{"version":1,"pages":[{"id":"7jpBEkG9VJiS0ZYZdgAw","title":"Welcome to CISO Assistant","pathname":"/ciso-assistant","siteSpaceId":"sitesp_0UdjP","emoji":"1f44b","description":"This is CISO Assistant documentation. You'll find advice on how to get started, and details on our vision of risk and compliance assessment."},{"id":"1q2DCrVKW6E0TcKt1C96","title":"Installation","pathname":"/ciso-assistant/guide/installation","siteSpaceId":"sitesp_0UdjP","icon":"desktop-arrow-down","description":"Docker Compose or Helm for Kubernetes","breadcrumbs":[{"label":"Guide"}]},{"id":"LVU6RNNg0U4uKP81Oc3c","title":"Understanding decoupling","pathname":"/ciso-assistant/guide/understanding-decoupling","siteSpaceId":"sitesp_0UdjP","icon":"octopus-deploy","breadcrumbs":[{"label":"Guide"}]},{"id":"eqrnHQNL9IYGnR8el1eg","title":"General tips","pathname":"/ciso-assistant/guide/general-tips","siteSpaceId":"sitesp_0UdjP","icon":"sparkle","breadcrumbs":[{"label":"Guide"}]},{"id":"ZUvwleZN8iwyLW3hHlqD","title":"Journeys","pathname":"/ciso-assistant/guide/journeys","siteSpaceId":"sitesp_0UdjP","icon":"face-glasses","breadcrumbs":[{"label":"Guide"}]},{"id":"zt3awMIDdUvt8G9dx0jR","title":"Creating your first perimeter","pathname":"/ciso-assistant/guide/creating-your-first-perimeter","siteSpaceId":"sitesp_0UdjP","emoji":"1f3d7","description":"Small tutorial to learn how to create your first perimeter and be prepared for risk and compliance assessment","breadcrumbs":[{"label":"Guide"}]},{"id":"F45y0lOV8fXIMn2cbSTm","title":"Creating your first Audit","pathname":"/ciso-assistant/guide/creating-your-first-audit","siteSpaceId":"sitesp_0UdjP","emoji":"2705","description":"Small tutorial to learn how to create your first compliance assessment","breadcrumbs":[{"label":"Guide"}]},{"id":"y64rmEdzu3S0OrGji7FT","title":"Creating your first risk assessment","pathname":"/ciso-assistant/guide/creating-your-first-risk-assessment","siteSpaceId":"sitesp_0UdjP","emoji":"1f4ca","description":"Small tutorial to learn how to create your first compliance assessment","breadcrumbs":[{"label":"Guide"}]},{"id":"duha6C12ZymjZrEgGu3J","title":"Overview","pathname":"/ciso-assistant/guide/overview","siteSpaceId":"sitesp_0UdjP","emoji":"1f50e","description":"Manage your assessments over time","breadcrumbs":[{"label":"Guide"}]},{"id":"nejMyC9I80gcNIewRwkl","title":"Extra tools","pathname":"/ciso-assistant/guide/extra-tools","siteSpaceId":"sitesp_0UdjP","emoji":"1f9f0","description":"Some useful tools for following up assessments","breadcrumbs":[{"label":"Guide"}]},{"id":"aKJGofsCQmstEIoGUg8F","title":"External resources","pathname":"/ciso-assistant/guide/external-resources","siteSpaceId":"sitesp_0UdjP","emoji":"1f310","description":"Community supported content","breadcrumbs":[{"label":"Guide"}]},{"id":"0gr8U0Y3wgdShmbQT2Z3","title":"Understand mapping","pathname":"/ciso-assistant/guide/understand-mapping","siteSpaceId":"sitesp_0UdjP","icon":"diagram-sankey","description":"Main concepts of the mapping feature","breadcrumbs":[{"label":"Guide"}]},{"id":"5KsuA2FvgWwSo4Dn4MaE","title":"Glossary","pathname":"/ciso-assistant/guide/glossary","siteSpaceId":"sitesp_0UdjP","icon":"sparkle","breadcrumbs":[{"label":"Guide"}]},{"id":"4nRLeMp7o86MskrCU2Gv","title":"Data import wizard","pathname":"/ciso-assistant/guide/data-import-wizard","siteSpaceId":"sitesp_0UdjP","icon":"diagram-previous","description":"Guidelines on data import format","breadcrumbs":[{"label":"Guide"}]},{"id":"go69aq4CEAHJCNH221vL","title":"Notifications","pathname":"/ciso-assistant/guide/notifications","siteSpaceId":"sitesp_0UdjP","icon":"bell","description":"CISO Assistant can send you email notifications to keep you informed about deadlines, assignments, and status changes.","breadcrumbs":[{"label":"Guide"}]},{"id":"hz4SbeP5AzZ1VKkLqDBX","title":"Controls autosuggestion","pathname":"/ciso-assistant/features-focus/controls-autosuggestion","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"RmyKWCqXNqON9pD0d3Qu","title":"Multi-level support","pathname":"/ciso-assistant/features-focus/multi-level-support","siteSpaceId":"sitesp_0UdjP","description":"Through implementation groups","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"HvPXEGTn2p17ueMHYxnU","title":"Flash mode","pathname":"/ciso-assistant/features-focus/flash-mode","siteSpaceId":"sitesp_0UdjP","description":"Establishing a security posture in flashcards mode","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"rRWNXTrxSEqfwubjSPod","title":"Evidences from clipboard","pathname":"/ciso-assistant/features-focus/evidences-from-clipboard","siteSpaceId":"sitesp_0UdjP","description":"Productivity