Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Cyber Security Assessment Form
"Need a Cyber Security Assessment Form for our Singapore-based fintech startup that's preparing for MAS licensing, with specific focus on cloud security controls and third-party vendor assessments, to be implemented by March 2025."
1. Organization Information: Basic details about the organization being assessed, including contact information, business nature, and size
2. Scope of Assessment: Clear definition of systems, networks, and assets to be assessed, including boundaries and exclusions
3. Risk Assessment Matrix: Framework for evaluating identified risks, including likelihood and impact criteria
4. Security Controls Assessment: Evaluation of existing security measures across technical, organizational, and physical controls
5. Compliance Requirements: Checklist of regulatory compliance requirements under Singapore's Cybersecurity Act and PDPA
1. Cloud Security Assessment: Detailed evaluation of cloud service security measures, including data sovereignty and access controls
2. IoT Security Assessment: Specialized assessment for Internet of Things devices and infrastructure security
3. Third-party Vendor Assessment: Security evaluation of vendors and partners, including data handling practices and compliance status
4. Financial Sector Requirements: Additional assessment criteria specific to financial institutions under MAS guidelines
5. Critical Infrastructure Assessment: Special considerations for organizations designated as Critical Information Infrastructure (CII)
1. Technical Security Controls Checklist: Comprehensive checklist covering technical security measures, configurations, and best practices
2. Asset Inventory: Detailed inventory of all IT assets within scope, including hardware, software, and data assets
3. Vulnerability Assessment Results: Technical findings from vulnerability scans, including severity ratings and recommendations
4. Risk Treatment Plan: Detailed action plan for addressing identified risks, including timelines and responsibilities
5. Regulatory Compliance Matrix: Mapping of assessment findings against relevant Singapore regulatory requirements
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.