User

AJ Suurhoff

Member since
Total activity 161
Last activity
Following 0 users
Followed by 0 users
Votes 0
Subscriptions 85

Articles

Recent activity by AJ Suurhoff

  • Adding, Uploading and Importing Risks

    Creating a Risk Register and regularly performing a risk assessment is an integral part of a cybersecurity compliance program. Starting from a pre-built set of risks or a risk library can be very h...

    • Updated
    • 1 follower
    • 0 comments
    • 0 votes
  • Frameworks

    Frameworks are a set of best practice recommendations by organizations like the American Institute of Certified Public Accountants (AICPA) for SOC2, National Institute of Standards and Technology (...

    • Updated
    • 1 follower
    • 0 comments
    • 0 votes
  • Configuring Tenant Sign In Settings - Google, Microsoft, SAML 2.0 SSO

    Overview ControlMap allows users to utilize SSOs (or Single Sign-On) to streamline the login process.  SSO Configuration can be configured within each customer tenant as outlined below. Additionall...

    • Updated
    • 1 follower
    • 0 comments
    • -1 votes
  • Start to finish. A workflow for a cybersecurity compliance program

    Common workflow   Here is a commonly used workflow by our customers planning an auditable framework such as SOC 2 or ISO 27001 certification. The end-to-end workflow is usually built out in Control...

    • Updated
    • 2 followers
    • 0 comments
    • 0 votes
  • Integration with Breach Secure Now

    Overview The Breach Secure Now integration will enable automatically bringing over companies and people from Breach Secure Now into ControlMap and ingesting Security Awareness Training details whil...

    • Updated
    • 1 follower
    • 0 comments
    • 1 vote
  • Account Settings

    Overview When onboarding or offboarding employees, it is important to make sure you have a process in place to ensure that all tasks are completed. This is where account settings come to fruition. ...

    • Updated
    • 1 follower
    • 0 comments
    • -3 votes
  • AZURE BL 1-2 Storage Accounts - data must be encrypted with Customer Managed Keys

    By default, data in the storage account is encrypted using Microsoft Managed Keys at rest. All Azure Storage resources are encrypted, including blobs, disks, files, queues, and tables. All object m...

    • 1 follower
    • 0 comments
    • 0 votes
  • Procedures

    What are Procedures? Your internal procedures are where your controls and policies meet the road, so to speak. They turn directives into step-by step processes that ensure the intended security goa...

    • 1 follower
    • 0 comments
    • 0 votes
  • Resetting your password

    If you've forgotten your account password, you can reset it at any time by following these steps:  1. Select the Forgot Password link near the bottom of the sign-in page.      2. Type your accoun...

    • Updated
    • 1 follower
    • 0 comments
    • 0 votes
  • Automating your compliance operations

    Why automation?   You can save hundreds of hours of manual work every month collecting, managing, and maintaining evidence that you will be required to maintain for SOC 2, ISO 27001 by connecting C...

    • 1 follower
    • 0 comments
    • 0 votes