ESC
Platform Info Quick Start Support

Welcome to amara

This help center guides you through everything amara can do -- whether you're logging in for the first time or fine-tuning your compliance program.

What is amara?

amara stands for Asset Management And Risk Assessment. It's an enterprise GRC (Governance, Risk & Compliance) platform that runs on your own infrastructure. The built-in AI assistant, Ask amara, lets you query your compliance data in plain English -- and your data never leaves your network.

Three things that make amara different

1. A unified GRC hub -- Assets, risks, suppliers, compliance, training, and documents in one database. Fill in one piece of data and it enriches everything else.

2. Your private AI co-pilot -- Ask amara runs a local AI model on your hardware. Ask "What are my top 10 risks?" and get real data back in seconds. No cloud APIs, no data leakage.

3. German-engineered data sovereignty -- On-premise or in German data centres. Air-gap capable. Built for NIS2, ISO 27001, and BSI C5 from day one.

Where should I start?

That depends on your role:

If you are...Start here
Brand new to amaraQuick Start (5 Steps) -- your first 30 minutes
A CISO or security leadRisk Management -- see the heatmap and treatment workflows
A compliance officerNIS2 Compliance -- check if you're in scope
An IT asset managerAsset Management -- register and classify assets
An admin setting up the platformOrganisation Setup -- fill in company details first
Curious about the AIAsk amara -- try asking it a question

The journey from data to intelligence

amara works in three stages. Each builds on the last:

amara Platform Module Overview

amara at a glance: core modules, tech stack, and deployment options

1

Foundational Intelligence: "What do we need to protect?"

Register your assets and suppliers. Create a single source of truth -- no more spreadsheet chaos.

2

Contextual Intelligence: "How critical is it?"

Score assets with CIA ratings. Run compliance assessments. Create risks linked to assets. Now you know what threatens you.

3

Amplified Intelligence: "What should we do about it?"

Ask amara cross-module questions. Generate board reports. Export audit evidence packages. Your data works for you.

Compliance Score Trend (12 Months)

What does amara replace?

The old wayWith amara
Spreadsheets for risk trackingVisual 4x4 heatmap with treatment tracking
EUR 800-1,500/day consultants writing policies44 templates, ~1,500 fields -- AI generates in minutes
40 hours of audit preparationOne-click evidence export in 40 seconds
GRC data in US cloud APIsEverything on your infrastructure, local AI
4 separate assessments for 4 frameworksOne assessment feeds ISO, NIS2, DORA, BSI C5
No link between assets, risks, suppliersSingle database -- every piece of data enriches the rest
Competitive Comparison Matrix

amara vs OneTrust, Vanta, ServiceNow: on-premise, local AI, NIS2-native at a fraction of cost

How everything connects

amara uses a single database (48 tables, 89 relationships between them). Register an asset and it's instantly available in risk management, supplier linking, compliance assessments, and AI queries. One assessment simultaneously satisfies ISO 27001, NIS2, DORA, and BSI C5.

Explore the modules

Think of amara's modules like different tools for different jobs. You wouldn't use a hammer to check your smoke alarm -- and you wouldn't use your risk register to manage supplier contracts. Here's what each module does in plain English:

ModuleWhat it does (in one sentence)Think of it like...
Asset ManagementRegister everything your business depends on -- servers, software, data, facilitiesA home inventory for your IT
Risk ManagementIdentify what could go wrong, score how bad it would be, and track your responseInsurance planning + prevention
Rapid AssessmentQuick 60-minute security health check across 10 domainsA blood pressure reading
ISO 27001Score your security against 93 international controls, generate the SoAA full physical exam
NIS2 ComplianceCheck if EU cybersecurity law applies to you, and how compliant you areBuilding code inspection
BSI C5German cloud security standard -- 17 criteria groups for cloud providersSpecialist certification
Supplier ManagementVet, approve, and monitor every vendor that touches your systemsBackground checks for contractors
Document DialogGenerate professional security policies from 44 templates using AIAn employee handbook generator
ISP GeneratorAuto-generate your complete 49-file Information Security PolicyYour security constitution
Training University20 role-based security courses with quizzes and signed certificatesFire safety drills, but for cyber
Ask amaraAsk your compliance data questions in plain English, get real answersA consultant who knows your data
ReportingOne-click board reports, audit evidence packages, compliance dashboardsYour CFO's monthly reports, but for security
Admin PanelUsers, roles, settings, backups, audit trailThe control room

How Modules Connect

This is what makes amara different from a collection of separate tools: everything lives in one database. When you register an asset, it automatically becomes available in risk assessments, supplier links, compliance checks, and AI queries. Here's how the modules build on each other.

Why does this matter to you?

Here's the problem with most GRC tools: they're collections of separate apps stitched together. Your asset list lives in one place, your risk register in another, your compliance scores in a third. When you update an asset's criticality, nothing else changes. You end up copy-pasting data between spreadsheets, manually checking that everything matches, and hoping nothing falls out of sync.

Think of it like a hospital where the X-ray department, the blood lab, and the pharmacy all use separate systems that don't talk to each other. Every time you visit a new specialist, you fill out the same forms again. That's what most GRC platforms feel like.

amara works differently. All 13 modules share one database (48 tables, 89 relationships). When you register a server and score it as "critical," that information automatically flows into risk scoring (higher impact), supplier mapping (which vendors touch this critical server?), compliance assessments (which ISO controls apply?), and AI queries ("tell me about our critical assets"). You enter the data once, and it works everywhere.

The practical benefit? Less duplicate work, fewer errors, and a complete picture instead of fragments. When your auditor asks "which critical assets have unresolved risks from unapproved suppliers?" -- that's a question that crosses three modules. In amara, Ask amara answers it in seconds. In a siloed tool, you'd spend hours cross-referencing spreadsheets.

