Your data doesn't train Genie's AI
You keep IP ownership of your information
1. Organization Details: Basic information about the organization being assessed, including contact information, industry sector, and size of operations
2. Assessment Scope: Detailed outline of what systems, processes, and areas are included in the security assessment
3. Infrastructure Overview: Documentation of current IT infrastructure, including hardware, software, and network architecture
4. Security Controls Assessment: Evaluation of existing security controls across different domains (physical, technical, administrative)
5. Data Protection Measures: Assessment of how personal and sensitive data is protected, stored, and processed
6. Access Control Systems: Review of user access management, authentication methods, and privilege controls
7. Incident Response Capabilities: Evaluation of incident detection, response procedures, and recovery plans
8. Compliance Status: Assessment of compliance with relevant regulatory requirements and industry standards
9. Risk Assessment: Identification and evaluation of cybersecurity risks and vulnerabilities
10. Findings Summary: Overview of key findings, vulnerabilities, and areas of concern
11. Recommendations: Prioritized list of recommended security improvements and remediation steps
1. Cloud Security Assessment: Detailed evaluation of cloud service security measures, required if organization uses cloud services
2. Mobile Device Security: Assessment of mobile device management and security, needed if organization has BYOD or mobile device programs
3. Third-Party Risk Assessment: Evaluation of security risks related to third-party vendors and partners, required if organization relies on external service providers
4. Critical Infrastructure Requirements: Additional assessment criteria for organizations classified as critical infrastructure under Australian law
5. Industry-Specific Compliance: Additional compliance requirements for specific industries (e.g., healthcare, financial services)
6. Remote Work Security: Assessment of security measures for remote work environments, needed if organization supports remote work
7. IoT Device Security: Evaluation of IoT device security measures, required if organization uses IoT devices
8. Development Security Practices: Assessment of secure development practices, needed if organization develops software internally
1. Technical Vulnerability Assessment Results: Detailed results of technical vulnerability scans and penetration testing
2. Asset Inventory: Comprehensive list of IT assets included in the assessment scope
3. Security Control Matrix: Detailed mapping of security controls against various compliance requirements
4. Risk Register: Detailed documentation of identified risks, their severity, and mitigation status
5. Incident Response Procedures: Detailed procedures for handling different types of security incidents
6. Network Architecture Diagrams: Detailed network diagrams showing security controls and data flows
7. Action Plan Template: Template for documenting and tracking remediation actions
8. Compliance Evidence Register: Register of evidence collected to demonstrate compliance with various requirements
Assessment Provider
Assessment Scope
Asset
Audit Trail
Authentication
Authorization
Business Impact
Confidential Information
Critical Infrastructure
Cyber Attack
Cyber Incident
Cyber Risk
Data Breach
Data Classification
Data Controller
Data Processor
Encryption
Essential Eight
Firewall
Incident Response
Information Asset
Information Security Event
Information System
Malware
Material Risk
Mitigation Controls
Network Security
Personal Information
Physical Security
Privacy Impact Assessment
Privileged Access
Recovery Point Objective
Recovery Time Objective
Remediation
Risk Assessment
Risk Register
Risk Treatment
Security Controls
Security Incident
Sensitive Data
System Owner
Threat Actor
Third Party
Vulnerability
Vulnerability Assessment
Confidentiality
Data Protection
Access Rights
Security Controls
Risk Assessment
Compliance Requirements
Incident Response
Reporting Requirements
Technical Requirements
Privacy Protection
Information Security
Asset Management
Vulnerability Management
Third Party Access
Business Continuity
Disaster Recovery
Access Control
Authentication Requirements
System Monitoring
Data Classification
Security Testing
Documentation Requirements
Personnel Security
Physical Security
Network Security
Cloud Security
Mobile Device Security
Change Management
Audit Requirements
Financial Services
Healthcare
Government
Critical Infrastructure
Technology
Telecommunications
Energy
Defense
Education
Retail
Manufacturing
Professional Services
Transport and Logistics
Mining and Resources
Information Security
IT Operations
Risk Management
Compliance
Legal
Internal Audit
Infrastructure
Security Operations Center
Data Protection
IT Governance
Executive Leadership
Digital Operations
Network Operations
Chief Information Security Officer (CISO)
IT Security Manager
Compliance Manager
Risk Manager
Information Security Analyst
Security Auditor
IT Director
Chief Technology Officer (CTO)
Security Consultant
Privacy Officer
IT Governance Manager
Cybersecurity Specialist
Systems Administrator
Network Security Engineer
Data Protection Officer
Chief Risk Officer
IT Compliance Analyst
Security Operations Manager
Find the exact document you need
Risk Assessment Aged Care
An Australian-compliant Risk Assessment Template for aged care facilities, designed to identify and manage risks while meeting regulatory requirements.
Home Oxygen Safety Risk Assessment Form
An Australian-compliant safety assessment form for evaluating risks and documenting safety measures for patients receiving home oxygen therapy.
Pregnant Risk Assessment
An Australian-compliant template for assessing and managing workplace risks for pregnant employees, aligned with WHS legislation.
