Security Key Audit Checklist

General Information
Auditor Name
Date
Department / Team
Key Inventory
Key ID Assigned User Device Type Status Last Audited Notes
Checklist
Item Compliant Comments
All keys are physically present
Unused/lost keys are revoked
Keys registered to correct users
Key usage logs reviewed
Backup keys accounted for
Additional Notes