This is a sample report
This report demonstrates the full format and content of the EvaluationCat information security assessment system.Start your exclusive assessment →
Example Tech Co., Ltd.
Average
Security Status Rating
Your organization has a solid foundation in Asset Identification, Backup & Access Management, but has higher risks inPrivileged Account Management, Continuous Monitoring & Cloud Configuration.
Priority Recommendations: It is recommended to complete privileged account review and MFA coverage within 30 days, and deploy SIEM or cloud posture monitoring within 90 daysto reduce medium-term risks.
31
Compliant
27
Partially Implemented
35
Not Implemented
33%
Compliance Rate
| Domain | Total | Compliant | Partially | Missing | Rate |
|---|---|---|---|---|---|
| Organizational Controls | 37 | 12 | 10 | 15 | 46% |
| People Controls | 8 | 5 | 1 | 2 | 69% |
| Physical Controls | 14 | 4 | 8 | 2 | 57% |
| Technological Controls | 34 | 10 | 8 | 16 | 41% |
Domain Score Comparison
Comparison of your organization's scores in four domains against industry averages.
| Domain | Your Score | Industry Avg | Diff |
|---|---|---|---|
| Organizational Controls | 46 | 60 | -14 |
| People Controls | 69 | 65 | +4 |
| Physical Controls | 57 | 55 | +2 |
| Technological Controls | 41 | 50 | -9 |
Average score across four domains is53, while industry average is58.
Key Findings
- Based on the analysis of four control domains, your organization performs best inPeople Controls.
- There is room for improvement inTechnological Controls, with scores significantly lower than other domains.
- The overall average score for the four control domains is53, compared to the industry average of58.
- Some control domain scores are still lower than the industry average and require further attention and improvement.
Recommendations
- ForTechnological Controls, it is recommended to further strengthen relevant security policies, processes, and technical controls.
- Conduct regular security control assessments to track improvement progress in each domain and ensure overall balanced development.
- Reference industry best practices and establish benchmarks in better-performing domains to drive improvements in other areas.
- Continuously strengthen security training to improve overall security awareness, with special attention to policy enforcement and behavioral norms related toPeople Controls.
Distribution of Control Execution Status
People Controls (A.6)
Excellent performance in personnel screening and background checks, with employee security awareness training coverage exceeding 90%
Physical Management of Office Equipment
Comprehensive physical access control measures, standardized equipment entry/exit management, and adequate surveillance coverage in office areas
Information Security Policy Documentation
Established a complete information security management system documentation, with regular reviews and updates
A.8.10 Information Deletion
Lack of encryption measures may lead to sensitive customer data leakage, facing risks of high fines under Data Security Laws
A.8.8 Privileged Access Management
Missing privileged account management may lead to internal privilege abuse and data tampering risks
A.8.16 Monitoring Activities
Lack of SIEM or log monitoring systems makes it difficult to detect anomalous behavior and security incidents in a timely manner
Industry Percentile Ranking
In the FinTech industry, your security score exceeds 25% of assessed companies
Potential Loss Estimation
Based on currently missing high-risk controls, your organization may face the following in case of a data security incident:
- Legal Litigation Costs: $70k - $300k
- Business Interruption Loss: Daily average $15k - $70k
- Brand PR Remediation: $150k - $700k
- Regulatory Fine Risk: Up to 5% of annual revenue
Priority Matrix
High Risk + Low Cost
- • Fix Password Policy (1-2 weeks)
- • Deploy MFA (2-3 weeks)
- • Review Privileged Accounts (3-4 weeks)
Long-term Compliance
- • Deploy SIEM (2-3 months)
- • ISO 27001 Certification (6-12 months)
- • Refine Disaster Recovery Plan (3-6 months)
Remediation Timeline
Emergency Fix Phase
Complete privileged account review & MFA coverage
Medium-term Risk Reduction
Deploy SIEM or Cloud Posture Monitoring
Long-term Compliance Phase
Complete ISO 27001 Certification Prep
Unlock Full AI Remediation Plan
Get specific technical implementation roadmaps and expert selection advice for each issue
Technical Implementation Plan
- 1. Deploy Privileged Access Management (PAM)
- 2. Implement Least Privilege Principle
- 3. Configure Audit Logs & Session Recording
Recommended Product Comparison
| Product | Price | Use Case |
|---|---|---|
| BeyondTrust | $10-20/user/month | Large Enterprise |
Pro Report Includes
- ✓ 1-on-1 AI Improvement Plan for Each Issue
- ✓ Specific Technical Product Models & Vendor Comparison
- ✓ Full Set of Management Policy Templates Download
- ✓ Budget Estimation & Implementation Timeline
30-Day Money-Back Guarantee | Corporate Invoicing Supported
Start Your Exclusive Security Assessment
Assess your enterprise information security status comprehensively with 93 controls based on latest ISO 27001/27002 standards
Get detailed scoring reports and professional remediation advice to improve your information security management level
Free version includes full assessment & basic report | Pro version ($49) includes AI remediation advice