tips series","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"Ko8oFhFmULAa5Qj7TyTt","title":"Library upgrade","pathname":"/ciso-assistant/features-focus/library-upgrade","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"gQNI5Mriqo5pW4YA9rNi","title":"Library clean-up","pathname":"/ciso-assistant/features-focus/library-clean-up","siteSpaceId":"sitesp_0UdjP","description":"How to delete/remove a loaded library","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"LXIVZ6iGjLQXR0IQpefX","title":"Mapping explorer","pathname":"/ciso-assistant/features-focus/graph-explorer","siteSpaceId":"sitesp_0UdjP","description":"","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"mXwcSh2Tic9DTqt5PlzR","title":"SSO","pathname":"/ciso-assistant/features-focus/sso","siteSpaceId":"sitesp_0UdjP","description":"Configure Single Sign-On with different SAML or OpenID Connect providers","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"ixSscfDCHUmK89kXAkY0","title":"SAML","pathname":"/ciso-assistant/features-focus/sso/saml","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Features focus","icon":"octopus"},{"label":"SSO"}]},{"id":"0thXUz0120ZMBs1Vk8iT","title":"OpenID Connect (OIDC)","pathname":"/ciso-assistant/features-focus/sso/openid-connect-oidc","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Features focus","icon":"octopus"},{"label":"SSO"}]},{"id":"96XA9G23HmWv4pahArQ0","title":"Identity providers","pathname":"/ciso-assistant/features-focus/sso/identity-providers","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Features focus","icon":"octopus"},{"label":"SSO"}]},{"id":"Zogpi46et66WDzavoVpP","title":"Microsoft Entra ID","pathname":"/ciso-assistant/features-focus/sso/identity-providers/microsoft-entra-id","siteSpaceId":"sitesp_0UdjP","description":"Configure Microsoft Entra ID as an Identity Provider for CISO Assistant","breadcrumbs":[{"label":"Features focus","icon":"octopus"},{"label":"SSO"},{"label":"Identity providers"}]},{"id":"Yms1xB2jY0udKcrAGAQF","title":"Okta","pathname":"/ciso-assistant/features-focus/sso/identity-providers/okta","siteSpaceId":"sitesp_0UdjP","description":"Configure Okta as an Identity Provider for CISO Assistant","breadcrumbs":[{"label":"Features focus","icon":"octopus"},{"label":"SSO"},{"label":"Identity providers"}]},{"id":"fgqvVhMI8QVPVFP4aPUo","title":"Google Workspace","pathname":"/ciso-assistant/features-focus/sso/identity-providers/google-workplace","siteSpaceId":"sitesp_0UdjP","description":"Configure Google Workspace as an Identity Provider for CISO Assistant","breadcrumbs":[{"label":"Features focus","icon":"octopus"},{"label":"SSO"},{"label":"Identity providers"}]},{"id":"0zlIMz0s6QvU9Q9d7mmm","title":"Keycloak","pathname":"/ciso-assistant/features-focus/sso/identity-providers/keycloak","siteSpaceId":"sitesp_0UdjP","description":"Configure Keycloak as an Identity Provider for CISO Assistant","breadcrumbs":[{"label":"Features focus","icon":"octopus"},{"label":"SSO"},{"label":"Identity providers"}]},{"id":"RjTPbiIYjruzB9Mvt0fT","title":"Setting up Multi-Factor Authentication (MFA)","pathname":"/ciso-assistant/features-focus/setting-up-multi-factor-authentication-mfa","siteSpaceId":"sitesp_0UdjP","description":"Multi-factor authentication adds an extra layer of security to your account by requiring both your password and a time-based code when you log in.","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"P82YJzGgb6p0Wa1LuWE7","title":"Metrics","pathname":"/ciso-assistant/features-focus/metrics","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"0oInzIZLi3UEF169Knkc","title":"Assignments / respondent mode","pathname":"/ciso-assistant/features-focus/assignments-respondent-mode","siteSpaceId":"sitesp_0UdjP","description":"Overview of the requirements dispatch mode","breadcrumbs":[{"label":"Features focus","icon":"octopus"}]},{"id":"BnOJQafGXu1F7SSmYuJV","title":"Organization","pathname":"/ciso-assistant/model/organization","siteSpaceId":"sitesp_0UdjP","emoji":"1f4c1","description":"You can find here CISO Assistant global organization. All entities will be linked to or contained within these objects.","breadcrumbs":[{"label":"Model"}]},{"id":"jJbf7NKFjqBUzYES8Lc7","title":"Add and manage users","pathname":"/ciso-assistant/model/organization/add-and-manage-users","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Model"},{"label":"Organization","emoji":"1f4c1"}]},{"id":"OAduxJJeXmeXMKUMty2S","title":"User