For those of us who make money when cybersecurity dollars are spent, yes. Practically, you’d get a federal agency writing checklists.
Do you use https?
Do you store password hashes instead of passwords?
Is the DB storing passwords in a firewalled network?
Is access to the DB restricted to only "need to know individuals"?
Does the DB send password hashes to other services?
Have you had a penetration test of your authentication system?
Do you sanitize the SQL you send to your DB?
etc.
Unfortunately the majority of security incidents occur due to someone forgetting something pretty basic or assuming "no one will ever find that".
This is the limiting factor in secure coding. We need more efficient ways of scaling out the few teams doing top tier work, as it only takes a single bad code review to open a security hole.
Teams should not need to implement their own authentication mechanism. Most companies should not need to implement their own mechanism. Authentication providers should explicitly and automatically verify that their clients have implemented auth correctly.
For the most part determined actors (many of them state sponsored) are going to be hard to prevent if they target you. Your best defense is early detection and reaction to the initial breaches. If you only do the hardening part and leave out the monitoring/observation part you are going to get owned.
No one expects the check lists to result in a perfect outcome but not having them quite likely results in a worse outcome.