Cross-Module Data Architecture

PostgreSQL core: 48 tables, 89 cross-module links, 8 connected modules with cross-module data sharing

The Data Flow

Layer 1 -- Foundation
Admin & RBAC
14 roles, audit trail
↓ ↓ ↓
Layer 2 -- Core Data
Asset Management
5 categories, CIA
Supplier Mgmt
34 fields, 8 factors
↓ ↓ ↓
Layer 3 -- Assessment & Analysis
Risk Management
4x4 heatmap
Rapid Assessment
160Q, 10 domains
ISO 27001
93 controls
NIS2
Art. 21, 40Q
BSI C5
17 criteria groups
↓ ↓ ↓
Layer 4 -- Evidence & Output
Document Dialog
44 templates
ISP Generator
49 files
Training
20 courses
Ask amara
33 DB functions
Reporting
28 templates

Key data flows

When you do this...It automatically enriches...
Register an asset with CIA scoresRisk impact pre-populated, ISO control mapping, supplier dependency
Score a supplier's criticalityAsset protection class, risk register, NIS2 Art. 21(d) evidence
Run a risk assessmentCompliance gap list, remediation roadmap, reporting dashboards
Complete an ISO 27001 assessmentSoA auto-generated, NIS2 cross-mapped, evidence package
Approve a policy documentAdded to RAG for Ask amara, compliance evidence, review cycle set
Complete a training courseNIS2 Art. 20 evidence, certificate signed, admin analytics

The shared evidence principle

One effort, four frameworks

A single risk assessment simultaneously satisfies ISO 27001 Clause 6.1, NIS2 Art. 21/1, DORA Art. 6, and BSI C5 Domain 2. amara maps it for you.

Multi-Framework Compliance Efficiency

One assessment effort covers ISO 27001, NIS2, DORA, BSI C5 simultaneously

Recommended build order

  1. Admin setup (org settings, users, RBAC)
  2. Asset inventory (register, CIA classify)
  3. Rapid Assessment (baseline posture)
  4. Supplier register (vendor onboarding)
  5. Risk register (link to assets)
  6. ISO 27001 / NIS2 assessment
  7. Document generation (policies)
  8. ISP skeleton (49 files)
  9. Training assignment
  10. Reporting & evidence packages

Platform at a Glance

This page gives you the bird's-eye view -- what amara includes, how it's built, and what makes it different from the dozens of GRC tools you've probably already looked at.

The short version

amara is a GRC platform with 13 integrated modules that all share one database. You register your assets, score your risks, run compliance assessments, generate policy documents, train your team, and manage your suppliers -- all in one place. The built-in AI lets you query everything in natural language. The entire platform runs on your infrastructure (or in German data centres), so your compliance data never leaves your control.

It was built by GRC domain experts with 20+ years of consulting experience. That deep domain expertise is baked into every module, template, and workflow.

What Makes amara Different

Pillar 1: A Unified GRC Hub

48 tables, 89 relationships between them, single PostgreSQL database. No data silos, no ETL, no sync issues. Every module reads and writes to the same source of truth.

Pillar 2: Your Private AI Co-Pilot

33 database functions for exact answers. Semantic search with vector embeddings for document retrieval. Local LLM inference -- data never leaves your infrastructure.

Pillar 3: German-Engineered Data Sovereignty

Hosted in certified German data centres. GDPR-compliant by architecture. BSI C5 compatible. Full air-gap deployment supported.

Cost Savings Comparison

First-year savings of EUR 59,000-124,000 compared to traditional GRC platforms

What Comes Ready on Day One

49
ISP Files
44
Document Templates
20
Training Courses
13
Integrated Modules

Pricing and Modularity

Deployment Pricing Tiers

Managed SaaS from EUR 1,500/mo, On-Premise from EUR 600/mo, custom Appliance pricing

Start with Asset + Risk

You don't need to activate all 13 modules at once. Start with Asset Management and Risk Management, then expand as your GRC program matures.

Data Flow Explained

Most GRC tools keep data in silos -- your asset list doesn't talk to your risk register, your compliance scores don't feed your reports. In amara, every piece of data you enter flows forward and enriches everything downstream. This page explains how.

Why does data flow matter?

Imagine you're building a house. The architect draws blueprints, the electrician runs wiring, the plumber lays pipes, and the inspector checks everything at the end. If those four people work in isolation -- never sharing plans -- the electrician drills through a water pipe, the plumber blocks a doorway, and the inspector finds problems that should have been caught months earlier.

That's exactly what happens when your GRC data lives in separate tools. You register an asset in one spreadsheet, score risks in another, track compliance in a third, and manage suppliers in a fourth. When someone asks "which of our critical assets have the highest risks from suppliers who are overdue for review?" -- you spend a day cross-referencing four documents and still aren't sure you caught everything.

Data flow is the answer. In amara, when you register a server and rate its confidentiality as "Critical (4)," that score doesn't just sit in the asset register. It flows forward: the risk module picks it up as the default impact score when you create a risk for that server. The compliance module knows which ISO controls apply based on the asset type. The supplier module shows which vendors touch that critical server. And Ask amara can answer questions that span all of these connections instantly.

The result: you enter data once, and it enriches everything else automatically. No copy-pasting, no manual cross-referencing, no stale data in forgotten spreadsheets. This page shows you exactly how that flow works, stage by stage.

How is this page different from Module Map?

The Module Map shows you which modules connect to each other -- a structural view. This page explains how data moves between them -- the flow. Think of the Module Map as the org chart and this page as the process diagram.

Assessment-to-Risk Data Flow

Asset management feeds CIA assessment and assessments hub; both feed risk management with inherited scores

The Three Stages of Intelligence

Stage 1: Foundational Intelligence

Assets and suppliers form the base layer. You need to know what you're protecting and who has access before anything else makes sense.

Stage 2: Contextual Intelligence

Risks, compliance assessments, and CIA scores add context. The system knows not just what you have, but how important it is and what threatens it.

Stage 3: Amplified Intelligence

Ask amara, reporting, and evidence packages combine everything into actionable output -- answers to auditor questions, board reports, and remediation roadmaps.

Primary Data Flows

Asset → CIA → Criticality

Protection Class = MAX(Confidentiality, Integrity, Availability). A server scored C:3, I:4, A:2 gets Protection Class = Critical (4).

Asset → Risk (Impact Score)

When you create a risk linked to an asset, the impact field is pre-populated from the asset's CIA-derived criticality.

Supplier → Asset (Approval Gate)

Only Phase 3-approved suppliers can be linked to assets. This is enforced at the database level.

NIS2 Assessment → Compliance Score

Your NIS2 compliance percentage is a live-calculated view across all 40 Article 21 questions.

ISO 27001 → SoA

The Statement of Applicability is auto-generated from your ISO 27001 assessment scores.

Training → Compliance Evidence

Each completed course generates a SHA-256 signed certificate that feeds NIS2 Art. 20 and ISO 27001 Control 6.3 evidence.

Single Database Architecture

48 tables, 89 enforced relationships. No data synchronisation pipelines, no sync jobs, no eventual consistency issues. When you update an asset's CIA score, every linked risk and compliance record reflects it immediately.