Groups","pathname":"/ciso-assistant/model/organization/user-groups","siteSpaceId":"sitesp_0UdjP","description":"User groups are built-in objects giving permissions to all users inside of them, with a specific role across a scope.","breadcrumbs":[{"label":"Model"},{"label":"Organization","emoji":"1f4c1"}]},{"id":"giNtEBxezKqNpHvQENBu","title":"Custom roles","pathname":"/ciso-assistant/model/organization/custom-roles","siteSpaceId":"sitesp_0UdjP","description":"For fine-grained permissions management - PRO feature","breadcrumbs":[{"label":"Model"},{"label":"Organization","emoji":"1f4c1"}]},{"id":"gcNtq2qVKK9XmdT0sqMW","title":"Understanding the IAM model","pathname":"/ciso-assistant/model/organization/understanding-the-iam-model","siteSpaceId":"sitesp_0UdjP","description":"Deep dive into CISO Asisstant IAM model","breadcrumbs":[{"label":"Model"},{"label":"Organization","emoji":"1f4c1"}]},{"id":"zFXZROVRkMpinscz6qwN","title":"Teams","pathname":"/ciso-assistant/model/organization/teams","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Model"},{"label":"Organization","emoji":"1f4c1"}]},{"id":"ygnsSXTUNXCItX8GuYlh","title":"Context","pathname":"/ciso-assistant/model/context","siteSpaceId":"sitesp_0UdjP","emoji":"2699","description":"This is the place to define the context for risk and compliance management. All items here are optional.","breadcrumbs":[{"label":"Model"}]},{"id":"cFQfyMwgbjzRaBIzeKwk","title":"Governance","pathname":"/ciso-assistant/model/governance","siteSpaceId":"sitesp_0UdjP","emoji":"1f3db","description":"You will set here documents and items that are used as a basis for assessments.","breadcrumbs":[{"label":"Model"}]},{"id":"Wb6il25di6HlwyESOGUP","title":"Risk","pathname":"/ciso-assistant/model/risk","siteSpaceId":"sitesp_0UdjP","emoji":"1f4a3","description":"This is where risk analyses are managed, from definition to potential acceptance.","breadcrumbs":[{"label":"Model"}]},{"id":"UU4XW0DfbQZHsHwDVhhf","title":"Compliance","pathname":"/ciso-assistant/model/compliance","siteSpaceId":"sitesp_0UdjP","emoji":"1f4cb","description":"This is where you can carry out your compliance work based on the framework of your choice.","breadcrumbs":[{"label":"Model"}]},{"id":"ZehSgnMBMjVFr0hpU0vq","title":"Manage extended result","pathname":"/ciso-assistant/model/compliance/manage-extended-result","siteSpaceId":"sitesp_0UdjP","description":"Minor nonconformity, Major nonconformity, etc.","breadcrumbs":[{"label":"Model"},{"label":"Compliance","emoji":"1f4cb"}]},{"id":"9HhJes1780EHbEnQe6cW","title":"Domain export/import","pathname":"/ciso-assistant/model/domain-export-import","siteSpaceId":"sitesp_0UdjP","icon":"square-this-way-up","breadcrumbs":[{"label":"Model"}]},{"id":"UwRm1H4ALH5Cwvbz3LO9","title":"Prerequisites","pathname":"/ciso-assistant/deployment/prerequisites","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Deployment"}]},{"id":"HaOg1vsaKlqQwDA0oHMP","title":"Local","pathname":"/ciso-assistant/deployment/local","siteSpaceId":"sitesp_0UdjP","description":"Basic setup for local deployment and experimentation","breadcrumbs":[{"label":"Deployment"}]},{"id":"DtXs5iFLSkTnpMs9V6ie","title":"Docker rootless configuration","pathname":"/ciso-assistant/deployment/docker-rootless-configuration","siteSpaceId":"sitesp_0UdjP","description":"Deployment documentation for rootless containers","breadcrumbs":[{"label":"Deployment"}]},{"id":"jAjihtMqLATWlu5D6Kdb","title":"Remote/Virtualization","pathname":"/ciso-assistant/deployment/remote-virtualization","siteSpaceId":"sitesp_0UdjP","description":"Experimenting CISO Assistant through remote server or hypervisor","breadcrumbs":[{"label":"Deployment"}]},{"id":"tSKO4zwv2eaFhhPhnriY","title":"Deploy on a VPS","pathname":"/ciso-assistant/deployment/deploy-on-a-vps","siteSpaceId":"sitesp_0UdjP","description":"Virtual Private Server - Remote internet-facing VM","breadcrumbs":[{"label":"Deployment"}]},{"id":"IyKqwCKlWCcMLTni94JJ","title":"Custom certificates","pathname":"/ciso-assistant/deployment/custom-certificates","siteSpaceId":"sitesp_0UdjP","description":"How to add custom certificates for your remote installation","breadcrumbs":[{"label":"Deployment"}]},{"id":"bIJwekqzUAmEyuOyL9ap","title":"Managing Secrets","pathname":"/ciso-assistant/deployment/managing-secrets","siteSpaceId":"sitesp_0UdjP","description":"This guide covers how to keep sensitive configuration (database credentials, mailer passwords, API keys) out of your docker-compose.yml.","breadcrumbs":[{"label":"Deployment"}]},{"id":"zaLm1zIsh2xCagp4BuvE","title":"Frequent