Showing 30 of 30 domains

Identity & Access Management (IAM)

Identity & Access Management (IAM) Security Self-Assessment — A structured review that evaluates how identities, roles, and access privileges are managed to ensure only authorized users and systems can access critical resources, reducing the risk of unauthorized access and privilege misuse.

Security Architecture & Engineering

Security Architecture & Engineering Self-Assessment — A structured review that evaluates the design and implementation of an organization’s security architecture and engineering practices to ensure systems are securely designed, integrated, and resilient against cyber threats.

Network Security

Network Security Self-Assessment — A structured review that evaluates the effectiveness of network security controls such as firewalls, segmentation, monitoring, and access restrictions to protect systems and data from unauthorized access and cyber threats.

Governance, Risk & Compliance (GRC)

Governance, Risk & Compliance (GRC) Self-Assessment — A structured review that evaluates an organization’s governance structure, risk management processes, and compliance practices to ensure risks are effectively managed and regulatory requirements are met.

Endpoint & Device Security

Endpoint & Device Security Self-Assessment — A structured review that evaluates the security controls protecting endpoints such as laptops, servers, and mobile devices, including configuration, patch management, malware protection, and device access controls.

Application Security (AppSec)

Application Security (AppSec) Self-Assessment — A structured review that evaluates the security of applications across the development lifecycle, including secure coding, vulnerability management, testing, and protection against common threats such as injection, authentication flaws, and data exposure.

Cloud & Infrastructure Security

Cloud & Infrastructure Security Self-Assessment — A structured review that evaluates the security of cloud platforms and underlying infrastructure, including configuration management, network protection, identity controls, and monitoring to ensure systems and data are securely hosted and managed.

Data Security & Privacy

Data Security & Privacy Self-Assessment — A structured review that evaluates how sensitive data is protected, managed, and processed to ensure confidentiality, integrity, privacy compliance, and protection against unauthorized access or data breaches.

Security Operations (SOC & Monitoring)

Security Operations (SOC & Monitoring) Self-Assessment — A structured review that evaluates the effectiveness of security monitoring, threat detection, incident response, and logging capabilities to ensure timely identification and response to cybersecurity threats.

Threat & Vulnerability Management (TVM)

Threat & Vulnerability Management (TVM) Self-Assessment — A structured review that evaluates how an organization identifies, assesses, prioritizes, and remediates security vulnerabilities and emerging threats to reduce the risk of exploitation.

Incident Response & Digital Forensics

Incident Response & Digital Forensics Self-Assessment — A structured review that evaluates an organization’s ability to detect, respond to, investigate, and recover from cybersecurity incidents while preserving evidence for forensic analysis.

Business Continuity & Disaster Recovery (BC/DR)

Business Continuity & Disaster Recovery (BC/DR) Self-Assessment — A structured review that evaluates an organization’s preparedness to maintain critical operations and recover systems and data during disruptions, ensuring resilience and minimal business impact.

Third-Party & Supply Chain Security

Third-Party & Supply Chain Security Self-Assessment — A structured review that evaluates how an organization manages security risks arising from vendors, partners, and suppliers to ensure external dependencies do not introduce unacceptable cyber or operational risks.

Awareness, Training & Security Culture

Awareness, Training & Security Culture Self-Assessment — A structured review that evaluates the effectiveness of security awareness programs, training initiatives, and organizational culture in promoting secure behaviors and reducing human-related cyber risks.

OT / IoT & Critical Infrastructure Security

O&T, IoT & Critical Infrastructure Security Operational Technology (OT), Internet of Things (IoT), and critical infrastructure environment

AI, Automation & Emerging Technology Security

As organizations adopt AI, automation, and emerging technologies, new and often hidden security risks.

Wireless and Wi-Fi Security

Wireless and Wi-Fi Security Self-Assessment — A structured review that evaluates the security of wireless networks, including encryption, authentication, access controls, and monitoring to prevent unauthorized access and wireless-based attacks.

ISO 27001

ISO 27001 Self-Assessment — A structured review conducted by an organization to evaluate its alignment with ISO/IEC 27001 information security requirements, identifying gaps in policies, controls, and processes within its Information Security Management System (ISMS).

ISO 22301

ISO 22301 Self-Assessment — A structured review that enables an organization to evaluate its business continuity management practices against the requirements of ISO 22301, identifying gaps, risks, and areas for improvement to ensure operational resilience and continuity during disruptions.

SOC 2

SOC 2 Self-Assessment — A structured evaluation that allows an organization to measure its security, availability, processing integrity, confidentiality, and privacy controls against the SOC 2 Trust Services Criteria to identify gaps and strengthen compliance readiness.

DORA

DORA Self-Assessment — A structured review that helps financial institutions evaluate their ICT risk management, operational resilience, incident reporting, third-party risk, and testing practices against the requirements of the EU Digital Operational Resilience Act (DORA) to identify gaps and improve compliance readiness.

