Chat on WhatsApp
Free tool · 2026 edition

Magento store health checklist

Run 50 weighted yes/no checks across security, performance, SEO, B2B, and ops in 5 minutes. Built from incident data across 200+ Magento stores audited 2017–2026 by an Adobe-Certified developer. Get a per-category grade and a prioritized fix list — not a 100-point lecture.

  • 50 questions across 5 categories — 10 each
  • Weighted: critical-fail items count more than nice-to-haves
  • 100% client-side — answers never leave your browser
Adobe-Certified Magento + Hyvä developer 200+ stores audited across 4 regions
The audit

Answer fifty questions. Get a real grade.

Yes / No / Skip on each. Critical questions carry 3 points, high 2, medium 1. Answer at least 30 to unlock your score; 100% client-side; nothing is uploaded; refresh resets it.

0 / 50 answered Answer at least 30 to unlock your score Score unlocked — keep going or show your result
    1. Critical

      Latest Magento security patch installed within the last 60 days (e.g. 2.4.9-p1, APSB advisory monitored)?

    2. Critical

      Admin login URL is randomized (NOT /admin / /backend), per backend/frontName?

    3. Critical

      2FA enabled and enforced for every admin user (Magento_TwoFactorAuth)?

    4. High

      Admin user passwords rotated quarterly (or password-strength enforced ≥ 12 chars + symbols)?

    5. High

      app/etc/env.php excluded from git AND server file permissions are 640 (owner read/write, group read, world none)?

    6. High

      PCI-DSS compliance verified annually (SAQ-A for hosted gateway, SAQ-A-EP if any card data touches your servers)?

    7. Medium

      Dev / staging environment isolated from production network (separate subnet, NOT shared DB user)?

    8. Medium

      Database backups encrypted at rest AND test-restored at least quarterly?

    9. Medium

      Suspicious-pattern detection on admin login (fail2ban / CloudFlare WAF / Sucuri / similar)?

    10. High

      Cookies flagged HTTPS-only + Secure + HttpOnly + SameSite=Lax (or Strict for admin)?

    1. Critical

      Lighthouse Performance score ≥ 90 on a typical PDP, mobile, throttled 4G?

    2. Critical

      TTFB (Time To First Byte) p95 under 800ms on a logged-out PDP request?

    3. High

      Largest Contentful Paint (LCP) under 2.5s on mobile (per Google Search Console — field data, not lab)?

    4. High

      Total parsed-JS payload < 200KB on PDP (gzipped, after tree-shake)?

    5. High

      Hyvä theme installed (or migration scheduled within 6 months)?

    6. High

      Full Page Cache (FPC) enabled with Varnish (NOT built-in PHP FPC) + warmer running on hot URLs?

    7. Medium

      CDN in front of origin (Cloudflare / Fastly / KeyCDN / similar)?

    8. Medium

      Image optimization automated (WebP / AVIF served via <picture> or auto-conversion module)?

    9. Medium

      MySQL slow-query log monitored, queries > 1s logged + alerted on?

    10. High

      Indexers in “Update on Schedule” mode (NOT “Update on Save”) for production stores > 10k SKUs?

    1. Critical

      Canonical tags emitted on every product + category page (single canonical, NOT duplicate)?

    2. Critical

      XML sitemap auto-regenerates (cron or panth:seo:sitemap:generate) AND submitted to Google Search Console?

    3. High

      Hreflang <link rel="alternate"> tags emitted on every multi-region / multi-language page?

    4. High

      Structured data (Product / Organization / BreadcrumbList) emitted as valid JSON-LD on every PDP?

    5. High

      Meta description filled per category (NOT auto-generated boilerplate, NOT empty)?

    6. Medium

      Robots.txt exists, contains Sitemap: directive AND blocks /checkout, /customer, /search?, /catalogsearch?

    7. Medium

      llms.txt published at site root for AI / LLM citation (ChatGPT, Claude, Perplexity)?

    8. Medium

      Server response time for Googlebot < 600ms (Search Console → Crawl Stats)?

    9. High

      301 redirects in place from old URLs (post-migration / category restructure / URL-key rewrites)?

    10. Medium

      Image alt-text populated on at least 80% of catalog product images?

