Security resources & reference packs.

A library of diagrams, checklists and templates you can adapt to your own security program and documentation.

How to use
Start from a template, then adjust for your environment.
Use visuals to align security, product and infra teams.
Integrate into your runbooks and playbooks.

Incident readiness checklist

A concise list covering people, process and technology for incident readiness.

  • Notification paths and contact lists.
  • Log retention and visibility requirements.
  • Runbook ownership and review cadence.

Zero trust reference map

A high-level view of identities, devices, networks and services in a zero trust model.

  • Helps align architecture and security teams.
  • Supports communication with leadership.
  • Forms the base for deeper threat modeling.

After-action report outline

A structure for capturing lessons learned from incidents and major drills.

  • Timeline, decisions and outcomes.
  • Root causes and contributing factors.
  • Follow-up actions and owners.

Curated bundles for common scenarios

Download-ready combinations of diagrams, checklists and templates for typical security projects.

Incident Starter Pack

  • Response roles & contact tree
  • First 24 hours runbook
  • Post-incident review template
IR SOC

Executive Briefing Kit

  • One-page risk overview
  • Zero trust reference slide
  • Top 10 metrics to track
C-level Board

Security Awareness Pack

  • Phishing simulation script
  • Security 101 slide deck outline
  • Printable quick-reference card
Training Awareness

Pick a path and follow the steps

Use these sequences as a guided tour through the resources depending on the maturity of your program.

Path 01 — Early Stage
  • Start with incident readiness checklist
  • Add basic zero trust reference map
  • Adopt after-action report outline
Path 02 — Growing Program
  • Use executive briefing kit for stakeholders
  • Roll out awareness pack to staff
  • Connect outputs into playbooks