Asset Inventory |
Maintain an inventory of all assets within the organisation. |
Assets |
Security Awareness Training Records |
Tracks security awareness training completion and effectiveness. |
Employees |
Business Impact Assessment (BIA) |
Assess the impact of business disruptions and prioritise recovery strategies. |
Processes |
Application Criticality Assessment |
Assess the criticality of applications to the business. |
Applications |
Risk Assessment Report (RAR) |
Identify, evaluate, and document risks to the business. |
Assets |
AI Risk Assessment Report (AIR) |
Identify, evaluate, and document AI implementation risks to the business. |
Applications |
Data Classification (DC) |
Classify data based on sensitivity and impact. |
Data |
Access Control Matrix |
Assess the access controls in place for applications. |
Applications |
Penetration Test Report |
Assess the security posture of applications through simulated attacks. |
Applications |
Vulnerability Management Report |
Tracks vulnerabilities in applications and their remediation status. |
Applications |
Audit Logs and Monitoring Dashboards |
Assess the effectiveness of logging and monitoring controls. |
Applications |
Change Management Logs |
Records of changes made to applications and their configurations. |
Applications |
Threat Model (TM) |
Analyse potential threats and design effective security controls. |
Data flows |
Security Policies and Standards |
Establish and maintain security policies and standards. |
Policies |
Security Architecture Diagram Templates |
Design of the security controls and architecture of applications. |
Systems |
Incident Response Plan (IRP) |
Establish and maintain an incident response plan. |
Incidents |
Disaster Recovery Plan (DRP) |
Establish and maintain a disaster recovery plan. |
Applications |
Business Continuity Plan (BCP) |
Establish and maintain a business continuity plan. |
Applications and Processes |
Third-Party Risk Assessments |
Evaluate the security posture of third-party vendors and their impact on the organisation. |
Third Parties |
Compliance Mapping Matrix |
Assess the compliance of applications with relevant regulations (e.g. GDPR, ISO 27001, PCI-DSS, etc). |
Applications |
Solution Architecture Design HLD Template |
Document the high-level design of the solution architecture. |
Applications |
Business Capability Model Template |
Document the high-level design of the business capabilities. |
Systems |
Technology Roadmap Template |
Document the high-level design of the technology roadmap. |
Systems |