Resources

Resource Catalog

Policies, templates, guides, runbooks, and tabletop exercises you can reuse across clients.

How to use this

Filter by resource type, search by title/tags, then download, generate, or view. Later, these can be linked directly to findings inside Risk Workspace.

Blue is for navigation / focus. Orange highlights section titles and primary actions.

Browse resources

Showing 30 of 30

Search by title, summary, or tags. Filter by resource type.

Policies

3 items

Recommended policy resources for client delivery.

Policy

Resource

Information Security Policy

Defines the organization’s approach to protecting information assets, systems, and data across people, process, and technology.

policybaselineCISNIST

Policy

Resource

Acceptable Use Policy (AUP)

Baseline acceptable use rules for corporate devices, email, and systems.

policybaselineCISNIST

Policy

Resource

AI Acceptable Use Policy

Rules for responsible AI use, approved tools, and data handling for client review.

policyaibaselineCIS

Frameworks

10 items

Recommended framework resources for client delivery.

Framework

Resource

NIST CSF 2.0

A risk-based framework to understand, assess, prioritize, and communicate cybersecurity outcomes across Identify, Protect, Detect, Respond, and Recover.

frameworksecurity-postureNISTbaseline

Framework

Resource

CIS Controls v8

A prioritized set of 18 safeguards to reduce the most common cyber risks; practical for SMB and enterprise control implementation.

frameworkcontrol-implementationCISbaseline

Framework

Resource

NIST SP 800-61 Rev. 3

Incident response recommendations and considerations aligned to cybersecurity risk management activities (CSF 2.0 alignment).

frameworkincident-responseNIST

Framework

Resource

ISO/IEC 27001

International standard specifying requirements for an Information Security Management System (ISMS).

frameworkgovernanceISOISMS

Framework

Resource

SOC 2

Assurance reporting framework for service organizations based on Trust Services Criteria (security, availability, processing integrity, confidentiality, privacy).

frameworkcustomer-trustSOC2AICPA

Framework

Resource

MITRE ATT&CK

A knowledge base of adversary tactics and techniques used to drive threat modeling, detection engineering, and threat-informed defense.

frameworkthreat-modelingMITRE

Framework

Resource

NIST AI RMF 1.0

Guidance to manage risks of AI systems and improve trustworthiness across Govern, Map, Measure, and Manage functions.

frameworkai-governanceNISTAI

Framework

Resource

NIST Privacy Framework

A voluntary framework to help organizations identify and manage privacy risk through enterprise risk management.

frameworkprivacyNIST

Framework

Resource

GDPR (Regulation (EU) 2016/679)

EU regulation governing personal data protection and privacy rights, including lawful processing, data subject rights, and accountability obligations.

frameworkprivacyGDPREU

Framework

Resource

ISO 22301

International standard for Business Continuity Management Systems (BCMS) to build resilience and recover from disruptive incidents.

frameworkresilienceISOBCMS

Runbooks

1 items

Recommended runbook resources for client delivery.

Runbook

Resource

Incident Response Quick Runbook

A one-page IR checklist for triage, containment, and communications.

runbookincident-response

Tabletop Exercises

16 items

Recommended tabletop resources for client delivery.

Tabletop

Resource

Ransomware attack on core business systems

60–90 minute, decision-focused exercise mapped to NIST IR + CIS (8, 17, 18).

tabletopttxincident-responsenist-ir

Tabletop

Resource

Phishing → credential compromise

Identity compromise scenario emphasizing executive decisions for containment and recovery.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Data exfiltration & breach notification

Decisions around containment, forensics, legal counsel, and notification timelines.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Third-party / vendor compromise

Vendor incident handling, contractual obligations, and continuity decision-making.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Insider threat (malicious or negligent)

HR/legal coordination, evidence handling, and containment decisions under pressure.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Business email compromise (BEC)

Fraud response and financial decision-making with comms and recovery sequencing.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Website defacement

Public-facing incident decisions including containment, restoration, and PR messaging.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Cloud service outage

Continuity, vendor escalation, and recovery sequencing decisions during outages.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Malware propagation across endpoints

Isolation tradeoffs, operational impact decisions, and recovery prioritization.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Lost/stolen device with sensitive data

Data exposure, legal obligations, and user/customer communications decisions.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Regulatory & reputational impact discussions

Executive decision-making on disclosure strategy, regulator engagement, and PR.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Backup Failure / Recovery Failure

Decision-making when restoration fails and operations must continue under constraints.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Identity / Privileged Access Compromise

Privileged account abuse decisions, containment steps, and credential reset sequencing.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Shadow IT / Unauthorized SaaS

Discovery, risk acceptance, and containment decisions without deep technical jargon.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Incident Communications Breakdown

Focuses on decision ownership, escalation, and messaging when coordination fails.

tabletopttxincident-responsenist-ir

Tabletop

Resource

Supply Chain / Software Update Compromise

Decisions around vendor trust, rollback strategy, customer impact, and recovery plans.

tabletopttxincident-responsenist-ir