CyberComply Platform Navigation Guide Overview
Comprehensive Platform Overview
The CyberComply Platform is a robust, multi-faceted tool designed to streamline and enhance compliance management for organizations of all sizes, featuring a centralized dashboard for complete visibility.
Multi-Tenant Management
Built to support organizations of every scale, the platform enables efficient management of multiple tenants, projects, and compliance tasks through an intuitive interface.
Advanced Compliance Tools
Transform your approach to cybersecurity compliance with comprehensive assessment capabilities, keeping your organization ahead in an ever-evolving regulatory landscape.
Home Dashboard: Your Compliance Command Center
Compliance Progress
The Home page serves as your compliance command center, offering a visual representation of your organization's compliance journey. A key feature is the Compliance Progress tracker, which provides an at-a-glance view of how well you're implementing various frameworks and controls. This visual aid helps you quickly identify areas that need attention and celebrate milestones achieved.
Pending Tasks
Stay on top of your to-do list with the Pending Tasks section. This feature prominently displays tasks that are overdue or approaching their deadlines. By highlighting these time-sensitive items, you can prioritize your efforts and ensure that critical compliance activities don't fall through the cracks.
Notifications
The Notifications area keeps you informed about critical issues that demand your immediate attention. These alerts can cover a range of important matters, such as incomplete evidence submissions, policy expirations, or other compliance-related concerns. By centralizing these notifications, CyberComply ensures that you're always aware of pressing issues that could impact your compliance status.
Tenants: Managing Multiple Entities with Ease
CyberComply's multi-tenancy platform features a powerful tool for organizations managing compliance across different divisions, subsidiaries, or clients. This functionality allows for complete data isolation between tenants, ensuring that sensitive information remains compartmentalized and secure.

Creating a New Tenant
To set up a new tenant, navigate to the Tenants section and select "Add Tenant." You'll be prompted to provide essential information such as the tenant's name, a brief description, and the primary contact person. This process helps in organizing and differentiating between various entities within your compliance ecosystem.

Switching Between Tenants
CyberComply makes it easy to move between different tenants' data sets. Simply use the dropdown menu to select the desired tenant, and the platform will adjust to display the relevant information. This seamless switching capability allows compliance managers to efficiently oversee multiple entities without confusion or data mix-ups.

Tenant-Specific Settings
Each tenant can have its own unique settings, including notification preferences, user access controls, and framework configurations. This level of customization ensures that you can tailor the compliance management approach to each entity's specific needs and regulatory requirements.
By leveraging the multi-tenancy feature, organizations can maintain a clear separation of compliance efforts while still benefiting from a centralized management platform. This approach is particularly valuable for managed service providers, large corporations with diverse subsidiaries, or any organization that needs to maintain distinct compliance profiles for different parts of their business.
Projects: Structuring Your Compliance Efforts
Projects in CyberComply serve as the organizational backbone for your compliance initiatives. They allow you to break down complex compliance efforts into manageable units, making it easier to track progress, allocate resources, and meet specific regulatory requirements.
1
Create a New Project
To initiate a new project, navigate to the Projects section and select "Add Project." You'll be prompted to provide a name, description, and select the relevant compliance frameworks. This step is crucial in defining the scope and objectives of your compliance effort.
2
Link Resources
Once a project is created, you can start linking various resources to it. This includes assigning users who will be responsible for different aspects of the project, connecting relevant controls from your chosen frameworks, and associating applicable policies.
3
Track Progress
As work progresses, use the project dashboard to monitor advancement. You can view completed tasks, outstanding items, and overall compliance status specific to each project. This granular view helps in identifying bottlenecks and areas needing attention.
4
Generate Reports
Projects facilitate easy reporting. Generate project-specific reports to share with stakeholders, demonstrating progress and highlighting areas of success or concern. These reports can be invaluable for management reviews and audit preparations.
By structuring your compliance efforts into projects, you create a clear roadmap for achieving your regulatory goals. This approach allows for better resource allocation, more accurate progress tracking, and ultimately, a more efficient path to compliance. Whether you're working on CMMC, SOC 2, ISO 27001, or any other framework, the project-based approach in CyberComply ensures that you stay organized and focused throughout the process.
Controls: The Building Blocks of Compliance
Controls are the fundamental elements of any compliance framework, representing specific requirements that organizations must meet to achieve and maintain compliance. CyberComply provides a robust system for managing these controls, ensuring that you can efficiently track, implement, and demonstrate adherence to various regulatory standards.
Viewing Controls
To access controls, navigate to the Controls section and select the relevant framework. CyberComply presents controls in an organized manner, typically grouped by categories or domains within the chosen framework. This logical arrangement makes it easy to understand the full scope of requirements and identify areas that need attention.
Updating Control Status
As you work towards compliance, you can update the status of each control. Options typically include "Not Started," "In Progress," and "Implemented." This feature allows for real-time tracking of your compliance efforts and helps identify areas that may be lagging behind. Additionally, you can attach evidence and notes to each control, providing context and documentation for auditors or internal reviews.
Custom Controls
Recognizing that every organization has unique needs, CyberComply allows you to create custom controls. This feature is particularly useful for addressing specific organizational requirements that may not be covered by standard frameworks. Custom controls can be integrated alongside pre-defined controls, ensuring a comprehensive approach to compliance management.
By providing a centralized location for managing controls, CyberComply enables organizations to maintain a clear overview of their compliance status. This approach not only streamlines the implementation process but also simplifies ongoing maintenance and auditing tasks. Whether you're dealing with CMMC, SOC 2, ISO 27001, or any other framework, the control management features in CyberComply ensure that you have a structured, evidence-based approach to meeting regulatory requirements.
Policies: Guiding Principles for Compliance
Policies form the backbone of any compliance program, outlining the rules, guidelines, and procedures that an organization follows to meet regulatory requirements. CyberComply's Policy module provides a centralized platform for creating, managing, and linking policies to specific controls and frameworks.

