Cybersecurity Strategy
Cybersecurity Policy & Procedures
Cybersecurity Roles & Responsibilities
Crisis Management Procedures
Disaster Recovery & Business Continuity Plans
Incident Response Plan
Policies, Plans & Procedures
Playbooks
Threat Actor Library
Mapping of incidents/Security events
Risk assessment
Risk mitigation plan/Risk prioritization
Audit/Assessment reports
Incident & Change management tracker - Major Changes
Information asset registers
Agreements with Suppliers
Requirements in Supply chain
Evaluation of cybersecurity controls in supply chain
Policies & Procedures
Evaluation & Monitoring checklists
Gap assessment
Measurement effectiveness of controls
Previous audit report closures
Implementation of controls
ISO 27001 & Cyber Essentials
Policies & Procedures
Measurement effectiveness
Compliance to organizational framework
Audit plans & Assessment reports
Information security strategy
Architecture diagram (HLD / LLD)
Comparison of solutions
Configuration
Monitoring
Information classification
Data flow analysis
Information access controls/restrictions
Data leakage controls
Policies
IT Procedures
Configuration guidelines
Incident/Problem Management
Effectiveness of IT Security controls
Asset Management
Information asset registers
Information classification and labelling
Asset criticality
Asset handling procedures