Track Changes to Registered Threats and Controls
For both registered Threats and Controls, you can create and track Comments. In addition, you can create and track Tasks associated with a Threat or Control. Threats also come with an Activity log to audit who made changes over time.
Comments
At the bottom of a registered Threat or Control page, you can leave a comment as a note or to communicate with other users on the platform.
Threat Activity Log
Threats come with an Activity Log so you can track changes over time. For instance, whenever a user updates the Inherent Risk Level, it is logged here.
To view the Activity Log, scroll to the bottom of a Registered Threat page and select “Activity.”
Related Articles
Associate Threats and Controls
In order to link Controls and Threats, navigate to the Risk Register at the top. You can assign more than one Control from a Threat detail page or assign one or more Threats on a Control detail page. You can associate Threats and Controls together, ...
Manage Tasks for Registered Threats and Controls
Create and assign a task to someone in your organization for both Threats and Controls. Begin by selecting Add Task under Tasks near the bottom of the page. Then follow the instructions for creating and assigning a Task. If creating a Task from ...
Define an Owner and Status for Registered Controls
Just like with Threats, you can assign an Owner to Controls. In addition, Controls have an Implementation Status. Assign an Owner to a Registered Control To assign an Owner, select from the dropdown. Only users assigned the Risk Register function ...
Define an Owner and Plan for Registered Threats
You can assign an Owner to manage each registered Threat and the Plan of action. Assign an Owner to a Registered Threat To assign an Owner, select a Registered Threat. Select from the dropdown beside the icon of a person. Only users assigned the Risk ...
Add Controls to the System
ComplyAssistant comes with 87 pre-populated Controls. All of these Controls are based on the Health Industry Cybersecurity Practices (HICP) rule. You also have the option to add Controls specific to your organization and Threats. To view the list of ...