This is a Demo Compliance Environment
No real customer data is stored here. All organizations, evidence, assessments, and control updates are seeded sample/demo data for product demonstrations.
Active demo organization: King's Healthcare, Inc. (Demo Organization)
King's FinTech, Inc. (Demo Organization)
King's FinTech, Inc. Annual Security Compliance Audit 2026
4 framework scope
9 fully implemented
5 overdue POA&M items
13 awaiting customer review
2 needs info/rejected
SOC 2
SOC2 · Trust Services Criteria
ISO/IEC 27001
ISO27001 · 2022
NIST Cybersecurity Framework
NIST · 2.0
CIS Controls
CIS · v8
Change Management
0 / 1 controls answered
0%0 implemented1 open
Change Management
0 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
0%
Controls with at least one linked evidence item
High Risk Gaps
1
Open controls marked High/Critical
Top Gaps
CC8.1 Change Management
Communication & Information
0 / 1 controls answered
0%0 implemented1 open
Communication & Information
0 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
0%
Controls with at least one linked evidence item
High Risk Gaps
1
Open controls marked High/Critical
Top Gaps
CC2.1 Board Oversight
Govern
0 / 1 controls answered
0%0 implemented1 open
Govern
0 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
0%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
GV.RM-01 Risk Management Strategy
Inventory and Control of Enterprise Assets
0 / 1 controls answered
0%0 implemented1 open
Inventory and Control of Enterprise Assets
0 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
0%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
1.1 Establish and Maintain Detailed Enterprise Asset Inventory
Secure Configuration of Enterprise Assets and Software
0 / 1 controls answered
0%0 implemented1 open
Secure Configuration of Enterprise Assets and Software
0 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
0%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
4.1 Establish and Maintain a Secure Configuration Process
Technological Controls
2 / 3 controls answered
67%2 implemented1 open
Technological Controls
2 / 3 controls answered
Implementation Coverage
67%
Includes fully implemented controls only
Evidence Coverage
67%
Controls with at least one linked evidence item
High Risk Gaps
1
Open controls marked High/Critical
Top Gaps
A.8.16 Monitoring Activities
Account Management
1 / 1 controls answered
100%1 implemented0 open
Account Management
1 / 1 controls answered
Implementation Coverage
100%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
No open gaps in this domain.
Audit Log Management
1 / 1 controls answered
100%0 implemented0 open
Audit Log Management
1 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
0%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
No open gaps in this domain.
Availability
1 / 1 controls answered
100%0 implemented0 open
Availability
1 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
1
Open controls marked High/Critical
Top Gaps
A1.2 Availability Commitments
Control Environment
1 / 1 controls answered
100%1 implemented0 open
Control Environment
1 / 1 controls answered
Implementation Coverage
100%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
No open gaps in this domain.
Detect
1 / 1 controls answered
100%0 implemented0 open
Detect
1 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
1
Open controls marked High/Critical
Top Gaps
DE.CM-01 Continuous Monitoring
Identify
1 / 1 controls answered
100%1 implemented0 open
Identify
1 / 1 controls answered
Implementation Coverage
100%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
No open gaps in this domain.
Incident Response Management
1 / 1 controls answered
100%0 implemented0 open
Incident Response Management
1 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
1
Open controls marked High/Critical
Top Gaps
17.3 Test and Update Incident Response Process
Logical and Physical Access Controls
1 / 1 controls answered
100%1 implemented0 open
Logical and Physical Access Controls
1 / 1 controls answered
Implementation Coverage
100%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
No open gaps in this domain.
Network Monitoring and Defense
1 / 1 controls answered
100%1 implemented0 open
Network Monitoring and Defense
1 / 1 controls answered
Implementation Coverage
100%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
No open gaps in this domain.
Organizational Controls
3 / 3 controls answered
100%1 implemented0 open
Organizational Controls
3 / 3 controls answered
Implementation Coverage
33%
Includes fully implemented controls only
Evidence Coverage
67%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
A.5.23 Information Security for Cloud Services
Protect
1 / 1 controls answered
100%0 implemented0 open
Protect
1 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
No open gaps in this domain.
Recover
1 / 1 controls answered
100%0 implemented0 open
Recover
1 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
RC.CO-01 Recovery Communications
Respond
1 / 1 controls answered
100%1 implemented0 open
Respond
1 / 1 controls answered
Implementation Coverage
100%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
No open gaps in this domain.
