Overview
Start your audit confidently with CISO Assistant by setting up your organization's domains and security perimeters. This guide helps you create an audit baseline aligned with ISO/IEC 27001:2022 and understand your organization's security context.
Go to localhost:5173
1. Click "Organization"
Access the Organization settings to begin configuring your domain management.

2. Click "Domains"
Navigate to the Domains section to manage your organization's domain details.

3. Click here
Initiate the process to add a new domain by selecting the appropriate option.

4. Click here
Enter a descriptive name for your new domain to clearly identify it.

5. Fill "explainer"
Save the newly created domain to register it within your organization.

6. Click "Save"
Select the domain you just created to begin setting up its security perimeter.

7. Click "2"
Open the domain details to configure its security boundaries.

8. Click "explainer"
Start adding a new security perimeter to define the domain's protective scope.

9. Click "Add perimeter"
Choose the option to specify the perimeter's characteristics and settings.

10. Click here
Provide a clear and concise name for the new security perimeter.

11. Fill "general"
Save the perimeter settings to apply them to the domain.

12. Click "Save"
Return to the General settings to prepare for audit creation.

13. Click "General"
Begin creating a new audit to assess your organization's security posture.

14. Click "New Audit"
Select the option to add a new audit baseline for evaluation.

15. Click here
Name your audit baseline to reflect its purpose or scope.

16. Fill "my baseline"
Specify the audit type or category to align with your compliance goals.

17. Click here
Choose the relevant standard or framework for your audit.

18. Fill "iso"
Select the International standard ISO/IEC 27001:2022 to align with recognized security practices.

19. Click "International standard ISO/IEC 27001:2022"
Confirm and save your audit configuration to proceed.

20. Click "Save"
Access the detailed audit sections to review specific requirements.

21. Click here
Select the section focused on the organization's context for information security.

22. Click "4 - Context of the organization 0%0%0%0%"
Review and identify internal and external factors impacting your security objectives.

23. Click "Identify internal and external factors that influence the organization’s ability to achieve information security objectives, ensuring the ISMS is aligned with its context."
Ensure your Information Security Management System (ISMS) aligns with your organization's context by addressing these factors.

This guide walked you through setting up domains and security perimeters, creating an audit baseline, and aligning your ISMS with ISO/IEC 27001:2022 standards. You learned to identify organizational factors critical to achieving information security objectives.
Last updated
Was this helpful?