Technical Architecture

For technical teams who want to understand what's under the hood. amara runs as a set of Docker containers on your infrastructure -- a Flask backend, PostgreSQL database, local AI model, vector store, and nginx reverse proxy. Nothing phones home. This page covers the full stack, security layers, and resource requirements.

MCP Architecture Overview

Full architecture: MCP integrations (Azure, Jira, Confluence, Kali) → amara GRC → Ask amara Pro → Local LLM inference → MCP server outbound

Stack Overview

LayerTechnologyPurpose
FrontendJinja2 + Bootstrap 5Server-rendered UI, SPA-like navigation
BackendFlask / Python 3.1111 modules, RBAC, OAuth2/PKCE
DatabasePostgreSQL 1648 tables, JSONB, audit trail
AI ModelLocal LLMPrimary inference, on-premise
EmbeddingsLocal embedding modelVector representations for RAG
Vector StoreLocal vector databaseSemantic search, document retrieval
Reverse ProxyNginxTLS 1.3, mTLS termination, rate limiting
ContainerisationDocker Compose5 services, blue/green deployment

8-Layer Security Architecture

Defense-in-Depth Security Layers

8 security layers: Network firewall → HTTPS/TLS → mTLS gateway → Host hardening → Docker isolation → RBAC → Data layer

Three-Factor Authentication

Three-Factor Authentication Flow

Factor 1: mTLS certificate (FIPS 140-3 hardware token) + Factor 2: Password (PBKDF2) + Factor 3: TOTP/MFA

AI Architecture

Ask amara Pro Pipeline

5-stage pipeline: Compliance Gate → Smart Router → Privacy Shield → LLM Inference → Audit Log

Resource Requirements

DeploymentRAMCPUStorageNetwork
Without AI4 GB2 cores20 GBOutbound only for setup
With AI (CPU)16 GB4 cores40 GBOutbound only for setup
With AI + GPU32 GB4 cores + GPU80 GBOutbound only for setup
Hardware Recommendation

Intel NUC, Mac Mini Pro, or entry-level rack server. 16 GB RAM and 4 cores handle most deployments comfortably.

Deployment Options

amara runs wherever you need it: a mini server under your desk, a rack in your data centre, a cloud VM, or a fully air-gapped appliance with zero internet. Same codebase, same features, same security -- the only difference is where it sits.

Deployment Pricing Tiers

Managed SaaS (EUR 1,500/mo) | On-Premise (EUR 600/mo) | Appliance (custom) -- same codebase, all features

Deployment Profiles

ProfileHardwareBest ForSetup Time
Mac MiniM4 Pro, 24 GB RAMSmall teams, PoC30 minutes
Rack Server16+ cores, 64 GBEnterprise, full AI2 hours
Cloud VMGerman cloud providerManaged SaaS5 minutes
Air-GapAny, pre-loadedClassified environments4 hours

Docker Compose Architecture

Docker Compose Production Stack

5 containers: nginx (reverse proxy) → flask-app (11 modules) → postgresql + chromadb + local LLM

Five services in the compose stack:

Network Requirements

Outbound only during initial setup (Docker Hub, Hugging Face model download). After setup, amara operates fully offline.

TLS / HTTPS Configuration

TLS 1.3 only. Self-signed certificates via step-ca or bring your own. mTLS optional via FIPS 140-3 hardware tokens.

Backup Strategy

Daily automated backups at 03:00. pg_dump with AES-256 GPG encryption. 750+ snapshots retained. Point-in-time recovery supported.

Get it Running in 30 Minutes

For most deployments, docker-compose up -d and a quick org settings configuration is all you need.

Quick Start -- 5 Steps to First Value

New to amara? This guide walks you through your first session -- from login to your first AI query. You'll have real data in the system within 30 minutes.

5-Day Go-Live Timeline

Monday Deploy → Tuesday Configure → Wed-Thu Populate → Friday Go-Live

Before you start

You need a user account with at least one RBAC role assigned. If you don't have one yet, ask your admin -- they'll set you up in Users & Roles.

1

Log in and look around

When you log in, you'll see the dashboard -- a dark-themed interface with six module cards (Asset Management, Assessments, Risk Management, NIS2 Compliance, Supplier Management, Training) and two charts showing Module Usage and Task Completion. The left sidebar is your command centre: main modules at the top, Quick Access shortcuts in the middle (for creating new items directly), and Resources at the bottom (Admin Panel, ISP, Ask amara, Document Dialog). Take 2 minutes to click through the sidebar. You can switch between English and German using the EN | DE toggle in the top-right corner.

2

Register your first asset

Click Asset Management in the sidebar. You'll see six category cards (Hardware, Software, Data, Services, Facilities, View All). Click the blue "+ Add New Asset" button in the top-right corner. Start simple -- pick a server or application you know well. Give it a name, choose its category, assign yourself as owner, and set the CIA scores (1-4 for each: Confidentiality, Integrity, Availability). Don't overthink the scores -- you can always adjust later. You can also use Quick Access → New Asset in the sidebar to get there faster.

3

Run a Rapid Assessment

Go to Assessments → Rapid Assessment and click Start New Assessment. You'll answer 16 yes/partial/no questions across 10 security domains. It takes about 15 minutes. When you're done, you'll get a score with a colour-coded domain heatmap showing where you're strong and where you have gaps.

4

Create your first risk

Navigate to Risk Management → New Risk. Give it a descriptive title (e.g., "Unpatched production server"). Set the Likelihood (1-4, how likely is this?) and Impact (1-4, how bad if it happens?). The score is calculated automatically: Likelihood x Impact = Risk Score (1-16). Link it to the asset you just created -- you'll notice the impact field pre-populates from your CIA scores.

5

Ask amara a question

Open Ask amara from the sidebar. Type a question in natural language -- try these:
"How many assets do we have?" (instant database answer)
"What are my top risks?" (sorted by score)
"What is our NIS2 compliance score?" (live compliance data)
The AI queries your actual data -- these aren't generic answers, they're real numbers from your system.

What's next?

Check the 1-Week Go-Live Plan for a structured path from Docker pull to audit-ready.

Your First Login

Here's what you'll see when you log in for the first time, and how to find your way around. amara has a dark-themed interface -- everything is designed so you can find what you need without clicking through endless menus.

The Dashboard Layout

The interface has three main areas:

Left Sidebar -- your command centre

The sidebar is divided into three sections:

The sidebar collapses to a narrow icon strip if you need more screen space.

