Security - Tools

Vendor Security Assessment Inventory

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.

Vendor Security Requirements Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to provide potential vendors with contractual requirements related...

Data Protection Impact Assessment Tool

To enable effective execution of compliance to the GDPR, a Data Protection Impact Assessment should be completed for processing activities that put data subjects at risk.

RBAC Implementation Workbook

Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.

IAM Task Prioritization Tool

Use this tool to document and prioritize the tasks required to complete and implement the role-based access control model.

GDPR Initiative Prioritization Tool

To enable effective execution of compliance, GDPR initiatives should be evaluated and prioritized.

Security Architecture Recommendation Tool

This tool guides organizations in evaluating the complexity of their IT environment, their operational maturity, and the perceived value of security architecture. It then...

Data Classification Inventory Tool

Use this tool to track and classify corporate data. Gain insight on the location and security of various data and repositories to drive strategic security decisions.

Data Classification RACI Tool

Assign responsibilities to your data classification program.

Data Discovery Interview Tracking Tool

Use this tool to conduct interviews with data owners in your organization. Discover what and where your data exists and the current data handling procedures in place.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP Contact Us