FCA PS21/3

FCA PS21/3 Self-Assessment — A structured review that enables firms to evaluate their operational resilience framework, including important business services, impact tolerances, and mapping of dependencies, against the requirements of Financial Conduct Authority Policy Statement PS21/3 to identify gaps and strengthen resilience compliance.

NIST FSP

NIST Framework Self-Assessment — A structured review that helps an organization evaluate its cybersecurity practices against the National Institute of Standards and Technology Cybersecurity Framework

CBEST

CBEST Self-Assessment — A structured review that helps financial institutions evaluate their cyber resilience, threat intelligence capability, and security controls against the UK financial sector’s intelligence-led testing framework developed by the Bank of England and the Financial Conduct Authority.

NIST 800-53

NIST SP 800-53 Self-Assessment — A structured review that enables an organization to evaluate its security and privacy controls against the control catalogue defined in NIST Special Publication 800-53 by the National Institute of Standards and Technology to identify control gaps and improve cybersecurity posture.

CSA Cloud Control Matrix

CSA Self-Assessment — A structured review that helps organizations evaluate their cloud security controls against the Cloud Controls Matrix developed by the Cloud Security Alliance to identify security gaps and improve cloud governance and compliance readiness.

AWS Security

AWS Security Self-Assessment — A structured review that helps organizations evaluate the configuration and security controls of their workloads running on Amazon Web Services to identify risks, misconfigurations, and compliance gaps across identity management, data protection, networking, and monitoring.

GCP Security

GCP Security Self-Assessment — A structured review that helps organizations evaluate the security configuration and controls of their cloud environment on Google Cloud Platform to identify risks, misconfigurations, and compliance gaps across identity management, data protection, networking, and monitoring.

Azure Security

Azure Security Self-Assessment — A structured review that helps organizations evaluate the security configuration and controls of their cloud environment on Microsoft Azure to identify risks, misconfigurations, and compliance gaps across identity management, data protection, networking, and monitoring.

GDPR

GDPR Self-Assessment — A structured review that helps organizations evaluate their data protection practices and privacy controls against the requirements of the General Data Protection Regulation to identify compliance gaps and strengthen personal data protection.

Identity & Access Management (IAM)

+ click to learn more

Identity & Access Management (IAM) Security Self-Assessment — A structured review that evaluates how identities, roles, and access privileges are managed to ensure only authorized users and systems can access critical resources, reducing the risk of unauthorized access and privilege misuse.

Security Architecture & Engineering

+ click to learn more

Security Architecture & Engineering Self-Assessment — A structured review that evaluates the design and implementation of an organization’s security architecture and engineering practices to ensure systems are securely designed, integrated, and resilient against cyber threats.

Network Security

+ click to learn more

Network Security Self-Assessment — A structured review that evaluates the effectiveness of network security controls such as firewalls, segmentation, monitoring, and access restrictions to protect systems and data from unauthorized access and cyber threats.

Governance, Risk & Compliance (GRC)

+ click to learn more

Governance, Risk & Compliance (GRC) Self-Assessment — A structured review that evaluates an organization’s governance structure, risk management processes, and compliance practices to ensure risks are effectively managed and regulatory requirements are met.

Endpoint & Device Security

+ click to learn more

Endpoint & Device Security Self-Assessment — A structured review that evaluates the security controls protecting endpoints such as laptops, servers, and mobile devices, including configuration, patch management, malware protection, and device access controls.

Application Security (AppSec)

+ click to learn more

Application Security (AppSec) Self-Assessment — A structured review that evaluates the security of applications across the development lifecycle, including secure coding, vulnerability management, testing, and protection against common threats such as injection, authentication flaws, and data exposure.

Cloud & Infrastructure Security

+ click to learn more

Cloud & Infrastructure Security Self-Assessment — A structured review that evaluates the security of cloud platforms and underlying infrastructure, including configuration management, network protection, identity controls, and monitoring to ensure systems and data are securely hosted and managed.

Data Security & Privacy

+ click to learn more

Data Security & Privacy Self-Assessment — A structured review that evaluates how sensitive data is protected, managed, and processed to ensure confidentiality, integrity, privacy compliance, and protection against unauthorized access or data breaches.

Security Operations (SOC & Monitoring)

+ click to learn more

Security Operations (SOC & Monitoring) Self-Assessment — A structured review that evaluates the effectiveness of security monitoring, threat detection, incident response, and logging capabilities to ensure timely identification and response to cybersecurity threats.

Threat & Vulnerability Management (TVM)

+ click to learn more

Threat & Vulnerability Management (TVM) Self-Assessment — A structured review that evaluates how an organization identifies, assesses, prioritizes, and remediates security vulnerabilities and emerging threats to reduce the risk of exploitation.

Incident Response & Digital Forensics

+ click to learn more

Incident Response & Digital Forensics Self-Assessment — A structured review that evaluates an organization’s ability to detect, respond to, investigate, and recover from cybersecurity incidents while preserving evidence for forensic analysis.

