Skip to main content
The Compliance module helps you manage regulatory compliance, track security frameworks, and maintain audit readiness. Organize compliance checks by company, assessment runs, and locations with detailed tracking and evidence management.

Accessing Compliance

  1. Click Compliance in the sidebar
  2. The compliance dashboard displays your assessment overview

View Options

The compliance module offers two viewing options to suit your workflow:

Tree View

The tree view organizes compliance data hierarchically, making it easy to drill down from company to individual checks:
Compliance Tree View
The tree hierarchy follows this structure:
  • Company - Top-level organization
    • Compliance Run - Assessment period or audit (e.g., “Annual Insurance Checks”)
      • Group/Location - Logical grouping or physical location
        • Individual Check - Specific compliance requirement
Click the expand arrow next to any item to reveal its children. Status badges show compliant (green) and non-compliant (red) counts at each level.

List View

Toggle to List view for a flat, sortable table of all compliance checks:
Compliance List View
The list view displays:
ColumnDescription
CompanyThe organization being assessed
ComplianceThe compliance run name
GroupLocation group or category
LocationSpecific site or area
CheckThe compliance requirement name
StatusCurrent compliance status
PriorityCritical, High, Medium, or Low
Due DateTarget completion date
Use the column headers to sort by any field, or use the filter controls to narrow results.

Running Compliance Checks

Click Run Checks in the toolbar to execute compliance assessments against your companies.
Run Compliance Checks Dialog

Configuration Options

FieldDescription
NameA descriptive name for this compliance run
NotesOptional notes about the assessment
Due DateWhen checks should be completed (1 week, 2 weeks, 30 days, 90 days, 1 year, or custom)

Selecting Entities

The left panel lets you choose what to assess:
TabDescription
CompaniesSelect individual companies to assess
LocationsChoose specific locations within companies
DevicesTarget individual devices for technical checks
Device GroupsSelect groups of devices by category
Use Select all to include all items, or check individual items from the list.

Understanding Checks, Groups, and Templates

The right panel organizes compliance requirements in a three-level hierarchy:
Individual checks are specific compliance requirements. Each check represents a single item to verify, such as “Verify firewall rules are documented” or “Confirm MFA is enabled for admin accounts.”Select the Individual tab to choose specific checks to run.
Groups organize related checks into logical categories. For example:
  • Network Security - Contains checks for firewalls, segmentation, access controls
  • Identity Management - Contains checks for authentication, authorization, MFA
  • Data Protection - Contains checks for encryption, backup, data handling
Select the Groups tab to run all checks within selected groups.
Templates bundle multiple groups and checks into pre-configured assessment packages. They represent complete compliance frameworks or custom assessment collections:
  • Annual Insurance Checks - Standard checks for cyber insurance audits
  • CIS Controls v8 - Full CIS benchmark assessment
  • NIST CSF - National Institute of Standards cybersecurity framework
  • Custom Templates - Your organization’s specific requirements
Select the Template tab to run entire assessment packages at once.
Hierarchy Tip: Templates contain Groups, and Groups contain individual Checks. Selecting a Template automatically includes all its Groups and their Checks. This makes it easy to run comprehensive assessments without selecting hundreds of individual items.

Running the Assessment

  1. Configure the run name, notes, and due date
  2. Select companies or other entities in the left panel
  3. Choose templates, groups, or individual checks in the right panel
  4. Click Run compliance checks to start the assessment

Compliance Check Details

Click any check in the tree or list view to open the detailed view:
Compliance Check Detail Dialog

Left Panel: Guidance

FieldDescription
CriticalityHow critical this check is to compliance
FrequencyHow often this check should be assessed
Score WeightPoint value for compliance scoring (formula shown)
DescriptionWhat this check validates
Why It’s ImportantBusiness and security impact of compliance

Center Panel: Assessment

Status and Priority

FieldDescription
StatusSet to New, In Progress, Compliant, Not Compliant, or N/A
PriorityCritical, High, Medium, or Low
Due DateTarget completion date

Public Notes (Client Visible)

Public notes are visible to clients in reports and portals. Use the rich text editor to document:
  • Assessment findings
  • Compliance status justification
  • Recommendations for improvement
Click + Add Template to insert pre-written content for common scenarios.

Private Notes (Internal Only)

Private notes are visible only to your internal team. Use this for:
  • Technical implementation details
  • Internal discussions and observations
  • Assessment notes not intended for clients
  • Raw findings before client-ready documentation
Check with Private Notes

AI Draft Feature

The AI Draft button transforms your private notes into polished, client-ready public documentation.

How It Works

  1. Enter your raw assessment observations in Private Notes
  2. Click AI Draft in the Public Notes header
  3. AI generates structured documentation including:
    • Summary - Clear overview of the assessment findings
    • Business Impact - Why this matters to the organization
    • Remediation - Actionable steps to address gaps
AI Draft Generated Content
Best Practice: Write detailed technical observations in Private Notes, including specific findings, device names, and technical details. AI Draft will extract the relevant information and format it professionally for client communication.

