Home

Frameworks & Methodology

The AYSOLI Security Baseline is based on globally recognized standards and best practices. Learn more about the frameworks used here.

STRIDE-LM

STRIDE is a model for identifying computer security threats. We use the extended variant STRIDE-LM, to map modern cloud and network architectures.

SpoofingImpersonating someone or something else
TamperingModifying data or code
RepudiationDenying an action
Information DisclosureExposing sensitive information
Denial of ServiceCrashing or slowing down a service
Elevation of PrivilegeGaining unauthorized access
Lateral MovementMoving through a network
Monitoring GapsGaps in visibility & logging

MITRE ATT&CK®

ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. It helps us adopt the attacker's perspective.

Visit Official Website

OWASP

The Open Web Application Security Project® (OWASP) Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus on the most critical security risks to web applications.

Explore OWASP Top 10

CIS Controls

The Center for Internet Security (CIS) Controls are a prioritized set of actions that collectively form a defense-in-depth set of best practices that mitigate the most common attacks against systems and networks.

Visit Official Website

NIST CSF

The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides a policy framework of computer security guidance for how private sector organizations in the United States can assess and improve their ability to prevent, detect, and respond to cyber attacks.

Visit Official Website

NIST AI RMF

The NIST AI Risk Management Framework (AI RMF 1.0, published 2023) is a standalone framework separate from the NIST CSF. It helps organisations identify, assess, and manage risks associated with AI systems — with a focus on trustworthiness, fairness, transparency, and safety.

Govern
Map
Measure
Manage
Visit Official Website

Controls Library

The Controls Library contains all security controls on the platform, mapped to CIS v8, NIST CSF, and NIST AI RMF. Use the framework filter to view controls by standard — grouped by CIS control group (1–18), NIST CSF function (GV · ID · PR · DE · RS · RC), or AI RMF category.

CIS v8NIST CSFNIST AI RMF
Open Controls Library

Security Assessment

The Security Assessment evaluates an organisation's security posture in two tiers. The Quick Check (~27 questions) gives an initial baseline across seven domains. The Deep Assessment then drills into open or partially implemented controls with targeted follow-up questions.

Quick CheckFast first assessment, ~27 questions, score 0–100
Deep AssessmentDeep-dive on partial gaps, more detailed recommendations
N/A — Not applicableQuestions can be marked as not applicable and are excluded from scoring
Traffic-light scoringGreen ≥ 70 · Yellow 40–69 · Red < 40 — per domain and overall
Start assessment

TLP 2.0

The Traffic Light Protocol (TLP) is a standard defined by FIRST (Forum of Incident Response and Security Teams) to classify sensitive information. TLP defines who information may be shared with. Version 2.0 comprises five classification levels.

TLP:CLEAR

No restriction

Information can be distributed without restriction. Recipients may share this information freely, regardless of source or format.

TLP:GREEN

Community-wide sharing

Information is for the community at large. It may be shared within the community, but not publicly or outside of it.

TLP:AMBER

Limited disclosure

Information may be shared with members of the recipient's own organisation who need to know. It must not be shared outside the organisation.

TLP:AMBER+STRICT

Direct recipients only

Like TLP:AMBER but more restrictive: information may only be shared with the direct recipients — not further within the organisation.

TLP:RED

No disclosure

Information is not for disclosure. It is restricted to direct participants only — including in-person and verbal communications.

Official FIRST TLP standard
Help & Methodology · AYSOLI Security Hub