Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Cyber Security Assessment Form
"Need a Cyber Security Assessment Form for our Singapore-based fintech startup that's preparing for MAS licensing, with specific focus on cloud security controls and third-party vendor assessments, to be implemented by March 2025."
1. Organization Information: Basic details about the organization being assessed, including contact information, business nature, and size
2. Scope of Assessment: Clear definition of systems, networks, and assets to be assessed, including boundaries and exclusions
3. Risk Assessment Matrix: Framework for evaluating identified risks, including likelihood and impact criteria
4. Security Controls Assessment: Evaluation of existing security measures across technical, organizational, and physical controls
5. Compliance Requirements: Checklist of regulatory compliance requirements under Singapore's Cybersecurity Act and PDPA
1. Cloud Security Assessment: Detailed evaluation of cloud service security measures, including data sovereignty and access controls
2. IoT Security Assessment: Specialized assessment for Internet of Things devices and infrastructure security
3. Third-party Vendor Assessment: Security evaluation of vendors and partners, including data handling practices and compliance status
4. Financial Sector Requirements: Additional assessment criteria specific to financial institutions under MAS guidelines
5. Critical Infrastructure Assessment: Special considerations for organizations designated as Critical Information Infrastructure (CII)
1. Technical Security Controls Checklist: Comprehensive checklist covering technical security measures, configurations, and best practices
2. Asset Inventory: Detailed inventory of all IT assets within scope, including hardware, software, and data assets
3. Vulnerability Assessment Results: Technical findings from vulnerability scans, including severity ratings and recommendations
4. Risk Treatment Plan: Detailed action plan for addressing identified risks, including timelines and responsibilities
5. Regulatory Compliance Matrix: Mapping of assessment findings against relevant Singapore regulatory requirements
Authors
Authorized Personnel
Confidential Information
Critical Assets
Cyber Security Controls
Cyber Security Incident
Data Assets
Data Breach
Information Systems
Information Security Management System (ISMS)
Network Infrastructure
Personal Data
Risk Level
Risk Rating
Security Controls
Security Measures
Security Vulnerability
Sensitive Information
System Components
Technical Controls
Third-Party Service Provider
Threat Actor
Treatment Plan
Vulnerability Assessment
Assessment Methodology
Access and Authorization
Confidentiality
Data Protection
Security Controls Assessment
Risk Assessment
Compliance Requirements
Incident Reporting
Documentation Requirements
Vulnerability Assessment
Technical Controls
Administrative Controls
Physical Security Controls
Network Security
Access Control
Data Classification
Security Monitoring
Incident Response
Business Continuity
Third-Party Risk Management
Training and Awareness
Audit Requirements
Remediation Requirements
Reporting Obligations
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.