Adding a New Policy
To create a new policy, navigate to the Policies section and select "Add Policy." CyberComply offers two primary methods for policy creation: you can either upload existing policy documents or draft new policies directly within the platform. This flexibility allows organizations to maintain consistency with existing documentation while also leveraging CyberComply's integrated tools for policy development.

Policy-Control Linkage
One of the most powerful features of CyberComply's policy management is the ability to link policies directly to relevant controls. This linkage creates a clear association between your documented procedures and the specific compliance requirements they address. When auditors or internal reviewers need to verify compliance, they can easily trace the implementation of controls back to the governing policies.

Version Control and Review
CyberComply maintains version history for all policies, allowing you to track changes over time. You can set review dates to ensure policies are regularly updated to reflect changes in regulations or organizational practices. The platform can also send notifications when policies are due for review, helping maintain the currency and relevance of your compliance documentation.
By centralizing policy management within CyberComply, organizations can ensure consistency across their compliance efforts. The ability to link policies directly to controls creates a transparent and auditable trail, demonstrating how your organization's guiding principles translate into concrete actions and compliance measures. This integrated approach not only streamlines the compliance process but also provides a solid foundation for building a culture of compliance within your organization.
Evidence: Documenting Compliance Efforts
The Evidence module in CyberComply serves as a central repository for all documentation related to your compliance efforts. This feature is crucial for demonstrating adherence to regulatory requirements and preparing for audits. By providing a structured approach to evidence management, CyberComply ensures that organizations can efficiently collect, organize, and present proof of their compliance activities.
Uploading Evidence
To add new evidence, navigate to the Evidence section and select "Add Evidence." CyberComply offers multiple options for evidence submission, including file uploads and links to external repositories. This flexibility allows organizations to maintain their existing documentation practices while centralizing access within the CyberComply platform.
Tagging and Categorization
CyberComply's tagging system allows for efficient organization of evidence. You can assign tags such as "CMMC" Documentation to categorize evidence items. This feature enables quick filtering and retrieval of relevant documents during audits or internal reviews. The ability to create custom tags ensures that you can organize evidence in a way that aligns with your specific compliance needs.
Evidence Reuse
One of the most powerful features of CyberComply's Evidence module is the ability to link a single piece of evidence to multiple controls. This approach reduces duplication of effort and ensures consistency across your compliance program. For example, a single security policy document might serve as evidence for several related controls across different frameworks.
By centralizing evidence management, CyberComply significantly streamlines the audit preparation process. The platform's structured approach ensures that all necessary documentation is readily available and properly linked to relevant controls and policies. This not only saves time during audits but also provides a clear, auditable trail of your compliance efforts. Whether you're preparing for an external audit or conducting an internal review, the Evidence module in CyberComply ensures that you can confidently demonstrate your organization's commitment to regulatory compliance.
Questionnaires: Streamlining Assessments
The Questionnaire feature in CyberComply is a versatile tool designed to facilitate various types of assessments, from vendor risk evaluations to internal compliance checks. This module provides a structured approach to gathering and analyzing information, ensuring that organizations can efficiently conduct thorough assessments while maintaining consistency and traceability.
1
Creating a Questionnaire
To create a new questionnaire, navigate to the Questionnaire section and select "Add New." Define the scope of your assessment, such as "Vendor Risk Assessment" or "Internal HIPAA Compliance Check." CyberComply allows you to craft questions in various formats, including multiple choice, free text, and scale ratings, ensuring flexibility in data collection.
2
Distributing Assessments
Once your questionnaire is ready, CyberComply enables easy distribution via email. You can send assessments to internal team members or external vendors, setting deadlines and reminders to ensure timely completion. The platform also provides a secure portal for respondents to submit their answers, maintaining the confidentiality of sensitive information.
3
Monitoring Responses
As responses come in, CyberComply allows you to track completion status in real-time. You can view individual responses, generate summary reports, and identify areas that require further investigation or clarification. This real-time monitoring capability ensures that you can quickly address any compliance gaps or risks identified through the assessment process.
4
Analysis and Reporting
CyberComply provides robust tools for analyzing questionnaire responses. Generate detailed reports that highlight key findings, trends, and potential areas of concern. These reports can be customized to focus on specific risk areas or compliance requirements, providing valuable insights for decision-makers and stakeholders.
The Questionnaire module in CyberComply transforms the often complex and time-consuming process of conducting assessments into a streamlined, efficient operation. By providing a centralized platform for creating, distributing, and analyzing questionnaires, CyberComply ensures that organizations can maintain a consistent and thorough approach to compliance and risk management. Whether you're evaluating the security practices of a new vendor or conducting an internal readiness assessment for an upcoming audit, the Questionnaire feature offers the flexibility and depth needed to gather critical compliance-related information effectively.
Frameworks: The Foundation of Compliance Management
CyberComply's Frameworks module serves as the cornerstone of your compliance management efforts. This feature provides comprehensive support for major regulatory standards and allows for customization to meet unique organizational needs. By centralizing framework management, CyberComply ensures that organizations can efficiently navigate the complex landscape of compliance requirements.

