tatersecurity.com Open App

GRC Modules Guide

Complete guide to all Governance, Risk, and Compliance modules in TATER: Risk Register, Exception Management, Audit Management, BCP/DR, Data Classification, Training, Control Testing, Vendor Management, Questionnaires, Change Requests, Regulatory Changes, and Access Reviews.

Risk Register & Heat Map

TATER Risk Register showing risk list and 5x5 heat map visualization

The Risk Register provides a centralized catalog of organizational risks with quantitative scoring, treatment tracking, and a visual 5x5 heat map.

Key Features

  • 5x5 Heat Map: Interactive likelihood vs. impact grid showing risk distribution across severity zones
  • Quantitative Scoring: ALE = SLE x ARO (Annual Loss Expectancy = Single Loss Expectancy x Annual Rate of Occurrence)
  • Treatment Plans: Four treatment options: Mitigate, Accept, Transfer, Avoid
  • Residual Risk: Track residual risk after treatment measures are applied
  • Control Linkage: Bidirectional linkage between risks and compliance controls
  • Categories: Organize risks by category (Operational, Strategic, Compliance, Financial, Technical, Reputational)

Creating a Risk Entry

Click New Risk

Navigate to the Risk Register and click New Risk to open the creation form.

Define the risk

Enter the risk title, description, category, and risk owner. Provide detailed context about the threat and its potential impact.

Score likelihood and impact

Rate both likelihood (1-5) and impact (1-5). The heat map cell updates in real-time. Optionally enter SLE and ARO for quantitative ALE calculation.

Select treatment

Choose a treatment option (Mitigate, Accept, Transfer, Avoid) and document the treatment plan. Link related compliance controls for traceability.

Set residual risk

After treatment is applied, reassess and record residual likelihood and impact scores.

Tip

Click any cell in the heat map to filter the risk list to only show risks at that likelihood/impact intersection. Click again to clear the filter.

Exception & Waiver Management

TATER Exception Management showing exception requests with approval status

Manage formal exception requests for compliance requirements that cannot be met due to business constraints, with structured approval workflows and automatic expiry enforcement.

Exception Workflow

  1. Request: Submit an exception request with the affected control, business justification, and proposed compensating controls
  2. Review: The request enters a multi-level approval chain (OrgAdmin, CISO, Risk Committee)
  3. Approve/Deny: Each approver reviews and provides their decision with comments
  4. Monitor: Approved exceptions are tracked with expiry dates and renewal reminders
  5. Renew or Close: Before expiry, the exception owner can renew with updated justification or close the exception

Exception Request Fields

FieldDescription
ControlThe compliance control requiring an exception
JustificationBusiness reason why the requirement cannot be met
Compensating ControlsAlternative measures implemented to reduce risk
Expiry DateWhen the exception expires and must be renewed or resolved
Risk LevelResidual risk with the exception in place
OwnerPerson responsible for monitoring the exception
Automatic Expiry

Exceptions approaching their expiry date trigger renewal reminders 30 days, 14 days, and 7 days before the deadline. Expired exceptions are automatically flagged and removed from active override calculations.

Audit Management

TATER Audit Management showing audit list with findings and evidence requests

Plan and manage internal and external audit engagements with finding tracking, evidence collection, and calendar management.

Planning an Audit

  1. Navigate to Audits and click New Audit
  2. Define the audit: name, type (Internal/External), scope, and objectives
  3. Set target dates: planned start, planned end, and report deadline
  4. Assign auditors from your team or external contacts
  5. Select the frameworks and controls in scope for the audit

Managing Findings

During the audit, record findings as they are identified:

  • Severity: Critical, Major, Minor, Observation
  • Affected Controls: Link findings to specific controls
  • Remediation Plan: Document the corrective action plan with target dates
  • Status Tracking: Open, In Progress, Remediated, Verified, Closed
  • Evidence: Attach supporting evidence to findings

Evidence Collection

Request evidence from control owners during the audit process:

  1. Click Request Evidence on an audit finding or control
  2. Select the evidence type needed (screenshot, document, configuration export, etc.)
  3. Assign the request to the control owner with a due date
  4. The owner receives a notification and can upload evidence directly
  5. Track request status: Requested, In Progress, Submitted, Reviewed

Audit Calendar

The audit calendar view shows all past and upcoming audit engagements in a timeline format. Use it to plan audit cadence and avoid scheduling conflicts.