questions","pathname":"/ciso-assistant/deployment/frequent-questions","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Deployment"}]},{"id":"2uozF7AU0ct8eiwrVbqX","title":"Setting up S3","pathname":"/ciso-assistant/deployment/setting-up-s3","siteSpaceId":"sitesp_0UdjP","description":"How to connect your S3 block storage for your installation","breadcrumbs":[{"label":"Deployment"}]},{"id":"9O1wJjAW86r1CYR2LQEc","title":"Setting up mailer","pathname":"/ciso-assistant/deployment/setting-up-mailer","siteSpaceId":"sitesp_0UdjP","description":"","breadcrumbs":[{"label":"Deployment"}]},{"id":"UIecfVtiUUwn6EqtweGD","title":"Updating your local instance","pathname":"/ciso-assistant/deployment/updating-your-local-instance","siteSpaceId":"sitesp_0UdjP","description":"How to update your local instance. All docker images are available on ghcr with the specific versions matching the repo tags. The latest tag points to the most recent release for both back and front.","breadcrumbs":[{"label":"Deployment"}]},{"id":"zjLC9pwXbcuOmlV5CG5t","title":"Helm Chart","pathname":"/ciso-assistant/deployment/helm-chart","siteSpaceId":"sitesp_0UdjP","description":"instructions for Kubernetes installation with Helm Chart","breadcrumbs":[{"label":"Deployment"}]},{"id":"o1S6VVcNo5kwi04omrzS","title":"Special cases","pathname":"/ciso-assistant/deployment/special-cases","siteSpaceId":"sitesp_0UdjP","description":"Tips and tricks regarding specific cases","breadcrumbs":[{"label":"Deployment"}]},{"id":"Yncwy5sFVscw0HqT4L3R","title":"Upgrading a library","pathname":"/ciso-assistant/deployment/upgrading-a-library","siteSpaceId":"sitesp_0UdjP","description":"getting the incremental updates of your framework, matrix or catalog","breadcrumbs":[{"label":"Deployment"}]},{"id":"68d773620a3725f2defe11d0314868a8fc3827c5","title":"Designing your own Libraries","pathname":"/ciso-assistant/customization/designing-your-own-libraries","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Customization","emoji":"2728"}]},{"id":"OBbLmcY5WmiH6ld4GuLE","title":"CIS Controls / Cloud Controls Matrix (CCM)","pathname":"/ciso-assistant/customization/cis-controls","siteSpaceId":"sitesp_0UdjP","description":"Importing CIS Controls or CSA CCM","breadcrumbs":[{"label":"Customization","emoji":"2728"}]},{"id":"otTHT9acRZuVqKedgdkK","title":"Changing the language","pathname":"/ciso-assistant/customization/changing-the-language","siteSpaceId":"sitesp_0UdjP","description":"Switch the UI language","breadcrumbs":[{"label":"Customization","emoji":"2728"}]},{"id":"bSaoZbxROMYyJf1z3M2d","title":"Internationalization","pathname":"/ciso-assistant/contributing/internationalization","siteSpaceId":"sitesp_0UdjP","description":"How to contribute to CISO Assistant internationalization","breadcrumbs":[{"label":"Contributing"}]},{"id":"pbsatcE4HIARbVnrhHdu","title":"Translating the interface","pathname":"/ciso-assistant/contributing/internationalization/translating-the-interface","siteSpaceId":"sitesp_0UdjP","description":"","breadcrumbs":[{"label":"Contributing"},{"label":"Internationalization"}]},{"id":"0llz4LUHVoxOVQJyesub","title":"Submit a library","pathname":"/ciso-assistant/contributing/submit-a-library-framework","siteSpaceId":"sitesp_0UdjP","description":"How to submit a framework, matrix or catalog to the community repository","breadcrumbs":[{"label":"Contributing"}]},{"id":"MwBpeA83nFalbkfXK2A9","title":"00 - initial setup","pathname":"/ciso-assistant/ca-journeys/00-initial-setup","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"CA Journeys","icon":"compass"}]},{"id":"kWvbXGbrHbXTdS1UKrME","title":"01 - basic audit","pathname":"/ciso-assistant/ca-journeys/overview","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"CA Journeys","icon":"compass"}]},{"id":"mm2UtLaqYwG3Q62aC4fE","title":"Third Parties Risk Management","pathname":"/ciso-assistant/ca-journeys/third-parties-risk-management","siteSpaceId":"sitesp_0UdjP","description":"","breadcrumbs":[{"label":"CA Journeys","icon":"compass"}]},{"id":"sXYv0I7T17SUAmpyyCG2","title":"New - Cyber Risk Quantification","pathname":"/ciso-assistant/ca-journeys/new-cyber-risk-quantification","siteSpaceId":"sitesp_0UdjP","description":"CRQ quick start","breadcrumbs":[{"label":"CA Journeys","icon":"compass"}]},{"id":"1Wq7kXrae5TR0BSLc5ro","title":"Integration overview","pathname":"/ciso-assistant/integration/integration-overview","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Integration"}]},{"id":"OLwNlqRIadpcd4oQQtsv","title":"Generating a PAT","pathname":"/ciso-assistant/integration/generating-a-pat","siteSpaceId":"sitesp_0UdjP","description":"Personal Access Token