Compliance

Simplify the way you enforce compliance

Rapidly achieve and maintain organizational compliance with standards and regulations.

Fetch vulnerabilities in SecurityScorecard and add to Drata

This Story leverages SecurityScorecard's ASI to find vulnerabilities and assets within your domain address. The results of this will create evidence needed to show auditors in Drata that the vulnerability management control has been met.

How it works

Instantly import stories to your tenant where you can adapt them to meet your unique business requirements.

Explore
Import
Adapt

Gather & enrich evidence between Analyst1, Sublime Security, and Drata

This Story will identify the threat actors and controls that are most closely aligned with your chosen sector. It will then create a Sublime Security Rule from the information gathered in Analyst1. Finally, all the Sublime Security rules will be uploaded as evidence to Drata.

Freshly baked

Latest stories

See more →

Check mailboxes for external autoforward rules and filters in Google Workspace

Uncover Google Workspace user mailboxes with autoforwarding enabled or forward filters set to unapproved email addresses or domains.

Tools

Google

Submit your story

We’d love to hear your ideas or see what you’ve created.

An illustration of a tines Storyboard

Sign up for our Community Edition

Sign up free