Business Continuity & Disaster Recovery

TATER BCP/DR showing plans, BIA, and test exercise tracking

Manage BCP/DR plans with business impact analysis, RTO/RPO tracking, and test exercise management.

Plan Management

  • Plan Library: Maintain multiple BCP/DR plans with version control
  • Approval Workflows: Plans go through review and approval before activation
  • Version History: Track changes across plan revisions
  • Distribution: Share approved plans with designated team members

Business Impact Analysis (BIA)

Document critical business processes and their recovery requirements:

BIA FieldDescription
Process NameThe business process being analyzed
CriticalityMission Critical, Business Critical, Important, Normal
RTORecovery Time Objective -- maximum acceptable downtime
RPORecovery Point Objective -- maximum acceptable data loss
DependenciesSystems, applications, and personnel required
Impact AssessmentFinancial, operational, and reputational impact at various time intervals

Test & Exercise Tracking

Track BCP/DR test exercises and their outcomes:

  • Exercise Types: Tabletop, Walkthrough, Simulation, Full Test
  • Results: Actual RTO/RPO achieved vs. targets
  • Lessons Learned: Document findings and improvement actions
  • Frequency: Track when the last test was performed and when the next is due

RTO/RPO Monitoring

The BCP/DR dashboard compares actual recovery performance against defined targets:

  • Green: Actual recovery met or exceeded the objective
  • Yellow: Actual recovery was within 120% of the objective
  • Red: Actual recovery exceeded the objective by more than 20%

Data Classification & Privacy

TATER Data Classification showing asset inventory with classification labels and flow mapping

Maintain a data asset inventory with classification labels, flow mapping, privacy impact assessments, and retention policy management.

Data Asset Inventory

Catalog all data assets in your organization:

  • Asset Name: Name of the data asset or system
  • Classification: Public, Internal, Confidential, Restricted
  • Data Type: PII, PHI, Financial, Intellectual Property, etc.
  • Owner: Data owner responsible for classification decisions
  • Storage Location: Where the data resides (cloud, on-premises, hybrid)
  • Encryption Status: At rest and in transit encryption status

Data Flow Mapping

Map how data flows between systems in your organization:

  • Define source and destination systems
  • Document the data types that flow between systems
  • Identify cross-border data transfers for regulatory compliance
  • Highlight flows that involve sensitive data classifications

Privacy Impact Assessments (PIA)

Conduct privacy impact assessments for new systems or processes:

  1. Create a new PIA and describe the system or process being assessed
  2. Identify the personal data collected and processed
  3. Assess the privacy risks and their likelihood and impact
  4. Document mitigating measures and residual risk
  5. Submit for review and approval by the Data Protection Officer

Retention Policy Management

Define and track data retention policies:

  • Set retention periods by data classification level
  • Track disposition schedules and upcoming deletions
  • Document legal hold requirements that override standard retention
  • Generate disposition reports for audit compliance

Security Awareness Training

TATER Training module showing campaigns, completion tracking, and phishing simulation results

Manage security awareness training campaigns with completion tracking, phishing simulation results, and audit-ready compliance reports.