Example Workflow

Private Notes (your input):
Reviewed OTICS network isolation on 11/30. Firewall rules confirmed between IT and OT segments. DMZ in place for remote access via jump host. MFA enabled on all remote access points. Minor finding: One legacy PLC on subnet 10.0.50.x lacks monitoring - recommend adding to SIEM. Overall compliance: PASS with recommendations.
AI Draft (generated output):
Summary Your OTICS network at London HQ is logically isolated from IT systems with a functioning DMZ and jump host for remote access. Firewall rules between IT and OT segments are in place and MFA is enabled on all remote access points. Business Impact
  • Unmonitored OT devices create blind spots during security incidents
  • Loss of visibility into legacy systems increases risk of undetected anomalies
Remediation
  • Step 1: Your MSP to add legacy PLC (subnet 10.0.50.x) to SIEM with appropriate OT-specific logging rules
  • Step 2: Verify SIEM is collecting baseline operational data from the PLC

Adding Checks to Planner

Compliance checks can be converted into Planner initiatives for tracking remediation work.
  1. Open a compliance check
  2. Click Add to Planner in the toolbar
  3. Configure the initiative details:
Add to Planner Dialog
FieldDescription
Due DateTarget completion date for the initiative
StatusInitial status (Not Started, In Progress, etc.)
TypeCategory of work (Compliance Check is auto-selected)
Business ValueLow, Medium, High, or Critical priority
Est. HoursEstimated hours to complete
Est. CostEstimated cost if applicable
Probability of SuccessConfidence level for completion
RelationshipsLink to related findings or other initiatives
DescriptionAuto-populated from check details
NotesAI Draft available to generate remediation plan
Click Save to create the Planner initiative. The compliance check will be linked to the initiative for tracking.

Additional Tabs

Uploads Tab

Attach evidence files and supporting documentation:
  • Documents (PDF, DOC, DOCX)
  • Spreadsheets (XLS, XLSX, CSV)
  • Images (PNG, JPG, GIF)
  • Text files (TXT, LOG)

Custom Fields Tab

View and edit additional fields configured for your organization, such as:
  • vCIO Reviewed checkbox
  • Custom assessment criteria
  • Organization-specific metadata

History Tab

Audit trail showing all changes to the check:
  • Status changes with timestamps
  • Who made each change
  • Previous values for comparison

Status Types

StatusDescriptionBadge Color
NewNot yet assessedGray
In ProgressCurrently being assessedBlue
CompliantRequirement fully metGreen
Not CompliantRequirement not satisfiedRed
Past DueAssessment overdueOrange
Not ApplicableRequirement doesn’t applyGray

Compliance Scoring

Score Calculation

Each check has a score weight that contributes to overall compliance:
  • Score Weight - Points for this check (calculated from criticality and multipliers)
  • Earned Points - Points earned when compliant
  • Total Score - Sum of all weighted checks

Weight Formula

The score weight formula is displayed on each check: score = (1 + crit × mult) × priority Where:
  • crit - Criticality value
  • mult - Organization multiplier
  • priority - Priority weight

Toolbar Actions

ActionDescription
Run ChecksExecute compliance assessments
Create TicketCreate a support ticket from a check
Flag for ReviewMark check for team review
Add to PlannerConvert to Planner initiative
Compliance MenuAccess additional compliance options

Best Practices

Assessment Strategy

  1. Use Templates - Start with pre-built templates for standard frameworks
  2. Schedule Regularly - Set up recurring assessment runs
  3. Document Thoroughly - Use Private Notes for raw findings, AI Draft for client docs
  4. Track in Planner - Convert findings to initiatives for remediation tracking

Evidence Management

  • Organize by Check - Keep evidence linked to specific requirements
  • Date Your Evidence - Include timestamps in documentation
  • Version Control - Maintain history of changes
  • Secure Storage - Evidence is encrypted at rest

Remediation Workflow

  1. Identify non-compliant checks
  2. Review the “Why It’s Important” guidance
  3. Use AI Draft to generate remediation steps
  4. Add to Planner for tracking
  5. Implement changes and attach evidence
  6. Update status to Compliant

Supported Frameworks

The compliance module supports industry-standard frameworks. Framework checks are not included—you’ll need to create your own checks and templates based on your compliance requirements.
FrameworkDescription
CIS ControlsCenter for Internet Security benchmarks
ISO 27001Information security management
NIST CSFCybersecurity framework
HIPAAHealthcare compliance
GDPRData privacy regulations
SOC 2Service organization controls
PCI DSSPayment card industry standards
CustomYour own compliance frameworks