Business Library 1,625
Risk Library 945
Control Library 4,950
Document 261
Risk Management Director (2nd LOD) 5s ago
Message User Image
Our company is implementing a new Risk Management System, but we lack sufficient data for system setup. How can I address this issue?

GRC Library now
Message User Image
The GRC Library contains various GRC items ranging from policies to processes, processes to risks and risks to controls. You can refer to this data when setting up your risk management system.

Latest Updates

Name Category Updated
Implement Regular User Access Review To Bank SystemsControl Standard2024-03-16 11:01
Implement Regular Security Assessments of Third-party ProvidersControl Standard2024-03-16 11:01
Implement Information Security Configuration Compliance in Banking SystemsControl Standard2024-03-16 11:01
Instate Incident Response Test Results ReportingControl Standard2024-03-16 11:01
Implement Information Security Policy Compliance ReportingControl Standard2024-03-16 11:00
Implement regular Internal Audit Activities reportingControl Standard2024-03-16 11:00
Implement Information Security Strategy, key initiatives and progress reporting for Board and ManagementControl Standard2024-03-16 11:00
Inform Decision-Makers about Sufficiency of Information SecurityControl Standard2024-03-16 10:59
Ensure Timely Identification and Remediation of New ThreatsControl Standard2024-03-16 10:59
Ensure Timely Identification and Remediation of New VulnerabilitiesControl Standard2024-03-16 10:59
Minimize Risk of New Vulnerabilities from System ChangeControl Standard2024-03-16 10:59
Protect Backups from CompromiseControl Standard2024-03-16 10:59
Ensure Recovery Under All Plausible ScenariosControl Standard2024-03-16 10:59
Ensure System Resilience to Component FailuresControl Standard2024-03-16 10:58
Ensure Orderly Response to Information Security IncidentsControl Standard2024-03-16 10:58
Implement secure software deployment practicesControl Standard2024-03-16 10:58
Detect unauthorised access timelyControl Standard2024-03-16 10:58
Ensure secure system-to-system communicationControl Standard2024-03-16 10:57
Protect systems from malicious attacksControl Standard2024-03-16 10:57
Secure networks from unauthorised trafficControl Standard2024-03-16 10:57
Establish system authentication controlsControl Standard2024-03-16 10:57
Implement Identity & Access Management controlsControl Standard2024-03-16 10:57
Establish procedures for incident monitoring and fraud managementControl Standard2024-03-16 10:56
Enable transaction activity monitoring and loss event trend reviewControl Standard2024-03-16 10:56
Enforce transaction limits within risk tolerancesControl Standard2024-03-16 10:56
Implement authentication controls for digital products and servicesControl Standard2024-03-16 10:56
Deploy Detection Techniques to Identify Key SubstitutionControl Standard2024-03-16 10:55
Implement Cryptographic Key Revocation ProcessesControl Standard2024-03-16 10:55
Regulate Activation and Deactivation Dates for Cryptographic KeysControl Standard2024-03-16 10:55
Implement Segregation of Duties to Cryptographic Key HandlingControl Standard2024-03-16 10:55