User

AJ Suurhoff

Member since
Total activity 161
Last activity
Following 0 users
Followed by 0 users
Votes 0
Subscriptions 85

Articles

Recent activity by AJ Suurhoff

  • ControlMap 101 Video Series

    Welcome to the ControlMap video series. These videos were created to help you and your team learn how to navigate and use ControlMap for your business. Note: Our product can evolve quickly,...

    • Updated
    • 1 follower
    • 0 comments
    • 2 votes
  • Team Settings

    Overview Invite your team to contribute, own or approve compliance tasks. Team members could be compliance managers, policy contributors, evidence owners or control owners.   Users Adding Users Edi...

    • Updated
    • 1 follower
    • 0 comments
    • 0 votes
  • AZURE BL 1-1 Storage accounts - Secure transfer required must be enabled

    You can configure your storage account to accept requests from secure connections only by setting the Secure transfer required property for the storage account. When you require a secure transfer, ...

    • 1 follower
    • 0 comments
    • 0 votes
  • Rules scanned & Remediation steps for GCP

    ControlMap follows CIS benchmarks to scan GCP environments and automatically report deviations. WE HIGHLY recommend that you familiarize yourself with the CIS benchmarks for GCP for AUDIT and REMED...

    • Updated
    • 1 follower
    • 0 comments
    • 0 votes
  • Vendors

    The Vendors section in ControlMap allows you to examine your preferred vendors’ cybersecurity compliance in relation to your own.  You can populate this section with relevant vendor information, ad...

    • 1 follower
    • 0 comments
    • 1 vote
  • Assets

    Working with AssetsManaging your organization’s assets can be a difficult task, as almost anything associated with a company could be considered an asset.  Every employee, computer and cell phone i...

    • Updated
    • 1 follower
    • 0 comments
    • -1 votes
  • Audits

    The Audits feature has been refreshed to include a useful workflow for performing internal or 3rd party audits. ControlMap has always supported auditing by evidence request list but now you are als...

    • Updated
    • 1 follower
    • 0 comments
    • 0 votes
  • Evidence

    The Evidence tab is used to manage evidence and evidence requests that link to controls. Evidence can also be linked and created directly within a Control. An example of evidence that would link to...

    • Updated
    • 1 follower
    • 0 comments
    • -4 votes
  • Policies

    Information Security policies are the bedrock of all cybersecurity Compliance Certifications, Audits, and Assessments. Without a central system for documenting these policies, maintaining mappings ...

    • Updated
    • 1 follower
    • 0 comments
    • -1 votes
  • Controls

    Implementing and monitoring controls is essential for all present-day organizations, as cyber threats/attacks are at an all-time high.  You can create, edit and manage your controls within ControlM...

    • Updated
    • 1 follower
    • 0 comments
    • -1 votes