๐Ÿ›ก๏ธ Cybersecurityโฑ 8 min read

Website Security Checklist for Australian Businesses (2026)

This checklist covers the essential security controls every Australian business website needs โ€” from basic HTTPS enforcement to Australian Privacy Act compliance. Each item is actionable and ordered by priority.

A complete website security checklist for Australian businesses covering SSL, headers, authentication, data protection, and compliance

This checklist covers the essential security controls every Australian business website needs โ€” from basic HTTPS enforcement to Australian Privacy Act compliance. Each item is actionable and ordered by priority: fix critical items first, then work through the rest. According to the ACSC, 1 in 5 Australian SMBs experienced a cyber incident in 2025, with the average cost per incident exceeding $46,000.

Critical โ€” fix immediately

SSL/TLS configuration

  • ☐ HTTPS enforced on all pages (no HTTP fallback)
  • ☐ TLS 1.2 or 1.3 only โ€” TLS 1.0 and 1.1 disabled
  • ☐ SSL certificate valid and auto-renewing
  • ☐ HSTS header enabled: Strict-Transport-Security: max-age=63072000; includeSubDomains; preload
  • ☐ No mixed content warnings (all resources loaded over HTTPS)

Authentication security

  • ☐ Admin login URLs changed from defaults (/wp-admin, /admin)
  • ☐ Brute force protection enabled (account lockout after 5 failed attempts)
  • ☐ Two-factor authentication on all admin accounts
  • ☐ Strong password policy enforced (minimum 12 characters)
  • ☐ Session cookies set with HttpOnly, Secure, and SameSite flags

High priority โ€” address within one week

Security headers

  • ☐ Content-Security-Policy โ€” prevents XSS and code injection
  • ☐ X-Frame-Options: DENY โ€” prevents clickjacking
  • ☐ X-Content-Type-Options: nosniff โ€” prevents MIME sniffing
  • ☐ Referrer-Policy: strict-origin-when-cross-origin
  • ☐ Permissions-Policy โ€” disables unused browser features (camera, microphone, geolocation)

Software updates

  • ☐ CMS updated to latest version (WordPress, Shopify, etc.)
  • ☐ All plugins and themes updated
  • ☐ Unused plugins and themes removed entirely
  • ☐ Server software (PHP, Node.js, nginx) up to date
  • ☐ Automatic updates enabled where available

Input validation

  • ☐ All form inputs validated server-side (not just client-side)
  • ☐ File uploads restricted by type and size
  • ☐ SQL injection protection on all database queries (parameterised queries)
  • ☐ Cross-site scripting (XSS) prevention โ€” user input escaped before display
  • ☐ CSRF tokens on all forms that change data

Medium priority โ€” address within one month

Information exposure

  • ☐ Server version headers removed (X-Powered-By, Server)
  • ☐ Directory listing disabled
  • ☐ Error pages show generic messages (no stack traces or debug info)
  • ☐ Backup files not accessible from the web (.bak, .old, .sql)
  • ☐ Configuration files not exposed (.env, wp-config.php, .git)

Email security

  • ☐ SPF record configured โ€” specifies which servers can send email for your domain
  • ☐ DKIM configured โ€” digitally signs outgoing emails
  • ☐ DMARC policy set โ€” tells receiving servers what to do with failed authentication
  • ☐ No open mail relay on your server

Backup and recovery

  • ☐ Automated daily backups running
  • ☐ Backups stored offsite (not just on the same server)
  • ☐ Backup restoration tested at least once
  • ☐ Recovery time documented โ€” how long to restore after an incident

Australian compliance requirements

Australian Privacy Act 1988

  • ☐ Privacy policy published and accessible from every page
  • ☐ Data collection minimised โ€” only collecting what's necessary
  • ☐ User consent obtained before collecting personal information
  • ☐ Data stored securely with encryption at rest
  • ☐ Process in place for responding to access and correction requests

Notifiable Data Breaches (NDB) scheme

  • ☐ Data breach response plan documented
  • ☐ Process for assessing whether a breach is "likely to result in serious harm"
  • ☐ OAIC notification template prepared
  • ☐ Staff trained on breach identification and escalation

Ongoing โ€” repeat quarterly

  • ☐ Run automated vulnerability scan
  • ☐ Review and rotate all passwords and API keys
  • ☐ Review user access โ€” remove accounts no longer needed
  • ☐ Check all third-party integrations still necessary and up to date
  • ☐ Review server logs for unusual access patterns
  • ☐ Test backup restoration

How does your website score on this checklist?

RabbiiCo Studio's free Attack Surface Scan checks your website against this checklist automatically and provides a prioritised remediation report. No obligation.

Get your free security scan โ†’