User
Client Environments — select all that apply to filter relevant checks
Comprehensive security discovery across 15 domains — 111 checks total
0 of 111 checks completed across all domains
0%
complete
0
Passed
Failed (Gaps)
Partial
111
Not Checked
8 checks · ~16h
Hardware, software, cloud, and data asset inventory — the foundation of every security program
11 checks · ~20h
Perimeter defence, segmentation, firewall rules, remote access, and network monitoring
10 checks · ~24h
Active Directory, Entra ID, MFA, privileged access, service accounts, and access reviews
8 checks · ~20h
EDR/AV coverage, patch management, device compliance, encryption, and endpoint hardening
8 checks · ~12h
Email gateway, SPF/DKIM/DMARC, anti-phishing, secure email gateway, and email DLP
7 checks · ~16h
Data classification, encryption at rest and in transit, DLP, backup, and data retention
7 checks · ~20h
Azure/M365 security posture, Defender for Cloud, CSPM, cloud identity, and workload protection
SIEM coverage, log sources, detection rules, alert triage, MTTR, and SOC maturity
6 checks · ~12h
Vulnerability scanning, CVE tracking, patch prioritisation, and remediation SLAs
6 checks · ~16h
IR plan, playbooks, tabletop exercises, breach notification, and forensic readiness
Security policies, risk management framework, compliance posture, and security governance structure
5 checks · ~8h
Security training programme, phishing simulations, role-based training, and culture assessment
5 checks · ~12h
BCP, DR plan, RTO/RPO targets, backup testing, and resilience assessment
Physical access controls, CCTV, clean desk, media handling, and visitor management
Secure development lifecycle, code review, SAST/DAST, dependency scanning, and API security
Vendor security assessments, supply chain risk, contract security requirements, and ongoing monitoring