6 min read
PDF security audit checklist for businesses
By ScoutMyTool Editorial Team ยท Last updated: 2026-05-20
The PDFs leaving a business carry more risk than most teams notice: failed redactions, leaked metadata, weak encryption, embedded files, and active JavaScript can all expose information the sender intended to hide. The good news is the audit is straightforward โ eight checks per file, most automatable, run on a sample of outbound documents quarterly. This article maps the eight-point audit, the policy controls that prevent the common failures, and the tools that make the checks repeatable.
The eight-point security audit
| Check | Risk if missed | Policy control |
|---|---|---|
| Encryption tier | RC4 or weak password = file recoverable in hours | Standardise on AES-256 with 12+ char passwords |
| Redaction technique | Rectangle annotations leak underlying text | Use destructive redaction; verify by selecting redacted region |
| Metadata leak | Author / Producer / Creation date reveal source info | Strip metadata for external distribution; use clean templates |
| Hidden text / layers | Hidden content survives in content stream | Flatten file before sending; check Properties โ Content |
| Embedded files | Attached files (Excel, ZIP) in PDF go unnoticed | Audit File โ Properties โ Attachments; remove unintended |
| Digital signature trust | Unverified signatures look valid in default viewers | Verify signature chain; require qualified signatures for high-value |
| Outbound link annotations | Hyperlinks in PDF can route to malicious URLs | Audit links; sanitise URLs in templates |
| JavaScript actions | Embedded JS can execute in some readers | Disable JS in reader settings; strip JS from incoming PDFs |
Step by step โ run a quarterly audit
- Pick a random sample of 10โ20 outbound PDFs from the past quarter (legal, finance, HR, marketing, client-facing each represented).
- Run the audit on each. Acrobat Pro Preflight + Properties โ Description + Tools โ Remove Hidden Information; record failures.
- Categorise findings. Failed redactions (highest severity), metadata leaks (moderate), embedded files (variable), JS / hidden content (case-by-case).
- Brief the responsible teams. Failed redactions in legal โ train legal; metadata leaks in marketing โ fix template; etc.
- Set a policy fix for the most common failure pattern. Often: standardise the export template to strip metadata; mandate destructive redaction tools.
Tools that automate the audit
Three tool categories make the audit repeatable rather than artisanal. First, command-line tools: pdfinfo, qpdf --check, exiftool, pdfsig โ each runs in seconds against a file or a directory of files; scriptable for batch audit against an entire quarterly sample. Second, Adobe Acrobat Pro\'s Preflight (Tools โ Print Production โ Preflight): runs profile-based checks including security checks; save a custom profile for your organisation\'s policy. Third, server-side data loss prevention (DLP) platforms (Microsoft Purview, Forcepoint, Symantec): scan PDFs leaving the corporate network for PII, sensitive metadata, and policy violations.
For small businesses, the command-line stack plus periodic Acrobat Pro audits is sufficient. For enterprises, the DLP platform is the right level of automation because it scales across thousands of daily outbound files. The audit cadence (quarterly for small, continuous for enterprise) should match the volume; doing it less often than your file output rate justifies invites the slow drift that audits exist to catch.
Common audit findings and how to address each
Three findings come up in nearly every audit. First: marketing and sales teams ship PDFs with author metadata containing personal names, internal project codenames, or draft-status tags. Fix: build metadata-strip into the marketing export template so every outbound PDF goes through the strip step. Second: legal teams use rectangle annotations as redactions and assume the underlying text is hidden. Fix: mandate destructive-redaction tools (block annotation-as-redaction via IT policy and training). Third: finance teams password-protect PDFs with short or shared passwords. Fix: require minimum 12-character per-document passwords, transmitted out-of-band.
None of these findings is unusual; all are preventable with template / tool / training fixes. The audit is what surfaces the patterns; the fix is policy plus tools, applied to the responsible teams.
Related reading
- PDF redaction guide: how to redact correctly and verify.
- PDF security guide: encryption tiers and password types.
- Share PDFs securely: secure-delivery patterns.
- PDF metadata editor: strip metadata before distribution.
- GDPR and PDFs: privacy-regulation overlap.
FAQ
- How do I audit a PDF for hidden content I do not know is there?
- Three tools layered. First, Acrobat Pro: File โ Properties โ expand Description, Security, and Initial View tabs; expand Tools โ Protect โ Remove Hidden Information to scan for unexpected content (annotations, form fields, hidden layers, JavaScript, embedded files, metadata, deleted content fragments). Second, command-line pdfinfo (from poppler-utils): dumps all metadata and structure to a text stream you can grep. Third, `qpdf --check input.pdf` (open source): validates the file structure and reports any anomalies. For high-stakes audits (before distributing confidential documents), run all three. A PDF that has been Word-edited, redacted, and signed often has remnants of each step that are not visible but are extractable.
- What is the most common security failure in business PDFs?
- Failed redactions โ rectangle annotations drawn over sensitive text without removing the underlying content. The text appears hidden visually but is still in the PDF content stream and can be extracted by anyone with Acrobat Pro or a PDF parser. The 2018 court filings in US v. Manafort, the 2017 release of Reality Winner NSA documents, and dozens of less-famous cases involved redactions that were defeated this way. Always use destructive redaction (ScoutMyTool Redact PDF, Acrobat Pro Redact); verify by attempting to select the redacted region after applying โ you should get nothing or the redaction colour, never the original characters.
- How do I prevent metadata from leaking confidential information?
- Strip metadata before external distribution. Acrobat Pro: File โ Properties โ Description โ blank out Author and Subject, then save. Command line: `exiftool -all= file.pdf` removes every metadata field including XMP. For sensitive document workflows, build metadata-stripping into the export step so it always runs before send โ most authoring tools have a "minimise file properties" or "remove personal info on save" option. Producer and Creator fields can reveal which tool authored the PDF (and by extension, which department or person); strip these for anonymous distribution.
- My team password-protects PDFs โ is that enough?
- Depends on the password and the encryption tier. AES-256 with a strong 12+ character password is sound โ brute-force is computationally infeasible. AES-128 with the same password is also fine for most use cases. RC4 (default for PDFs before 1.6) is broken โ modern cracking tools defeat RC4 PDFs in hours regardless of password strength. Standardise on AES-256 and audit historical files; PDFs created before 2010 may be on RC4. Also avoid relying on the "owner password" (permissions password) for security โ most PDF editors ignore those restrictions. Only the "user password" (open password) actually prevents access.
- What policy controls should we have for PDF security?
- Five basics. First, standardise on a current PDF version (1.7 or 2.0) and AES-256 encryption โ document in IT policy. Second, mandate destructive redaction (not annotation) for any PII redaction. Third, run metadata-strip on PDFs leaving the network โ easily automated via Adobe Document Cloud or a server-side process. Fourth, train staff to verify redactions visually (select-copy test) before distributing. Fifth, audit a random sample of outgoing PDFs quarterly to catch process drift. The whole policy fits on one page; the auditing is what makes it real.
Citations
- ISO 32000-1:2008 โ "Document management โ Portable document format" โ ยง7.6 (Encryption) and ยง12 (Annotations / Forms).
- NIST Special Publication 800-38A โ AES encryption modes.
- OWASP โ Cryptographic Storage Cheat Sheet.
- Adobe Acrobat โ Preflight and Remove Hidden Information documentation.
- qpdf โ open-source PDF structural validator.
Browser-based redact + protect for the audit
ScoutMyTool Redact and Protect run client-side. Audit fixes never expose the file to a third-party server.
Open the PDF toolkit โ