AJ Suurhoff
Articles
Recent activity by AJ Suurhoff
-
Adding, Uploading and Importing Risks
Creating a Risk Register and regularly performing a risk assessment is an integral part of a cybersecurity compliance program. Starting from a pre-built set of risks or a risk library can be very h...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Frameworks
Frameworks are a set of best practice recommendations by organizations like the American Institute of Certified Public Accountants (AICPA) for SOC2, National Institute of Standards and Technology (...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Configuring Tenant Sign In Settings - Google, Microsoft, SAML 2.0 SSO
Overview ControlMap allows users to utilize SSOs (or Single Sign-On) to streamline the login process. SSO Configuration can be configured within each customer tenant as outlined below. Additionall...
- Updated
- 1 follower
- 0 comments
- -1 votes
-
Start to finish. A workflow for a cybersecurity compliance program
Common workflow Here is a commonly used workflow by our customers planning an auditable framework such as SOC 2 or ISO 27001 certification. The end-to-end workflow is usually built out in Control...
- Updated
- 2 followers
- 0 comments
- 0 votes
-
Integration with Breach Secure Now
Overview The Breach Secure Now integration will enable automatically bringing over companies and people from Breach Secure Now into ControlMap and ingesting Security Awareness Training details whil...
- Updated
- 1 follower
- 0 comments
- 1 vote
-
Account Settings
Overview When onboarding or offboarding employees, it is important to make sure you have a process in place to ensure that all tasks are completed. This is where account settings come to fruition. ...
- Updated
- 1 follower
- 0 comments
- -3 votes
-
AZURE BL 1-2 Storage Accounts - data must be encrypted with Customer Managed Keys
By default, data in the storage account is encrypted using Microsoft Managed Keys at rest. All Azure Storage resources are encrypted, including blobs, disks, files, queues, and tables. All object m...
- 1 follower
- 0 comments
- 0 votes
-
Procedures
What are Procedures? Your internal procedures are where your controls and policies meet the road, so to speak. They turn directives into step-by step processes that ensure the intended security goa...
- 1 follower
- 0 comments
- 0 votes
-
Resetting your password
If you've forgotten your account password, you can reset it at any time by following these steps: 1. Select the Forgot Password link near the bottom of the sign-in page. 2. Type your accoun...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Automating your compliance operations
Why automation? You can save hundreds of hours of manual work every month collecting, managing, and maintaining evidence that you will be required to maintain for SOC 2, ISO 27001 by connecting C...
- 1 follower
- 0 comments
- 0 votes