Auditing toolkitΒΆ
These pages form the reference layer that applies across all the framework-specific sections. They run from the operational environment outward: the concepts that define what is being protected, the threats that test it, and the obligations that frame it. The working methods follow: assessing your own position, capturing and scoring risk, and gathering evidence. The audit process pages follow: running internal sessions, acting on findings, and maintaining compliance between reviews. The tooling pages close the section with BI and AI options for evidence work at scale.
- Confidentiality, integrity, and availability
- Arrows and shields
- ISO/IEC information security standards
- OT/ICS standards
- EU regulations reference
- Supply chain and third-party risk
- Scope definition
- Gap analysis
- Threat register
- Risk scoring
- Interview and workshop facilitation
- Audit findings and reporting
- Continuous compliance monitoring
- Use of big data in audits
- Use of AI in audits