Skip to main content
Testing & Assurance · Retail Cybersecurity

Retail
cybersecurity
audit: the practical
checklist.

Most retail cybersecurity audit checklists read like they were written by someone who has never walked through a store. They list generic controls, mention PCI DSS in passing, and skip the parts that actually matter: how your POS estate connects to your corporate network, whether your e-commerce platform is silently leaking card data through third-party scripts, and what happens when a store manager reuses the same admin password across six systems.

This guide is built for Australian retailers who need a practical, honest audit framework. It covers PCI DSS v4.0 (fully mandatory since March 2025), the Australian Privacy Act obligations that most retail businesses underestimate, and the specific attack surfaces that make retail one of the most targeted sectors in the country.

Written by practitioners who hold ISO 27001 certification and conduct cybersecurity audits for Australian retail and e-commerce businesses.

01 / Why retail is different

Retail has a unique attack surface that generic audit checklists consistently miss.

Retail is not just another industry vertical that handles credit cards. It has a combination of characteristics that make its cybersecurity profile genuinely distinctive, and genuinely difficult to secure.

High transaction volume with low-margin tolerance for disruption. A retailer processing thousands of transactions daily cannot afford the downtime that a ransomware incident creates. The pressure to restore operations quickly often leads to poor incident response decisions, including paying ransoms without proper forensic analysis.

Distributed physical infrastructure. Most retailers operate across multiple store locations, each with its own POS terminals, local networks, and staff. Every store is an entry point. Every store manager with admin access is a potential phishing target. Centralised security policies are only as strong as their weakest local implementation.

Blended digital and physical environments. Modern retail combines in-store POS systems, e-commerce platforms, mobile apps, loyalty programmes, warehouse management, and supply chain integrations. Each of these systems touches customer data. Each creates a potential path for an attacker to move between environments.

High staff turnover. Retail has one of the highest employee turnover rates of any industry. This creates persistent challenges around access management, security awareness, and the risk of credentials remaining active long after staff have departed.

A cybersecurity audit that does not account for these specific characteristics will produce findings that look thorough on paper but miss the risks that actually matter in a retail environment.

02 / The retail threat landscape in Australia

What is actually hitting Australian retailers, and what that means for your audit priorities.

Understanding what threats are real and active shapes where your audit should focus. The Australian Signals Directorate's Annual Cyber Threat Report and the OAIC's Notifiable Data Breaches reports provide the clearest picture of what is actually happening.

1,100+
Notifiable data breaches reported to the OAIC in the 2023-24 financial year
67%
Of breaches caused by malicious or criminal attacks, not accidents
$56,600
Average self-reported cost per incident for small businesses (ASD 2024-25)

The retail sector consistently appears among the most-breached industries in OAIC reporting. The reasons are structural, not surprising: large volumes of personal and financial data, extensive third-party integrations, and security investment that often lags behind the pace of digital transformation.

01
POS malware and skimming
Memory-scraping malware that captures card data in transit between the POS terminal and the payment processor. Still active and effective where end-to-end encryption has not been fully implemented or where legacy terminals remain in the environment.
02
Ransomware
Retail's low tolerance for downtime makes it an attractive ransomware target. Attackers know that a retailer facing a weekend of lost sales is more likely to pay than a business that can operate offline. Common entry points include exposed RDP, phishing, and compromised vendor access.
03
E-commerce platform attacks
Magecart-style attacks inject malicious JavaScript into checkout pages to skim payment data in real time. These scripts often enter through compromised third-party integrations, analytics tags, or advertising pixels that have write access to the checkout page DOM.
04
Phishing and BEC
Business email compromise targeting finance teams, store managers, and supply chain contacts. Retail's distributed workforce and high turnover mean that staff are less likely to recognise sophisticated phishing attempts, especially those impersonating suppliers or head office.

Your audit checklist should be weighted toward these threats. If your audit spends equal time on every control domain without accounting for the specific risk profile of retail, it will produce a report that looks balanced but misses the areas where you are most likely to be hit.

03 / The audit checklist

Eight domains that every retail cybersecurity audit must cover, with the specific checks that matter most.

This is not an exhaustive list of every possible control. It is a practical checklist built around the areas where we consistently find the most significant gaps in Australian retail environments. Each domain includes the specific checks that should be part of your audit scope.

