Security Technology & Operations - Tools

Security Metrics Assessment Tool

Use this assessment to identify which metrics best align with your organization's risk tolerance level and other requirements.

Security Risk Register Tool

This tool will allow you to collect, analyze, and combine individual risks and view the aggregate level of risk within the organization, including how it compares to your...

Service Risk Assessment Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.

Vendor Security Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to develop a questionnaire for potential vendors to assess their...

Vendor Security Assessment Inventory

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to inventory vendors and the results of their security assessments.

Vendor Security Requirements Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, or on its own to provide potential vendors with contractual requirements related...

RBAC Implementation Workbook

Use this tool to build a role-based access control model for your organization. This tool also provides version control and metrics tabs to assist with long-term maintenance.

IAM Task Prioritization Tool

Use this tool to document and prioritize the tasks required to complete and implement the role-based access control model.

Insourcing vs. Outsourcing Costing Tool

This tool will help you determine the costs of outsourcing and in-house options to determine potential cost savings from outsourcing.

MSSP Selection Tool

This tool will rank managed security service providers (MSSPs) based on the variables selected in order to determine which MSSP is the most valuable to your organization.
GET HELP Contact Us
×
VL Methodology