The Plus program builds upon the Core program by including the following:
Integrate automated evidence collection, map all controls and evidence accurately, troubleshoot errors and failing tests, assign responsibilities, and manage the platform for optimal performance.
Assess compliance goals, review the current posture, prioritize critical gaps, and provide realistic timelines for all work-streams related to the compliance objective.
Develop tailored policies and procedures based on the business context, operating environment, risk tolerance, ownership, and best practice recommendations.
Design, customize, implement, and test controls within the business context and operating environment; align with risk tolerance, ownership, and best practice recommendations.
Act as the main contact with auditors (if desired), represent the security and compliance program to external parties, manage discussions, and involve client teams only when necessary. Provide coaching on managing the audit experience.
Help identify the scope and appropriate levels of penetration testing, explain key differences, recommend vendors, and evaluate options for optimal resource use.
Perform a basic, compliance-ready risk assessment to create a foundational risk register, assign risk owners, and develop action plans and priorities.
Organize and document two tabletop scenarios: one for disaster recovery and one for incident response.
Create and formalize SOPs for vendor risk management, particularly procurement and evaluations, and centrally manage vendor assessments.
Establish policies and SOPs for patch and vulnerability management, including CI/CD processes, for infrastructure, code, applications, and workstations.
Develop policies and SOPs for incident management, including conducting a tabletop test and a lessons learned feedback loop exercise.
Formulate policies and SOPs for BC/DR, including conducting a tabletop test and a lessons learned feedback loop exercise.
Create policies, SOPs, and a technical stack (including log configuration) to ensure proper threat visibility, forensic trails, and investigation capabilities.