Campaign Management

  1. Navigate to Training and click New Campaign
  2. Define the campaign: name, required courses, target audience, deadline, and completion threshold
  3. Assign target groups (all employees, specific departments, new hires)
  4. Set the campaign as mandatory or optional
  5. Activate the campaign to begin tracking

Completion Tracking

Track per-employee completion status with dashboard KPI cards:

  • Completion Rate: Percentage of target audience who completed all required courses
  • Overdue: Count of employees past the deadline who have not completed training
  • In Progress: Employees who have started but not finished
  • Not Started: Employees who have not begun training

Phishing Simulation Results

Import phishing simulation results from third-party tools and track trends:

  • Click rate, report rate, and data submission rate per campaign
  • Trend analysis across multiple simulation campaigns
  • Department-level breakdown showing which teams need additional training
  • Repeat offender identification for targeted intervention

Audit Evidence

Training completion records serve as audit evidence for compliance frameworks that require security awareness training (NIST 800-53 AT-2, ISO 27001 A.7.2.2, SOC 2 CC1.4).

Control Testing Automation

TATER Control Testing showing test schedules, procedures, and historical results

Schedule and execute control tests with reusable procedures, historical results tracking, and automatic gap detection.

Test Scheduling

Configure automated test schedules for each control:

  • Frequency: Daily, Weekly, Monthly, Quarterly, Annually
  • Scope: Individual controls or groups of controls
  • Assignments: Assign test execution to specific team members
  • Notifications: Alerts when tests are due or overdue

Test Procedure Library

Build a reusable library of test procedures:

  • Document step-by-step test procedures for each control
  • Define pass/fail criteria with clear thresholds
  • Include expected evidence and documentation requirements
  • Reuse procedures across multiple test cycles

Historical Results & Trends

  • View test results over time with trend charts showing effectiveness
  • Identify controls that consistently fail tests for remediation prioritization
  • Generate test reports for audit evidence
  • Track tester notes and observations alongside pass/fail status

Automatic Gap Detection

Failed control tests automatically feed into the remediation workflow:

  • Failed tests generate gap notifications to control owners
  • Gaps are linked to the failing control for remediation tracking
  • SLA timers start based on the control's severity level

Vendor Risk Management

TATER Vendor Management showing vendor list with risk tiers and assessment status

Manage third-party vendor relationships with risk tiering, assessment tracking, and continuous monitoring.

Vendor Inventory

  • Vendor Name: Company name and primary contact
  • Risk Tier: Critical, High, Medium, Low based on data access and business dependency
  • Services: Services provided by the vendor
  • Data Access: What types of data the vendor can access
  • Contract Status: Active, Under Review, Terminated
  • Last Assessment: Date of most recent risk assessment

Risk Assessments

  1. Select a vendor and click New Assessment
  2. Complete the assessment questionnaire (security controls, certifications, incident history)
  3. Review vendor-provided evidence (SOC 2 reports, penetration test results, etc.)
  4. Score the vendor across security domains
  5. Generate an assessment report with recommendations

Continuous Monitoring

  • Track vendor certification expiry dates
  • Monitor vendor security ratings from external sources
  • Set reassessment reminders based on risk tier frequency
  • Document vendor incidents and their resolution

Access Reviews

TATER Access Reviews showing review campaigns with approval status

Conduct periodic access reviews to ensure users have appropriate access levels across your organization's systems.

Review Campaigns

  1. Navigate to Access Reviews and click New Review
  2. Define the scope: which systems, roles, or user groups to review
  3. Assign reviewers (typically managers or system owners)
  4. Set the review deadline
  5. Activate the campaign to begin the review process

Review Process

  • Reviewers receive notifications with a list of users to review
  • For each user, the reviewer can: Approve (keep access), Revoke (remove access), or Flag (escalate for further review)
  • Reviewers can add comments explaining their decisions
  • Bulk actions allow approving or revoking multiple users at once

Review Reports

  • Completion rate tracking per reviewer
  • Summary of approved, revoked, and flagged access
  • Audit trail of all review decisions with timestamps
  • Overdue reviews highlighted for escalation

Change Control

The Change Control module enforces a structured approval workflow before high-impact configuration changes are applied to your environment — providing a documented audit trail for every modification.

