterly Access Review (Q1) (Cyber Essentials) - Comprehensive user account and privilege audit Access Control Policy
- Automated Export & Reconciliation: Export GitHub organisation members list and Northflank team members list; compare against Privileged Account Inventory for discrepancies
- Device Privileges: Verify standard/admin account separation maintained on all devices
- Device Admin Credentials: Verify device administrator credentials remain securely stored in password manager
- Admin Usage Verification: Confirm admin accounts (device and cloud) not used for routine work activities
- Cloud Accounts: Verify no orphaned or inactive accounts exist on GitHub and Northflank
- Role Alignment: Confirm all current users are authorized with appropriate role assignments (Owner vs Member)
- Privilege Verification: Verify account privileges match current role requirements and identify any 'privilege creep'
- Admin Controls: Verify administrative privileges only assigned to designated administrative accounts
- Operational Restrictions: Confirm operational accounts cannot perform security-critical operations
- Contractor Access: Ensure subcontractors only retain access to active projects
- Leaver Verification: Confirm any accounts belonging to departed staff have been fully removed
- Emergency Contacts: Review emergency contacts and Unseal Key locations
- Documentation Check: Verify Movers/Leavers Log is current and audit logs reviewed
- Data Flow Mapping Review - Verify current state matches documentation
Ongoing Monthly (March)
- Monthly Access Review - GitHub and Northflank user lists (CTO) Access Control Policy
- Flag any accounts inactive for >90 days for review/disabling (Access Control Policy Section 6.4)
- Privileged Account Inventory Update - Update inventory with any account changes (new hires, role changes, leavers) Access Audit Logs
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal) External Service Authentication
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
April 2026
Week 1-4 (Apr 1-30)
- Software Asset Register Reconciliation (Q2) - Quarterly review Software Assets
- Verify all software in register matches actual deployments
- Remove decommissioned tools from register
- Update version numbers and support status
- VAULT_SECRET_ID Rotation (Q2) - Quarterly 90-day rotation Key Rotation Policy
- Generate new secret ID:
vault write -f auth/approle/role/checktick-app/secret-id - Update .env file with new VAULT_SECRET_ID
- Restart webapp:
docker compose restart web - Verify webapp can authenticate to Vault
- Document completion date in Infrastructure Technical Change Log
- DPIA Annual Review - Review all existing DPIAs (minimum annually) DPIA Procedure
- Survey Platform DPIA
- Any new feature DPIAs from previous year
- Update risk assessments
- SIRO sign-off on residual risks
- Privacy Notice Review - Annual review and update if required
- Terms of Service Review - Annual review and update if required
Ongoing Monthly (April)
- Monthly Access Review - GitHub and Northflank user lists (CTO) Access Control Policy
- Flag any accounts inactive for >90 days for review/disabling (Access Control Policy Section 6.4)
- Privileged Account Inventory Update - Update inventory with any account changes (new hires, role changes, leavers) Access Audit Logs
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal) External Service Authentication
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
May 2026
Week 1-4 (May 1-31)
- Internal Audit Spot Check - Semi-annual comprehensive audit Internal Audit Spot Check Log
- User access review (GitHub & Northflank)
- Encryption verification test
- Staff awareness test (random questions)
- Backup verification
- Individual rights tracker review
- Document findings and actions
- Training Needs Analysis Review - Review and update for coming year Training Needs Analysis
- Staff Security Agreement Review - Annual review Staff Security Agreement
Ongoing Monthly (May)
- Monthly Access Review - GitHub and Northflank user lists (CTO) Access Control Policy
- Flag any accounts inactive for >90 days for review/disabling (Access Control Policy Section 6.4)
- Privileged Account Inventory Update - Update inventory with any account changes (new hires, role changes, leavers) Access Audit Logs
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal) External Service Authentication
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
June 2026
Week 1-2 (Jun 1-15)
- Backup Restoration Test (Mid-Year) - Point-in-time recovery verification Backup Log
- Test point-in-time restore functionality
- Document recovery time
- Verify data integrity
Week 3-4 (Jun 16-30)
- Quarterly Access Review (Q2) (Cyber Essentials) - Comprehensive user account and privilege audit Access Control Policy
- Automated Export & Reconciliation: Export GitHub organisation members list and Northflank team members list; compare against Privileged Account Inventory for discrepancies
- Device Privileges: Verify standard/admin account separation maintained on all devices
- Device Admin Credentials: Verify device administrator credentials remain securely stored in password manager
- Admin Usage Verification: Confirm admin accounts (device and cloud) not used for routine work activities