Business Continuity & Disaster Recovery (BC/DR)

+ click to learn more

Business Continuity & Disaster Recovery (BC/DR) Self-Assessment — A structured review that evaluates an organization’s preparedness to maintain critical operations and recover systems and data during disruptions, ensuring resilience and minimal business impact.

Third-Party & Supply Chain Security

+ click to learn more

Third-Party & Supply Chain Security Self-Assessment — A structured review that evaluates how an organization manages security risks arising from vendors, partners, and suppliers to ensure external dependencies do not introduce unacceptable cyber or operational risks.

Awareness, Training & Security Culture

+ click to learn more

Awareness, Training & Security Culture Self-Assessment — A structured review that evaluates the effectiveness of security awareness programs, training initiatives, and organizational culture in promoting secure behaviors and reducing human-related cyber risks.

OT / IoT & Critical Infrastructure Security

+ click to learn more

O&T, IoT & Critical Infrastructure Security Operational Technology (OT), Internet of Things (IoT), and critical infrastructure environment

AI, Automation & Emerging Technology Security

+ click to learn more

As organizations adopt AI, automation, and emerging technologies, new and often hidden security risks.

Wireless and Wi-Fi Security

+ click to learn more

Wireless and Wi-Fi Security Self-Assessment — A structured review that evaluates the security of wireless networks, including encryption, authentication, access controls, and monitoring to prevent unauthorized access and wireless-based attacks.

ISO 27001

+ click to learn more

ISO 27001 Self-Assessment — A structured review conducted by an organization to evaluate its alignment with ISO/IEC 27001 information security requirements, identifying gaps in policies, controls, and processes within its Information Security Management System (ISMS).

ISO 22301

+ click to learn more

ISO 22301 Self-Assessment — A structured review that enables an organization to evaluate its business continuity management practices against the requirements of ISO 22301, identifying gaps, risks, and areas for improvement to ensure operational resilience and continuity during disruptions.

SOC 2

+ click to learn more

SOC 2 Self-Assessment — A structured evaluation that allows an organization to measure its security, availability, processing integrity, confidentiality, and privacy controls against the SOC 2 Trust Services Criteria to identify gaps and strengthen compliance readiness.

DORA

+ click to learn more

DORA Self-Assessment — A structured review that helps financial institutions evaluate their ICT risk management, operational resilience, incident reporting, third-party risk, and testing practices against the requirements of the EU Digital Operational Resilience Act (DORA) to identify gaps and improve compliance readiness.

FCA PS21/3

+ click to learn more

FCA PS21/3 Self-Assessment — A structured review that enables firms to evaluate their operational resilience framework, including important business services, impact tolerances, and mapping of dependencies, against the requirements of Financial Conduct Authority Policy Statement PS21/3 to identify gaps and strengthen resilience compliance.

NIST FSP

+ click to learn more

NIST Framework Self-Assessment — A structured review that helps an organization evaluate its cybersecurity practices against the National Institute of Standards and Technology Cybersecurity Framework

CBEST

+ click to learn more

CBEST Self-Assessment — A structured review that helps financial institutions evaluate their cyber resilience, threat intelligence capability, and security controls against the UK financial sector’s intelligence-led testing framework developed by the Bank of England and the Financial Conduct Authority.

NIST 800-53

+ click to learn more

NIST SP 800-53 Self-Assessment — A structured review that enables an organization to evaluate its security and privacy controls against the control catalogue defined in NIST Special Publication 800-53 by the National Institute of Standards and Technology to identify control gaps and improve cybersecurity posture.

CSA Cloud Control Matrix

+ click to learn more

CSA Self-Assessment — A structured review that helps organizations evaluate their cloud security controls against the Cloud Controls Matrix developed by the Cloud Security Alliance to identify security gaps and improve cloud governance and compliance readiness.

AWS Security

+ click to learn more

AWS Security Self-Assessment — A structured review that helps organizations evaluate the configuration and security controls of their workloads running on Amazon Web Services to identify risks, misconfigurations, and compliance gaps across identity management, data protection, networking, and monitoring.

GCP Security

+ click to learn more

GCP Security Self-Assessment — A structured review that helps organizations evaluate the security configuration and controls of their cloud environment on Google Cloud Platform to identify risks, misconfigurations, and compliance gaps across identity management, data protection, networking, and monitoring.

Azure Security

+ click to learn more

Azure Security Self-Assessment — A structured review that helps organizations evaluate the security configuration and controls of their cloud environment on Microsoft Azure to identify risks, misconfigurations, and compliance gaps across identity management, data protection, networking, and monitoring.

GDPR

+ click to learn more

GDPR Self-Assessment — A structured review that helps organizations evaluate their data protection practices and privacy controls against the requirements of the General Data Protection Regulation to identify compliance gaps and strengthen personal data protection.