    1. High

      Companies feature enabled (Adobe Commerce native B2B) OR equivalent extension (Aheadworks B2B Suite / Wyomind / etc.)?

    2. High

      Quote-to-cart / Request-for-Quote workflow enabled for B2B segment?

    3. Medium

      Customer-segment-specific pricing rules defined (Tier prices / Catalog price rules per group)?

    4. Medium

      Net-30 / Net-60 / purchase-order payment method enabled for approved B2B customers?

    5. Medium

      Requisition lists (saved cart templates) feature available to B2B customers?

    6. Medium

      Bulk-order CSV upload / quick-order pad available on storefront?

    7. Medium

      Trade catalog / B2B-only products hidden from non-B2B (guest / D2C) customer segments?

    8. Medium

      ACH / SEPA / wire-transfer / bulk-payment method integrated for high-value B2B orders?

    9. Medium

      ERP integration (NetSuite / SAP / Microsoft Dynamics / Tally / Odoo) syncing inventory + pricing both directions?

    10. Medium

      B2B customer roles (admin / buyer / approver) + approval thresholds configured per Company?

    1. Critical

      Production environment monitored 24/7 (uptime + error rate + response time)?

    2. Critical

      Database backup automated daily AND verified successful (last backup ≤ 24h old, restorable)?

    3. High

      Magento cron running every minute on production (3 cron groups: default, index, consts)?

    4. High

      var/log/exception.log + system.log monitored, alerts on critical errors?

    5. High

      Disk space monitored on app server + DB server (alert at > 80% used, page at > 90%)?

    6. Medium

      Composer dependencies audited — composer audit reports zero open advisories?

    7. Medium

      PHP version supported (PHP 8.1 for Magento 2.4.6/7; PHP 8.3 for 2.4.8/9)?

    8. Medium

      Staging environment matches production (same Magento + PHP + MySQL + Elastic/OpenSearch + Redis + Varnish versions)?

    9. Medium

      Deploy process automated (CI / CD pipeline, NOT manual SSH + rsync + setup:upgrade)?

    10. High

      Sessions stored on Redis (NOT file-system), session.save = redis?

Overall grade

0%

Prioritized fix list Sorted critical → medium across categories

Zero failed checks among the questions you answered.

Either you’re actually ahead of ~95% of Magento stores, or you skipped the awkward ones. If you’re skeptical of your own grade — book the deep audit and let me try to find what the in-page checklist couldn’t.

Get a deeper audit

Send your score through and I’ll come back with a written remediation plan + fixed-price scope per item, within 24 business hours.

Why trust this checklist

Four reasons the grade is honest

Built from invoiced incident data, not vendor brochures. Weighted by real failure-cost. Skip-friendly. Prioritized fix list out the other end.

  • 50 questions Across 5 categories

    Security, performance, SEO, B2B readiness, ops — ten substantive checks per area. Each one is something a senior Magento operator would actually run before signing off on a production store as healthy. No fluff, no “does your site have a logo” filler questions.

  • Weighted Critical fails count more

    Critical questions (latest patch, daily backup, TTFB < 800ms) carry 3 points. High-impact items 2 points. Medium 1 point. Failing one critical hurts your category grade more than failing five mediums — just like real operations.

  • 5 minutes Skip if you don’t know

    Use the “Skip” button on questions you can’t answer without a developer. Skipped questions are excluded from your category total — you get a fair score on what you do know, plus a list of things to ask your dev team about.

  • Prioritized Fixes ordered by urgency

    The result panel sorts your failed questions critical-first, then high, then medium — not by category. Fix the top 3 before you touch anything else. Each fix has a one-line technical hint so a senior dev can act on it without re-reading the doc.

Each category, in plain English

What “passing” looks like in each of the five

Security, performance, SEO, B2B, ops — plus the editorial reason this checklist exists. Skim the card for your weakest category, expand the matching tab in the audit above.

  • Security — what passing looks like

    Latest APSB patch within 60 days of release. 2FA enforced on every admin account. Custom admin URL (not /admin). app/etc/env.php chmod 640, never in git. PCI-DSS SAQ-A re-attested annually. Cookies Secure + HttpOnly + SameSite. Session storage on Redis. Backups encrypted at rest and test-restored quarterly. Failing “security” means you’re one breach away from a Magecart skimmer headline.