- Cloud Accounts: Verify no orphaned or inactive accounts exist on GitHub and Northflank
- Role Alignment: Confirm all current users are authorized with appropriate role assignments (Owner vs Member)
- Privilege Verification: Verify account privileges match current role requirements and identify any 'privilege creep'
- Admin Controls: Verify administrative privileges only assigned to designated administrative accounts
- Operational Restrictions: Confirm operational accounts cannot perform security-critical operations
- Contractor Access: Ensure subcontractors only retain access to active projects
- Leaver Verification: Confirm any accounts belonging to departed staff have been fully removed
- Emergency Contacts: Review emergency contacts and Unseal Key locations
- Documentation Check: Verify Movers/Leavers Log is current and audit logs reviewed
- Security Review & Firewall Audit (Bi-annual) - Mid-year review Security Review Log and Infrastructure Technical Change Log
- Production ingress rules verification
- Compare against authorized inbound rule register
- Device User Account Re-verification: Confirm only necessary accounts on all devices
- Guest accounts still DISABLED
- Single user per device maintained
- Admin/user separation maintained
- Device Security Re-verification (Cyber Essentials): Standard Build Specification
- Screen lock timers still configured (laptops โค10min, mobile โค2min)
- Safari 'Open safe files after downloading' still disabled
- Chrome auto-open preferences still cleared
- Gatekeeper still active
- Device firewalls enabled with stealth mode
- FileVault encryption active
- Cloud service account review
- Document findings
Ongoing Monthly (June)
- Monthly Access Review - GitHub and Northflank user lists (CTO) Access Control Policy
- Flag any accounts inactive for >90 days for review/disabling (Access Control Policy Section 6.4)
- Privileged Account Inventory Update - Update inventory with any account changes (new hires, role changes, leavers) Access Audit Logs
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal) External Service Authentication
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
July 2026
Week 1-4 (Jul 1-31)
- Software Asset Register Reconciliation (Q3) - Quarterly review Software Assets
- Verify all software in register matches actual deployments
- Remove decommissioned tools from register
- Update version numbers and support status
- VAULT_SECRET_ID Rotation (Q3) - Quarterly 90-day rotation Key Rotation Policy
- Generate new secret ID:
vault write -f auth/approle/role/checktick-app/secret-id - Update .env file with new VAULT_SECRET_ID
- Restart webapp:
docker compose restart web - Verify webapp can authenticate to Vault
- Document completion date in Infrastructure Technical Change Log
- Mid-Year Training Refresh Check - Verify no training expirations
- Incident Response Plan Review - Mid-year review and update if needed Incident Response Plan
- Data Rights Request Tracker Review - Verify no pending SARs Data Rights Request Tracker
Ongoing Monthly (July)
- Monthly Access Review - GitHub and Northflank user lists (CTO) Access Control Policy
- Flag any accounts inactive for >90 days for review/disabling (Access Control Policy Section 6.4)
- Privileged Account Inventory Update - Update inventory with any account changes (new hires, role changes, leavers) Access Audit Logs
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal) External Service Authentication
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
August 2026
Week 1-4 (Aug 1-31)
- Tabletop Exercise (Q3) - Cyber security simulation Exercise Summary
- Based on NCSC threat intelligence
- Test incident response procedures
- Validate role clarity (SIRO/CTO)
- Test technical access to emergency backups
- Review communication templates
- Document lessons learned
- Update action log
- Annual Custodian Share Rotation - Cryptographic key rotation Key Rotation Policy
- Assemble Custodians: Coordinate availability of 3 of 4 custodians for current share retrieval
- Test Current Shares: Run
test_custodian_reconstructionwith 3 existing shares to verify before rotation - Generate New Platform Master Key: Execute
vault/setup_vault.pyto generate new vault and custodian components - Split New Component: Run
split_custodian_componentto create 4 new shares (3-of-4 threshold) - Distribute New Shares: Securely deliver shares to same 4 custodians (align with Vault unseal key holders)
- Test New Shares: Run
test_custodian_reconstructionwith 3 new shares to verify reconstruction - Destroy Old Shares: Securely overwrite/destroy all 4 old shares and any backups
- Update Vault Component: Update Vault secret store with new vault component
- Document Rotation: Record in Key Management Log with date, participants, and verification results
- Dual Authorization: Require SIRO + CTO sign-off on rotation completion
- Vault Encryption Key Rotation (Optional) - Rotate Vault's internal barrier key Key Rotation Policy
- Ensure Vault is unsealed
- Execute:
vault operator rotate - Verify Vault remains operational after rotation
- Document completion in Infrastructure Technical Change Log
- Supplier Register Review - Mid-year update
- Information Asset Register (ROPA) Review - Verify current processing activities