01
Payment system security
Payment systems are the primary target in retail. This domain covers everything between the customer's card and your payment processor.
  • PCI DSS v4.0 compliance status validated against current requirements (all v4.0 requirements mandatory from 31 March 2025)
  • End-to-end encryption (P2PE) implemented across all POS terminals with no legacy unencrypted devices remaining
  • Tokenisation in place for stored card data, with no PAN storage in clear text anywhere in the environment
  • POS terminal inventory current and reconciled, with tamper inspections documented at defined intervals
  • Network segmentation isolating the cardholder data environment from corporate and store networks
  • Payment gateway configuration reviewed, including TLS versions, cipher suites, and certificate management
02
E-commerce platform security
If you sell online, your e-commerce platform is both a revenue channel and an attack surface. Magecart-style attacks continue to compromise retail checkout pages through third-party scripts.
  • Third-party script inventory on checkout and payment pages, with each script justified and monitored
  • Content Security Policy (CSP) implemented to restrict which scripts can execute on payment pages
  • Subresource Integrity (SRI) hashes applied to all externally hosted scripts
  • Platform patching current for the CMS, plugins, and extensions (Magento, Shopify, WooCommerce, or equivalent)
  • Admin access to the e-commerce platform protected by MFA, with access logs reviewed
  • SSL/TLS configuration validated across all customer-facing pages, not only the checkout
03
Access controls and identity management
High staff turnover in retail makes access management a persistent challenge. The audit should verify that access controls keep pace with workforce changes.
  • Role-based access control (RBAC) implemented with clearly defined roles for store staff, managers, and head office
  • MFA enforced for all remote access, admin accounts, and cloud platform access
  • Joiner-mover-leaver process documented and functioning, with access revoked within 24 hours of termination
  • Privileged account inventory current, with shared or generic admin accounts identified and scheduled for elimination
  • Password policies aligned with current ASD and NIST guidance (length over complexity, credential screening against breach databases)
  • Service account management reviewed, with service accounts using individual credentials and minimum necessary permissions
04
Network security and segmentation
Flat networks are one of the most common findings in retail audits. When the store Wi-Fi, POS system, back-office workstations, and CCTV all share the same network, a compromise in one area gives an attacker access to everything.
  • Network segmentation between POS, corporate, guest Wi-Fi, IoT/CCTV, and warehouse environments verified and tested
  • Firewall rules reviewed and justified, with no legacy allow-all rules remaining
  • Remote access restricted to VPN or zero-trust network access, with RDP not exposed to the internet
  • Guest and customer Wi-Fi completely isolated from internal networks
  • DNS filtering and web content filtering deployed across all store and corporate networks
  • Wireless security using WPA3 or WPA2-Enterprise, with no WEP or open networks in the environment
05
Endpoint and POS device management
Retail environments typically include a mix of POS terminals, workstations, tablets, mobile devices, and IoT systems. Each needs to be managed, patched, and monitored.
  • Endpoint detection and response (EDR) deployed across all workstations and servers, with alerts actively monitored
  • POS terminal firmware and software current, with a defined patching schedule
  • Application whitelisting considered for POS terminals and kiosk devices that run a fixed set of applications
  • USB and removable media controls enforced on POS and workstation devices
  • Asset inventory complete and current, covering all devices across all store locations
  • Patching cadence aligned with risk: critical vulnerabilities on internet-facing systems patched within 48 hours per ASD guidance
06
Data protection and privacy
Retailers hold personal information (names, addresses, purchase history, loyalty data) and financial data (card numbers, bank details). Both carry legal obligations under Australian law.
  • Data inventory documenting what personal information is collected, where it is stored, who has access, and how long it is retained
  • Privacy Act compliance assessed, including Australian Privacy Principles (APPs) for collection, use, disclosure, and storage of personal information
  • Notifiable Data Breaches (NDB) scheme readiness verified, with a documented process for assessing and reporting eligible breaches to the OAIC
  • Data retention policies defined and enforced, with data destroyed when no longer needed for the purpose it was collected
  • Encryption at rest and in transit for all personal and financial data, including loyalty programme databases and customer analytics
  • Cross-border data transfers assessed where customer data is processed by overseas vendors or cloud platforms
07
Third-party and supply chain security
Retail supply chains are complex. Payment processors, logistics providers, marketing platforms, loyalty programme vendors, and e-commerce integrations all have some level of access to your environment or data. Each is a potential attack vector.
  • Third-party inventory listing all vendors with access to systems, data, or network connectivity
  • Security assessments conducted for critical vendors, proportionate to their access level and data exposure
  • Contractual security requirements in place, including breach notification obligations, right to audit, and data handling standards
  • Vendor access controls reviewed, with third-party access limited to specific systems and time-bound where possible
  • Fourth-party risk considered: understanding which of your vendors subcontract to other providers and what data flows downstream
  • API security assessed for all integrations between your systems and third-party platforms
08
Incident response and business continuity
When a retail business is hit by a cyber incident, the pressure to restore trading creates decisions that are often at odds with good incident response practice. Your audit should verify that you can do both.
  • Incident response plan documented, tested, and understood by key personnel including store operations leadership
  • Communication protocols defined for notifying customers, regulators (OAIC, card brands), law enforcement, and the board
  • Backup and recovery tested, with recovery time objectives defined for critical retail systems (POS, e-commerce, inventory)
  • Offline trading capability assessed: can stores continue to trade if the network or POS system is unavailable?
  • Forensic readiness verified: logging is sufficient to support investigation, and logs are stored separately from production systems
  • Tabletop exercises conducted at least annually, with scenarios specific to retail (ransomware during peak trading, card data breach, supply chain compromise)
04 / PCI DSS v4.0: what changed for retailers

