Articles on: Security

Security

πŸ›‘ Security Dashboard πŸ›‘

From technical and organizational controls to continuity β€” this is where your security lives.



1️⃣ Page Overview

The Security section of Brainframe is where you manage the core elements of your organization’s protection strategy.

Each menu item uses a consistent layout: a list view with filters, search, and quick actions for adding new entries.


Available menus include:

  • Controls
  • Business Impact Assessments (BIA)
  • Business Continuity & Recovery (BCP/DRP)
  • Threats & Vulnerabilities


2️⃣ Controls


The Controls page is where you maintain all governance and technical safeguards.

Each entry can represent a policy, procedure, standard, or CIS control, with ownership clearly assigned.


Displayed fields include:

  • ID β€” Unique reference (e.g., access, logs).
  • Name β€” Full control or policy title.
  • Classification of information β€” Sensitivity or category (optional).
  • Owner β€” Responsible person or role (e.g., CTO, CISO) (optional).


This is the classical layout for ALL table views in Brainframe.


Actions available:

  • βž• Add new control/policy.
  • πŸ“‚ Import file with upload.
  • πŸ” Filter by creation date, owner, or classification.
  • πŸ“€ Export to excel.


πŸ“Œ This creates a single source of truth for all security rules and practices.


3️⃣ Business Impact Assessments (BIA)


The BIA menu helps evaluate the criticality of business processes and resources. It identifies dependencies and expected impacts of disruptions, feeding directly into continuity planning. We provide you with a preconfigured template to help you get started,


Typical fields include:

  • Process/Asset name
  • Owner
  • Criticality (High/Medium/Low)
  • Maximum tolerable downtime
  • Dependencies


BIAs are essential for prioritizing recovery actions.


4️⃣ Business Continuity & Recovery (BCP/DRP)


This menu manages your business continuity and disaster recovery plans. Each entry corresponds to a plan or recovery procedure, ensuring you’re prepared for incidents.



Key details:

  • Plan type (BCP or DRP)
  • Scope and owner
  • Recovery objectives (RTO, RPO)
  • Linked BIAs and resources
  • Version history for audits


πŸ“Œ Keep your continuity playbooks organized and up to date.


5️⃣ Threats & Vulnerabilities


Here you can document known threats and system vulnerabilities. This supports risk assessments, patch management, and reporting.



Tracked elements include:

  • Threat or vulnerability ID
  • Description
  • Affected assets, systems, processes, vendors
  • Severity level
  • Mitigation or patch applied
  • Linked risks/incidents


Maintaining this library ensures you can respond proactively to evolving risks.


6️⃣ Best Practices

  • πŸ”„ Update controls regularly β€” reflect policy changes or new frameworks.
  • 🧩 Connect BIAs to continuity plans β€” ensures recovery strategies are aligned.
  • ⚑ Track vulnerabilities quickly β€” link them to incidents if exploited.
  • πŸ“‘ Use ownership fields β€” accountability is crucial for audits.


🎯 Visual Checklist

  • [x] Controls documented and assigned
  • [x] BIAs completed for critical processes
  • [ ] BCP/DRP plans reviewed this quarter
  • [ ] Threats & vulnerabilities updated


Updated on: 27/08/2025

Was this article helpful?

Share your feedback

Cancel

Thank you!