Supported Frameworks
CyberComply offers out-of-the-box support for a wide range of industry-standard frameworks, including CMMC, NIST, SOC 2, ISO 27001, and HIPAA. These pre-configured frameworks come complete with all relevant controls, allowing organizations to quickly initiate compliance efforts without the need for extensive setup.

Assigning Frameworks
To begin working with a framework, navigate to the Frameworks section, select the desired standard, and link it to a specific project. This association allows you to track compliance efforts within the context of individual initiatives, providing a clear structure for your compliance program.

Custom Frameworks
Recognizing that some organizations have unique compliance needs, CyberComply allows for the creation of custom frameworks. This feature enables you to define your own set of controls and policies, ensuring that you can address industry-specific regulations or internal standards not covered by pre-existing frameworks.
The Frameworks module in CyberComply provides a flexible and comprehensive approach to compliance management. By offering support for major industry standards alongside the ability to create custom frameworks, CyberComply ensures that organizations of all sizes and across various sectors can effectively manage their compliance efforts. The integration of frameworks with other modules such as Controls, Policies, and Evidence creates a cohesive system that streamlines the entire compliance process, from initial assessment to ongoing maintenance and reporting.
Tags and Labels: Organizing Your Compliance Data
The Tags and Labels feature in CyberComply provides a powerful yet flexible system for organizing and categorizing various elements within your compliance management process. This functionality allows users to create a customized taxonomy that enhances searchability, improves workflow efficiency, and facilitates more effective reporting and analysis.
Creating Tags
To create a new tag, navigate to the Tags section and select "Add Tag." You can define tags based on various criteria such as department (e.g., "IT," "HR"), priority level (e.g., "High," "Medium," "Low"), or specific compliance initiatives (e.g., "CMMC-2023," "GDPR-Readiness"). These tags can then be assigned to relevant elements throughout the platform, including controls, evidence, and tasks.
Applying Tags
Once tags are created, they can be easily applied to various components within CyberComply. For example, when uploading evidence, you can tag it with relevant categories like "Annual Review" or "Third-Party Assessment." Similarly, controls can be tagged based on their status or the department responsible for their implementation. This tagging system creates a flexible, multi-dimensional approach to organizing your compliance data.
Filtering and Searching
The true power of tags becomes evident when filtering and searching for information. CyberComply's advanced search functionality allows users to quickly locate items based on their tags. For instance, during an audit, you could easily filter all evidence tagged with "CMMC" and "2023" to review the relevant documentation for that specific compliance effort.
By leveraging the Tags and Labels feature, organizations can create a highly organized and efficient compliance management system. This approach not only streamlines day-to-day operations but also proves invaluable during audits and reviews. The ability to quickly locate and group related items across different modules of CyberComply ensures that you can respond promptly to auditor requests and demonstrate a well-structured approach to compliance. Whether you're managing multiple compliance frameworks or simply looking to improve the organization of your compliance efforts, the Tags and Labels feature provides the flexibility and power to tailor CyberComply to your specific needs.
Tenant Users: Managing Access Within Organizations
The Tenant Users feature in CyberComply is designed to provide granular control over user access within specific organizational units or clients. This functionality is particularly crucial for maintaining data isolation and ensuring that users only have access to the information relevant to their roles and responsibilities.

