

With Cyber Maturity Risk and Security Audit Application,
- The real maturity level is seen in audit and evaluation studies.
- Inventory management can be provided.
- criticality assessment can be made.
- technical evaluation can be made.
It is aimed to evaluate and improve the cyber security maturity of public and private sector information technology infrastructures.
Frequently Asked Questions
In the query application, you can add all your assets in addition to information security assets and define attributes of any type (number, text, date, etc.) you want. You can also version your assets and monitor their changes.
It is done by evaluating the answers given to the survey questions prepared for the asset or asset groups and calculating the values of the attributes (confidentiality, integrity, etc.) connected to the question lists.
It is to evaluate assets or asset groups according to standards such as BİG Guide or ISO 27001 or specially defined compliance lists and measure their maturity levels.
It is the control of the configuration of the entities on the network through customized scripts after their credentials are defined.
Yes, you can manage all BİG Guide processes via Query and even download the reports that need to be uploaded to BİGDES as a result of the audit.