Reporting and Follow Up

Published: August 31, 2023Last updated: April 4, 2024

In this chapter the possibilities to follow up security requirements fulfilment and statement will be explored further.

Security requirements reporting

Navigate to “Compliance” at the top right menu and then select “Security Requirements” on the left side menu.

This report will give you several options:

  1. Using tags – by entering a tag the report will display status only for object with that tag
  2. Filter by name of security requirement
  3. Filter by security requirement categories
  4. Filter by object (applications, devices, locations, and organizations)
  5. Filter by which security goals that the security requirement helps to fulfil
  6. Filter by cyber security function
  7. Spider chart report for cyber security functions

All the settings/filters mentioned can be used in combination and the pie chart is always updated to reflect the filters you have used.

Follow up statements

Navigate to “Compliance” at the top right menu and then select “Statements” on the left side menu.
This report gives you several options to analyze statements. By using filters, you can:

  1. By using the options to show all, missing, or not missing statement you can easily find what you are looking for. Not missing gives the ones stated with any status and missing give all the ones that haven’t been stated.
  2. Filter by owners, security requirement and state
  3. Search for specific comment

All the settings/filters mentioned can be used in combination and the pie chart is always updated to reflect the filters you have used.