PCI DSS v4.0 is now fully mandatory. Here is what Australian retailers need to understand.

PCI DSS v4.0 was published in March 2022, with a transition period that ended on 31 March 2025. All previous versions (including v3.2.1) have been retired. If your last PCI assessment was conducted against v3.2.1, it is no longer valid as a current compliance baseline.

The changes in v4.0 are not cosmetic. Several requirements that were previously best practice became mandatory in March 2025. The most significant for Australian retailers include:

Requirement area What changed in v4.0 Retail impact
Authentication (Req 8) MFA required for all access to the cardholder data environment, not just remote access Store staff and managers accessing payment systems now need MFA, which many retailers have not implemented for in-store access
E-commerce scripts (Req 6.4.3) Inventory and integrity monitoring of all scripts on payment pages Directly targets Magecart-style attacks. Retailers must inventory, justify, and monitor every script executing on checkout pages
Risk-based approach (Req 12.3.1) Targeted risk analysis required for each requirement where flexibility is exercised Retailers using the customised approach must document risk analysis, not just assert compliance
Security awareness (Req 12.6) Phishing and social engineering training explicitly required Training must cover current threats relevant to retail staff, not just generic annual awareness modules
Logging (Req 10) Automated log review mechanisms required Manual log review no longer sufficient. Retailers need automated monitoring or a managed security service to meet this requirement

PCI DSS is enforced contractually through your acquiring bank, not by the Australian Government. But the consequences of non-compliance are commercial, not just regulatory: increased transaction fees, fines from card brands, and in serious cases, loss of the ability to accept card payments. For a retailer, that last consequence is effectively a shutdown.

Self-Assessment Questionnaire or Report on Compliance? Which PCI DSS validation type applies to you depends on your transaction volume and acquirer requirements. Most Australian retailers with fewer than six million transactions annually will use an SAQ. Larger retailers and those that have experienced a breach typically require a Report on Compliance (ROC) assessed by a Qualified Security Assessor (QSA). Your acquirer determines which applies.

05 / Australian Privacy Act obligations for retail

The Privacy Act applies to most retailers, and the obligations are broader than many realise.

The Privacy Act 1988 applies to retail businesses with annual turnover exceeding $3 million, as well as smaller retailers that trade in personal information, are related to a larger organisation, or provide health-related services. In practice, most multi-store retailers and any retailer with a meaningful online presence will be covered.

The Notifiable Data Breaches (NDB) scheme requires covered retailers to notify the OAIC and affected individuals when a data breach is likely to result in serious harm. This applies to breaches of personal information, not just financial data. A breach of your loyalty programme database containing names, email addresses, and purchase history can trigger notification obligations.

Your cybersecurity audit should verify that you have:

  • A documented process for assessing whether a suspected breach is a notifiable data breach under the NDB scheme
  • Clear responsibility assigned for making the notification decision, with defined escalation to the board
  • The ability to notify affected individuals promptly, including where contact details may have been compromised
  • Data retention schedules that minimise the volume of personal information at risk if a breach occurs

The Australian Government's proposed Privacy Act reforms are expected to lower the small business exemption threshold and expand individual rights. Retailers currently below the $3 million threshold should be preparing for these changes rather than waiting for them to take effect.

06 / The gaps we find most often

After auditing retail environments, these are the findings that keep appearing.

These are not theoretical risks. They are the specific gaps we encounter consistently when assessing Australian retail businesses. If your last audit did not examine these areas, it left significant blind spots.

