Security
π‘ Security Dashboard π‘
From technical and organizational controls to continuity β this is where your security lives.
1οΈβ£ Page Overview
The Security section of Brainframe is where you manage the core elements of your organizationβs protection strategy.
Each menu item uses a consistent layout: a list view with filters, search, and quick actions for adding new entries.
Available menus include:
- Controls
- Business Impact Assessments (BIA)
- Business Continuity & Recovery (BCP/DRP)
- Threats & Vulnerabilities
2οΈβ£ Controls
The Controls page is where you maintain all governance and technical safeguards.
Each entry can represent a policy, procedure, standard, or CIS control, with ownership clearly assigned.
Displayed fields include:
- ID β Unique reference (e.g.,
access
,logs
). - Name β Full control or policy title.
- Classification of information β Sensitivity or category (optional).
- Owner β Responsible person or role (e.g., CTO, CISO) (optional).
Actions available:
- β Add new control/policy.
- π Import file with upload.
- π Filter by creation date, owner, or classification.
- π€ Export to excel.
π This creates a single source of truth for all security rules and practices.
3οΈβ£ Business Impact Assessments (BIA)
The BIA menu helps evaluate the criticality of business processes and resources. It identifies dependencies and expected impacts of disruptions, feeding directly into continuity planning. We provide you with a preconfigured template to help you get started,
Typical fields include:
- Process/Asset name
- Owner
- Criticality (High/Medium/Low)
- Maximum tolerable downtime
- Dependencies
4οΈβ£ Business Continuity & Recovery (BCP/DRP)
This menu manages your business continuity and disaster recovery plans. Each entry corresponds to a plan or recovery procedure, ensuring youβre prepared for incidents.
Key details:
- Plan type (BCP or DRP)
- Scope and owner
- Recovery objectives (RTO, RPO)
- Linked BIAs and resources
- Version history for audits
π Keep your continuity playbooks organized and up to date.
5οΈβ£ Threats & Vulnerabilities
Here you can document known threats and system vulnerabilities. This supports risk assessments, patch management, and reporting.
Tracked elements include:
- Threat or vulnerability ID
- Description
- Affected assets, systems, processes, vendors
- Severity level
- Mitigation or patch applied
- Linked risks/incidents
6οΈβ£ Best Practices
- π Update controls regularly β reflect policy changes or new frameworks.
- π§© Connect BIAs to continuity plans β ensures recovery strategies are aligned.
- β‘ Track vulnerabilities quickly β link them to incidents if exploited.
- π Use ownership fields β accountability is crucial for audits.
π― Visual Checklist
- [x] Controls documented and assigned
- [x] BIAs completed for critical processes
- [ ] BCP/DRP plans reviewed this quarter
- [ ] Threats & vulnerabilities updated
Updated on: 27/08/2025
Thank you!