Security Technology & Operations - Tools

Service Risk Assessment Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.

Vendor Security Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to develop a questionnaire for potential vendors to assess their...

Vendor Security Assessment Inventory

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.

Vendor Security Requirements Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to provide potential vendors with contractual requirements related...

RBAC Implementation Workbook

Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.

IAM Task Prioritization Tool

Use this tool to document and prioritize the tasks required to complete and implement the role-based access control model.

Security Risk Register Tool

This tool will allow you to collect, analyze, and combine individual risks and view the aggregate level of risk within the organization, including how it compares to your...

Insourcing vs. Outsourcing Costing Tool

This tool will help you determine the costs of outsourcing and in-house options to determine potential cost savings from outsourcing.

MSSP Selection Tool

This tool will rank managed security service providers (MSSPs) based on the variables selected in order to determine which MSSP is the most valuable to your organization.

Security Operations Preliminary Maturity Assessment Tool

At a high level, assess your organization’s operational maturity in each of the threat collaboration environment functions. Determine whether the foundational processes...
GET HELP Contact Us
×
VL Methodology