  • Performance — what passing looks like

    Lighthouse Performance ≥ 90 on PDP mobile. TTFB p95 < 800ms. LCP < 2.5s field-data (Search Console). JS bundle < 200KB parsed. FPC + Varnish + cache warmer. CDN in front of origin (Cloudflare / Fastly). Indexers in “Update on Schedule” mode. Slow-query log monitored. Hyvä gets you most of these out-of-the-box; Luma + heavy themes need real engineering work.

  • SEO — what passing looks like

    Single canonical per page (no duplicates from layered nav). XML sitemap auto-regenerated daily + submitted to Google Search Console. Hreflang on every multi-region page. Product / Organization / Breadcrumb JSON-LD validated via Rich Results Test. Meta description filled per category. Robots.txt with sitemap directive. llms.txt for AI citation. 301s in place after every URL refactor. SEO is the channel where compounding cost-of-failure is highest — a 3-month Google ranking drop costs more than the next two years of SEO investment.

  • B2B readiness — what passing looks like

    Companies feature enabled (or B2B suite installed). Quote-to-cart workflow live for tier-3+ buyers. Customer-segment pricing rules per group. Net-30 / PO payment method gated to approved companies. Requisition lists for repeat orders. Bulk-order pad / CSV upload. Trade catalog hidden from non-B2B segments. ACH / SEPA for high-value orders. ERP sync (NetSuite / SAP / Tally / Odoo). Approval thresholds per company role. If you do any meaningful wholesale, every fail here is friction your sales team is absorbing manually.

  • Ops — what passing looks like

    Production monitored 24/7 (uptime + errors + APM). Database backup automated daily, last backup ≤ 24h old, test-restored quarterly. Magento cron running every minute. exception.log + system.log tailed to alerts. Disk-space monitoring (alert at 80% used). composer audit clean. Supported PHP version. Staging-prod parity. CI/CD deploy (no manual SSH). Sessions on Redis. Ops failures don’t kill you fast — they kill you slowly, on the day you need them most.

  • Why this checklist exists

    I’ve audited 200+ Magento stores since 2017. ~70% have at least one critical failing — usually patch level, missing 2FA, or no tested backup. Most operators don’t know what to ask their dev team to verify. This checklist is the questionnaire I’d hand a CTO before signing off on a Magento store as “production-ready” in 2026. Honest, weighted, and ordered by what actually breaks first.

From checklist to action

Five steps from a 5-minute audit to a fixed store

Take the audit → get the grade → fix the criticals → plan the mediums → book a deep audit if needed. Each step has a clear “done” signal, so you can’t accidentally drift.

  1. 01

    Take the audit

    Run all 50 questions. Use “Skip” on anything you can’t answer without a developer — better to skip than guess. Most operators answer 35–45 confidently in 5 minutes; the remaining 5–10 become your “ask the dev team” list.

    50 answers
  2. 02

    Get the score

    Click “Show my score.” Five category cards (security / performance / SEO / B2B / ops) each show earned/possible + grade A–F. Plus the overall percentage. Plus the prioritized fix list, sorted critical → medium across all categories.

    5 grades + fix list
  3. 03

    Fix the criticals

    Anything red-flagged as critical (weight = 3) is a “fix this week” item: missing patches, no 2FA, untested backups, broken FPC. Each has a one-line fix hint — share with your dev team and ticket each one. Don’t move past this step.

    Criticals closed
  4. 04

    Plan the mediums

    High and medium-weight items go on the next-quarter roadmap: image optimization, slow-query monitoring, requisition lists, ERP sync, deploy automation. Group by category, allocate owners, set deadlines. Re-take the audit in 90 days to measure progress.

    Q+1 roadmap
  5. 05

    Schedule a deep audit

    If your overall grade is C or below, or any category is ≤ D, book a paid 1–3 day deep audit ($1.5k–$3k). I’ll clone your repo, run the deeper diagnostics this checklist can’t (slow-query patterns, custom-module security, B2B data integrity), and deliver a written remediation plan with fixed-price scopes per item.

