Skip to main content

CRAM User Guide

Overview

Test.png

Figure 1. Navigation

 

Cyber Risk Assessment Management

To proceed on Onboarding Cyber Risk Assessment Management (CRAM), you should press Get Started button.

image.png

Figure 2. Cyber Security Risk Management - Asset Identification

 

After pressing the get started you will be directed to this part of the Onboarding. It requires information regarding on the clients Main Business Statement.

Disclaimer: This is not a real company and only made for client's guidance on what to input.

image.png

Figure 3. Cyber Security Risk Management - Main Business Statement

 

After adding the necessary information and pressing save, it will redirect you to this page. The client can edit the information here by pressing the edit to add their business objectives.

image.png

Figure 3. Cyber Security Risk Management - Business Objectives

 

Here's the edit section of the business objective, where the client can add their business objectives.

image.png

Figure 4. Cyber Security Risk Management - Business Objective / Edit Section

 

After pressing the save button it will then redirect you to this page about business fundamentals. The client can also edit their business fundamentals and add what aligns to their own fundamentals.

image.png

Figure 5. Cyber Security Risk Management - Business Fundamentals

 

Here's the edit section of business fundamentals.

image.png

Figure 5. Cyber Security Risk Management - Business Fundamentals / Edit Section

 

After adding and pressing save it will redirect you to Critical Clientele & Markets. The client

image.png

Figure 5. Cyber Security Risk Management - Critical Clientele & Markets

 

Here is the edit section of the Critical Clientele & Markets to change any necessary information about their goods or services, supersector, sector, and industry. 

image.png

Figure 5. Cyber Security Risk Management - Critical Clientele & Markets / Edit Section

 

image.png

Figure 5. Cyber Security Risk Management - Sub-Business Activities

 

Here's the edit section of the Sub-Business Activities where you can add vendors that help the client's business grow.

image.png

Figure 5. Cyber Security Risk Management - Sub-Business Activities / Edit Section

 

Then after saving the edit, it will bring the client back to the sub-business activities where they can see their added vendors. Then Press continue to proceed Onboarding the business.

image.png

Figure 5. Cyber Security Risk Management - Sub-Business Activities / Edit Section

 

Business Industry. In this part, the client can put their information on what is the organization best fit into. The client can also edit to add any necessary information about their business industry.

image.png

Figure 5. Cyber Security Risk Management - Business Industry

 

Here is the edit section of the business industry where the client can change any necessary information regarding on their business.

image.png

Figure 5: Cyber Security Risk Management - Business Industry / Edit Section

 

After saving the information for Business Industry, then it will redirect you to the Critical Vendors. There is also an edit function here to add any necessary information regarding on the client business.

image.png

Figure 5: Cyber Security Risk Management - Critical Vendors

 

After proceeding to Critical Vendors, it will then redirect the client to the Critical Business Partners. Critical Business Partners is for your business partners that shares the same values and investments. The client can add their business partners through the edit button.

image.png

Figure 5: Cyber Security Risk Management - Critical Business Partners

 

 


image.png

Figure 5: Cyber Security Risk Management - Critical Business Partners / Edit Section

 

After adding and saving your critical business partners then it will redirect you to proceed in Geographic Locations. Geographic Location is where the client holds their offices.

image.png

Figure 5: Cyber Security Risk Management - Geographic Location 

 

The client can add their geographic location on the edit section by pressing the arrow key.

image.png

Figure 5: Cyber Security Risk Management - Geographic Location / Edit Section

 

Critical Business Processes (CBP's) 

After saving the Geographic Location of the offices and pressing continue the client will be redirected to this Critical Business Processes (CBP's). Critical Business Processes is the clients' money-making processes. The client can also add their money-making process through edit.
image.png

Figure 5: Cyber Security Risk Management - Critical Business Processes (CBP's)

 

Here in the edit section of Critical Business Processes (CBP's) the client can add their information regarding on their money-making processes. The client can also add what their company do, what they offer and what type of service they do.
image.png

Figure 5: Cyber Security Risk Management - Critical Business Processes (CBP's) / Edit Section

 

After saving and adding the correct input for CBP's the client will be redirected to the Critical Business Functions (CBF's) section where they can add information on who are the people, processes, and technologies that makes the clients CBP's so successful. The client can add their CBF's through the edit button.
image.png

Figure 5: Cyber Security Risk Management - Critical Business Functions (CBF's)

 

Here is the edit section of the CBF's where the client can add their information about what are the people, processes, or technologies that keeps their business successful. Then after saving the required information, it will then redirect the client back to the Critical Business Function (CBF's) to see if they have put their correct input regarding on their CBF's then after that the client can press continue to proceed.

image.png

Figure 5: Cyber Security Risk Management - Critical Business Function (CBF's) / Edit Section

 

Business Vector

Business Vector is about how the clients Critical Business Functions (CBF's) are coming to life.

image.png

Figure 5: Cyber Security Risk Management - Business Vector

 

Business Vector edit section where the client can the name and what the client CBF's does your vector belongs.

image.png

Figure 5: Cyber Security Risk Management - Business Vector / Edit Section

 

 

Risk Tolerance

In this section the client can see on which Critical Function can be rank. The client can also switch to Critical Business Function (CBF's) or Critical Business Process (CBP's)

image.png

Figure 5: Cyber Security Risk Management - Risk Tolerance

 

Here's the Risk Tolerance edit section where the client can change their confidentiality, integrity, and availability. Ranking from Very high - to Very Low.

image.png

Figure 5: Cyber Security Risk Management - Risk Tolerance / Edit Section

 

Risk Appetite

In this section after proceeding to Risk Tolerance, Risk Appetite is knowing how well your organization can absorb a cyber-attack by ranking Very high to Very Low. The client can also change their risk appetite through the edit section.

image.png

Figure 5: Cyber Security Risk Management - Risk Tolerance

 

After proceeding to Risk Appetite, the client will be directed to the Cyber Insurance, asking if does your organization have cyber insurance? The client can pick if its Yes or No through the edit button.

image.png

Figure 5: Cyber Security Risk Management - Cyber Insurance

 

Cyber Privacy Obligation

In this section for Onboarding the client's business, you will be asked 3 questions regarding on the Cyber Privacy Obligations

image.png

Figure 5: Cyber Security Risk Management - Cyber Privacy Obligations

 

The client can edit their response to the edit section of Cyber Privacy Obligation by pressing the edit button below.

 image.png

Figure 5: Cyber Security Risk Management - Cyber Privacy Obligations / Edit Section

 

Threats

This maps any relevant threats of the organization that may impact the business. The client can add the threats through the edit section by clicking the edit button below.

image.png

Figure 5: Cyber Security Risk Management - Threats

 

image.png

Figure 5: Cyber Security Risk Management - Threats