Compliance

Accelerate compliance processes

Optimize compliance processes and enforcement quickly to stay ahead of evolving standards and regulatory requirements.

Fetch vulnerabilities in SecurityScorecard and add to Drata

This Story leverages SecurityScorecard's ASI to find vulnerabilities and assets within your domain address. The results of this will create evidence needed to show auditors in Drata that the vulnerability management control has been met.

How it works

Instantly import stories to your tenant where you can adapt them to meet your unique business requirements.

Explore
Import
Adapt

Gather & enrich evidence between Analyst1, Sublime Security, and Drata

This Story will identify the threat actors and controls that are most closely aligned with your chosen sector. It will then create a Sublime Security Rule from the information gathered in Analyst1. Finally, all the Sublime Security rules will be uploaded as evidence to Drata.

Check mailboxes for external autoforward rules and filters in Google Workspace

Uncover Google Workspace user mailboxes with autoforwarding enabled or forward filters set to unapproved email addresses or domains.

Tools

Google

Freshly baked

Latest stories

See more →

Submit your story

We’d love to hear your ideas or see what you’ve created.

An illustration of a tines Storyboard

Sign up for our Community Edition

Sign up free