Latest Evidence
Description
Calculation
Metadata
| Last Seen: | |
|---|---|
| Control Owner: | |
| Control Approver: |
Links
Relationships
Tags
Entity Scope
SystemXXX
SystemXXX
SystemXXX
SystemXXX
SystemXXX
SystemXXX
Description
Calculation
Metadata
| Last Seen | |
|---|---|
| Control Type | |
| Control Owner | |
| Control Approver | |
| Target State | |
| Baseline State | |
| Monitored |
Events (Past 7 Days)
Relationships
Evidence Picker
Evidence
Risk Score
Org Chart
Metadata
Tags
Timeline
Discovered By
| Data Source | First Discovered by QO | Last Seen by Data Source | State | Trend |
|---|
Evidence
Go to Dashboard
Framework Summary
72%
100%
ATT&CK
99%
EMEA/EU DORA
68%
NIST CSF 1.1
68%
PCI DSS 3.2.1
50%
SOX
Go to Dashboard
Security KRI/KPI Summary
86%
0%
Cloud Controls
87%
Endpoint
100%
Ext Attack Surf
100%
Identity
100%
InsiderThreat
100%
Ransomware
100%
User Awareness
100%
Vulnerabilities
Go to Dashboard
Identity and Access Management (IAM) is a security framework that helps organizations manage and control access to digital resources by ensuring the right individuals have the right level of access at the right time. IAM Summary provides an overview of the organization's IAM posture.
Go to Dashboard
Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.