00 - initial setup

Start your journey with CISO Assistant by setting up your organization’s domains, perimeters, and users

1. Introduction

This guide walks you through configuring essential security frameworks and risk matrices to establish a robust compliance foundation.

Introduction

2. Click "Organization"

Navigate to the Organization section to begin configuring your company settings.

Click 'Organization'

3. Click "Domains"

Access the Domains tab to manage your organization's domain information.

Click 'Domains'

4. Click here

Initiate adding a new domain by clicking the add button.

Click here

5. Click here

Open the domain creation form to input new domain details. Markdown is supported for the description.

Click here

6. Fill "ACME" (or any relevant domain name)

Enter your organization's domain name to register it within the system.

Fill 'ACME' (or any relevant domain name)

7. Click "Save"

Confirm and save the new domain to apply changes.

Click 'Save'

8. Click "ACME"

Select the newly created domain to configure its specific settings.

Click 'ACME'

9. Click "Add perimeter"

Start adding a security perimeter to define access boundaries for the domain.

Click 'Add perimeter'

10. Click here

Open the perimeter creation interface to specify perimeter details.

Click here

11. Fill "Common"

Name the new perimeter to identify it clearly within your domain.

Fill 'Common'

12. Click "Save"

Save the perimeter settings to establish the defined boundary.

Click 'Save'

13. Click "Users"

Go to the Users section to manage user accounts and permissions.

Click 'Users'

14. Click here

Begin adding a new user by selecting the add user option.

Click here

15. Click here

Open the user creation form to input user details.

Click here

16. Fill "alice@company.com"

Enter the user's email address to create their account.

Fill 'alice@company.com'

17. Click "Save"

Save the new user profile to register them in the system.

Click 'Save'

18. Click "alice@company.com"

Select the newly added user to modify their settings.

Click 'alice@company.com'

19. Click "Edit"

Access the edit mode to update user roles and permissions.

Click 'Edit'

20. Click here

Open the role assignment dropdown to select user roles.

Click here

21. Click "ACME - Analyst"

Choose the appropriate role for the user within the organization.

Click 'ACME - Analyst'

22. Click "Save"

Save the updated user role to apply changes.

Click 'Save'

23. Click "Catalog"

Navigate to the Catalog section to explore available frameworks and resources.

Click 'Catalog'

24. Click "Frameworks"

Access the Frameworks tab to browse compliance and security frameworks.

Click 'Frameworks'

25. Click here

Open the framework search interface to find specific standards.

Click here

Use the search bar to locate a framework by name or keyword.

Click 'Search...'

27. Fill "iso 27"

Enter the ISO 27001 framework to find relevant compliance information.

Fill 'iso 27'

28. Click here

Select the ISO 27001 framework from the search results to view details.

Click here

29. Fill "nist csf"

Open the NIST CSF framework details for review and mapping.

Fill 'nist csf'

30. Click here

Use the search function to find specific frameworks or resources.

Click here

31. Click "nist csf"

Access the Risk Matrices section to manage risk assessment tools.

Click 'nist csf'

Open the risk matrix search to locate specific matrices.

Fill 'Search...'

33. Click "Risk matrices"

Search for critical risk matrices to prioritize high-impact risks.

Click 'Risk matrices'

34. Click here

Select the critical risk matrix to analyze and manage risks.

Click here

Navigate to the Mappings section to link frameworks and risk matrices.

Click 'Search...'

36. Fill "critic"

Access the Risk Matrices tab within Mappings to review associations.

Fill 'critic'

37. Click here

Switch to the Frameworks tab to manage framework mappings.

Click here

38. Click "Risk matrices"

Review the filtered entries to find specific standards and mappings.

Click 'Risk matrices'

39. Click "Frameworks"

Examine the details of the ISO/IEC 27001:2022 standard for information security compliance.

Click 'Frameworks'

This guide covered setting up your organization in CISO Assistant, including domain and perimeter creation, user management, role assignments, and exploring compliance frameworks and risk matrices. It also detailed how to map frameworks to risk matrices for comprehensive security management.

Powered by guidde

Last updated

Was this helpful?