Track Changes to Registered Threats and Controls

Track Changes to Registered Threats and Controls

For both registered Threats and Controls, you can create and track Comments. In addition, you can create and track Tasks associated with a Threat or Control. Threats also come with an Activity log to audit who made changes over time.

Comments

At the bottom of a registered Threat or Control page, you can leave a comment as a note or to communicate with other users on the platform.



If you are not the owner of the Threat or Control, you can decide whether to notify the owner of your comment via email.


Threat Activity Log

Threats come with an Activity Log so you can track changes over time. For instance, whenever a user updates the Inherent Risk Level, it is logged here.


To view the Activity Log, scroll to the bottom of a Registered Threat page and select “Activity.”




    • Related Articles

    • Associate Threats and Controls

      In order to link Controls and Threats, navigate to the Risk Register at the top. You can assign more than one Control from a Threat detail page or assign one or more Threats on a Control detail page. You can associate Threats and Controls together, ...
    • Manage Tasks for Registered Threats and Controls

      Create and assign a task to someone in your organization for both Threats and Controls. Begin by selecting Add Task under Tasks near the bottom of the page. Then follow the instructions for creating and assigning a Task. If creating a Task from ...
    • Define an Owner and Status for Registered Controls

      Just like with Threats, you can assign an Owner to Controls. In addition, Controls have an Implementation Status. Assign an Owner to a Registered Control To assign an Owner, select from the dropdown. Only users assigned the Risk Register function ...
    • Define an Owner and Plan for Registered Threats

      You can assign an Owner to manage each registered Threat and the Plan of action. Assign an Owner to a Registered Threat To assign an Owner, select a Registered Threat. Select from the dropdown beside the icon of a person. Only users assigned the Risk ...
    • Add Controls to the System

      ComplyAssistant comes with 87 pre-populated Controls. All of these Controls are based on the Health Industry Cybersecurity Practices (HICP) rule. You also have the option to add Controls specific to your organization and Threats. To view the list of ...