email-svg
Get in touch
info@canadiancyber.ca

Internal Audit Script for MSPs

A practical internal audit guide for MSPs to test shared access, backup controls, and vendor governance with evidence auditors trust.

Main Hero Image

MSP Audit Readiness • Shared Access • Backup Restore • Vendor Governance

Internal Audit Script for MSPs

How to test shared access, backup, and vendor controls with samples auditors trust
MSPs do not get audited like regular companies. You are trusted with customer admin access, backups and recovery, privileged tools, and a long list of vendors and subcontractors. That is why internal audits hit harder in these areas.

When an ISO 27001, SOC 2, or customer-driven internal audit happens, auditors usually push hard on three questions: who can do what across tenants, can you actually restore what you back up, and are third parties governed instead of just listed.

This is a practical audit script MSPs can run quarterly or as a micro-audit. It is built around test objectives, sample rules, steps, evidence capture, and clear pass or fail logic.

How to use this script

  1. Pick a period, usually the last quarter.
  2. Pull a small sample, typically 3 to 10 items per test.
  3. Record results using Condition, Criteria, and Consequence.
  4. Create corrective actions with closure proof and a verification date.

If your ISMS lives in SharePoint, keep the results clean. Store the script output as a short audit memo, save the sample evidence in the quarter’s evidence pack, and log findings plus CAPA in the corrective action register.

Audit memo
One page summary of scope, tests, and results.
Evidence pack
Sample screenshots, exports, sign-offs, and tickets for the quarter.
Corrective actions
Findings-to-fixes with owners, due dates, and re-test proof.

Part 1: Shared access

This is the MSP’s highest-risk control area. Auditors want proof that privileged access is known, justified, segmented, and reviewed.

Test 1 — Privileged account inventory and ownership

Area What to do
Objective Confirm privileged access is known, minimal, owned, and reviewed.
Sample Pull full exports from RMM, PSA, M365 or Entra, and PAM if used. Sample 5 to 10 privileged accounts including a break-glass account, a service account, two technician or admin users, and one external vendor account if applicable.
Steps Confirm owner, business justification, MFA where supported, least privilege alignment, and a periodic privileged access review for the quarter.
Evidence Export snapshot, review sign-off, and MFA proof.
Pass or fail Pass if all sampled accounts are justified, MFA-protected, and reviewed. Fail if there are unknown admins, shared admins, no review record, or MFA gaps.

Test 2 — Shared accounts and generic logins

Search for accounts like admin@, support@, tech@, svc@, or noc@. If they exist, the audit question is not just whether they exist. It is whether they are governed tightly.

What auditors expect if shared accounts remain
  • documented business justification
  • compensating controls such as vaulting, checkout, MFA, and logging
  • restricted permissions
  • review cadence
  • an exception with an expiry date if the account cannot yet be removed
Pass:
no shared accounts, or strong compensating controls plus an expiry-dated exception.

Fail:
shared admin accounts with no governance.

Test 3 — Customer tenant access segmentation

Select three customer tenants: one largest client, one regulated or high-risk client, and one smaller client. Then sample two to three technicians per client and verify they only have access to the clients they should support and only at the role level they actually need.

Look for
Per-client groups, role-based separation, approval records, and offboarding evidence.
Pass
Clear segmentation, approvals, and revocation proof.
Fail
Broad permanent access with no review.

Test 4 — Vendor remote access governance

Pull three vendor access instances from the last quarter, or three active vendor accounts. Verify there is an approval record, the access is time-bound, least privilege is applied, and logs or session records exist where the platform supports them.

Best first move for MSP audits
If you want the fastest risk reduction, start with privileged account inventory, shared account cleanup, and tenant access segmentation. Those three areas usually produce the most meaningful audit findings first.

Part 2: Backup controls

This is the “prove you can restore” section. Backups do not impress auditors by existing. They impress auditors when you can show that coverage is defined, failures are corrected, restores are tested, and backup administration is hardened.

Test 5 — Backup scope and coverage

Sample three customers using the same logic as before: largest, high-risk, and small. For each one, sample a server or workload backup, an M365 or SaaS backup if offered, and one critical configuration backup such as firewall, switch, or export.

Check What good looks like
Backup inventory What is backed up is defined per client.
Frequency and retention Matches contract terms or internal expectations.
Failure handling Failed jobs create tickets and there is closure evidence.

Test 6 — Restore testing

This is the backup control auditors trust most. Select two restore tests from the last quarter, or run one immediately if records are missing. One should be file-level and one should be a system, application, database, or VM restore.

Restore test evidence should show
  • date, scope, system, and outcome
  • time-to-restore or RTO evidence
  • validation steps proving the restore actually worked
  • review or sign-off
  • corrective action if the restore failed
Pass:
restore evidence exists with validation and timing.

Fail:
backups exist, but restores are not tested or not documented.

Test 7 — Backup security and ransomware resilience

Pull the backup admin role list, sample three backup admin accounts, and confirm least privilege, MFA, deletion protection or immutability where feasible, and a break-glass process if needed.

Evidence
Role export, MFA proof, vault or retention settings, and access review sign-off.
Pass
Access is restricted, MFA is enforced, and destructive deletion is controlled.
Fail
Too many backup admins, no review, and easy deletion paths.

Part 3: Vendor controls

MSP supply chain governance must be provable. Auditors want to see vendor tiering, evidence reviews, access mapping, and renewal discipline before a problem happens.

Test 8 — Vendor register completeness and tiering

Pull the vendor register and sample five vendors: two critical, two high, and one medium. Confirm service, data type, access type, tier, contract owner, last review date, and next review date are all populated. Critical vendors should have assurance evidence such as SOC 2, ISO material, or internal security review notes.

Test 9 — Vendor access and subprocessor mapping

Sample three critical vendors that can access customer data or environments. Document what they can access, how access is granted, how activity is logged, and whether contract terms cover incident notification, confidentiality, and data return or deletion expectations.

Test 10 — Vendor renewal and evidence calendar

Look ahead to the next 90 days of critical vendor renewals. Confirm renewal dates are tracked and that review tasks are created 30 to 60 days before renewal. If assurance is missing, there should be a decision record showing accepted risk, conditional approval, or a replacement plan.

Vendor governance proof Why it matters
Tiered register with dates Shows governance exists beyond a static list.
Access path and contract checklist Shows the MSP understands vendor exposure and obligations.
Renewal review tasks and decisions Shows vendor oversight happens before risk becomes an incident.

How to record results in a format auditors respect

For every failed test, record findings with a simple chain that makes the issue easy to understand and easy to fix.

  • Condition: what you observed
  • Criteria: what should be true
  • Consequence: why it matters
  • Corrective action: owner, due date, and closure proof
  • Verification: how the test will be re-run next quarter

The MSP audit pack to store in SharePoint

Audit memo, 1 to 2 pages
Evidence links to samples
Findings list
Corrective action list with owners and dates
Verification plan for next-quarter re-test

If you want MSP audits to stop being a scramble
The fastest path is to operationalize this script inside your cadence, your evidence packs, and your corrective action workflow so audit prep becomes continuous instead of reactive.

Final thought

The best MSP internal audits do not try to test everything at once. They focus on the control areas where trust is most exposed: shared access, recoverability, and vendor governance. When those are sampled well, evidenced cleanly, and tied to corrective actions, the whole audit gets easier.

That is how you turn internal audit from a quarterly fire drill into a repeatable operating discipline.

Follow Canadian Cyber
Practical cybersecurity and compliance guidance:

Related Post