Security Maturity Assessment
My Assessments →Select a pattern to assess your organisation against. Rate each control area on a 1-5 maturity scale and get a radar chart, gap analysis, and threat exposure assessment. All data is encrypted in your browser with AES-256-GCM before reaching our servers — we cannot read your scores or notes.
NIST Cybersecurity Framework 2.0
Framework AssessmentScore your current vs target maturity across 6 core functions and 22 categories. Identify gaps, prioritise remediation, and map to OSA patterns.
Pattern Assessments
CBDC and Digital Currency Infrastructure
SP-054Security architecture for central bank digital currency (CBDC) and digital currency infrastructure covering retail and wholesale CBDC models, dual-led...
Zero-Knowledge Proof Architecture
SP-053Security architecture for zero-knowledge proof (ZKP) systems covering ZK-SNARK and ZK-STARK proof systems, trusted setup ceremony security, ZK-rollup ...
Decentralised Identity & Verifiable Credentials
SP-052Security architecture for decentralised identity (DID/SSI) systems covering W3C DID method selection and resolution, Verifiable Credential (VC) issuan...
Tokenised Asset Security Architecture
SP-051Security architecture for institutional tokenised asset platforms covering custody architecture (HSM, MPC, threshold signatures), smart contract secur...
Mobile Security Architecture
SP-050Comprehensive mobile security architecture pattern covering certificate pinning, secure enclave usage, biometric authentication, mobile payment securi...
AI in Security Operations
SP-049Security architecture for the use of AI in defensive security operations — AI-augmented threat detection, AI-assisted incident triage and response, AI...
Secure Agentic AI Frameworks
SP-047Enterprise security architecture for adopting agentic AI frameworks (LangChain, CrewAI, AutoGen, LangGraph, and similar orchestration platforms) safel...
External Attack Surface Management
SP-046Comprehensive pattern for discovering, monitoring, and managing an organisation's internet-facing digital assets. Covers automated asset discovery, DN...
AI Governance and Responsible AI
SP-045A governance pattern for establishing and operating an AI management system (AIMS) across the enterprise. Covers training data governance, model lifec...
SaaS Identity Lifecycle Management
SP-044A security architecture pattern for managing the full identity lifecycle across SaaS applications -- from provisioning and role assignment through acc...
Secure Application Baseline for Developers
SP-041Architecture pattern bridging the gap between security control frameworks and practical software implementation. Provides developer-centric guidance f...
Post-Quantum Cryptography and Quantum Readiness
SP-040Architecture pattern for migrating enterprise cryptographic infrastructure to post-quantum algorithms. Covers crypto agility, cryptographic inventory ...
Client-Side Encryption and Data Privacy
SP-039Pattern for implementing client-side encryption to protect sensitive user data before it reaches the server. Covers browser-based cryptography via Web...
Vulnerability Management and Patching
SP-038End-to-end vulnerability management pattern covering asset discovery, vulnerability scanning, risk-based prioritisation, patch management lifecycle, e...
Privileged User Management
SP-037Comprehensive privileged access management pattern covering credential vaulting, just-in-time access, session recording, standing privilege eliminatio...
Incident Response
SP-036End-to-end incident response pattern covering preparation, detection, triage, containment, eradication, recovery, and post-incident review. Addresses ...
Offensive Security Testing
SP-035Governance and execution pattern for red teaming, blue teaming, purple teaming, and intelligence-led penetration testing (CBEST, TIBER-EU). Covers thr...
Cyber Resilience
SP-034Enterprise architecture pattern for designing systems that survive cyber attacks, maintain critical operations under degraded conditions, and recover ...
Passkey Authentication
SP-033Deep-dive pattern for implementing phishing-resistant passwordless authentication using FIDO2 WebAuthn and passkeys. Covers platform authenticators, r...
Modern Authentication
SP-032Enterprise authentication architecture pattern covering directory services, federation, and token-based authentication using OIDC, OAuth 2.0, and JWT....
Security Monitoring and Response
SP-031End-to-end security operations pattern covering the full detection and response lifecycle: telemetry collection from endpoints, networks, and cloud; c...
API Security
SP-030Comprehensive security pattern for protecting application programming interfaces across their full lifecycle. Maps 45 NIST 800-53 controls to the crit...
Zero Trust Architecture
SP-029Enterprise security architecture pattern that eliminates implicit trust, enforcing continuous verification of every user, device, and workload before ...
Secure DevOps Pipeline Pattern
SP-028Security architecture for CI/CD pipelines, DevSecOps practices, and software delivery automation. Covers pipeline infrastructure hardening, secrets ma...
Secure LLM Usage
SP-027Security architecture for integrating large language models (LLMs) into enterprise environments. Covers prompt injection and jailbreaking defences, ou...
PCI Full Environment
SP-026Security architecture for a fully PCI DSS compliant cardholder data environment. Covers CDE scoping and segmentation, cardholder data protection with ...
Advanced Monitoring and Detection
SP-025Security architecture for building advanced detection and response capabilities against sophisticated threats. Covers SIEM deployment, security operat...
Industrial Control Systems
SP-023Security architecture for protecting industrial control systems (ICS), SCADA, and operational technology environments. Covers network segmentation bet...
Secure Ad-Hoc File Exchange Pattern
SP-019Security architecture for enabling secure, business-driven file sharing with external partners without pre-established federation. Covers encrypted fi...
Information Security Management System (ISMS) Module
SP-018Security architecture for establishing, operating, and continuously improving an Information Security Management System aligned with ISO 27001. Covers...
DMZ Module
SP-016Security architecture for designing and operating a demilitarized zone (DMZ) network segment. Covers multi-tier firewall topologies, bastion host hard...
Secure Remote Working
SP-015Comprehensive remote and hybrid working security pattern covering endpoint hardening, ZTNA and VPN architectures, BYOD and corporate device management...
Data Security Pattern
SP-013Security architecture for classifying, protecting, and controlling data throughout its lifecycle. Covers data classification schemes, encryption at re...
Secure Software Development Lifecycle
SP-012End-to-end secure SDLC pattern covering threat modelling in design, secure coding standards, static and dynamic analysis, software composition analysi...
Cloud Computing Pattern
SP-011Security architecture for organisations consuming or providing cloud services, addressing the shared responsibility model, data sovereignty, identity ...
Public Web Server Pattern
SP-008Security architecture for internet-facing web applications, covering network segmentation, input validation, session management, TLS configuration, DD...
Server Module
SP-002Reusable security module defining the standard control baseline for server systems including physical, virtual, and cloud-hosted instances. Referenced...
Client Module
SP-001Reusable security module defining the standard control baseline for client endpoints including desktops, laptops, and workstations. Referenced as a bu...