Your data doesn't train Genie's AI
You keep IP ownership of your information
1. Executive Summary: High-level overview of the assessment, key findings, and critical recommendations
2. Assessment Overview: Scope, objectives, methodology, and timeframe of the security assessment
3. Assessment Team: Details of the assessment team members, their qualifications, and roles
4. Methodology: Detailed explanation of the assessment approach, tools used, and testing procedures
5. Findings Summary: Overview of all identified vulnerabilities and risks, categorized by severity
6. Risk Assessment: Analysis of identified risks, including likelihood and impact ratings
7. Compliance Status: Evaluation against relevant New Zealand security standards and regulatory requirements
8. Recommendations: Detailed remediation steps and security improvements, prioritized by importance
9. Conclusion: Overall security posture summary and next steps
1. Business Impact Analysis: Detailed analysis of how identified vulnerabilities could impact business operations - include when assessment covers critical business systems
2. Privacy Impact Assessment: Specific section analyzing privacy implications - include when personal data is involved
3. Cloud Security Assessment: Detailed evaluation of cloud service security - include when cloud services are in scope
4. Third-Party Risk Assessment: Analysis of security risks from third-party vendors - include when vendor systems are involved
5. Incident Response Capability: Assessment of incident response procedures - include when incident response is in scope
6. Physical Security Assessment: Evaluation of physical security controls - include when physical security is in scope
1. Appendix A: Technical Findings: Detailed technical information about each vulnerability, including proof of concept
2. Appendix B: Testing Evidence: Screenshots, logs, and other evidence supporting the findings
3. Appendix C: Scan Results: Raw output from security scanning tools used during the assessment
4. Appendix D: Assessment Scope Details: Detailed list of all systems, applications, and infrastructure included in the assessment
5. Appendix E: Risk Rating Methodology: Detailed explanation of how risk ratings were determined
6. Appendix F: Compliance Requirements: Detailed mapping of findings against specific compliance requirements
7. Appendix G: Remediation Roadmap: Detailed timeline and steps for implementing recommendations
Threat
Risk
Impact
Likelihood
Control
Mitigation
Assessment Scope
Assets
Confidentiality
Integrity
Availability
Personal Information
Critical Systems
Security Incident
Penetration Testing
Vulnerability Assessment
Security Control
Compensating Control
Risk Rating
Severity Level
Remediation
Authentication
Authorization
Access Control
Audit Trail
Data Breach
Encryption
Network Security
Security Perimeter
Third-Party Risk
Cloud Services
Compliance Requirements
Security Framework
Test Environment
Production Environment
Security Policy
Acceptable Risk
Security Architecture
Information Asset
Security Baseline
Risk Appetite
Technical Vulnerability
Business Impact
Root Cause
Security Event
Threat Actor
Security Zone
Privileged Access
Security Patch
Assessment Methodology
Risk Classification
Technical Findings
Compliance Status
Privacy Compliance
Data Protection
Vulnerability Assessment
Security Controls
Risk Management
Access Control
Network Security
Application Security
Infrastructure Security
Cloud Security
Physical Security
Incident Response
Business Continuity
Disaster Recovery
Third-Party Risk
Regulatory Compliance
Technical Vulnerabilities
Security Recommendations
Remediation Planning
Implementation Timeline
Security Testing
Authentication Controls
Data Handling
System Configuration
Security Architecture
Security Governance
Risk Assessment
Threat Analysis
Financial Services
Healthcare
Government
Technology
Telecommunications
Education
Retail
Manufacturing
Energy
Transportation
Professional Services
Critical Infrastructure
Information Security
IT Operations
Risk Management
Compliance
Legal
Internal Audit
Infrastructure
Security Operations Center
Privacy
Executive Leadership
Project Management
Quality Assurance
Chief Information Security Officer
IT Security Manager
Risk Manager
Compliance Officer
Security Analyst
Systems Administrator
Network Engineer
Privacy Officer
Chief Technology Officer
IT Director
Security Consultant
Penetration Tester
Information Security Analyst
Audit Manager
Chief Risk Officer
Security Operations Manager
Find the exact document you need
Village Hall Risk Assessment
A New Zealand-compliant risk assessment template for village halls and community facilities, outlining safety procedures and hazard management strategies.
Workstation Risk Assessment
A comprehensive workstation risk assessment document aligned with New Zealand workplace safety regulations, designed to evaluate and improve workstation ergonomics and safety.
Safety Task Assessment
A New Zealand-compliant document for assessing and controlling task-specific workplace safety risks under the Health and Safety at Work Act 2015.
Security Risk Assessment Report
A detailed security evaluation document compliant with New Zealand regulations that assesses organizational security risks and provides improvement recommendations.
Risk Assessment Report Of A Company
A detailed risk evaluation document compliant with New Zealand regulations that identifies, analyzes, and provides mitigation strategies for company-wide risks.
Risk Assessment Questionnaire For Banks
A structured risk assessment tool for New Zealand banks to evaluate and document their risk profile in compliance with RBNZ requirements.
Risk Assessment Letter
A formal document under New Zealand law that outlines identified risks, their potential impacts, and recommended mitigation strategies in compliance with local health and safety regulations.
