At first it doesn’t seem right… that’s why we get this question often.. in this day and age we expect most tools to be online or available as an app. However, we also found that most people feel quite strongly about the need to keep their Self Assessment information offline so that it can’t easily be shared with other people (and if it is shared, there will be evidence).

For example, earlier this month we received this question by email:

I have noticed that if you don’t have a proper software, you are left with excel.

The reason why might surprise you: security – the information clients enter in the self assessments is very sensitive. Offline use enables users to be in control of their data more than they feel they would be able to do online.

In the same email this client asked what templates are available that can help and Information Security Professional:

Do you know if there is by any chance a book or a CD with all, or most of the templates that an information Security Professional is supposed to deal with?

Information security is a very, very broad and deep terrain – we have self assessments on a whole range of security related topics:
  • Application Security: Standard Requirements
  • Chief information security officer: Standard Requirements
  • Cloud access security broker: Standard Requirements
  • Cloud computing security: Standard Requirements
  • Cloud Security: Standard Requirements
  • Container Security Initiative: Standard Requirements
  • Cyber Security Resilience: Standard Requirements
  • Data Center Security: Standard Requirements
  • Data security: Standard Requirements
  • Database security: Standard Requirements
  • Endpoint security: Standard Requirements
  • Enterprise information security architecture: Standard Requirements
  • Information security awareness: Standard Requirements
  • IT Security Management: Standard Requirements
  • IT Security: Standard Requirements
  • Managed Security Service Provider: Standard Requirements
  • Microsoft Security Development Lifecycle: Standard Requirements
  • Network Security: Standard Requirements
  • Security Outsourcing: Standard Requirements

For more information on the Self Assessments and a full overview of the available topics, go to store.theartofservice.com/self-assessments/