Cybersecurity Architecture

The automated methods, frameworks and artefacts of a Cybersecurity Architect as a Service.

Getting Started

Wizards are available to step through the end-to-end process for specific use cases, such as producing a Protective Data Security Plan (PDSP) utilising the Victorian Protective Data Security Framework (VPDSF)


Manage your Tenant Profile, and select or create self-contained Security Profiles to manage on behalf of your own organisation, subsidiaries, or your clients.


Manage your Risk Framework and map your Information Asset Classification Framework to the same business endorsed consequence definitions.

Asset Registry

Manage your System and Information Assets, and the User Accounts able to compromise them. Define the relationships between all three to derive your risk exposure.


Manage your Controls, Control Catalogues, Cybersecurity Frameworks and Maturity Models.

Maturity & Risk Assessment

Specify the Control Objectives that are currently met for the Controls in your Cybersecurity Framework across your entire organisation, on a platform, environment or system specific basis, or any combination of the four.

Security Program

Derive and refine your Target State. Assess the Gap Analysis, define the Tasks necessary to close those gaps, prioritise and package the Tasks and define your Strategy & Roadmap.


Generate pre-defined and custom reports, including pre-defined industry standards like the Protective Data Security Plan (PDSP) to address the Victorian Protective Data Security Standards (VPDSS).

Architecture & Design

Define and manage the Principles and Pattern Catalogue that guide and constrain Solution Design artefacts.