to interact with the API","breadcrumbs":[{"label":"Integration"}]},{"id":"XbXeUrgVfkJlrXRMtaaP","title":"API usage","pathname":"/ciso-assistant/integration/api-usage","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Integration"}]},{"id":"lbiQYOgaWaNxdqPhD9cF","title":"Third-party integrations","pathname":"/ciso-assistant/integration/third-party-integrations","siteSpaceId":"sitesp_0UdjP","description":"Integrate CISO Assistant with third-party providers","breadcrumbs":[{"label":"Integration"}]},{"id":"LqSgsnB9vksdy0qc5dt3","title":"Jira","pathname":"/ciso-assistant/integration/third-party-integrations/jira","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Integration"},{"label":"Third-party integrations"}]},{"id":"Rx47u5aUJtbKRoQhRjTS","title":"ServiceNow","pathname":"/ciso-assistant/integration/third-party-integrations/servicenow","siteSpaceId":"sitesp_0UdjP","description":"ServiceNow Integration Guide","breadcrumbs":[{"label":"Integration"},{"label":"Third-party integrations"}]},{"id":"WbqNWhtIVKfXWCey98J0","title":"Outgoing webhooks","pathname":"/ciso-assistant/integration/outgoing-webhooks","siteSpaceId":"sitesp_0UdjP","breadcrumbs":[{"label":"Integration"}]},{"id":"tzNkISJJNpkQp2Boo6ai","title":"MCP setup guide","pathname":"/ciso-assistant/integration/mcp-setup-guide","siteSpaceId":"sitesp_0UdjP","description":"This guide explains how to connect your AI assistant to CISO Assistant using the Model Context Protocol (MCP). Once set up, you'll be able to ask your AI to create risk assessments, manage compliance","breadcrumbs":[{"label":"Integration"}]},{"id":"LThc2RqOxBKU56Qt3TMy","title":"Welcome","pathname":"/ciso-assistant/product-docs","siteSpaceId":"sitesp_EBAjk","icon":"hand-wave"},{"id":"peBBl1pR2WToAt366mDY","title":"Core concepts","pathname":"/ciso-assistant/product-docs/introduction/core-concepts","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Introduction"}]},{"id":"IBX0bBuIo1i0XZfCyS4F","title":"Decoupling and links","pathname":"/ciso-assistant/product-docs/introduction/decoupling-and-links","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Introduction"}]},{"id":"2VQSSUSLqnmQtI2Yqnzy","title":"Community vs Pro","pathname":"/ciso-assistant/product-docs/introduction/community-vs-pro","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Introduction"}]},{"id":"Je4fHHywnbihZTeoMhnR","title":"Overview and prerequisites","pathname":"/ciso-assistant/product-docs/installation/overview-and-prerequisites","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Installation"}]},{"id":"1rAxouTJfb1jjV49jfKA","title":"Local: simple mode","pathname":"/ciso-assistant/product-docs/installation/local-simple-mode","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Installation"}]},{"id":"6ZKZn5zPil4WMrG2LqTd","title":"VM: config builder","pathname":"/ciso-assistant/product-docs/installation/vm-config-builder","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Installation"}]},{"id":"GbEMUxrpc4PUpOSlS8B3","title":"VM: full offline mode","pathname":"/ciso-assistant/product-docs/installation/vm-full-offline-mode","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Installation"}]},{"id":"Nhg0fvzatJeRwnzJfmNf","title":"Kubernetes: helm chart","pathname":"/ciso-assistant/product-docs/installation/kubernetes-helm-chart","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Installation"}]},{"id":"bSawt5cbgP5OGBeMsDfg","title":"Backup and restore","pathname":"/ciso-assistant/product-docs/installation/backup-and-restore","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Installation"}]},{"id":"6BhvtbLdgCwDLmxp4qzI","title":"Upgrade procedure","pathname":"/ciso-assistant/product-docs/installation/upgrade-procedure","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Installation"}]},{"id":"7FvWQMF0kTK7HGhlQfmo","title":"Starting with Demo data","pathname":"/ciso-assistant/product-docs/getting-started/quickstart","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Getting Started"}]},{"id":"bSTmLFKmsga1AibqEuui","title":"Feature flags","pathname":"/ciso-assistant/product-docs/getting-started/feature-flags","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Getting Started"}]},{"id":"uokAjSbzDpChd2IFtaqL","title":"Domains and perimeters","pathname":"/ciso-assistant/product-docs/getting-started/domains-and-perimeters","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Getting Started"}]},{"id":"8ZyFFzA6tX0ehU9NUZDE","title":"IAM management","pathname":"/ciso-assistant/product-docs/getting-started/iam-management","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Getting