Framework compliance monitoring and audit management
42 days
Mean Time to Remediate
91.2%
Control Effectiveness
2
Open Critical Findings
87%
Audit Readiness
6-Month Change
+11%
Trend
Improving
Target
90%
AC
92%
25 controls
AU
94%
16 controls
AT
89%
6 controls
CM
85%
14 controls
CP
95%
13 controls
IA
90%
12 controls
IR
85%
10 controls
MA
91%
7 controls
MP
88%
8 controls
PS
100%
9 controls
PE
89%
20 controls
PL
94%
11 controls
RA
85%
10 controls
CA
86%
9 controls
SC
88%
51 controls
SI
87%
23 controls
SA
86%
22 controls
Policies and procedures to limit information system access to authorized users
Last reviewed: 11/15/2025
Create, protect, and retain audit records to enable monitoring and investigation
Last reviewed: 11/18/2025
Security awareness and training programs for system users
Last reviewed: 11/10/2025
Establish and maintain baseline configurations and inventory of systems
Last reviewed: 11/12/2025
Plans and procedures for system backup, recovery, and continuity
Last reviewed: 11/8/2025
Verify identities of users, processes, and devices
Last reviewed: 11/14/2025
Establish operational incident handling capability
Last reviewed: 11/16/2025
Perform periodic and timely system maintenance
Last reviewed: 11/5/2025
Protect system media and control physical access
Last reviewed: 10/28/2025
Ensure personnel are trustworthy and meet security requirements
Last reviewed: 11/11/2025
Physical access controls and environmental protections
Last reviewed: 11/3/2025
Security planning to develop and implement system security plans
Last reviewed: 11/7/2025
Assess risk and vulnerabilities to organizational operations
Last reviewed: 11/13/2025
Assess security controls and monitor effectiveness
Last reviewed: 11/17/2025
Monitor, control, and protect communications at system boundaries
Last reviewed: 11/9/2025
Identify, report, and correct information system flaws
Last reviewed: 11/14/2025
Allocate resources and develop systems using secure development lifecycle
Last reviewed: 11/6/2025