Skip to content

Audit Packet Checklist (48-hour evidence readiness) — ChoicePoint (FTC 2006)

If examined (regulator, auditor, litigation), you should be able to produce the following within 48 hours.

A) Architecture + boundaries

  • Subscriber-onboarding process maps and data-access boundary diagrams.
  • Customer verification control inventory and ownership matrix.
  • Exception register for onboarding shortcuts with compensating controls and expiry.

B) Change control proof

  • Change approvals for onboarding verification controls and fraud-screening workflows.
  • Emergency change logs tied to fraud-onboarding risk mitigation actions.
  • Ticket evidence linking control changes to documented risk findings.

C) IAM least privilege proof

  • Access inventory for systems handling sensitive consumer records.
  • Periodic access reviews and remediation evidence for excessive permissions.
  • Credential governance and privileged-account monitoring evidence.

D) Logging + monitoring proof

  • Log-source coverage for onboarding actions, authentication events, and data queries.
  • Retention policies and tamper-evidence controls for investigative logs.
  • Detection/alert artifacts for suspicious customer account creation patterns.

E) Risk management & governance

  • Risk-register entries for fraudulent customer onboarding and unauthorized data access.
  • Governance reporting packets tracking FTC-order control commitments.
  • Independent assessment reports and remediation closure documents.

F) Incident response readiness

  • IR runbooks for fraudulent-account abuse and sensitive-data misuse events.
  • Evidence chain-of-custody records for law-enforcement and regulator support.
  • Tabletop outputs focused on onboarding fraud and escalation timeliness.
© 2026 Yi Zhang. Licensed under the MIT License.
Last updated: 2026 April 17 9:37 AM