Risk Register
Overview of Risk Map
The Risk Map charts your Registered Threats based on their Inherent Risk factors: Likelihood and Impact. The Y axis represents Impact. The X axis represents Likelihood. For example, below are 3 Registered Threats with High Impact that are expected to ...
Manage Control Details
You can manage different information for Controls from within the Risk Register or Control Library. From any Control page, you can export the information to PDF. This is available in the Control Library and Risk Register. Within the Risk Register, ...
Delete a Threat
You can remove any Threat from your Risk Register, but you can only delete custom Threats from ComplyAssistant. From the Risk Register, you can remove any Threat you no longer want to report on. From the Threat Library, you can delete custom Threats ...
Manage Threat Details
You can manage different information for Threats from within the Risk Register or Threat Library. From any Threat Detail page, you can export the information to PDF. This is available in the Threat Library and Risk Register. Within the Risk Register, ...
Manage Tasks for Registered Threats and Controls
Create and assign a task to someone in your organization for both Threats and Controls. Begin by selecting Add Task under Tasks near the bottom of the page. Then follow the instructions for creating and assigning a Task. If creating a Task from ...
Track Changes to Registered Threats and Controls
For both registered Threats and Controls, you can create and track Comments. In addition, you can create and track Tasks associated with a Threat or Control. Threats also come with an Activity log to audit who made changes over time. Comments At the ...
Define an Owner and Status for Registered Controls
Just like with Threats, you can assign an Owner to Controls. In addition, Controls have an Implementation Status. Assign an Owner to a Registered Control To assign an Owner, select from the dropdown. Only users assigned the Risk Register function ...
Define an Owner and Plan for Registered Threats
You can assign an Owner to manage each registered Threat and the Plan of action. Assign an Owner to a Registered Threat To assign an Owner, select a Registered Threat. Select from the dropdown beside the icon of a person. Only users assigned the Risk ...
Associate Threats and Controls
In order to link Controls and Threats, navigate to the Risk Register at the top. You can assign more than one Control from a Threat detail page or assign one or more Threats on a Control detail page. You can associate Threats and Controls together, ...
Add a Control to the Register
Register a Control so that you can quickly view and track it under Registered Controls on the Risk Register. Navigate to the Risk Register at the top. On the right hand side, select Add Controls to Register. This will open a modal that displays all ...
Add Controls to the System
ComplyAssistant comes with 87 pre-populated Controls. All of these Controls are based on the Health Industry Cybersecurity Practices (HICP) rule. You also have the option to add Controls specific to your organization and Threats. To view the list of ...
Add a Threat to the Register
To start managing Threats in ComplyAssistant, navigate to the Risk Register at the top. On the right hand side, select Add Threats to Register. This will open a modal that displays all of the Threats in Account Settings: system-defined and custom. ...
Add Threats to the System
ComplyAssistant comes with 125 pre-populated Threats. Five of these Threats are based on the Health Industry Cybersecurity Practices (HICP) rule. You also have the option to add Threats specific to your organization. To view the list of Threats and ...
Overview of Risk Register
The ComplyAssistant Risk Register allows you to track and manage security Threats and associated Controls across your organization. You can register a series of system-defined Threats and Controls or add and register your own. In order to access the ...