3. Key Features to Explore First
3.1 Audits
Go to Compliance β Audits.
Select a framework (ISO, NIST, or custom).
Review assigned controls, mark them compliant or non-compliant, and attach evidence.
3.2 Risk Assessments
Navigate to Risks β Assessments.
Create a new risk assessment for a department, system, or process.
Rate risks by impact and likelihood.
Assign mitigation actions to responsible team members.
3.3 Policies
Go to Governance β Policies.
Review published organizational policies.
Upload or acknowledge policies (depending on your role).
3.4 Incidents
Navigate to Incidents β Report Incident.
Log details of a security event.
Track its status (Open, In Progress, Resolved).
Attach supporting files such as screenshots, logs, or reports.
Last updated