Flat networks across stores. The POS system, back-office workstations, CCTV cameras, and customer Wi-Fi all sitting on the same network or VLAN. An attacker who compromises the Wi-Fi or a CCTV camera can reach payment systems. This is one of the most common and most dangerous findings in retail.

Legacy POS terminals still in the environment. Older terminals that do not support P2PE or current TLS versions, kept running because they still work. These devices often cannot be patched and represent a direct path to card data.

No inventory of third-party scripts on the e-commerce platform. Marketing, analytics, A/B testing, and advertising scripts running on checkout pages with no formal approval process and no integrity monitoring. This is exactly the gap that Magecart-style attacks exploit, and it is now an explicit PCI DSS v4.0 requirement to address.

Generic shared admin accounts. A single "manager" or "admin" account used across multiple stores or by multiple people. No individual accountability, no audit trail, and typically no MFA. When a credential is compromised, there is no way to determine which individual's access was used.

Incident response plans that have never been tested. The plan exists in a document, but no one in store operations has seen it. No tabletop exercise has been conducted. When an incident occurs, the response is improvised, and the priority is always to restore trading rather than to contain the breach properly.

Terminated staff with active credentials. High turnover combined with informal offboarding processes means former employees retain access to systems, sometimes for weeks or months. This is particularly dangerous when the same credentials provide remote VPN access to the corporate network.

07 / Audit versus penetration test: you probably need both

They answer different questions, and one does not replace the other.

A common mistake is to treat a cybersecurity audit and a penetration test as interchangeable. They are not. They answer fundamentally different questions, and for a retail business, you need the answers to both.

Dimension Cybersecurity audit Penetration test
Question answered Are our controls designed correctly and operating effectively? Can an attacker actually break in, and how far can they get?
Scope Broad: policies, processes, technical controls, compliance, governance Targeted: specific systems, applications, or network segments
Output Maturity assessment, compliance gaps, governance recommendations Exploitable vulnerabilities, attack paths, proof-of-concept evidence
PCI DSS role Provides the compliance assessment (SAQ or ROC) Required as a component of PCI DSS (Req 11.4) at least annually
For retail Evaluates your overall security posture across all stores and platforms Tests whether your POS network, e-commerce platform, or corporate network can be compromised

PCI DSS itself requires both. Requirement 11.4 mandates external and internal penetration testing at least annually and after significant changes. The broader compliance assessment (SAQ or ROC) covers the audit function. Treating one as a substitute for the other will leave gaps in both your security posture and your compliance evidence.

08 / How we help

What the Cliffside approach to retail cybersecurity audits actually looks like.

We conduct cybersecurity audits for Australian retailers ranging from multi-store chains to online-only e-commerce businesses. Our approach is built around the specific risk profile of retail, not a generic control framework applied without context.

Our Lighthouse Assessment provides an independently verified picture of your cybersecurity posture, covering every domain in this checklist plus the regulatory obligations specific to your business. We tell you what is working, what is not, and what to fix first, prioritised by actual risk to your operations, not by audit framework numbering.

  • Full cybersecurity posture assessment across all store locations, e-commerce platforms, and corporate infrastructure
  • PCI DSS v4.0 readiness assessment, identifying gaps against current requirements
  • Privacy Act and NDB scheme compliance review for personal data handling
  • Penetration testing of POS networks, e-commerce platforms, and corporate environments
  • Third-party and supply chain risk assessment covering payment processors, logistics, and marketing vendors
  • Incident response plan review and tabletop exercise design
  • Transferable report with prioritised remediation roadmap, yours to use with your board, your auditors, or your acquirer

The findings are honest. We will tell you where your controls are genuinely strong, and we will tell you where they are not. If your previous audit missed the gaps outlined in this article, your security posture is based on an incomplete picture.

Retail Cybersecurity

Know where
your retail
security
actually stands.

The Cliffside Lighthouse Assessment delivers an independently verified cybersecurity posture assessment for your retail business, covering PCI DSS v4.0 readiness, Privacy Act obligations, payment system security, e-commerce platform protection, and the specific gaps that generic audit checklists consistently miss.

What you get from the Lighthouse Assessment
  • Full cybersecurity posture assessment across stores, e-commerce, and corporate infrastructure
  • PCI DSS v4.0 gap analysis against current mandatory requirements
  • Privacy Act and NDB scheme compliance review
  • Third-party and supply chain risk assessment
  • Penetration testing of payment and e-commerce environments
  • Transferable report with prioritised remediation roadmap