Adding Users
To add a new user to a tenant, navigate to the Tenant Users section and select "Add User." You'll be prompted to enter essential information such as the user's name, email address, and contact details. This process allows you to create user accounts specifically tied to a particular tenant, ensuring proper data segregation.

Assigning Roles
CyberComply offers predefined roles such as Admin, Contributor, and Viewer. Each role comes with a set of permissions that determine what actions the user can perform within the tenant. Admins have full control over the tenant's data and settings, Contributors can input and modify data, while Viewers have read-only access. This role-based access control (RBAC) system ensures that users have the appropriate level of access for their responsibilities.

Customizing Permissions
For organizations with more complex needs, CyberComply allows for the creation of custom roles with specific permission sets. This feature enables you to tailor user access precisely to your organization's structure and workflow, ensuring that each user has exactly the right level of access needed to perform their tasks efficiently and securely.
The Tenant Users feature is essential for organizations managing multiple clients or divisions within the CyberComply platform. By providing fine-grained control over user access, it ensures data privacy and compliance with access control requirements. This approach not only enhances security but also simplifies user management, allowing administrators to efficiently oversee user activities and permissions within each tenant. Whether you're a managed service provider handling multiple clients or a large corporation with distinct divisions, the Tenant Users functionality in CyberComply provides the tools needed to maintain proper access control and data segregation.
Instance Users: Platform-Wide Access Management
The Instance Users feature in CyberComply is designed to manage user access at the platform level, providing a comprehensive solution for organizations that need to oversee multiple tenants or require users with cross-tenant responsibilities. This functionality is crucial for maintaining overall platform security and ensuring efficient administration of the CyberComply system.
Adding Instance Users
To create a new instance user, navigate to the Instance Users section and select "Add User." You'll be prompted to enter essential information such as the user's name, email address, and contact details. Unlike tenant users, instance users can potentially have access across multiple tenants, making this feature particularly useful for administrators and auditors who need a broader view of the organization's compliance efforts.
Defining Permissions
When setting up an instance user, you have the flexibility to define their permissions at a granular level. This includes specifying whether the user has multi-tenant or single-tenant access, as well as defining their role within each accessible tenant. For example, an auditor might be given read-only access across all tenants, while a senior compliance officer could have administrative rights across multiple divisions.
Access Scope Management
CyberComply allows you to precisely control the scope of each instance user's access. This can range from full platform-wide access for senior administrators to limited access to specific tenants or even particular modules within tenants. This level of control ensures that users have the appropriate access to perform their duties without compromising data security or privacy.
The Instance Users feature is a powerful tool for organizations that need to manage compliance across complex structures or multiple entities. By providing a centralized approach to user management, it simplifies the administration of large-scale compliance efforts while maintaining strict control over data access. This functionality is particularly valuable for managed service providers, large enterprises with multiple subsidiaries, or any organization that requires a holistic view of their compliance landscape. The ability to finely tune user permissions at the instance level ensures that CyberComply can adapt to even the most complex organizational structures and compliance requirements.
Settings: Tailoring CyberComply to Your Needs
The Settings module in CyberComply provides a comprehensive suite of configuration options, allowing organizations to customize the platform to their specific compliance management needs. This feature ensures that CyberComply can adapt to various organizational structures, workflows, and regulatory requirements.

Notification Preferences
Configure how and when users receive alerts about critical compliance activities. Set up email notifications for tasks approaching deadlines, policy expirations, or new evidence submissions. Customize the frequency and type of notifications to ensure that team members stay informed without being overwhelmed.

