Section tracker

Click any section below to preview or revisit your answers.

1. Organization Profile

Tell us about your organization.

Business Context Quick narrative so the assessment aligns with reality

2-4 sentences describing what you deliver, to whom, and scale.

List the processes or services that must stay online.

Approximate number of active customers or typical range.

Press Enter after each industry to add a chip.

Technical Architecture Helps calibrate control expectations

Matches how workloads are deployed today.

Do you separate prod/dev/test networks? Is OT isolated from corporate IT?

Client Data Lifecycle Track where client data lives across stages

Check all that apply; add brief systems for each stage (e.g., Store = S3; Dispose = policy + tool).

Risk Management Framework Document risk tolerance, acceptance, and ERM linkage
Structured Data Flows Map sources → stores → movements

Identify major sources→stores→movements (e.g., endpoints → S3 → ETL → warehouse).

Risk & Compliance Requirements Surface regulatory and contractual must-haves

Note any SLAs, audit rights, or security addenda.

List the top known risks or open issues (no placeholders).

Stakeholders & Risk Appetite Identify who owns the risk conversation

How comfortable is leadership with taking security/operational risk?

Governance & Programs Understand policies, awareness, and oversight structure

Select all formal policies currently maintained.

KPIs quantify program health (e.g., MTTR, patch SLAs, phishing click rate).

Select controls in place for facilities where company assets or data are stored.

Highlight activities that keep custom code secure.

Capture controls that protect email and collaboration platforms.

Security Awareness Program Capture training delivery, phishing simulations, and champions
Operations & Change Management Clarify how changes and incidents are handled
Secure Development & Platform Security Outline SDLC methodologies, security gates, and change control

2. Infrastructure & Technology

Understand your IT environment.

Indicate how mobile devices (laptops, tablets, phones) are onboarded and controlled.

3. Access & Authentication

How do you manage user access?

Select all that apply

Estimate what percentage of your workforce must use MFA across key systems.

Identity Lifecycle Management Deep dive on joiner/mover/leaver, privileged accounts, and federation

4. Asset Management & Data

How do you track and protect critical assets?

Select the safeguards that govern how encryption keys are generated, stored, rotated, and retired.

Identify how portable storage (USB drives, external disks) is governed.

5. Vulnerability & Patch Management

Identify and remediate weaknesses.

6. Monitoring & Detection

How do you detect/respond to threats?

EDR agents watch endpoints for malicious behavior and enable rapid containment.

Security Operations Details Capture how day-to-day monitoring and response run
Detection & Monitoring Enhancements SIEM usage, behavioral baselines, and incident criteria

A SIEM ingests logs from many systems so you can correlate events and alert on threats.

7. Backup & Recovery

Recover from data loss or ransomware.

Auto-filled from Section 1; RTO is the maximum downtime your business can tolerate.

Auto-filled from Section 1; RPO is the maximum acceptable data loss window.

8. Incident Response & Breach History

Detect, respond, and learn from incidents.

Incident Response Program Details Deeper insight into response standards and readiness
Communications & External Relations Outline who is notified internally and externally during incidents

9. Third-Party Risk Management

Manage security risks from vendors/partners.

Critical Vendor Details Track key vendors, data handling, and assurances

Press Enter after each vendor; select a chip to edit details.

Add a vendor above, then select it to capture category, services, data access, and requirements.

Example: Annual SOC 2 Type II; 24-hour breach notification; right-to-audit clause.

Cyber Insurance Document coverage, limits, and insurer expectations
Expanded Third-Party Risk Capture onboarding standards, monitoring cadence, and exits

10. Business Continuity & Risk

How resilient is your organization?

BCP explains how you keep critical services running during major disruptions.

DR plans describe how you restore systems and data after a severe outage.

Compliance & Audit Surface assurance activities and exception handling
Metrics & Continuous Improvement Track KRIs/KPIs, cadence, and roadmap ownership

KRIs flag when risk is increasing so leadership can act early.

KPIs measure ongoing program performance (e.g., MTTR, training completion).

NIST CSF 2.0 Assessment Report

Cybersecurity Framework Readiness Analysis

Executive Summary

Maturity Analysis by Function

Implementation Tier Assessment

Overall Tier
-
Awaiting analysis
Governance
-
Risk Management
-
Learn about NIST CSF Tiers →

Rationale

  • Analysis pending…

Priority Focus Areas

  • Analysis pending…

Key Recommendations

Detailed Assessment Data

Unlock Your Complete Package

Get your full assessment report and customized security policy documents tailored to your organization.

Package includes: Complete Assessment Report + 8 Customized Security Policies (Information Security, Acceptable Use, Access Control, Data Classification, Logging & Monitoring, Incident Response, Backup & Recovery, Vendor Risk Management)
Progress saved in this browser.
1 of 10