Top Bar

The amara logo on the left, a search icon, a language toggle (EN | DE) to switch the interface between English and German, and your user profile on the right.

Main Content Area

The dashboard shows six feature cards in a 3x2 grid -- one for each core module (Asset Management, Assessments, Risk Management, NIS2 Compliance, Supplier Management, Training). Each card has a description and a "+ Module" button. Below, two charts: Module Usage (donut) and Task Completion (line chart tracking progress over time).

Navigation tips

amara is a single-page application -- pages load without full refreshes. A breadcrumb trail at the top (e.g., "Home / Asset Management / Hardware Assets") shows where you are and lets you navigate back. Use the sidebar for module-level navigation, Quick Access for creating new items, and breadcrumbs for going up within a module.

Quick Access is your shortcut

The "Quick Access" section in the sidebar lets you jump directly to creating a new asset, assessment, risk, or supplier without navigating into the module first. If you know what you want to create, use Quick Access.

First Action

Go to Admin → Organisation Settings and fill in your company details. This data powers NIS2 relevance checks, document templates, and Ask amara.

Organisation Setup

Before you do anything else in amara, fill in your organisation details. This isn't just a formality -- these settings power the NIS2 relevance checker, populate your policy documents, and give Ask amara the context it needs to answer company-specific questions.

Required Fields (Do These First)

FieldWhy It MattersExample
Company NameAppears on all documents, reports, certificatesMustermann GmbH
Industry SectorNIS2 relevance engine, risk contextHealthcare / IT Services
Employee CountNIS2 size threshold (50/250)180
Annual RevenueNIS2 threshold (EUR 10M/50M)EUR 25M
Balance SheetNIS2 threshold (EUR 10M/43M)EUR 18M
CountryRegulatory jurisdictionGermany
DPO ContactGDPR compliance, document templatesdpo@mustermann.de
CISO ContactRisk ownership, incident responseciso@mustermann.de

After Setup: What Changes

Don't Skip This Step

Many features depend on org settings. Incomplete settings = incomplete documents, inaccurate NIS2 scoring, and generic AI answers.

Users & 14 RBAC Roles

Not everyone in your organisation needs access to everything. A compliance officer doesn't need to manage backups, and a regular employee doesn't need to see the risk register. amara uses 14 roles to control who can see and do what -- and you can stack multiple roles on a single user.

RBAC Role Reference

14 boolean role columns: from Super Admin to Standard User, each mapped to typical job titles

Creating a user account

Required fields: email, full name, department, role assignments (check the relevant boolean flags), and language preference.

The 14 RBAC roles

RoleCodeTypical Job Title
Super Adminrole_adminIT Director, CTO
Read Onlyrole_read_onlyAuditor, Board Member
Asset Managementrole_asset_mgmtIT Asset Manager
Supplier Due Diligencerole_supplier_dueProcurement, Vendor Manager
NIS2 Compliancerole_nis2_complianceCompliance Officer
Assessments (General)role_assessmentsSecurity Analyst
Assessments (ISO)role_assessments_isoISMS Manager
Assessments (CIA)role_assessments_ciaRisk Analyst
Assessments (C5)role_assessments_c5Cloud Security Specialist
Risk Assessmentrole_risk_assessmentRisk Manager
Document Dialogrole_document_dialogPolicy Author, ISMS Manager
Rapid Assessmentrole_assessments_rapidSecurity Analyst
Trainingrole_trainingAny Employee
Training Adminrole_training_adminHR Manager, CISO
Role stacking

A CISO typically stacks 6+ roles: admin, risk, NIS2, ISO, document dialog, and training admin. Roles are additive -- more flags = more access.

Deactivating a user

Never delete users -- deactivate them instead. Reassign all ownerships (assets, risks, suppliers) before deactivation. The audit trail preserves all actions by deactivated users.

1-Week Go-Live Plan

Most GRC implementations take months. amara is designed to get you from "we just installed this" to "we have a working ISMS" in 5 business days. Here's the day-by-day plan that's been tested and refined.

5-Day Go-Live Timeline

Day-by-day onboarding: Deploy → Configure → Populate → Assess → Go Live

Monday
Deploy

Platform Setup (~30 min)

docker-compose up -d. SSL certificate configured. Super Admin account created. Organisation settings filled in. 3-5 pilot users created with RBAC roles.

Deliverable: Platform live and accessible.

Tuesday
Configure

Users & Calibration (~30 min)

Create remaining user accounts. Calibrate risk matrix thresholds. Configure notification settings. Set up asset categories.

Deliverable: All users have accounts and roles.

Wed-Thu
Populate

Data Entry (~4h admin deep-dive)

CSV import assets. Assign CIA scores. Register top 10 suppliers. Generate ISP 49-file skeleton. Run first NIS2 relevance check.

Deliverable: Asset inventory and suppliers populated.

Thursday
Assess

Risk & Compliance

Run Rapid Assessment. Create 5-10 initial risks linked to assets. Assign treatment plans. Launch first training courses.

Deliverable: Initial risk register and baseline compliance score.

Friday
Go Live

Production Launch

Start ISO/NIS2 assessment. Generate 3-5 policy documents. Create executive risk report. Brief management team. Dashboards go live for all users.

Deliverable: Platform in full production use.

12-Week Onboarding Roadmap

Extended 12-week roadmap: Foundation (1-3) → Compliance (4-8) → Remediate (5-10) → Certify (11-12)

Free implementation support

The amara 1-Week ISMS/GRC Accelerator includes a dedicated engineer to guide you through setup. Contact accelerator@askamara.de.

Asset Management -- Overview

You can't protect what you don't know you have. Asset Management is where your GRC journey starts -- register every server, application, database, and service your organisation depends on, then classify how critical each one is.

What you'll see

When you click Asset Management in the left sidebar, you'll land on a dashboard with six category cards arranged in a grid: Hardware Assets, Software Assets, Data Assets, Services, Facilities, and View All Assets. Each card has a brief description and a button to view that category. In the top-right corner, you'll see two buttons: "View All Assets" (shows everything in a sortable table) and "+ Add New Asset" (opens the registration form).

Below the cards, two charts give you instant visibility: an Asset Distribution donut chart (breakdown by category) and an Asset Health Status bar chart. Click into any category to see a filterable, sortable table with columns for name, category, owner, criticality level (colour-coded badge), and status.

Why do I need Asset Management?