    Written plan + quote
What your grade means

Three honest playbooks, by overall grade

Stable A/B, concerning C, crisis D/F — pick the one that matches your result and skip the rest. The middle scenario is where most $1M–$10M stores actually sit.

  • Stable: A or B grade overall

    Maintain — quarterly re-audit

    • Re-run this checklist every 90 days (set a calendar reminder)
    • Watch for security-patch advisory (APSB cadence: ~quarterly)
    • Monitor performance regressions via Google Search Console field data
    • Plan annual deep audit for SEO + structured-data validation
    • Refresh backup-restore drill quarterly — an untested backup is a hope
    • Review composer audit + PHP EOL calendar twice a year
    • You’re ahead of ~85% of Magento stores at this grade — don’t coast
  • Crisis: D or F grade overall, or 2+ category fails

    Stop building features — fix foundations first

    • Patch level + 2FA + admin URL + backup are likely all failing — week-1 work
    • Book a 3-day deep audit immediately ($3k–$5k); don’t guess at root causes
    • Freeze new feature work for ~30 days while foundations get rebuilt
    • Risk: breach / Magecart skimmer / extended outage / Google ranking collapse
    • Allocate $10k–$30k for the remediation (seriously, plan it now)
    • If your dev team has been ≤ 6 months on Magento, get external help fast
    • Recoverable — I’ve cleaned up 40+ “F-grade” stores in this state
Get a deeper audit

Send your score through, get a remediation plan in 24 hours

Ten fields — just enough for me to come back with a real plan. I’ll review your overall grade, weakest category, and main concern, and send a written remediation plan with fixed-price scope per item. No upsell, no auto-call-booking.

We will get back to you shortly.

Past audit clients say

Reviews from stores I’ve audited

Public reviews on Upwork — clickable on each card. Same playbook, same honest weighting, every audit.

professional, enthusiastic, knowledgeable and exceptional diligence and patience, highly recommended freelancer on magento.

professional, enthusiastic, knowledgeable and exceptional diligence and patience, highly recommended freelancer on

D

Dennis

CEO, Bay Tech

Kishan was able to resolve an issue that many others could not solve.

Kishan was able to resolve an issue that many others could not solve. Great

MC

Mitch Chiba

10916234 Canada Inc.

Great experience working with Kishan Savaliya.

Great experience working with Kishan Savaliya. completed job very fast and provided me accurate results. I highly recommend him for Magento 2 and development work. Thank

AS

Ajay Singh

Great experience working with kishan, He assist me with email task and provided awesome and great work.

Great experience working with kishan, He assist me with email task and provided awesome and great work. I highly recommend him for development and magento 2

AS

Ajay Singh

I hired Kishan for a small project.

I hired Kishan for a small project. He did it very well and fast. So, I hired him to do more things and he did it on time! Kishan is really an excellent developer. Very committed, cleaver and very nice

FH

Fadi Hamdan

I am very grateful to have found Kishan.

I am very grateful to have found Kishan. He has helped me tremendously through the process of creating my ecommerce site. I was completely lost and ignorant. He guided me and completely helped me set up magento 2. He was patient with me and is very trustworthy. If and when the...

SE

Sarah Ehling

Auditing Magento stores across

  • United States
  • United Kingdom
  • Canada
  • Australia
  • Germany
  • France
  • Netherlands
  • India
FAQ

Twelve questions checklist users actually ask

Is 5 minutes really enough for a real audit?

For a self-assessment first pass, yes. For a final sign-off audit, no — that’s a 1–3 day paid engagement.

Here’s the honest breakdown of what these 50 questions can and cannot do:

  • What 5 minutes covers: the questions a senior Magento operator can answer from memory + a quick admin-panel glance — patch level, 2FA on/off, FPC enabled, indexers in schedule mode, cron running, composer audit last result, sessions on Redis. About 35–45 of the 50 questions fall here.
  • What 5 minutes can’t cover: things requiring code-reading or query-running — how many custom modules use deprecated APIs, whether a quote workflow still validates after the last patch, whether canonical tags are correct on every layered-nav permutation. Skip those, then ask your dev team. About 5–10 of the 50.
  • What this checklist deliberately doesn’t do: custom-module security review, slow-query log analysis, dependency vulnerability deep-scan, ERP integration data-integrity check. Those are the deep-audit territory.