How It Works

  • Automatic routing by impact: Low and Medium impact changes are auto-approved and logged immediately. High and Critical impact changes enter a Pending state and require OrgAdmin approval.
  • Scan-detected changes: When a new scan result differs from the previous scan for a control, TATER automatically creates a change request of type scan-detected — giving you an audit record without manual entry.
  • Manual change requests: Users can log planned changes (type manual) before making changes, providing a pre-authorization paper trail.
  • MCP integration: The list_pending_changes and create_change_request MCP tools allow AI agents to query pending changes and log new ones as part of automated workflows.

Approving and Rejecting Changes

  • OrgAdmin+ users see an Approve and Reject button on each pending change request
  • Approval requires an optional Approval Note explaining the decision
  • Approved changes record the approver's name, OID, and timestamp
  • Rejected changes are closed with the rejection reason visible in the audit log

Change Request Fields

FieldDescription
Control IDThe TATER control this change is associated with (e.g., ENT_001)
DescriptionWhat is changing and why (minimum 10 characters)
ImpactLow, Medium, High, or Critical — determines auto-approval vs. manual review
Typemanual (user-initiated) or scan-detected (automatic from scan comparison)
StatusPending, Approved, Rejected, or Auto-Approved

CSV Export

All change requests can be exported to CSV for SOC 2, ISO 27001, or internal audit evidence. The export includes all fields, approval timestamps, and approver details.

Custom Control Frameworks

TATER's framework builder lets you define completely custom compliance frameworks alongside the built-in CIS, NIST, ISO, and SCUBA frameworks — enabling organizations to encode internal policy requirements, customer commitments, or proprietary standards into the same compliance engine.

Framework Builder

  • Navigate to Governance & Risk → Custom Frameworks to open the builder
  • Define domains (e.g., Identity, Data Protection, Network) as top-level groupings
  • Add custom control definitions within each domain with threshold logic in the V2 threshold engine
  • Map custom controls to standard frameworks (CIS, NIST 800-53, ISO 27001) for cross-framework gap analysis

Import / Export

  • Export a custom framework as JSON for backup or distribution to other organizations
  • Import a JSON framework package — useful for MSPs distributing a standard client framework across managed accounts
  • Imported frameworks appear in the same framework list as built-in frameworks

Custom Control Definitions

Each custom control supports the same threshold types as the V2 engine:

  • Boolean: Pass/fail based on a true/false value
  • Compare: Numeric comparison (greater than, less than, equal to)
  • Includes / Excludes: Check whether a value appears in a list
  • Count: Evaluate the count of items against a threshold
  • Regex: Pattern matching against string values
  • Composite: Combine multiple thresholds with AND/OR logic

Regulatory Change Management

See the dedicated Regulatory Change Management guide for full documentation on tracking framework updates, assessing impact on your controls, and managing the transition to new requirements.

In brief, this module lets you:

  • Curate a feed of regulatory and framework updates (CIS benchmark revisions, NIST updates, new CISA SCuBA baselines)
  • Tag each change as New Requirement, Updated Requirement, Retired Requirement, or Clarification
  • Set Effective Dates and track compliance deadlines on the GRC Calendar
  • Link affected controls to the change record for gap analysis

Auditor Portal

The Auditor Portal provides time-limited, read-only access to compliance evidence packages for external auditors — without requiring auditors to have a TATER account.

Access Tokens

  • Generate access tokens from Administration → Audit Management → Auditor Portal
  • Each token is scoped to a specific framework (e.g., SOC 2, ISO 27001) and expires after a configurable period (1–90 days)
  • Tokens can be revoked at any time before expiry
  • Access events are logged (timestamp, IP address) for your audit trail

What Auditors See

  • Framework compliance summary and control-by-control status for the scoped framework
  • Evidence comments attached to each control (added via the AI Analyst or manually)
  • Risk acceptances and overrides with justification text
  • Policy documents in the Policy Library (with Published status)
  • Your organization branding (logo, company name)

Audit Snapshots

Point-in-time snapshots capture compliance state at a specific moment — useful for year-end audits or regulatory submission deadlines. Snapshots are immutable records that preserve the compliance posture at the time of generation even as future scans change the live state.