AJ Suurhoff
Articles
Recent activity by AJ Suurhoff
-
ControlMap 101 Video Series
Welcome to the ControlMap video series. These videos were created to help you and your team learn how to navigate and use ControlMap for your business. Note: Our product can evolve quickly,...
- Updated
- 1 follower
- 0 comments
- 2 votes
-
Team Settings
Overview Invite your team to contribute, own or approve compliance tasks. Team members could be compliance managers, policy contributors, evidence owners or control owners. Users Adding Users Edi...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
AZURE BL 1-1 Storage accounts - Secure transfer required must be enabled
You can configure your storage account to accept requests from secure connections only by setting the Secure transfer required property for the storage account. When you require a secure transfer, ...
- 1 follower
- 0 comments
- 0 votes
-
Rules scanned & Remediation steps for GCP
ControlMap follows CIS benchmarks to scan GCP environments and automatically report deviations. WE HIGHLY recommend that you familiarize yourself with the CIS benchmarks for GCP for AUDIT and REMED...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Vendors
The Vendors section in ControlMap allows you to examine your preferred vendors’ cybersecurity compliance in relation to your own. You can populate this section with relevant vendor information, ad...
- 1 follower
- 0 comments
- 1 vote
-
Assets
Working with AssetsManaging your organization’s assets can be a difficult task, as almost anything associated with a company could be considered an asset. Every employee, computer and cell phone i...
- Updated
- 1 follower
- 0 comments
- -1 votes
-
Audits
The Audits feature has been refreshed to include a useful workflow for performing internal or 3rd party audits. ControlMap has always supported auditing by evidence request list but now you are als...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Evidence
The Evidence tab is used to manage evidence and evidence requests that link to controls. Evidence can also be linked and created directly within a Control. An example of evidence that would link to...
- Updated
- 1 follower
- 0 comments
- -4 votes
-
Policies
Information Security policies are the bedrock of all cybersecurity Compliance Certifications, Audits, and Assessments. Without a central system for documenting these policies, maintaining mappings ...
- Updated
- 1 follower
- 0 comments
- -1 votes
-
Controls
Implementing and monitoring controls is essential for all present-day organizations, as cyber threats/attacks are at an all-time high. You can create, edit and manage your controls within ControlM...
- Updated
- 1 follower
- 0 comments
- -1 votes