So: 5 minutes for the self-assessment, then a paid 1–3 day deep audit ($1.5k–$3k) if your overall grade is C or below, or any single category is at D.

Are my answers stored or shared?

No. The 50 questions and your scoring run 100% in your browser — nothing is sent to my server, nothing is logged, nothing persists if you refresh. Open dev tools and watch the network tab while you take the audit; you won’t see a single XHR until you optionally submit the “Get a deeper audit” form at the bottom (which is itself opt-in and asks only for the score summary, not your individual answers).

Why this matters: many of the questions are sensitive (patch level, fail2ban presence, encryption status). Operators are rightly hesitant to type those answers into a marketing tool. So the architecture deliberately doesn’t give me a place to leak them from. Reload the page → everything resets.

If you decide to send a deeper-audit request, you choose what to include. The form captures your overall grade + the weakest category + your free-text notes — not the raw 50 answers. You stay in control of how much detail crosses the wire.

What if I don’t know an answer — should I skip?

Yes — skip honestly. The scoring is built around it: any skipped question is excluded from both the earned and the possible total for that category. Skipping doesn’t hurt your grade, and guessing “Yes” when you don’t actually know just gives you a falsely-confident result that hides real risk.

The pattern I see most often: operators answer 35–45 questions confidently in 5 minutes, then have 5–10 they need to ask their dev team about. Those 5–10 become a written follow-up email (“is question seo-3 actually true on our store?”) and a fresh re-take a week later with proper answers.

The honest skip-strategy:

  • If you’re an operator without dev access: skip anything starting with “does app/etc/env.php…” or “is the slow-query log…”. Take the visible-from-the-storefront questions, then circulate the rest.
  • If you’re a senior dev: very few skips needed. If you’re skipping more than 10 of the 50, your team probably needs more visibility into the production environment.
  • If you’re skipping more than 25: your team isn’t close enough to the store. That alone is a finding.
How are the weights determined?

Weights reflect real-world failure-cost, not theoretical importance. Drawn from incident data across 200+ Magento stores I’ve audited or remediated since 2017.

  • Weight 3 (critical): something whose failure puts the business at material risk inside a 90-day window. Missing security patches, no daily backup, no 2FA, FPC misconfigured causing TTFB spikes, no production monitoring. These are the “will hurt you in a quarter” failures.
  • Weight 2 (high): something whose failure compounds over 6–12 months. Slow indexer mode on a big catalog, no hreflang on multi-region, missing Companies feature for B2B, no log alerting. Will erode revenue or operator efficiency steadily, not catastrophically.
  • Weight 1 (medium): something whose failure is meaningful but recoverable, often a “could be better” rather than a “is broken.” Image alt-text below 80%, llms.txt missing, no requisition lists, image optimization not yet automated. Roadmap items, not ticket-now items.

The weights are fixed, not user-tunable. The reason: experience shows operators consistently under-weight critical security and ops items (because they haven’t personally been bitten yet) and over-weight visible front-end items (because those get noticed at the executive level). Holding the weights independent of operator opinion is the point.

Why these 50 questions specifically?

I started with ~140 candidate questions drawn from 9 years of incident logs, then iteratively cut to the smallest set that:

  • Catches 80%+ of real production incidents in advance. Adding more questions hits diminishing returns fast — each marginal question above 50 catches less new variance.
  • Covers the 5 categories evenly (10 questions each). Real Magento ops failures are roughly evenly split across security / performance / SEO / B2B / ops; an 8-question SEO category and a 14-question security category would skew the overall grade.
  • Is answerable in 5 minutes by a senior operator without code-reading. If a question would require running a query or grepping a log, it becomes a “skip if unsure” question instead of being on the list.
  • Avoids vendor-specific bias. No “are you using product X.” Yes/no/skip on real engineering checks, not marketplace endorsements.

The full candidate list (the 140) lives in the deep-audit. If your in-page checklist score is C or below, the 90 extra questions in the deep audit are probably where the real failures hide.

My grade is F — is my store doomed?