Think of Asset Management like a home inventory. If your house burned down, could you list everything you owned for the insurance company? Most people can't. It's the same with IT: most organisations can't tell you exactly what hardware, software, and data they have, who's responsible for it, or how critical it is.

That's a problem because:

Real-world example

A mid-size company had 200+ servers in their data centre. When asked "which ones hold customer data?", the IT team couldn't answer confidently. After registering everything in amara with CIA scores, they discovered 12 servers with critical customer data that had no backup and no assigned owner. That's the kind of blind spot Asset Management eliminates.

How to register your first asset

Let's walk through registering a real asset -- say your production database server:

1

Click + New Asset

This opens the asset registration form with 4 sections and 23 fields. Don't worry -- most fields are optional. Focus on the essentials first.

2

Fill in the basics

Asset Name: "Production Database Server" (be descriptive -- you'll search for this later)
Category: Hardware (HW)
Status: Active
Description: "Main PostgreSQL server hosting customer data and financial records"

3

Assign ownership

Asset Owner: The person accountable for this asset (e.g., your DBA lead)
Department: IT Operations
The owner will be notified for annual reviews and CIA sign-offs.

4

Score the CIA dimensions

This is the most important part. For each dimension, pick 1-4:
Confidentiality: 4 (Critical) -- contains customer PII
Integrity: 4 (Critical) -- financial transactions must be accurate
Availability: 3 (High) -- 4-hour RTO maximum
The Protection Class is auto-calculated as the highest of the three: Critical (4).

5

Save

Click Save. Your asset is now live in the system. It's immediately available in the risk module (to link risks), supplier module (to map vendor dependencies), and Ask amara (you can ask "tell me about the production database server").

Start small, expand later

You don't need to register every asset on day one. Start with your 10-20 most critical assets. You can always add more later, and you can bulk-import via CSV.

5
Asset Categories
23
Fields per Asset
5
Status Values
5
AI Query Functions
Asset Management Deep-Dive

4-step workflow: Register → CIA Classify → Link (risks, suppliers, ISO) → Review

Assets by Category
Assets by Criticality

The 5 asset categories

CodeCategoryWhat belongs hereExamples
HWHardwarePhysical devicesServers, laptops, firewalls, switches
SWSoftwareApplications, licensesERP, CRM, OS licenses, SaaS tools
DATADataInformation assetsCustomer DB, financial records, IP
SVCServicesIT services, cloudEmail, DNS, cloud hosting, backups
FACFacilitiesPhysical locationsData centre, office, server room

Asset status lifecycle

StatusMeaningRisk assessments required?
ActiveIn production, fully managedYes, mandatory
InactivePowered off / standbyRecommended
UnknownStatus not yet determinedFlag for review
MaintenanceUnder maintenance / upgradeYes, for residual risks
RetiredDecommissionedNo, audit trail preserved

How Asset Management connects to other modules

Assets aren't isolated records -- they're the foundation that makes everything else in amara smarter:

The golden rule

Fill in Asset Management first. Every other module in amara becomes more useful when it has assets to work with. Without assets, your risks have no context, your compliance assessments have no scope, and your AI has nothing to query.

Registering an Asset

Here's how to add an asset to amara, step by step. The form has 23 fields but most are optional -- you can start with just a name, category, and owner, then fill in details later.

Asset Management Lifecycle

Four phases: Discover (manual/CSV/Azure) → Classify (CIA, owner) → Protect (risks, controls) → Review (annual recertification)

How to create an asset

1

Navigate to Asset Management → New Asset

2

Section 1: Identification

This is the "what is it?" section. Fill in:

  • Asset Name -- be descriptive and searchable. "Production Database Server - PostgreSQL" is better than "Server 1." You'll search for this name later, and so will your auditor.
  • Asset ID -- auto-generated by amara (e.g., AST-HW-0042). You don't need to set this.
  • Category -- choose from HW (Hardware), SW (Software), DATA (Data Assets), SVC (Services), or FAC (Facilities). Not sure? Ask yourself: "Is this a physical thing I can touch?" (HW/FAC), "Is this a program or licence?" (SW), "Is this information stored somewhere?" (DATA), or "Is this something a provider delivers to us?" (SVC).
  • Sub-category -- optional, helps with filtering. For a server, you might pick "Database Server." For software, "SaaS Application."
  • Description -- write 1-2 sentences explaining what this asset does and why it matters. Think: "If someone found this record a year from now, would they understand what this asset is?"
  • Status -- set to Active for anything in production. Use "Unknown" if you've discovered it but haven't classified it yet.
3

Section 2: Ownership

Every asset needs someone accountable. This isn't optional bureaucracy -- when a risk is identified or a review is due, amara needs to know who to notify.

  • Asset Owner -- the person who is accountable for this asset. Not necessarily the person who uses it daily, but the person who would answer to management if something went wrong. For a database server, this is often the Head of IT or DBA Lead. For a SaaS tool, it might be the department head who purchased it.
  • Custodian -- the person who manages it day-to-day (often the sysadmin or team lead). The custodian handles updates, patches, and backups. The owner makes decisions about budget and risk acceptance.
  • Department -- which team uses or manages this asset. Helps with filtering and reporting.
  • Location -- physical location (e.g., "Frankfurt Data Centre, Rack B12") or "Cloud - AWS eu-central-1." Auditors always ask where assets are located.
Common mistake

Don't set the IT team as owner of everything. The business owner (the person who depends on this asset to do their job) should be the owner. IT is typically the custodian.

4

Section 3: CIA Classification

This is the most important part of asset registration -- it determines how much protection this asset gets. For each dimension, ask yourself a simple question and score 1-4:

  • Confidentiality (1-4) -- "What happens if an unauthorised person sees this?" Score 1 if it's public info (your marketing website). Score 4 if it's trade secrets or patient medical records.
  • Integrity (1-4) -- "What happens if someone changes this without permission?" Score 1 for a draft blog post. Score 4 for financial transaction records or safety system configurations.
  • Availability (1-4) -- "What happens if this goes offline?" Score 1 for an archive nobody accesses. Score 4 for payment processing or emergency systems.

Protection Class is auto-calculated as MAX(C, I, A). So a server scored C:3, I:4, A:2 gets Protection Class = Critical (4). This score flows directly into risk management -- when you create a risk linked to this asset, the impact field will default to 4.

See CIA Classification for a detailed scoring guide with examples for each level.