System Operations
1 / 1 controls answered
100%0 implemented0 open
System Operations
1 / 1 controls answered
Implementation Coverage
0%
Includes fully implemented controls only
Evidence Coverage
100%
Controls with at least one linked evidence item
High Risk Gaps
0
Open controls marked High/Critical
Top Gaps
CC7.2 System Monitoring
A1.2 Availability Commitments
HighA.8.16 Monitoring Activities
HighCC2.1 Board Oversight
High17.3 Test and Update Incident Response Process
HighDE.CM-01 Continuous Monitoring
HighCC8.1 Change Management
High1.1 Establish and Maintain Detailed Enterprise Asset Inventory
Medium4.1 Establish and Maintain a Secure Configuration Process
Medium| Control | Domain | Framework | Status | Customer Review | Evidence Review | Risk | Evidence | POA&M | Owner | Due |
|---|---|---|---|---|---|---|---|---|---|---|
5.1 Establish and Maintain an Inventory of Accounts | Account Management | CIS | IMPLEMENTED | APPROVED | APPROVED | — | 1 linked | — | Security | — No due date |
8.2 Collect Audit Logs | Audit Log Management | CIS | NOT APPLICABLE | APPROVED | — | — | Missing | — | Compliance | — No due date |
A1.2 Availability Commitments | Availability | SOC2 | PARTIALLY IMPLEMENTED | SUBMITTED | SUBMITTED | High | 1 linked 1 pending | OPEN 1 open · 1 overdue | IT | Feb 17, 2026 8d overdue |
CC8.1 Change Management | Change Management | SOC2 | NOT IMPLEMENTED | SUBMITTED | — | High | Missing | BLOCKED 1 open | Compliance | Mar 9, 2026 Due in 12d |
CC2.1 Board Oversight | Communication & Information | SOC2 | NOT IMPLEMENTED | DRAFT | — | High | Missing | BLOCKED 1 open · 1 overdue | Engineering | Feb 25, 2026 Due today |
CC1.1 Integrity and Ethical Values | Control Environment | SOC2 | IMPLEMENTED | APPROVED | APPROVED | — | 1 linked | — | Platform | — No due date |
DE.CM-01 Continuous Monitoring | Detect | NIST | PARTIALLY IMPLEMENTED | SUBMITTED | SUBMITTED | High | 1 linked 1 pending | OPEN 1 open | IT | Mar 1, 2026 Due in 4d |
GV.RM-01 Risk Management Strategy | Govern | NIST | NOT IMPLEMENTED | SUBMITTED | — | Medium | Missing | IN_PROGRESS 1 open | Platform | Mar 5, 2026 Due in 8d |
ID.AM-01 Asset Inventory | Identify | NIST | IMPLEMENTED | SUBMITTED | APPROVED | — | 1 linked | — | Engineering | — No due date |
17.3 Test and Update Incident Response Process | Incident Response Management | CIS | PARTIALLY IMPLEMENTED | NEEDS INFO | NEEDS INFO | High | 1 linked 1 pending | OPEN 1 open · 1 overdue | Engineering | Feb 25, 2026 Due today |
1.1 Establish and Maintain Detailed Enterprise Asset Inventory | Inventory and Control of Enterprise Assets | CIS | NOT IMPLEMENTED | DRAFT | — | Medium | Missing | OPEN 1 open · 1 overdue | IT | Feb 17, 2026 8d overdue |
CC6.1 Logical Access Controls | Logical and Physical Access Controls | SOC2 | IMPLEMENTED | UNDER REVIEW | UNDER REVIEW | — | 1 linked 1 pending | — | GRC | — No due date |
13.1 Centralize Security Event Alerting | Network Monitoring and Defense | CIS | IMPLEMENTED | APPROVED | APPROVED | — | 1 linked | — | Platform | — No due date |
A.5.1 Policies for Information Security | Organizational Controls | ISO27001 | IMPLEMENTED | UNDER REVIEW | UNDER REVIEW | — | 1 linked 1 pending | — | IT | — No due date |
A.5.15 Access Control | Organizational Controls | ISO27001 | NOT APPLICABLE | APPROVED | — | — | Missing | — | Platform | — No due date |
A.5.23 Information Security for Cloud Services | Organizational Controls | ISO27001 | PARTIALLY IMPLEMENTED | NEEDS INFO | NEEDS INFO | Medium | 1 linked 1 pending | OPEN 1 open | Engineering | Mar 21, 2026 Due in 24d |
PR.AA-01 Identity and Access Management | Protect | NIST | NOT APPLICABLE | APPROVED | APPROVED | — | 1 linked | — | GRC | — No due date |
RC.CO-01 Recovery Communications | Recover | NIST | PARTIALLY IMPLEMENTED | UNDER REVIEW | UNDER REVIEW | Medium | 1 linked 1 pending | IN_PROGRESS 1 open | Security | Mar 17, 2026 Due in 20d |
RS.RP-01 Response Plan Execution | Respond | NIST | IMPLEMENTED | SUBMITTED | APPROVED | — | 1 linked | — | Compliance | — No due date |
4.1 Establish and Maintain a Secure Configuration Process | Secure Configuration of Enterprise Assets and Software | CIS | NOT IMPLEMENTED | SUBMITTED | — | Medium | Missing | OPEN 1 open | GRC | Mar 1, 2026 Due in 4d |
CC7.2 System Monitoring | System Operations | SOC2 | PARTIALLY IMPLEMENTED | UNDER REVIEW | UNDER REVIEW | Low | 1 linked 1 pending | IN_PROGRESS 1 open | Security | Mar 5, 2026 Due in 8d |
A.8.15 Logging | Technological Controls | ISO27001 | IMPLEMENTED | UNDER REVIEW | UNDER REVIEW | — | 1 linked 1 pending | — | GRC | — No due date |
A.8.16 Monitoring Activities | Technological Controls | ISO27001 | NOT IMPLEMENTED | DRAFT | — | High | Missing | IN_PROGRESS 1 open · 1 overdue | Security | Feb 21, 2026 4d overdue |
A.8.28 Secure Coding | Technological Controls | ISO27001 | IMPLEMENTED | SUBMITTED | APPROVED | — | 1 linked | — | Compliance | — No due date |