47 Criteria Across Every Layer
of Your Security Posture
Endpoint Security
Antivirus, EDR, patch management, device encryption, and endpoint policy enforcement across all devices.
Identity & Access
MFA enforcement, privileged access management, password policies, and Active Directory security.
Network Security
Firewall configuration, network segmentation, DNS filtering, and remote access security.
Cloud & Email
Microsoft 365 security, email filtering, cloud access controls, and SaaS application security.
Backup & Recovery
Backup completeness, offsite replication, recovery testing, and RTO/RPO gap analysis.
Compliance Posture
HIPAA, CMMC, GLBA, CJIS, PCI-DSS, and Ohio Safe Harbor alignment check.