Security - Tools

RBAC Implementation Workbook

Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.

IAM Task Prioritization Tool

Use this tool to document and prioritize the tasks required to complete and implement the role-based access control model.

Service Risk Assessment Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.

Vendor Security Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to develop a questionnaire for potential vendors to assess their...

Vendor Security Assessment Inventory

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.

Vendor Security Requirements Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to provide potential vendors with contractual requirements related...

Data Retention Schedule Tool – GDPR

Use this tool to dynamically document all data that is retained by the organization, how long it will be stored, and other details.

Risk Tolerance Determination Tool

This tool helps you determine risk tolerance level to guide future assessments and accurately identify unacceptable risks.

Threat and Risk Assessment Tool

Use this tool to assess the threat and risk severity with any particular IT project or initiative.

Security Risk Register Tool

This tool will allow you to collect, analyze, and combine individual risks and view the aggregate level of risk within the organization, including how it compares to your...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us