Risk Assessment For Software Development
A comprehensive risk assessment document for software development projects, aligned with New Zealand legislation and industry standards.
Rapid Risk Assessment
A structured risk assessment document compliant with New Zealand health and safety regulations, designed for swift identification and evaluation of workplace hazards.
Psychological Risk Assessment
A structured assessment document for evaluating and managing workplace psychological risks under New Zealand health and safety legislation.
Plant And Equipment Risk Assessment
A comprehensive safety assessment document for plant and equipment required under New Zealand health and safety legislation, evaluating hazards, risks, and control measures.
Mobile Plant Risk Assessment
A New Zealand-compliant risk assessment document for evaluating and controlling safety risks associated with mobile plant operations, aligned with the Health and Safety at Work Act 2015.
Matter Risk Assessment Form
A New Zealand-compliant risk assessment tool for evaluating and documenting potential risks associated with new legal matters or professional engagements.
Hot Works Risk Assessment
A New Zealand-compliant safety assessment document for managing risks associated with works involving heat, flames, or sparks.
Hazard Assessment Form
A New Zealand-compliant workplace safety document for systematic hazard identification, risk assessment, and control measure implementation.
Equipment Risk Assessment
A regulatory-compliant assessment document for identifying and managing equipment-related risks in New Zealand workplaces under the Health and Safety at Work Act 2015.
Cyber Security Risk Assessment Matrix
A structured framework for assessing and managing cyber security risks, designed specifically for New Zealand organizations in compliance with local privacy and security regulations.
Compressed Air Risk Assessment
A New Zealand-compliant risk assessment document for evaluating and managing safety risks associated with industrial compressed air systems under NZ Health and Safety regulations.
Anti Bribery Risk Assessment
A structured evaluation of organizational bribery risks and control measures under New Zealand law, providing risk assessment and compliance recommendations.
Risk Control Assessment
A New Zealand-compliant document for identifying, analyzing, and establishing control measures for organizational risks, aligned with local Health and Safety regulations.
Personal Security Risk Assessment
A New Zealand-compliant document that evaluates personal security risks and provides recommendations for protective measures and risk mitigation strategies.
Patient Manual Handling Risk Assessment
A New Zealand-compliant risk assessment framework for evaluating and managing patient manual handling risks in healthcare settings.
Latex Risk Assessment
A comprehensive latex risk assessment framework for New Zealand workplaces, aligned with local health and safety legislation and hazardous substance regulations.
Baseline Risk Assessment For Electrical Work
A New Zealand-compliant risk assessment template for electrical work safety, incorporating local regulatory requirements and industry standards.
Stairs Risk Assessment
A New Zealand-compliant assessment document for identifying and managing risks associated with stairs in buildings, aligned with local health and safety regulations.
Broad Brush Risk Assessment
A comprehensive risk assessment document compliant with New Zealand health and safety legislation, used to identify and evaluate organizational hazards and risks.
Agricultural Risk Assessment
A New Zealand-compliant risk assessment document identifying and analyzing agricultural operation hazards, providing mitigation strategies and compliance measures under NZ legislation.
Fundraising Risk Assessment
A risk assessment document for fundraising activities in New Zealand, providing comprehensive risk evaluation and mitigation strategies while ensuring compliance with local regulations.
Demolition Risk Assessment
A New Zealand-compliant risk assessment document outlining safety measures and controls required for demolition operations under NZ health and safety regulations.
Cafe Risk Assessment
A New Zealand-compliant risk assessment document for identifying and managing safety hazards in cafe operations.
Excavator Risk Assessment
A New Zealand-compliant risk assessment document for excavator operations, addressing safety requirements and hazard controls under NZ health and safety regulations.
Return To Work Risk Assessment
A New Zealand-compliant risk assessment document for managing an employee's safe return to work following absence, aligned with NZ Health and Safety legislation and ACC requirements.
Building Security Risk Assessment
A detailed evaluation of building security risks and recommendations for improvements, compliant with New Zealand regulations and building codes.
Executive Summary Risk Assessment
A strategic overview of organizational risks and mitigation strategies, prepared in accordance with New Zealand regulatory requirements and corporate governance standards.
Project Assessment Matrix
A comprehensive project evaluation tool tailored for New Zealand's regulatory environment, used to assess and score projects against predetermined criteria.
Supplier Security Assessment Questionnaire
A New Zealand-compliant security assessment tool for evaluating supplier security controls and data protection practices under local privacy and security regulations.
Modern Slavery Risk Assessment
A structured framework for assessing modern slavery risks in operations and supply chains under New Zealand law and international standards.
Vulnerability Assessment Matrix
A structured framework for assessing and prioritizing security vulnerabilities in organizational systems, compliant with New Zealand privacy and security regulations.
Hospitality Risk Assessment
A New Zealand-compliant risk assessment framework for hospitality venues, addressing operational safety and regulatory requirements.
Hazard Identification Form
A New Zealand-compliant workplace hazard identification and risk assessment form for systematic hazard management and safety control.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it


.png)
.png)