Applied Controls

The Applied Controls page in CyberGuard.ai provides a centralized view of all security and compliance controls that have been implemented across your organization’s domains. It allows users to monitor the deployment and effectiveness of cybersecurity policies, standards, and operational safeguards mapped to frameworks such as NIST, CMMC, and SOC 2.

This section ensures that each control — such as Access Management, Incident Response, or Configuration Management — is actively tracked with its status, priority, and associated domain, providing full visibility into the maturity and coverage of your control environment.


Usage Notes

  1. Viewing and Managing Controls

    • Each row represents an applied control, including its reference ID, name, category, status, and domain.

    • Use the view icon to see detailed information about a specific control’s implementation.

    • Use the edit icon to update or modify a control as new measures are deployed or policies are revised.

    • Use the delete icon to remove obsolete or deprecated controls.

  2. Filtering and Searching

    • The search bar enables quick lookup by control name, reference ID, or domain.

    • Use the filters button to refine the list by category, priority, or status (e.g., Active, Planned, Deprecated).

  3. Monitoring Control Effectiveness

    • The page helps governance and security teams verify that all required controls are in place and functioning as intended.

    • Active controls indicate current enforcement, while planned or inactive statuses can signal pending implementation or review needs.

  4. Integration with Other Modules

    • Applied Controls are linked with the Governance, Compliance, and Risk modules to ensure continuous visibility and alignment across the security program.

    • Each control can be tied to specific frameworks, audits, or risk assessments, allowing traceability from regulatory requirements to operational enforcement.


  • Governance Analytics – Track control maturity and framework coverage metrics.

  • Compliance Assessments – Map applied controls to framework requirements for audit readiness.

  • Risk Register – Identify which risks are mitigated by implemented controls.

  • Policies – Review associated security policies that define control implementation details.

Last updated