Started"}]},{"id":"QPzbTvC6XsT5gERiU43E","title":"SSO setup","pathname":"/ciso-assistant/product-docs/getting-started/publish-your-docs","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Getting Started"}]},{"id":"sBEnlmL3j2lIowKvWUHh","title":"Custom roles","pathname":"/ciso-assistant/product-docs/getting-started/custom-roles","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Getting Started"}]},{"id":"xopBNLNzrRM796ZvTWjQ","title":"User settings and MFA","pathname":"/ciso-assistant/product-docs/getting-started/user-settings-and-mfa","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Getting Started"}]},{"id":"i73g4LZQanoLj7XtSO18","title":"Where to start","pathname":"/ciso-assistant/product-docs/how-to/editor","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"AD9lDCmpddI5WAY92HgG","title":"Compliance management","pathname":"/ciso-assistant/product-docs/how-to/markdown","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"44AMBxA81xsTGcjsEOJB","title":"Audit and baseline","pathname":"/ciso-assistant/product-docs/how-to/markdown/audit-and-baseline","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Compliance management"}]},{"id":"cPjynFKyFUBzMzk7wkvA","title":"Mapping and multi-framework compliance","pathname":"/ciso-assistant/product-docs/how-to/markdown/mapping-and-multi-framework-compliance","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Compliance management"}]},{"id":"xFB1TpjS6I0GkqM0WqH8","title":"Scoring and maturity","pathname":"/ciso-assistant/product-docs/how-to/markdown/scoring-and-maturity","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Compliance management"}]},{"id":"lWzQ4Vvz7WNeNMENAqoP","title":"Evidences management","pathname":"/ciso-assistant/product-docs/how-to/markdown/evidences-management","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Compliance management"}]},{"id":"tUrrQhaB5v1lnZViNAuP","title":"Campaigns","pathname":"/ciso-assistant/product-docs/how-to/markdown/campaigns","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Compliance management"}]},{"id":"VizfRnpZvbkcmYYXFKHT","title":"Projects security baseline","pathname":"/ciso-assistant/product-docs/how-to/markdown/projects-security-baseline","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Compliance management"}]},{"id":"5374kDUBlhItKwG8vlNh","title":"Assets and resilience","pathname":"/ciso-assistant/product-docs/how-to/assets-and-resilience","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"BqklTtChzFVgsZy8444u","title":"Assets","pathname":"/ciso-assistant/product-docs/how-to/assets-and-resilience/assets","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Assets and resilience"}]},{"id":"fJyBLsGCYy039R4AZrs8","title":"BIA","pathname":"/ciso-assistant/product-docs/how-to/assets-and-resilience/bia","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Assets and resilience"}]},{"id":"scPRmf2UHNygzfDCY7Iu","title":"Risk management","pathname":"/ciso-assistant/product-docs/how-to/images-and-media","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"jKA9azCw4RN1KSYCCqBQ","title":"Risk assessment","pathname":"/ciso-assistant/product-docs/how-to/images-and-media/risk-assessment","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Risk management"}]},{"id":"mkshDnTiYnOLAIaFgeMd","title":"EBIOS RM","pathname":"/ciso-assistant/product-docs/how-to/images-and-media/ebios-rm","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Risk management"}]},{"id":"AMfkJtvATvjdWKhWuakI","title":"CRQ","pathname":"/ciso-assistant/product-docs/how-to/images-and-media/crq","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Risk management"}]},{"id":"DhiUamcxobhsYb371Z92","title":"Vulnerabilities","pathname":"/ciso-assistant/product-docs/how-to/images-and-media/vulnerabilities","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Risk management"}]},{"id":"ULmoXhthX9AEP6aH6ZSe","title":"Operations","pathname":"/ciso-assistant/product-docs/how-to/interactive-blocks","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"5Gafh4TEeCAjOfMQ6Z3D","title":"Applied Controls","pathname":"/ciso-assistant/product-docs/how-to/interactive-blocks/applied-controls","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Operations"}]},{"id":"woQfRjdmq6sJowSLH4WQ","title":"Periodic