00 - initial setup
Start your journey with CISO Assistant by setting up your organizationβs domains, perimeters, and users
1. Introduction
This guide walks you through configuring essential security frameworks and risk matrices to establish a robust compliance foundation.

2. Click "Organization"
Navigate to the Organization section to begin configuring your company settings.

3. Click "Domains"
Access the Domains tab to manage your organization's domain information.

4. Click here
Initiate adding a new domain by clicking the add button.

5. Click here
Open the domain creation form to input new domain details. Markdown is supported for the description.

6. Fill "ACME" (or any relevant domain name)
Enter your organization's domain name to register it within the system.

7. Click "Save"
Confirm and save the new domain to apply changes.

8. Click "ACME"
Select the newly created domain to configure its specific settings.

9. Click "Add perimeter"
Start adding a security perimeter to define access boundaries for the domain.

10. Click here
Open the perimeter creation interface to specify perimeter details.

11. Fill "Common"
Name the new perimeter to identify it clearly within your domain.

12. Click "Save"
Save the perimeter settings to establish the defined boundary.

13. Click "Users"
Go to the Users section to manage user accounts and permissions.

14. Click here
Begin adding a new user by selecting the add user option.

15. Click here
Open the user creation form to input user details.

16. Fill "alice@company.com"
Enter the user's email address to create their account.

17. Click "Save"
Save the new user profile to register them in the system.

18. Click "alice@company.com"
Select the newly added user to modify their settings.

19. Click "Edit"
Access the edit mode to update user roles and permissions.

20. Click here
Open the role assignment dropdown to select user roles.

21. Click "ACME - Analyst"
Choose the appropriate role for the user within the organization.

22. Click "Save"
Save the updated user role to apply changes.

23. Click "Catalog"
Navigate to the Catalog section to explore available frameworks and resources.

24. Click "Frameworks"
Access the Frameworks tab to browse compliance and security frameworks.

25. Click here
Open the framework search interface to find specific standards.

26. Click "Search..."
Use the search bar to locate a framework by name or keyword.

27. Fill "iso 27"
Enter the ISO 27001 framework to find relevant compliance information.

28. Click here
Select the ISO 27001 framework from the search results to view details.

29. Fill "nist csf"
Open the NIST CSF framework details for review and mapping.

30. Click here
Use the search function to find specific frameworks or resources.

31. Click "nist csf"
Access the Risk Matrices section to manage risk assessment tools.

32. Fill "Search..."
Open the risk matrix search to locate specific matrices.

33. Click "Risk matrices"
Search for critical risk matrices to prioritize high-impact risks.

34. Click here
Select the critical risk matrix to analyze and manage risks.

35. Click "Search..."
Navigate to the Mappings section to link frameworks and risk matrices.

36. Fill "critic"
Access the Risk Matrices tab within Mappings to review associations.

37. Click here
Switch to the Frameworks tab to manage framework mappings.

38. Click "Risk matrices"
Review the filtered entries to find specific standards and mappings.

39. Click "Frameworks"
Examine the details of the ISO/IEC 27001:2022 standard for information security compliance.

This guide covered setting up your organization in CISO Assistant, including domain and perimeter creation, user management, role assignments, and exploring compliance frameworks and risk matrices. It also detailed how to map frameworks to risk matrices for comprehensive security management.
Last updated
Was this helpful?