Total Tasks

48

5 since last month

Overdue Tasks

7

2 since last week

Due This Week

12

25% of total tasks

Completed Tasks

156

Last 30 days

Task Name Framework Reference Assignee Due Date Priority Status Actions
Update Access Control Policy
Review and update the access control policy to align with current business requirements and security best practices.
PR.AC-1
John Smith John Smith
Apr 15, 2025 High In Progress
Conduct Vulnerability Assessment
Perform quarterly vulnerability assessment of all critical systems and document findings.
ID.RA-1
Michael Chen Michael Chen
Apr 20, 2025 Medium Not Started
Review Information Security Policy
Annual review of the information security policy to ensure it remains appropriate and effective.
A.5.2
Lisa Rodriguez Lisa Rodriguez
May 10, 2025 High Not Started
Backup Verification Test
Conduct monthly verification of backup integrity and restoration capabilities.
A.8.13
Robert Johnson Robert Johnson
Apr 30, 2025 Medium In Progress
Security Awareness Training
Conduct quarterly security awareness training for all employees.
Recurring (Quarterly)
PR.AT-1 A.6.3
Sarah Johnson Sarah Johnson
Jun 15, 2025 High Not Started
Review Incident Response Plan
Annual review and update of the incident response plan.
Recurring (Annual)
RS.RP-1 A.5.26
John Smith John Smith
Jul 20, 2025 High Not Started

April 2025

Sun
Mon
Tue
Wed
Thu
Fri
Sat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Update Access Control Policy
16
17
18
19
20
Conduct Vulnerability Assessment
21
22
23
24
25
26
27
28
29
30
Backup Verification Test
1
2
3

Week view is not implemented in this demo.

Day view is not implemented in this demo.

Overdue
Upcoming
Completed

Compliance Routines

Manage recurring compliance activities organized by frequency and framework requirements.

Daily Routines

3 Routines
Security Log Review
NIST CSF

Review security logs for suspicious activities and potential security incidents.

DE.CM-1, DE.CM-3
Security Analyst
30 minutes
Backup Status Check
ISO 27001

Verify successful completion of daily backups and check for any errors.

A.8.13
IT Operations
15 minutes

Weekly Routines

4 Routines
Vulnerability Scan
NIST CSF

Conduct weekly vulnerability scans of critical systems and review results.

ID.RA-1, DE.CM-8
Security Engineer
2 hours
Access Review
ISO 27001

Review access changes and privileged account activities from the past week.

A.5.15, A.5.16
Security Manager
1 hour

Monthly Routines

5 Routines
Backup Verification Test
NIST & ISO

Perform a full restoration test of critical system backups to verify recoverability.

PR.IP-4, A.8.13
IT Operations
4 hours
Compliance Metrics Review
NIST & ISO

Review compliance metrics and KPIs, identify trends, and report to management.

GV.MT-1, Clause 9.1
Compliance Manager
3 hours

Quarterly Routines

3 Routines
Security Awareness Training
NIST & ISO

Conduct quarterly security awareness training for all employees.

PR.AT-1, A.6.3
Security Manager
8 hours

Annual Routines

6 Routines
Risk Assessment
NIST & ISO

Conduct comprehensive risk assessment of information systems and business processes.

ID.RA, Clause 6.1
Risk Manager
2 weeks
Business Continuity Test
NIST & ISO

Conduct annual test of business continuity and disaster recovery plans.

RC.RP-1, A.11.2
BC/DR Coordinator
3 days

Task Templates

Standardized task templates for common compliance activities.

Access Control Policy Review

NIST CSF

Review and update the access control policy to align with current business requirements and security best practices.

PR.AC-1
Estimated: 8 hours

Vulnerability Assessment

NIST CSF

Conduct vulnerability assessment of systems and applications to identify security weaknesses.

ID.RA-1
Estimated: 16 hours

Information Security Policy Review

ISO 27001

Annual review of the information security policy to ensure it remains appropriate and effective.

A.5.2
Estimated: 8 hours

Backup Verification Test

ISO 27001

Verify backup integrity and restoration capabilities through testing.

A.8.13
Estimated: 4 hours

Internal Security Audit

NIST & ISO

Conduct internal security audit to assess compliance with security policies and standards.

GV.MT-1, Clause 9.2
Estimated: 40 hours

Compliance Gap Assessment

NIST & ISO

Identify gaps between current security practices and compliance requirements.

Multiple Controls
Estimated: 24 hours