tasks","pathname":"/ciso-assistant/product-docs/how-to/interactive-blocks/periodic-tasks","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Operations"}]},{"id":"gw2yrVLpcYrSDQ3nkT0p","title":"Incidents","pathname":"/ciso-assistant/product-docs/how-to/interactive-blocks/incidents","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Operations"}]},{"id":"lWdZgI2P4YIODQ7uazsl","title":"Governance","pathname":"/ciso-assistant/product-docs/how-to/integrations","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"sBklmAVBd9WmabCR0phd","title":"Policies","pathname":"/ciso-assistant/product-docs/how-to/integrations/policies","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Governance"}]},{"id":"R3XIDWpeIVx73fr7av9Q","title":"Follow-ups (pentest, internal audit, etc.)","pathname":"/ciso-assistant/product-docs/how-to/integrations/follow-ups-pentest-internal-audit-etc.","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Governance"}]},{"id":"XSkEFxjP1QOMjMrLzhLS","title":"Exceptions","pathname":"/ciso-assistant/product-docs/how-to/integrations/exceptions","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Governance"}]},{"id":"wdbXGBE47Vi6vCJ9bfky","title":"Validations","pathname":"/ciso-assistant/product-docs/how-to/integrations/validations","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Governance"}]},{"id":"7S1Cmi2Df1dE1wrV1csP","title":"Accreditations","pathname":"/ciso-assistant/product-docs/how-to/integrations/accreditations","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Governance"}]},{"id":"ZEmeBbnyQ3K151oSQSWH","title":"Third parties","pathname":"/ciso-assistant/product-docs/how-to/third-parties","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"uiEL1bQCw7LZ3pkLYJ7m","title":"Core concepts","pathname":"/ciso-assistant/product-docs/how-to/third-parties/core-concepts","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Third parties"}]},{"id":"zjt9iIwqV2IIQZFTs4F7","title":"TPRM lifecycle","pathname":"/ciso-assistant/product-docs/how-to/third-parties/tprm-lifecycle","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Third parties"}]},{"id":"7d3eIKeIU6ZC0PAawwQj","title":"Privacy","pathname":"/ciso-assistant/product-docs/how-to/privacy","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"VWtHoclhtNcyMzik7Gld","title":"Processings","pathname":"/ciso-assistant/product-docs/how-to/privacy/processings","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Privacy"}]},{"id":"9XGXRQSG0slg3WUz8o0e","title":"Requests","pathname":"/ciso-assistant/product-docs/how-to/privacy/requests","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Privacy"}]},{"id":"4yJrew8gZMZJi9f3x2Z3","title":"Breaches","pathname":"/ciso-assistant/product-docs/how-to/privacy/breaches","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Privacy"}]},{"id":"z0dN0puVZsNxQC42LqZj","title":"Reporting and analytics","pathname":"/ciso-assistant/product-docs/how-to/reporting-and-analytics","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"W11TNZcUMNiedmndT0o7","title":"Analytics options","pathname":"/ciso-assistant/product-docs/how-to/reporting-and-analytics/analytics-options","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Reporting and analytics"}]},{"id":"Pzo5zbsDbWHW0sDyFJJH","title":"Metrics","pathname":"/ciso-assistant/product-docs/how-to/reporting-and-analytics/metrics","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Reporting and analytics"}]},{"id":"UULnGygRYDBcQ7oLq1Je","title":"Dedicated reports","pathname":"/ciso-assistant/product-docs/how-to/reporting-and-analytics/dedicated-reports","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Reporting and analytics"}]},{"id":"PX3xs9iXh6zcR8LyeIt0","title":"Misc","pathname":"/ciso-assistant/product-docs/how-to/misc","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"FEdr0ydbJa064QXUB97K","title":"My assignments","pathname":"/ciso-assistant/product-docs/how-to/misc/my-assignments","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Misc"}]},{"id":"OipZbrRJMygbptodHkHc","title":"Email notifications","pathname":"/ciso-assistant/product-docs/how-to/misc/email-notifications","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Misc"}]},{"id":"yfNNfJ7fykEYPYUQ3Qnn","title":"Audit log","pathname":"/ciso-assistant/product-docs/how-to/misc/audit-log","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"},{"label":"Misc"}]},{"id":"hkXvD0kCoIxAxNHYukSB","title":"Importing data","pathname":"/ciso-assistant/product-docs/how-to/importing-data","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"How to"}]},{"id":"cnYk6VauiggBCwvr5KmY","title":"Core concepts","pathname":"/ciso-assistant/product-docs/libraries-customization/core-concepts","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Libraries customization"}]},{"id":"qlJslH1vG1LDmfeOgPtX","title":"Basic