Skip to main content
All CollectionsTrust Assets
Security Overview Report
Security Overview Report

Turn your continuous security posture into a Trust Asset with the Security Overview report

Kati Voeller avatar
Written by Kati Voeller
Updated over 11 months ago

Establishing trust is sometimes the key differentiator in competitive deals. With the Security Overview Report, you have a shareable Trust Asset at your finger tips to demonstrate your real-time continuous compliance program and security posture.

We know that each deal is different, and so we've given you flexible tools to customize your report before downloading, enabling you to efficiently provide answers to commonly asked security questions (even prior to earning your audit certificate).

What's included in the report?

  • A space where you can provide a brief overview of your company and description of your product / service

  • An outline of your security & risk posture, including risk descriptions and a list of your active and in place controls that mitigate your risk categories

  • Details of controls covering relevant framework criteria

  • Ability to tailor the generated PDF report with the information you want included

How to customize your report

Write an introduction

Use this text area to introduce your company and your product or services. Consider adding details for key points of contact within your organization as it relates to compliance and security matters. This area can be hidden from the generated PDF by toggling the visibility.

*Note that the text box in the 'Introduction and Company Overview' section does not support bullet points or italics.

Toggle the visibility of risk categories

Depending on the context on which you plant to use the Security Overview Report, you may wish to hide certain risk categories. For instance, you may only want to include the technology-related risks.

Use the toggles next to each risk category to hide the information that you want excluded from the PDF report. Risk categories that are grayed out will not be included in the generated PDF.

Review the controls that mitigate and monitor each risk category

Within each risk category, you can see the list of controls that are mapped to risks in that category. Click on the > to view all of the relevant controls related to the risk category.

A few specifics to note about the controls that are listed on the report:

  • Only controls that are active and have been assigned the progress flag in place appear in these lists and in the report.

  • Control statuses (the green or red circles) are only shown on the Security Overview Report page in Strike Graph, and they are not included in the PDF report. These are to help remind you to make sure you satisfy your controls!

  • Filter your controls in the Control Library by Active status and In Place progress to see all of the controls that will be included - remember that these controls must be linked to relevant risks to display in the report!

Exporting your report

After you have reviewed the relevant controls and tailored the information you want included in the Security Overview Report, click on the PDF button at the top of the page. This will generate a PDF which you can send to prospects or other stakeholders who are interested in your security posture.

Questions?

Reach out through our chat feature for real-time Customer Success support 8 am - 5 pm PT Monday through Friday.

Did this answer your question?