5

Section 4: Financial & Lifecycle

These fields are optional but valuable for audit and budgeting:

  • Purchase Date -- when was it acquired? Helps track asset age and plan replacements.
  • Purchase Cost -- original price. Useful for insurance claims and budget planning.
  • Current Value -- depreciated value. Your finance team will appreciate having this in one place.
  • End of Life Date -- when does the vendor stop supporting it? amara will flag assets approaching end-of-life so you can plan replacements before they become security risks. An unsupported Windows Server, for example, is an immediate risk.
  • Warranty Expiry -- when does the warranty run out? After this date, hardware failures come out of your budget, not the vendor's.
Skip it for now?

If you're doing a quick initial registration, it's fine to leave these blank and come back later. The critical fields are in Sections 1-3.

6

Link to suppliers and save

If a vendor supports this asset (e.g., your cloud hosting provider for a SaaS tool), you can link them here. Only Phase 3-approved suppliers appear in the dropdown -- this is enforced at the database level so you can't accidentally link an unvetted vendor to a critical asset.

After saving, three things happen automatically: the asset appears in the risk picker (so you can link risks to it), the ISO Annex A mapping updates based on the asset category, and the asset's CIA score feeds into risk impact calculations for any linked risks.

CIA Classification

Not every asset is equally important. Your public website and your customer database need very different levels of protection. CIA classification helps you figure out which is which -- so you're not wasting resources protecting low-value assets while leaving critical ones exposed.

What is CIA?

CIA stands for three questions you ask about every asset:

You score each dimension from 1 (low) to 4 (critical). The highest score becomes the asset's Protection Class -- this drives which security controls apply, what risk impact score it inherits, and how much attention it deserves.

CIA Assessment 4-Phase Approval

4-phase approval: Data Entry → Asset Owner Review → Cyber Security Review → Risk Owner Approval (42 fields total)

The CIA triad

DimensionQuestion it answersExample of score 4
ConfidentialityWhat if unauthorised people see this?Patient medical records, trade secrets
IntegrityWhat if this data is altered?Financial transactions, safety systems
AvailabilityWhat if this is unavailable?Emergency services, payment processing

Scoring guide

ScoreLevelC exampleI exampleA example
1LowPublic website contentDraft notesArchive (weekly access OK)
2StandardInternal handbookEmployee directoryEmail (hours downtime OK)
3HighCustomer PIIFinancial reportsERP (minutes downtime)
4CriticalTrade secretsSafety system configEmergency systems (zero downtime)

Protection class calculation

Protection Class = MAX(Confidentiality, Integrity, Availability)

Highest CIAProtection ClassRequired controls
1LowBasic access control
2StandardStandard security baseline
3HighEnhanced encryption, MFA, audit logging
4CriticalFull security stack, mTLS, real-time monitoring
Common mistake

Don't score everything as 4/4/4. Over-classification wastes resources and makes your security program unmanageable. Score honestly based on actual business impact.

Asset Lifecycle

An asset isn't a "set it and forget it" record. It moves through a lifecycle: you discover it, classify how critical it is, link it to risks and controls, and review it annually. amara tracks each phase so nothing gets stale.

Asset Management Lifecycle

Discover → Classify (CIA + owner) → Protect (risks, controls, ISO) → Review (annual recertification)

The four lifecycle phases

Think of the asset lifecycle like onboarding a new employee. First you discover they exist (someone sends a CV). Then you classify their role and skills (interviews, assessments). Then you protect the relationship (contracts, access cards, training). And every year you review whether things are still working (performance review). Assets follow the same pattern.

Phase 1: Discover -- "What do we actually have?"

This is where most organisations get their first surprise. You start registering assets and realise there are servers nobody knew about, SaaS tools someone signed up for with a credit card, or legacy systems that "someone" manages. The discovery phase is about getting everything into one place. You can register assets manually, bulk-import from a CSV (great if you already have an Excel list), or sync from Azure via MCP integration.

At this stage, it's fine if the records are incomplete. A name, a category, and an initial owner are enough to start. You'll fill in the details in the next phase.

Phase 2: Classify -- "How critical is it?"

Now you add depth. The asset owner completes the CIA scoring (Confidentiality, Integrity, Availability -- each scored 1-4). This goes through a 4-phase approval: the person entering data, the asset owner reviewing it, the security team validating it, and the risk owner signing off. That might sound like a lot of steps, but it prevents one person from under-classifying a critical asset. A 42-field CIA form captures everything an auditor would ask about.

Phase 3: Protect -- "What are we doing about it?"

Here's where the asset starts earning its keep. You link risks to it (the impact score auto-populates from the CIA classification). You map suppliers to it (which vendors support this asset?). amara auto-maps relevant ISO 27001 Annex A controls based on the asset category -- a database server gets different controls than a physical facility. If you're running vulnerability scans with Kali, the asset's network details define the scan scope.

Phase 4: Review -- "Is everything still current?"

Assets aren't static. Servers get upgraded, owners change jobs, vendors go bankrupt, and what was "low criticality" last year might be "critical" today because you started storing customer data on it. The annual review is your chance to catch these changes. amara sends automatic reminders 60 days and 30 days before the review is due. If the asset is no longer needed, you decommission it (unlink risks, unlink suppliers, change status to Retired).

PhaseStatusKey actionsamara feature
DiscoverNew / UnknownRegister asset, assign category, initial ownerManual entry, CSV import, Azure MCP sync
ClassifyActiveCIA scoring, owner sign-off, dependency mapping42-field CIA form, 4-phase approval
ProtectActiveLink to risks, assign controls, supplier mappingAuto ISO Annex A mapping, Kali scan scope
ReviewActive / RetiredAnnual recertification, owner sign-off12-month reminders, decommission workflow

Annual asset review workflow

1

Receive review reminder

60-day and 30-day advance notifications to asset owner.

2

Verify all fields

Check CIA scores, owner, location, supplier links. Update where needed.

3

Sign off

Owner confirms asset data is current. Audit trail records the sign-off.

4

If decommissioning

Unlink risks and suppliers, change status to Retired, create decommission record.

Import & Export

Already have an asset list in a spreadsheet? Good -- you don't need to re-type everything. amara supports CSV import so you can bulk-load your existing inventory. And when auditors or management need data out of amara, you can export anything as PDF, CSV, or JSON.

How to import assets from a spreadsheet

1

Prepare your CSV file

Open your existing asset list in Excel or Google Sheets. Make sure the columns match amara's expected format (see table below). Save as CSV.

2

Navigate to Admin Panel → Import

Click Import in the Admin Panel. Select "Asset Import" and upload your CSV file.

