This tool guides organizations in evaluating the complexity of their IT environment, their operational maturity, and the perceived value of security architecture. It then...
|
|
Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to provide potential vendors with contractual requirements related...
|
|
Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.
|
|
Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to develop a questionnaire for potential vendors to assess their...
|
|
Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.
|
|
Use this tool to document and prioritize the tasks required to complete and implement the role-based access control model.
|
|
Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.
|
|
The In-House vs. Outsourcing Decision-Making Tool is designed to help organizations analyze the cost and risk management effectiveness for security capabilities with...
|
|
This tool will give you an assessment of your current control coverage and help you determine the types of controls required to mitigate your risks.
|
|
The only way to know if your controls are providing adequate coverage is to measure them over time. This tool will give you insight into the continued relevance of your...
|
|