Threat Modeling
Controls Library
All security controls mapped to CIS v8 and NIST CSF. Use the filter to view controls by framework.
API Asset Inventory
Infrastructure as Code (IaC) Scanning
SaaS Security Posture Management (SSPM)
Hardware Asset Tagging
External Attack Surface Management (EASM)
API Documentation & Inventory
AI Plugin Sandboxing
PowerShell Constrained Language Mode
Device Compliance Policies
Remote Wipe (Selective)
Secret Scanning in Code Repositories
Endpoint Compliance (Intune)
Cloud Resource Locking
Partner Account Deprovisioning
Jailbreak & Root Detection
Regular Access Reviews
Adaptive MFA (Risk-based)
Break-Glass Accounts
Privileged Access Workstation (PAW)
Privileged Identity Management (PIM)
Tiered Administration Model
Mutual TLS (mTLS)
Terms of Use (B2B)
IAM Permissions Boundaries
MFA for Deletion Operations
Conditional Access Policies
FIDO2 Enforcement
Mailbox Delegation Monitoring
Automated Offboarding Workflow
Centralized Secrets Vaulting
Guest Invitation Governance
Least Privilege Principle
Modern Auth Enforcement
MFA for Windows Sign-in
Tenant Restrictions
Fine-Grained RBAC / ABAC
Strict Transport Security (TLS 1.3)
API Security Audit (Logging)
Immutable Audit Logs
Unified Audit Log (UAL)
SIEM Integration
Anti-Phishing & Anti-Spam Policies
Email Authentication (SPF, DKIM, DMARC)
Mailflow Rules (Transport Rules)
ATP Safe Links & Attachments
B2B IP Allowlisting
Rate Limiting & Throttling
Zero Trust Network Access (ZTNA)
Automated Certificate Rotation
Trusted Certificate Profiles
Bot Management & Anti-Scraping
CAPTCHA / Proof-of-Work
Egress Filtering (SSRF Protection)
Automatic Data Classification
Exact Data Matching (EDM)
Endpoint DLP Policies
OCR for DLP
Data Loss Prevention (DLP)
Data Erasure Process (Right to be Forgotten)
Sensitivity Labels (Purview)
External Sharing Governance
Mobile Application Management (MAM)
App Protection - Screen Capture Block
Collaboration Governance
OSINT Hygiene & Information Minimization
Partner Security Assessment (Supply Chain)
Strict Schema Validation
Advanced Threat Protection (WAF)
DDoS Protection & Rate Limiting
Code Scanning (SAST / Secret Scanning)
Restricted App Consent
CORS Configuration
Content Security Policy (CSP)
Security Headers (X-Frame / Content-Type)
HTTP Strict Transport Security (HSTS)
Input Validation & Sanitization
Software Composition Analysis (SCA)
Subresource Integrity (SRI)
Virtual Patching via WAF
AI Usage Policies
Dark Web & Credential Leak Monitoring
Data Processing Agreement (DPA)
Privacy by Design Guardrails
Incident Response Playbook (Admin Compromise)
Incident Response Playbook (BYOD Security Incident)
Incident Response Playbook (Partner Compromise)
Continuous AI Red Teaming
Dynamic Application Security Testing (DAST)
Manual Business Logic Review
Regular Penetration Testing