3

Review the preview

amara shows you a preview of what will be imported. Check for errors (missing required fields, invalid categories, unknown owner emails). Fix any issues in your CSV and re-upload if needed.

4

Confirm and import

Click Import. Each row becomes an asset record. You can then add CIA scores and supplier links to each asset individually.

Required CSV Columns

ColumnTypeExample
nameStringProduction Database Server
categoryEnumHW / SW / DATA / SVC / FAC
statusEnumActive / Inactive / Unknown
owner_emailEmailjohn@company.de
criticality1-43

Exporting Data

Data TypeFormatsIncludes
Asset RegisterPDF, CSV, JSONAll 23 fields, CIA scores, linked risks
Risk RegisterPDF, CSV, JSONAll risks, scores, treatment status
Supplier RegisterPDF, CSVAll 34 fields, criticality, approval status
NIS2 AssessmentPDF, CSVAll 40 questions, scores, gaps
ISO 27001 SoAPDF93 controls, maturity, exclusions
Training RecordsPDF, CSVCertificates, quiz scores, completion
Audit LogJSON, PDF, CSVAll actions, timestamps, user IDs

Asset Module -- Module Connections

Assets aren't isolated records -- they're the glue that connects your entire GRC program. When you register an asset, it becomes instantly queryable by the risk module, supplier module, compliance assessments, and AI. Here's exactly what connects to what.

Assessment-to-Risk Data Flow

Assets feed into CIA assessment and compliance assessments; both feed risk management with inherited impact scores

Assets → Risks

  • CIA-derived impact pre-populates risk scoring
  • Risk treatments linked to specific assets
  • Residual risk tracked per asset

Assets → Suppliers

  • Supplier approval required before asset linking
  • Supplier criticality inherits from asset CIA
  • Decommission requires supplier unlinking

Assets → Compliance

  • ISO 27001 Annex A auto-mapped from asset type
  • NIS2 scope driven by asset criticality
  • BSI C5 cloud service classification

Assets → Ask amara

  • 5 dedicated asset query functions
  • "How many critical assets?" -- instant answer
  • RAG-powered asset context in complex queries

Risk Management -- Overview

This is where you turn "we should probably worry about that" into a measurable, tracked, and auditable risk item. Every risk gets a score, an owner, a treatment plan, and a deadline -- and you can prove it all to an auditor.

What you'll see

When you click Risk Management in the sidebar, you'll see a dashboard with seven workflow cards: Process Guide, Risk Identification, Risk Assessment, Risk Treatment, Risk Acceptance, Risk Register, and Risk Monitoring. Each card represents a step in the risk lifecycle -- click any to dive in. In the top-right corner, "+ New Risk Assessment" lets you create a new risk immediately.

Below the cards, two charts give you a real-time overview: Risk Distribution by Category (donut chart showing the split between Cyber, Operational, Strategic, Reputational, Legal) and Top Risk Areas (horizontal bar chart ranking your biggest risk areas). The sidebar also expands with sub-items: Process Guide, Risk Identification, Risk Assessment, Risk Treatment, Risk Acceptance, Risk Register, and Risk Monitoring -- so you can navigate directly to any workflow step.

The Risk Register view shows all your risks in a sortable table with columns for title, category, score (1-16), treatment status, and owner. The 4x4 Risk Heatmap (visible in Process Guide and reports) plots every risk by Likelihood x Impact -- red squares in the top-right corner mean critical risks needing immediate escalation.

Why do I need Risk Management?

Think of risk management like car insurance -- except instead of just paying for damage after it happens, you're actively preventing the accidents too. Every business faces threats: hackers, hardware failures, employee mistakes, supplier incidents. The question isn't if something will go wrong, it's when -- and whether you'll be ready.

Risk management helps you:

Real-world example

Imagine your cloud hosting provider goes bankrupt overnight. Without risk management, you're scrambling. With it, you'd already identified "cloud provider dependency" as a risk, scored it Medium (Likelihood: 2, Impact: 4 = Score 8), and your treatment plan includes "maintain tested migration procedure to backup provider." The crisis becomes a planned procedure.

How to create your first risk

Let's create a real risk -- say you've discovered an unpatched server:

1

Click + New Risk

Anyone in your organisation can report a risk -- you don't need to be a Risk Manager. Give it a clear, descriptive title: "Unpatched production server -- known CVE-2024-XXXX"

2

Describe what could happen

In the Description field, explain the risk: what could go wrong, how likely is it, and what's the potential impact. Be specific: "Production database server running PostgreSQL 15.2 with known RCE vulnerability. Patch available but not applied due to change freeze."

3

Choose a category and link assets

Select Cyber as the category. Then link it to the asset you registered earlier -- when you do this, the Impact score is pre-populated from the asset's CIA criticality. A critical asset automatically means a high-impact risk.

4

Score the risk

Set Likelihood: 3 (Likely -- the CVE is publicly known and exploit code exists) and Impact: 4 (Catastrophic -- this server holds customer data). The Risk Score calculates automatically: 3 x 4 = 12 (High). You'll see the risk appear in the orange/red zone of the heatmap.

5

Choose a treatment strategy

Four options: Mitigate (apply the patch -- most common, ~65% of risks), Transfer (e.g., cyber insurance), Avoid (decommission the server), or Accept (document and monitor -- requires board approval for high/critical risks). Assign an owner and set a deadline.

What happens after you save

The risk appears in the register and on the heatmap. The assigned owner gets notified. If you linked it to an asset, the asset's detail page now shows this risk. Treatment deadlines trigger automatic alerts at 14 days, 7 days, 1 day, and on the deadline itself. When treatment is completed and verified, the residual risk is re-scored.

4x4
Risk Matrix
5
Risk Categories
4
Treatment Strategies
3
Workflow Phases
Risk Management Lifecycle

4-step lifecycle: Report (anyone) → Analyse (security team) → Decide (risk owner) → Track (ongoing)

The 5 risk categories

CategoryWhat it coversExamples
CyberDigital threats, vulnerabilitiesRansomware, phishing, unpatched systems
OperationalProcess failures, system outagesBackup failure, key person dependency
StrategicBusiness decisions, market changesVendor lock-in, technology obsolescence
ReputationalBrand, trust, public perceptionData breach disclosure, negative press
LegalRegulatory, contractualGDPR violation, NIS2 non-compliance

The 3-phase risk workflow

PhaseStatusWho actsKey actions
ReportOPENAny userSubmit risk title, category, affected assets, initial impact
AnalyseIN REVIEWSecurity teamScore likelihood x impact, assign owner, select treatment
DecideAPPROVEDRisk ownerApprove treatment, set deadline, assign budget

How Risk Management connects to other modules

Risks don't exist in a vacuum -- they're woven into every other part of amara:

Creating a Risk

Anyone in your organisation can report a risk -- you don't need special permissions or technical knowledge. Just describe what you're worried about, and the security team takes it from there. Here's how the process works from start to finish.

