Click any section below to preview or revisit your answers.
1. Organization Profile
Tell us about your organization.
Business Context Quick narrative so the assessment aligns with reality
2-4 sentences describing what you deliver, to whom, and scale.
List the processes or services that must stay online.
Approximate number of active customers or typical range.
Press Enter after each industry to add a chip.
Technical Architecture Helps calibrate control expectations
Matches how workloads are deployed today.
Do you separate prod/dev/test networks? Is OT isolated from corporate IT?
Client Data Lifecycle Track where client data lives across stages
Check all that apply; add brief systems for each stage (e.g., Store = S3; Dispose = policy + tool).
Risk Management Framework Document risk tolerance, acceptance, and ERM linkage
Structured Data Flows Map sources → stores → movements
Identify major sources→stores→movements (e.g., endpoints → S3 → ETL → warehouse).
Risk & Compliance Requirements Surface regulatory and contractual must-haves
Note any SLAs, audit rights, or security addenda.
List the top known risks or open issues (no placeholders).
Stakeholders & Risk Appetite Identify who owns the risk conversation
How comfortable is leadership with taking security/operational risk?
Governance & Programs Understand policies, awareness, and oversight structure
Select all formal policies currently maintained.
KPIs quantify program health (e.g., MTTR, patch SLAs, phishing click rate).
Select controls in place for facilities where company assets or data are stored.
Highlight activities that keep custom code secure.
Capture controls that protect email and collaboration platforms.
Security Awareness Program Capture training delivery, phishing simulations, and champions
Operations & Change Management Clarify how changes and incidents are handled
Secure Development & Platform Security Outline SDLC methodologies, security gates, and change control
2. Infrastructure & Technology
Understand your IT environment.
Indicate how mobile devices (laptops, tablets, phones) are onboarded and controlled.
3. Access & Authentication
How do you manage user access?
Select all that apply
Estimate what percentage of your workforce must use MFA across key systems.
Identity Lifecycle Management Deep dive on joiner/mover/leaver, privileged accounts, and federation
4. Asset Management & Data
How do you track and protect critical assets?
Select the safeguards that govern how encryption keys are generated, stored, rotated, and retired.
Identify how portable storage (USB drives, external disks) is governed.
5. Vulnerability & Patch Management
Identify and remediate weaknesses.
6. Monitoring & Detection
How do you detect/respond to threats?
EDR agents watch endpoints for malicious behavior and enable rapid containment.
Security Operations Details Capture how day-to-day monitoring and response run
Detection & Monitoring Enhancements SIEM usage, behavioral baselines, and incident criteria
A SIEM ingests logs from many systems so you can correlate events and alert on threats.
7. Backup & Recovery
Recover from data loss or ransomware.
Auto-filled from Section 1; RTO is the maximum downtime your business can tolerate.
Auto-filled from Section 1; RPO is the maximum acceptable data loss window.
8. Incident Response & Breach History
Detect, respond, and learn from incidents.
Incident Response Program Details Deeper insight into response standards and readiness
Communications & External Relations Outline who is notified internally and externally during incidents
9. Third-Party Risk Management
Manage security risks from vendors/partners.
Critical Vendor Details Track key vendors, data handling, and assurances
Press Enter after each vendor; select a chip to edit details.
Add a vendor above, then select it to capture category, services, data access, and requirements.
Example: Annual SOC 2 Type II; 24-hour breach notification; right-to-audit clause.
Cyber Insurance Document coverage, limits, and insurer expectations
Expanded Third-Party Risk Capture onboarding standards, monitoring cadence, and exits
10. Business Continuity & Risk
How resilient is your organization?
BCP explains how you keep critical services running during major disruptions.
DR plans describe how you restore systems and data after a severe outage.
Compliance & Audit Surface assurance activities and exception handling
Metrics & Continuous Improvement Track KRIs/KPIs, cadence, and roadmap ownership
KRIs flag when risk is increasing so leadership can act early.
KPIs measure ongoing program performance (e.g., MTTR, training completion).
NIST CSF 2.0 Assessment Report
Cybersecurity Framework Readiness Analysis
Executive Summary
Maturity Analysis by Function
Implementation Tier Assessment
Rationale
- Analysis pending…
Priority Focus Areas
- Analysis pending…
Key Recommendations
Detailed Assessment Data
Unlock Your Complete Package
Get your full assessment report and customized security policy documents tailored to your organization.