austinsonger
commited on
Commit
•
c23fb87
1
Parent(s):
d18acbd
Update README.md
Browse files
README.md
CHANGED
@@ -29,42 +29,49 @@ Addresses a critical and often cumbersome aspect of business operations—ensuri
|
|
29 |
| Contract Compliance | Key points from contracts and SLAs, including compliance with specified security requirements. | Unstructured | "SLA includes 99.9% uptime guarantee, penalties for data breaches" |
|
30 |
|
31 |
|
32 |
-
### What to collect:
|
33 |
|
34 |
#### Security Attestation
|
35 |
-
-
|
36 |
-
-
|
37 |
-
-
|
38 |
-
|
|
|
39 |
|
40 |
#### BCP Effectiveness
|
41 |
-
-
|
42 |
-
-
|
43 |
-
- BCP
|
|
|
|
|
44 |
|
45 |
#### DRP Readiness
|
46 |
-
-
|
47 |
-
- DR
|
48 |
-
-
|
49 |
-
|
|
|
50 |
|
51 |
#### Cybersecurity Maturity
|
52 |
-
-
|
53 |
-
-
|
54 |
-
-
|
55 |
-
|
|
|
56 |
|
57 |
#### Financial Health
|
58 |
-
-
|
59 |
-
-
|
60 |
-
-
|
61 |
-
|
|
|
62 |
|
63 |
#### Contract Compliance
|
64 |
-
-
|
65 |
-
-
|
66 |
-
-
|
67 |
-
|
|
|
68 |
|
69 |
|
70 |
|
|
|
29 |
| Contract Compliance | Key points from contracts and SLAs, including compliance with specified security requirements. | Unstructured | "SLA includes 99.9% uptime guarantee, penalties for data breaches" |
|
30 |
|
31 |
|
32 |
+
### What I need to collect:
|
33 |
|
34 |
#### Security Attestation
|
35 |
+
- [ ] Key security controls implemented
|
36 |
+
- [ ] Findings from the audit/assessment
|
37 |
+
- [ ] Compliance status and areas of improvement
|
38 |
+
- [ ] Summary of security measures like encryption, access controls, etc.
|
39 |
+
- [ ] Any significant observations or exceptions noted in the report
|
40 |
|
41 |
#### BCP Effectiveness
|
42 |
+
- [ ] Summary of BCP tests and exercises
|
43 |
+
- [ ] Coverage of critical operations in the BCP
|
44 |
+
- [ ] Frequency and results of BCP testing
|
45 |
+
- [ ] Any identified gaps and improvements
|
46 |
+
- [ ] Metrics like Recovery Time Objective (RTO) and Recovery Point Objective (RPO) achieved during tests
|
47 |
|
48 |
#### DRP Readiness
|
49 |
+
- [ ] Summary of DRP and its strategic approaches
|
50 |
+
- [ ] DR drills and testing frequency
|
51 |
+
- [ ] Achieved RTO and RPO for critical services
|
52 |
+
- [ ] Readiness status and any identified improvements
|
53 |
+
- [ ] Key dependencies and risks identified in the DRP
|
54 |
|
55 |
#### Cybersecurity Maturity
|
56 |
+
- [ ] Cybersecurity maturity model used (e.g., CMMI, NIST CSF)
|
57 |
+
- [ ] Current maturity level and criteria met
|
58 |
+
- [ ] Areas of strength and improvement
|
59 |
+
- [ ] Specific scores or ratings for different cybersecurity domains
|
60 |
+
- [ ] Summary of assessment findings
|
61 |
|
62 |
#### Financial Health
|
63 |
+
- [ ] Key financial ratios (e.g., Current Ratio, Debt to Equity Ratio)
|
64 |
+
- [ ] Financial stability indicators (e.g., Profit Margin, EBITDA)
|
65 |
+
- [ ] Cash flow statements
|
66 |
+
- [ ] Balance sheet summaries
|
67 |
+
- [ ] Financial trends and forecasts
|
68 |
|
69 |
#### Contract Compliance
|
70 |
+
- [ ] Key compliance requirements from contracts and SLAs
|
71 |
+
- [ ] Security requirements and obligations
|
72 |
+
- [ ] Uptime guarantees and penalties
|
73 |
+
- [ ] Summary of compliance status
|
74 |
+
- [ ] Any exceptions or non-compliance issues noted
|
75 |
|
76 |
|
77 |
|