Security Operations - Tools

Service Risk Assessment Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.

Vendor Security Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to develop a questionnaire for potential vendors to assess their...

Vendor Security Assessment Inventory

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.

Vendor Security Requirements Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to provide potential vendors with contractual requirements related...

RBAC Implementation Workbook

Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.

IAM Task Prioritization Tool

Use this tool to document and prioritize the tasks required to complete and implement the role-based access control model.

Data Classification Inventory Tool

Use this tool to track and classify corporate data. Gain insight on the location and security of various data and repositories to drive strategic security decisions.

Data Classification RACI Tool

Assign responsibilities to your data classification program.

Data Discovery Interview Tracking Tool

Use this tool to conduct interviews with data owners in your organization. Discover what and where your data exists and the current data handling procedures in place.

Data Classification Metrics Tracking Tool

Use this tool to summarize important metrics in your organization.
GET HELP Contact Us
×
VL Methodology