December is the month with the highest number of incidents reported throughout the year, especially due to seasonal phishing and human error.
82% of breaches are due to human error or incorrect configurations (Verizon DBIR 2024).
This checklist is a practical guide that you can apply before the end of the year.
1. Updated asset inventory
40% of breaches involve forgotten or uninventoried assets (Gartner 2024).
Include:
- Computers
- Servers
- Licenses
- Active/inactive users
- Third-party access
- SaaS applications
2. Tested backups
It’s not enough to “have” a backup: you must ensure that it can be restored.
Validate:
- Recent restoration
- 3-2-1 rule
- Offline copy
- Integrity verification
Source: NIST SP 800-34.
3. Patches and updates
CISA notes that more than 50% of massive attacks exploit vulnerabilities that were patched months earlier.
Check:
- Windows Update
- Firewall firmware
- Servers
- Key applications
4. Privileged access and inactive users
The end of the year requires cleaning up: staff who have resigned, temporary suppliers, interns.
Eliminate:
- Orphaned users
- Duplicate accounts
- Unnecessary administrator roles
5. Antivirus/EDR working correctly
An expired antivirus is almost the same as not having one.
Validate:
- Latest update
- Active engine
- Sensors working
- Real-time detection
Source: AV-Test 2024.
6. Logs and records
CISA states that without logs there is no investigation or containment.
Check:
- Retention of at least 90 days
- Alerts configured
- Centralized export
This checklist not only prevents attacks; it prepares you for January audits.