No, but you’re in “stop building features, fix foundations” territory. I’ve cleaned up 40+ stores in F-grade state since 2017; every single one was recoverable. The pattern:

  1. Week 1: ticket every weight-3 critical fail. Apply the missing security patch, enforce 2FA, set up daily backup, fix FPC. These are mechanical fixes, not architectural rebuilds. ~$2k–$8k of dev time.
  2. Week 2–4: work through weight-2 highs in priority order. Indexer mode, slow-query monitoring, Companies feature if doing B2B. ~$5k–$15k.
  3. Week 4–8: book a paid 3-day deep audit ($3k–$5k) so an external senior takes a fresh look at custom-module security, B2B data integrity, ERP handshake. Fixes from the audit go on the next quarter’s roadmap.
  4. Week 8 onwards: retake the in-page checklist monthly, watch the grade climb. F → D is usually 30 days; D → B is usually another 60.

What kills F-grade stores isn’t the F itself; it’s denial. If you’ve scored F honestly, you’re already past the hardest step.

My grade is A — am I done?

For the moment, yes — you’re ahead of ~85% of Magento stores at A. But A doesn’t mean “done forever”:

  • Re-audit every 90 days. Adobe ships a security patch roughly quarterly. Your dependency tree shifts. New extensions get installed. The store that’s A in May can be C by August if you don’t maintain.
  • Watch for the things this checklist doesn’t cover. Custom-module security, slow-query patterns on growing catalogs, ERP-handshake drift, edge-case checkout bugs — none of these show up here. An annual paid deep audit ($1.5k–$3k) catches them.
  • Plan ahead. If you’re on Magento 2.4.6 today and 2.4.10 ships in 6 months, plan the upgrade now while you’re A-grade and have engineering bandwidth. Upgrading from A is cheap; upgrading from D after foundations rot is expensive.
  • The A-grade trap: complacency. I’ve seen A-grade stores skip patches for 9 months because “everything is fine” — until APSB-2026-XX drops a CVSS 9.8 and they have 48 hours to patch with no rehearsal. Your A is a privilege you re-earn quarterly.
What’s a “deep audit” beyond this checklist?

A deep audit is the 1–3 day paid engagement where I clone your repo and look at the things 50 yes/no questions can’t. The full deep-audit checklist runs to ~140 questions plus several diagnostics. Specifically:

  • Custom-module security review (~25 checks): SQL injection, CSRF, XSS, IDOR, hard-coded credentials, deprecated crypto, PHP 8.3 compatibility, vendor-specific anti-patterns.
  • Slow-query log analysis: 7 days of slow-log data parsed, top-10 worst queries diagnosed, indexer staleness mapped to specific table-scan queries.
  • B2B data integrity audit: companies, quotes, segment pricing, requisition lists — check for orphan records, broken FKs, stale customer-group sync.
  • ERP handshake validation: diff inventory + price + customer between Magento and ERP, identify drift, document the canonical source per field.
  • Performance deep-dive: Lighthouse on top-20 URLs, INP audit, LCP per template, cache-warm coverage report, CDN hit-rate analysis.
  • Composer + extension audit: every dependency’s actual maintenance status, abandoned-package detection, security-advisory match-up.
  • Custom code documentation: a written map of every app/code/Vendor/Module directory with risk + criticality + handoff notes.

Output: a 20–40 page written report with prioritized fix list, fixed-price scope per item, and a recommended 30/60/90-day execution plan. Roughly $1.5k–$3k for the audit, plus separate fixed-price quotes for the actual remediation work.

Cost of a paid deep audit?

Three pricing tiers depending on the store’s complexity:

  • 1-day audit ($1,500): single-store, no B2B, no ERP. Around 80–100 of the deep checklist’s questions, slow-query review, top-10 fixes prioritized. Output: ~10-page report. Best for stores doing $500k–$2M GMV with a clean architecture.
  • 2-day audit ($2,400): single-store with B2B or ERP, OR multi-store without B2B. Full deep checklist, performance deep-dive, custom-module security review of 5–8 modules. Output: ~20-page report. Best for $2M–$10M GMV stores.
  • 3-day audit ($3,200): multi-store + B2B + ERP, or any store with significant custom-module footprint (15+ modules). Full deep checklist, security review of all modules, ERP handshake diff, B2B data integrity, 30/60/90-day execution plan. Output: 30–40 page report. Best for $10M+ stores or any “crisis-grade” remediation.