Ongoing Monthly (August)
- Monthly Access Review - GitHub and Northflank user lists (CTO) Access Control Policy
- Flag any accounts inactive for >90 days for review/disabling (Access Control Policy Section 6.4)
- Privileged Account Inventory Update - Update inventory with any account changes (new hires, role changes, leavers) Access Audit Logs
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal) External Service Authentication
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
September 2026
Week 1-4 (Sep 1-30)
- Quarterly Access Review (Q3) (Cyber Essentials) - Comprehensive user account and privilege audit Access Control Policy
- Automated Export & Reconciliation: Export GitHub organisation members list and Northflank team members list; compare against Privileged Account Inventory for discrepancies
- Device Privileges: Verify standard/admin account separation maintained on all devices
- Device Admin Credentials: Verify device administrator credentials remain securely stored in password manager
- Admin Usage Verification: Confirm admin accounts (device and cloud) not used for routine work activities
- Cloud Accounts: Verify no orphaned or inactive accounts exist on GitHub and Northflank
- Role Alignment: Confirm all current users are authorized with appropriate role assignments (Owner vs Member)
- Privilege Verification: Verify account privileges match current role requirements and identify any 'privilege creep'
- Admin Controls: Verify administrative privileges only assigned to designated administrative accounts
- Operational Restrictions: Confirm operational accounts cannot perform security-critical operations
- Contractor Access: Ensure subcontractors only retain access to active projects
- Leaver Verification: Confirm any accounts belonging to departed staff have been fully removed
- Emergency Contacts: Review emergency contacts and Unseal Key locations
- Documentation Check: Verify Movers/Leavers Log is current and audit logs reviewed
- Access Audit Log Spot Check - Bi-annual review of Data Custodian exports
- Change Management Policy Review - Verify compliance with procedures
Ongoing Monthly (September)
- Monthly Access Review - GitHub and Northflank user lists
- Privileged Account Inventory Update - Update inventory with any account changes
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal)
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
October 2026
Week 1-4 (Oct 1-31)
- Software Asset Register Reconciliation (Q4) - Quarterly review Software Assets
- Verify all software in register matches actual deployments
- Remove decommissioned tools from register
- Update version numbers and support status
- VAULT_SECRET_ID Rotation (Q4) - Quarterly 90-day rotation Key Rotation Policy
- Generate new secret ID:
vault write -f auth/approle/role/checktick-app/secret-id - Update .env file with new VAULT_SECRET_ID
- Restart webapp:
docker compose restart web - Verify webapp can authenticate to Vault
- Document completion date in Infrastructure Technical Change Log
- Annual Training Season Begins - Initiate annual training renewals
- NHS Data Security Awareness (Level 1) - All staff
- GDPR Training refresher
- Information Governance refresher
- OWASP/Secure Development - Technical staff
- Patch Management Strategy Review - Annual review and update Patch Management Strategy
- Vulnerability Patch Log Review - Audit trail verification
Ongoing Monthly (October)
- Monthly Access Review - GitHub and Northflank user lists
- Privileged Account Inventory Update - Update inventory with any account changes
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal)
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
November 2026
Week 1-2 (Nov 1-15)
- Internal Audit Spot Check - Annual comprehensive audit Internal Audit Spot Check Log
- User access review
- Encryption verification
- Staff awareness test
- Backup verification
- Individual rights tracker review
- Sovereign Security Review (Q4) - Review against updated NCSC Cloud Security Guidance
Week 3-4 (Nov 16-30)
- Board Meeting - Annual Policy Review - Review all policies for 2027
- Review and approve Data Security & Protection policy suite
- Sign Board minutes for DSPT evidence Board Minutes
- Annual Training Completion Verification - Ensure 100% completion Training Log
Ongoing Monthly (November)
- Monthly Access Review - GitHub and Northflank user lists
- Privileged Account Inventory Update - Update inventory with any account changes
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal)
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
December 2026
Week 1-2 (Dec 1-15)
- Security Review & Firewall Audit - Bi-annual review Security Review Log
- Router ingress rules verification (BT Smart Hub 2)
- Verify no port forwarding enabled
- Verify DMZ disabled
- Verify UPnP disabled
- Document findings in Security Review Log
- Quarterly Access Review (Q4) (Cyber Essentials) - Comprehensive user account and privilege audit Access Control Policy
- Automated Export & Reconciliation: Export GitHub organisation members list and Northflank team members list; compare against Privileged Account Inventory for discrepancies
- Device Privileges: Verify standard/admin account separation maintained on all devices