example","pathname":"/ciso-assistant/product-docs/libraries-customization/basic-example","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Libraries customization"}]},{"id":"nAAmJ871lCpYEdZSvLJF","title":"Supported use cases","pathname":"/ciso-assistant/product-docs/libraries-customization/supported-use-cases","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Libraries customization"}]},{"id":"jHFlI4DuwsqP3cwlrukO","title":"Export/import domain","pathname":"/ciso-assistant/product-docs/advanced-features/export-import-domain","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Advanced features"}]},{"id":"jaFiGW2kWwdgspwJm3nb","title":"Custom terminologies","pathname":"/ciso-assistant/product-docs/advanced-features/custom-terminologies","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Advanced features"}]},{"id":"WNYwf3IDyCK2lWbsFGgb","title":"Requirements inspector","pathname":"/ciso-assistant/product-docs/advanced-features/requirements-inspector","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Advanced features"}]},{"id":"SwUj3rjhVmT98lLmCD4A","title":"Assignment/respondent mode","pathname":"/ciso-assistant/product-docs/advanced-features/assignment-respondent-mode","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Advanced features"}]},{"id":"gvOnRkg49PpIqLJMeiWm","title":"Specialized reports","pathname":"/ciso-assistant/product-docs/advanced-features/specialized-reports","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Advanced features"}]},{"id":"iImmHmkh0LqEmofz8yas","title":"Full ISMS management","pathname":"/ciso-assistant/product-docs/journeys/full-isms-management","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Journeys"}]},{"id":"dWnV3KVl7rEA5FdxV3y6","title":"Consultant workflow","pathname":"/ciso-assistant/product-docs/journeys/consultant-workflow","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Journeys"}]},{"id":"zRyQ6DNj5AQ8WWchvtn4","title":"Jira Sync","pathname":"/ciso-assistant/product-docs/integrations/jira-sync","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Integrations"}]},{"id":"Iw6N5Hsp9ehsGh0u22aA","title":"PAT","pathname":"/ciso-assistant/product-docs/integrations/pat","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Integrations"}]},{"id":"yKBezGhLhyVsATM2HGJ7","title":"MCP","pathname":"/ciso-assistant/product-docs/integrations/mcp","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Integrations"}]},{"id":"Y2idUbj8tZ1GR4BEh5Aq","title":"Custom n8n node","pathname":"/ciso-assistant/product-docs/integrations/custom-n8n-node","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Integrations"}]},{"id":"EJaYHRvekPXze6TXApgX","title":"Webhooks","pathname":"/ciso-assistant/product-docs/integrations/webhooks","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Integrations"}]},{"id":"qnqPHiSfpJGWgToviPao","title":"Kafka listener","pathname":"/ciso-assistant/product-docs/integrations/kafka-listener","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Integrations"}]},{"id":"W3iKEth8q0wAyNAx8gI1","title":"API documentation","pathname":"/ciso-assistant/product-docs/integrations/api-documentation","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Integrations"}]},{"id":"Q30uOYeNNXMZ9HKRcqz8","title":"Code of conduct","pathname":"/ciso-assistant/product-docs/contributing/code-of-conduct","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Contributing"}]},{"id":"5vL9to1popnds47ANnfA","title":"CLA","pathname":"/ciso-assistant/product-docs/contributing/cla","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Contributing"}]},{"id":"cS4e6Yj1eR7zonzOnuwr","title":"Submit a library","pathname":"/ciso-assistant/product-docs/contributing/submit-a-library","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Contributing"}]},{"id":"HTNNV0X0UF1QpICnTTpP","title":"Common installation issues","pathname":"/ciso-assistant/product-docs/troubleshooting/common-installation-issues","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Troubleshooting"}]},{"id":"vBSqyvLnRlViTp9GJUUW","title":"Database management","pathname":"/ciso-assistant/product-docs/troubleshooting/database-management","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Troubleshooting"}]},{"id":"WLC1Es8MsKTZfXehr3CQ","title":"Performance","pathname":"/ciso-assistant/product-docs/troubleshooting/performance","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Troubleshooting"}]},{"id":"isgUaTJuU6NHV8KGn0R8","title":"About multi-tenancy","pathname":"/ciso-assistant/product-docs/troubleshooting/about-multi-tenancy","siteSpaceId":"sitesp_EBAjk","breadcrumbs":[{"label":"Troubleshooting"}]}]}