What the audit fee does not include: the actual remediation work itself. The audit gives you a fixed-price quote per finding so you can budget the remediation separately and decide which items to ticket.

What it does include: 14 days of follow-up Q&A so your dev team can ask clarifying questions while they’re working through the fix list, and a one-call kick-off + one-call walkthrough.

Can I retake the audit or save my answers?

Yes to retake, no to native save — by design.

Retake: the audit always runs fresh. There’s a “Reset” button on the result panel that clears your answers and lets you go again. Reload the page and you also get a fresh start. I recommend re-taking once a quarter at minimum to catch drift.

Native save: deliberately not built. The choice is between “your answers persist somewhere” (cookies, localStorage, server) and “your answers are private and ephemeral.” I picked the second — the trade-off is real but I’d rather lose “come back next week and resume” than introduce a place for sensitive answers to leak from.

The workaround for tracking over time:

  1. After taking the audit, hit your browser’s Print button (or Cmd/Ctrl + P) on the result panel. Save as PDF. The result is timestamped and includes overall grade + per-category breakdown + fix list.
  2. Repeat in 90 days. Diff the two PDFs to see grade lift per category.
  3. If you want native tracking baked in (per-account history, team dashboards, fix-list assignment), that’s the deep audit + retainer combination, not the free in-page tool.
PCI-DSS / regulated industry — is this checklist enough?

No — this is a self-assessment, not a compliance attestation. For PCI-DSS, HIPAA-adjacent, GDPR-Article-32, DSCSA, or any regulated context you need a paid third-party audit with proper documentation. This checklist gets you ~60% of the way to ready; the remaining 40% is paperwork, evidence-gathering, and external attestation.

What this checklist does for regulated stores:

  • Catches the basic-hygiene items that would fail any PCI ASV scan (missing patches, weak admin auth, unencrypted backups, exposed env files).
  • Surfaces the obvious B2B data-handling gaps (companies + quotes + segment pricing — relevant if you handle payment terms separately by buyer).
  • Identifies ops gaps that compound regulator scrutiny (unmonitored production, no backup-restore drill, no log alerting).

What it doesn’t do for regulated stores:

  • Generate the SAQ-A or SAQ-A-EP self-attestation document. That’s a separate process with your acquirer or QSA.
  • Map findings to specific PCI requirements. The deep audit (separate engagement) does this.
  • Replace your annual ASV scan from Trustwave / SecurityMetrics / similar. Required by PCI, not me.
  • Cover DSCSA-specific pharma / regulated-product chain-of-custody. That’s domain-specific and needs a specialist.

If you’re in pharma / cosmetics / firearms / regulated finance, take the checklist for the engineering signal, then book a paid audit specifically scoped for your regulator (the audit fee does include compliance-mapping for these contexts).

How is this different from Adobe’s built-in audit tools?

Adobe ships several built-in audit tools that overlap with this checklist but don’t replace it. Quick comparison:

  • Adobe Commerce Site-Wide Analysis Tool (SWAT) — ships in Adobe Commerce 2.4.6+, runs static analysis on your codebase. Catches code-quality issues, security smells, deprecation warnings. Strong on code, blind to ops + B2B + SEO config. Run it monthly — complements this checklist, doesn’t replace.
  • Magento Marketplace Module Health — per-extension static analysis. Useful for vendor extensions, useless for custom in-house modules. One narrow slice.
  • Adobe Experience Manager Best Practices Analyzer — primarily for AEM, partial overlap with Magento. Not really applicable.
  • This checklist — covers the 50 cross-cutting checks an operator would run before signing off a Magento store as production-healthy. SWAT can’t answer “do you have 2FA enforced” or “is your daily backup test-restored quarterly” — those are operational state, not code state.

How they fit together:

  1. Run this checklist quarterly. Get the cross-functional state-of-the-store snapshot.
  2. Run SWAT monthly. Catch code-quality regressions between checklist runs.
  3. Schedule a paid deep audit annually. Catches the things both miss (slow-query patterns, custom-module security depth, ERP drift, B2B data integrity).

Three layers, three time horizons, three different blind spots. None of them replaces another.