AJ Suurhoff
Articles
Recent activity by AJ Suurhoff
-
AZURE BL 1-2 Storage Accounts - data must be encrypted with Customer Managed Keys
By default, data in the storage account is encrypted using Microsoft Managed Keys at rest. All Azure Storage resources are encrypted, including blobs, disks, files, queues, and tables. All object m...
- 1 follower
- 0 comments
- 0 votes
-
Procedures
What are Procedures? Your internal procedures are where your controls and policies meet the road, so to speak. They turn directives into step-by step processes that ensure the intended security goa...
- 1 follower
- 0 comments
- 0 votes
-
Resetting your password
If you've forgotten your account password, you can reset it at any time by following these steps: 1. Select the Forgot Password link near the bottom of the sign-in page. 2. Type your accoun...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Automating your compliance operations
Why automation? You can save hundreds of hours of manual work every month collecting, managing, and maintaining evidence that you will be required to maintain for SOC 2, ISO 27001 by connecting C...
- 1 follower
- 0 comments
- 0 votes
-
Users, Roles & Employees in ControlMap
User Overview Access to your ControlMap Command Center is managed in the Users section of the Settings menu. To add or manage users, select the "Settings" section at the bottom of the sidebar and...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Policies, Procedures and Governance Settings
Overview Within ControlMap settings, you can apply different configuration options for your Policies, Procedures and Governance documents. This includes updates to document content, headers, footer...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
AZURE BL 1-3 Storage Accounts that include activity logs should be encrypted with Customer Managed Keys
By default, data in the storage account is encrypted using Microsoft Managed Keys at rest. All Azure Storage resources are encrypted, including blobs, disks, files, queues, and tables. All object m...
- 1 follower
- 0 comments
- 0 votes
-
Enabling Two Factor / 2FA Authentication
Two-Factor Authentication (2FA) has become increasingly necessary to protect against unauthorized access. ScalePad supports 2FA both within the ScalePad Hub and within ControlMap direct tenant lo...
- Updated
- 1 follower
- 0 comments
- 0 votes
-
Syncing Employee / HR system with ControlMap
Why connect your HR system to ControlMap A large number of evidence requests from the auditors for SOC 2 audits or for ISO 27001 certifications are related to the status, access, and onboarding, ...
- 1 follower
- 0 comments
- 0 votes
-
Risk Settings
Overview Every company may have different risk factors or impact based on the likelihood of something happening. It is important to review the Risk Factors and Risk Score to make sure they align wi...
- Updated
- 1 follower
- 0 comments
- -1 votes