3. Key Features to Explore First

3.1 Audits

  • Go to Compliance β†’ Audits.

  • Select a framework (ISO, NIST, or custom).

  • Review assigned controls, mark them compliant or non-compliant, and attach evidence.

3.2 Risk Assessments

  • Navigate to Risks β†’ Assessments.

  • Create a new risk assessment for a department, system, or process.

  • Rate risks by impact and likelihood.

  • Assign mitigation actions to responsible team members.

3.3 Policies

  • Go to Governance β†’ Policies.

  • Review published organizational policies.

  • Upload or acknowledge policies (depending on your role).

3.4 Incidents

  • Navigate to Incidents β†’ Report Incident.

  • Log details of a security event.

  • Track its status (Open, In Progress, Resolved).

  • Attach supporting files such as screenshots, logs, or reports.

Last updated