TSI
CYBER
Full-Suite Compliance Audit
This section details capabilities supporting an audit of the client's physical and logical environments against regulatory frameworks like NIST, ISO, or CMMC. Typically employed in preparation for a formal audit, these capabilities aim to secure certification with a regulatory body, meet federal contracting requirements, or establish an organizational baseline aligned with a trusted security model for guiding cybersecurity maturity development.
The full-suite compliance assessment is a structured two-phase process intended to guide organizations in meeting the standards of their chosen security framework. The overall assessment model is divided into two phases.
The first, the Interview Process, involves a comprehensive 4-hour session with select personnel, covering all controls within the regulatory framework and discerning technically implemented controls without policy enforcement. The second phase, Policy Analysis & Development, ensures organizational compliance across a spectrum of requirements.
TSI
CYBER
Interview Procedure
The Interview Procedure is a stand-alone implementation of phase 1 from the Full-Suite Compliance Audit, specifically designed for organizations conducting an annual review of their established security programs. The number of technical controls validated depends on the framework under review, and established policies are reviewed without modification. The 4-hour interview involves select Human Resources (HR), security, and leadership personnel, covering all controls within the regulatory framework. It aims to identify controls implemented technically but not enforced by policy and areas covered by policy lacking technical enforcement. Data from the interview is then analyzed to create a Plan of Actions & Milestones (POA&M) and a System Security Plan (SSP).
Tailored for organizations undergoing an annual security program review, the Interview Procedure delivers actionable POA&M spreadsheets and System Security Plans (SSP). Organizations not currently performing required third-party or vulnerability management services in their selected framework can choose to integrate this service with technical assessments or analysis capabilities to ensure compliance with these requirements.
Let's Get Started
To give our team an idea of what kind of services you're interested in, fill out this short form.