- Device Admin Credentials: Verify device administrator credentials remain securely stored in password manager
- Admin Usage Verification: Confirm admin accounts (device and cloud) not used for routine work activities
- Cloud Accounts: Verify no orphaned or inactive accounts exist on GitHub and Northflank
- Role Alignment: Confirm all current users are authorized with appropriate role assignments (Owner vs Member)
- Privilege Verification: Verify account privileges match current role requirements and identify any 'privilege creep'
- Admin Controls: Verify administrative privileges only assigned to designated administrative accounts
- Operational Restrictions: Confirm operational accounts cannot perform security-critical operations
- Contractor Access: Ensure subcontractors only retain access to active projects
- Leaver Verification: Confirm any accounts belonging to departed staff have been fully removed
- Emergency Contacts: Review emergency contacts and Unseal Key locations
- Documentation Check: Verify Movers/Leavers Log is current and audit logs reviewed
- Year-End Risk Register Review - Prepare for annual board review
- Business Impact Assessment Review - Annual update Business Impact Assessment
- Verify RTO/RPO targets
- Update service criticality ratings
- Review dependencies
Week 3-4 (Dec 16-31)
- Annual Compliance Documentation Review - Prepare evidence portfolio for next DSPT cycle
- Organize all logs and audit trails
- Collect training certificates
- Compile incident reports (if any)
- Document all exercises and drills
- Data Retention Policy Review - Verify automated data governance processes
- Year-End Board Report - Summary of security posture for the year
Ongoing Monthly (December)
- Monthly Access Review - GitHub and Northflank user lists
- Privileged Account Inventory Update - Update inventory with any account changes
- Monthly MFA Compliance Check (Cyber Essentials) - Verify MFA enabled on staff administrative accounts (CheckTick backend/admin portal)
- Monthly Risk Register Review - Founders' Board meeting
- Monthly Security Briefing - Review logs, alerts, and policy updates
Continuous/Weekly Activities (All Year)
Daily
- Automated Security Scans - GitHub Dependabot and pip-audit (06:00 UTC)
- Automated Maintenance Tasks
process_data_governance- GDPR data minimizationprocess_recovery_time_delays- Key recoverycleanup_survey_progress- Session cleanup- Security Monitoring - Review alerts from Northflank/GitHub
Weekly
- Vulnerability Management - Review and triage Dependabot alerts
- Patch Review - Assess and plan patches for non-critical vulnerabilities
- NHS Data Dictionary Sync - Automated clinical data accuracy update
- Backup Verification - Confirm automated backups successful
As Needed
- Critical/Zero-Day Patching - Emergency response within 48 hours (CVSS 9.0+)
- Incident Response - Follow Incident Response Plan for any security events
- Data Subject Rights Requests - Process within 30 days of receipt
- Breach Notification - ICO within 72 hours; customers without undue delay
Quarterly Summary Schedule
Q1 (Jan-Mar)
- Annual Security Validation
- Unused Software & Service Removal (Annual)
- Software Asset Register Reconciliation (Quarterly)
- Annual Infrastructure & Firewall Review (Cyber Essentials)
- External Service Authentication Review (Cyber Essentials)
- Device User Account Audit (Annual)
- Device Security Configuration Audit - AutoRun/Execution Controls (Bi-annual)
- DSPT Submission
- Disaster Recovery Drill
- Contract Reviews
- Asset Register Update
Q2 (Apr-Jun)
- Software Asset Register Reconciliation (Quarterly)
- Device User Account Re-verification (Bi-annual)
- Device Security Configuration Re-verification - AutoRun/Execution Controls (Bi-annual)
- DPIA Reviews
- Mid-year Backup Test
- Semi-annual Internal Audit
- Firewall Audit
Q3 (Jul-Sep)
- Software Asset Register Reconciliation (Quarterly)
- Tabletop Exercise
- Mid-year Reviews
- Incident Response Plan Review
- Supplier Register Update
Q4 (Oct-Dec)
- Software Asset Register Reconciliation (Quarterly)
- Annual Training Renewals
- Policy Suite Review
- Board Approval & Minutes
- Year-end Compliance Documentation
- Business Impact Assessment
Key Contacts & Escalation
SIRO (Senior Information Risk Owner): [SIRO Name] CTO (Cyber Security Lead): [DPO Name] DPO (Data Protection Officer): [SIRO Name] Caldicott Guardian: [DPO Name]
Emergency Response Times
- Critical Incidents (P1): Immediate response, containment within 4 hours
- ICO Breach Notification: Within 72 hours of awareness
- Critical Patching: Within 48 hours
- Data Subject Rights: Within 30 days
Version History
| Date | Version | Changes | Approved By |
|---|---|---|---|
| 08/02/2026 | 1.0 | Initial 2026 checklist created | Pending |
Notes
- This checklist is derived from the complete compliance documentation suite
- All activities support DSPT (Data Security & Protection Toolkit) and CyberEssentials requirements
- Review and update this checklist monthly during board meetings
- Document completion of each item with date and responsible person
- Any deviations must be documented in the Risk Register
- Failed or missed items escalate to board level within 48 hours
Last Updated: 08/02/2026 Next Review: Monthly at Board Meeting