Worksite Assessment
An Australian-compliant template for conducting and documenting systematic workplace safety assessments under WHS legislation.
Site Visit Risk Assessment
An Australian-compliant template for conducting comprehensive site visit risk assessments in accordance with WHS legislation and industry standards.
Risk Self Assessment
An Australian-compliant Risk Self Assessment Template for systematic identification and management of organizational risks, aligned with WHS legislation and ISO 31000 guidelines.
Risk Assessment Social Care
An Australian-compliant Risk Assessment Template for social care providers, enabling systematic risk identification and management while meeting regulatory requirements.
Risk Assessment Log
An Australian-compliant Risk Assessment Log Template for systematic identification, evaluation, and management of workplace risks.
Risk And Control Assessment
An Australian-compliant template for systematic risk and control assessment, aligned with local regulatory requirements and corporate governance standards.
Program Risk Assessment
An Australian-compliant template for systematic program risk assessment, incorporating regulatory requirements and best practices for comprehensive risk management.
Pharmacy Risk Assessment
An Australian-compliant risk assessment template for pharmacies, covering operational, clinical, and safety risks under federal and state regulations.
Personal Training Risk Assessment
An Australian-compliant risk assessment template for personal training services, aligned with national Work Health and Safety legislation and fitness industry standards.
Organisational Risk Assessment
An Australian-compliant template for conducting comprehensive organizational risk assessments, aligned with national legislation and standards.
Makeup Artist Risk Assessment
An Australian-compliant risk assessment template for makeup artists, covering comprehensive safety and hygiene protocols in accordance with WHS regulations.
Gate Risk Assessment Form
An Australian-compliant safety assessment document for evaluating and managing risks associated with gate installations and operations in workplace settings.
Forestry Risk Assessment
An Australian-compliant risk assessment template for forestry operations, covering environmental, safety, and operational risks under federal and state legislation.
Electronic Signature Risk Assessment
A risk assessment framework for electronic signature implementation in compliance with Australian electronic transaction laws and regulations.
Electrical Equipment Risk Assessment
An Australian-compliant template for conducting risk assessments of electrical equipment, aligned with WHS and Electrical Safety regulations.
Dance Risk Assessment
An Australian-compliant risk assessment template for dance activities, aligned with WHS legislation and industry standards.
Care Plan Risk Assessment
An Australian-compliant template for healthcare providers to assess and document client care risks, ensuring comprehensive risk management and regulatory compliance.
Risk Assessment Childcare
An Australian-compliant risk assessment template for childcare facilities, designed to identify and manage risks while meeting national regulatory requirements.
Smoking Risk Assessment
An Australian-compliant template for assessing and managing workplace smoking-related risks, aligned with federal and state WHS requirements.
Service User Risk Assessment
An Australian-compliant template for assessing and managing risks associated with individual service users in healthcare and social service settings.
Service Provider Risk Assessment
An Australian-compliant template for systematic assessment of service provider risks, incorporating local regulatory requirements and risk management frameworks.
Job Hazard Assessment Form
An Australian-compliant workplace hazard assessment template for systematic identification and control of workplace safety risks under WHS legislation.
Ppe Risk Assessment
An Australian-compliant risk assessment document that evaluates workplace hazards and establishes comprehensive PPE requirements and protocols.
Participant Risk Assessment
An Australian-compliant template for assessing and documenting participant-related risks in service delivery contexts.
Machine Guarding Assessment
An Australian-compliant template for assessing machine guarding systems and safety controls in accordance with WHS legislation and relevant standards.
New And Expectant Mothers Risk Assessment
An Australian workplace risk assessment template for protecting new and expectant mothers, ensuring compliance with WHS legislation and anti-discrimination laws.
Bar Risk Assessment
An Australian-compliant risk assessment template for bar operations, covering all essential safety and operational risk aspects under federal and state regulations.
Threat Vulnerability Assessment
An Australian-compliant template for conducting comprehensive threat and vulnerability assessments of organizational information systems and infrastructure.
Machine Guarding Risk Assessment
An Australian-compliant template for assessing machine guarding risks and safety requirements in accordance with WHS regulations and AS 4024 standards.
Field Level Hazard Assessment
An Australian-compliant template for conducting and documenting systematic hazard assessments in field-based work environments.
Home Visit Risk Assessment
An Australian-compliant risk assessment template for healthcare and community service providers conducting home visits, ensuring WHS compliance and safe service delivery.
Domiciliary Care Risk Assessment
An Australian-compliant template for assessing and managing risks in home care service delivery.
Pre Job Hazard Assessment
An Australian-compliant Pre Job Hazard Assessment Template for systematic identification and control of workplace hazards before task commencement.
Formal Hazard Assessment
An Australian-compliant template for systematic workplace hazard assessment and risk control documentation.
Application Security Risk Assessment
An Australian-compliant template for conducting comprehensive application security risk assessments, aligned with local privacy and data protection requirements.
Risk Assessment Security
An Australian-compliant security risk assessment template providing a structured framework for identifying and managing security risks across organizations.
High Level Risk Assessment
An Australian-compliant template for conducting comprehensive high-level risk assessments across various business operations and projects.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it


.png)
.png)