Framework Integrations
Manage the integration of various compliance frameworks within CyberComply. This includes activating or deactivating specific frameworks, updating to the latest versions of regulatory standards, and configuring how different frameworks interact within your compliance program.

Access Control Lists (ACLs)
Fine-tune user permissions and access rights across the platform. Create custom roles with specific sets of permissions, ensuring that each user has the appropriate level of access to perform their duties effectively while maintaining data security.

Branding and Customization
Tailor the look and feel of CyberComply to align with your organization's branding. This may include adding your company logo, adjusting color schemes, or customizing the dashboard layout to highlight the most relevant information for your team.
The Settings module is a crucial component of CyberComply, allowing organizations to mold the platform to their unique compliance management processes. By providing extensive customization options, from notification systems to access controls, CyberComply ensures that it can serve as an effective tool for organizations of all sizes and across various industries. This level of flexibility not only enhances the user experience but also contributes to more efficient and effective compliance management, ultimately leading to stronger overall security postures and easier regulatory adherence.
Tasks: Streamlining Compliance Workflows
The Tasks module in CyberComply is a powerful feature designed to help organizations manage and track compliance-related activities efficiently. By providing a centralized system for task assignment, monitoring, and completion, this module ensures that all aspects of your compliance program are executed in a timely and organized manner.
1
Creating Tasks
To create a new task, navigate to the Tasks section and select "Add Task." You can assign the task to a specific user, link it to a relevant control or policy, and set deadlines. This process allows for clear communication of responsibilities and expectations within your compliance team.
2
Task Prioritization
CyberComply allows you to set priority levels for tasks, ensuring that critical activities are highlighted and addressed promptly. This feature helps team members focus on the most important compliance activities, especially when managing multiple frameworks or preparing for audits.
3
Progress Tracking
Monitor the status of all tasks through an intuitive dashboard. Tasks can be categorized as "Not Started," "In Progress," or "Completed." This visual representation of task progress helps managers identify bottlenecks and ensure that compliance activities are on track.
4
Automated Reminders
Set up automated reminders for upcoming or overdue tasks. These notifications can be customized to alert both the assigned user and supervisors, ensuring that critical deadlines are not missed and compliance activities remain a priority.
The Tasks module transforms compliance management from a potentially overwhelming process into a series of manageable, trackable activities. By breaking down complex compliance requirements into specific, assignable tasks, organizations can ensure that every aspect of their compliance program is addressed systematically. This approach not only improves efficiency but also provides clear accountability and visibility into the compliance process. Whether you're preparing for an audit, implementing a new regulatory framework, or maintaining ongoing compliance, the Tasks module in CyberComply provides the structure and oversight needed to manage these critical activities effectively.
Jobs: Automating Routine Compliance Operations
The Jobs module in CyberComply is a powerful feature designed to automate routine compliance operations, significantly reducing manual effort and improving consistency in compliance management. This functionality allows organizations to schedule various tasks, ensuring that critical compliance activities are performed regularly and reliably.
Scheduling Data Imports/Exports
CyberComply allows you to set up automated jobs for importing and exporting data. This can include regularly updating control statuses from integrated systems, importing new policies from document management systems, or exporting compliance reports for stakeholders. By automating these data transfers, organizations can ensure that their compliance information is always up-to-date and readily available.
Framework and Policy Updates
Stay current with regulatory changes by scheduling periodic updates to frameworks and policies. CyberComply can automatically check for updates to standard frameworks like CMMC, SOC 2, ISO 27001, or any other framework, ensuring that your compliance program always aligns with the latest requirements. Similarly, you can schedule regular reviews and updates of internal policies to maintain their relevance and effectiveness.
Monitoring Job Performance
The Jobs module provides detailed logs of all automated activities. Navigate to the Jobs section to view logs of completed jobs, including success status and any errors encountered. This visibility allows administrators to quickly identify and address any issues with automated processes, ensuring the smooth operation of your compliance management system.
By leveraging the Jobs module, organizations can significantly enhance the efficiency and reliability of their compliance management processes. Automation reduces the risk of human error in routine tasks, ensures timely execution of critical activities, and frees up valuable time for compliance teams to focus on more strategic initiatives. Whether it's maintaining up-to-date evidence, generating periodic reports, or ensuring policy reviews occur on schedule, the Jobs module in CyberComply provides the tools needed to keep your compliance program running smoothly and effectively.