Step 1: Submit a risk (any user)

FieldRequiredNotes
Risk TitleYesClear, descriptive title
DescriptionYesWhat could happen, how, why
CategoryYesCyber / Operational / Strategic / Reputational / Legal
Affected AssetsNoLink to registered assets
Initial ImpactNoPre-populated from asset CIA if linked
EvidenceNoScreenshots, scan results, emails

Step 2: Score the risk (Risk Manager)

The Risk Manager (or security team) takes the submitted risk and scores it. This is where gut feeling becomes a measurable number.

Setting the Likelihood (1-4)

Ask yourself: "How often could this realistically happen?"

Setting the Impact (1-4)

If a risk is linked to an asset, the impact field is pre-populated from the asset's CIA criticality. This is a smart default -- a critical asset automatically means a high-impact risk. You can override it, but think carefully before lowering it.

If there's no linked asset, ask: "If this risk materialises, what's the worst realistic outcome?"

Risk Score = Likelihood x Impact. The result (1-16) lands on the heatmap and determines the urgency of treatment. See 4x4 Heatmap Scoring for the full matrix.

Choosing a treatment strategy

For every risk, pick one of four strategies:

Then assign a treatment owner (who's responsible for executing) and a deadline. amara will send automatic alerts at 14, 7, and 1 day before the deadline.

Step 3: Approve (Risk Owner / CISO)

The Risk Owner or CISO is the final checkpoint before a risk enters the active register. Here's what they review and sign off on:

Once approved, the risk is fully active: it appears on the heatmap, the treatment owner gets notified, deadline alerts are scheduled, and it becomes visible in reports and AI queries.

Accepted risks need extra approval

Risks with treatment strategy "Accept" -- especially those scoring High (10-15) or Critical (16) -- require explicit board-level approval. You can't quietly accept a major risk. The approval decision, the approver's name, and their reasoning are permanently recorded in the audit trail.

4x4 Risk Heatmap Scoring

Every risk in amara gets a score from 1 to 16. The idea is simple: how likely is this to happen, and how bad would it be if it did? Multiply those two numbers and you get a score that tells you exactly how much attention this risk deserves.

How risk scoring works

For each risk, you answer two questions:

Risk Score = Likelihood x Impact. A "Likely" (3) risk with "Major" (3) impact scores 9 (Medium). An "Almost Certain" (4) risk with "Catastrophic" (4) impact scores 16 (Critical -- drop everything and deal with this now).

When you link a risk to an asset, the Impact score is pre-populated from the asset's CIA criticality. A critical asset (CIA = 4) automatically starts with Impact = 4, because losing a critical asset is by definition catastrophic. You can override this, but it's a smart default.

Risk Scoring Matrix

4x4 likelihood vs impact matrix: scores 1-16 colour-coded Low / Medium / High / Critical

Severity Scale Reference

Severity scale: Low (1-4) | Medium (5-9) | High (10-15) | Critical (16)

Risk Distribution

The risk matrix

Minor (1)
Moderate (2)
Major (3)
Catastrophic (4)
Almost Certain (4)
4
8
12
16
Likely (3)
3
6
9
12
Unlikely (2)
2
4
6
8
Rare (1)
1
2
3
4

Score interpretation

ScoreLevelRequired actionApproval needed
1-4LowMonitor, review annuallyRisk Manager
5-9MediumTreatment plan within 90 daysRisk Manager + CISO
10-15HighImmediate treatment planCISO + Management
16CriticalEmergency escalationBoard level

Residual risk

Residual = Inherent - Treatment Effect. After applying controls, re-score the risk. The delta between inherent and residual demonstrates your risk reduction.

Treatment Plans

Identifying a risk is only half the job. The other half is deciding what to do about it and then actually following through. amara tracks four treatment strategies -- mitigate, transfer, avoid, or accept -- from the moment you make the decision through to final verification.

The 4 ways to handle a risk

For every risk, you have exactly four options. There's no fifth -- every risk management framework in the world uses these same four strategies:

The key insight: "do nothing" is not an option. Every risk must have a documented treatment decision with an owner and a deadline. This is what auditors check.

The 4 treatment strategies in detail

StrategyTypical use% of risksExample
MitigateReduce likelihood or impact~65%Patch vulnerability, add MFA
TransferShift risk to third party~15%Cyber insurance, outsource hosting
AvoidEliminate the risk source~10%Discontinue risky service
AcceptAcknowledge and monitor~10%Low-impact legacy system

Treatment lifecycle

StageWho actsamara actions
PlannedRisk OwnerDeadline set, budget allocated, assignee named
In ProgressImplementerCompletion % tracked, evidence uploads
CompletedImplementerFinal evidence attached, residual re-scored
VerifiedRisk OwnerVerification sign-off, risk closed

Deadline alerting

Automatic alerts at 14 days, 7 days, 1 day, and on deadline. Overdue treatments are flagged in red on dashboards and reports.

Risk Module Connections

Risks don't exist in isolation -- they're connected to assets, suppliers, compliance frameworks, and reports. This page shows you exactly how the risk module talks to everything else in amara, so you understand why filling in one module makes every other module smarter.

Assessment-to-Risk Data Flow

One risk simultaneously satisfies ISO 27001, NIS2, DORA, and BSI C5 requirements

What Feeds Into Risks

From Asset Manager (Impact Score)

When you link a risk to an asset, the impact field is pre-populated from the asset's CIA-derived protection class.

From CIA Assessment (Derived Criticality)

The 42-field CIA assessment provides granular criticality that flows into risk impact scoring.

From NIS2 / ISO 27001 Assessments

Compliance gaps are automatically flagged as potential risk items for the risk register.

What Risk Data Feeds Into

Into Reporting

Risk heatmap, treatment burndown, executive summary -- all auto-generated from live data.

Into Evidence Packages

Risk register with treatment status is a mandatory component of ISO 27001 and NIS2 audit packages.

Into Ask amara

7 dedicated risk functions: count risks, list by category, score distribution, overdue treatments, highest risks, risk trends, risk-asset mapping.

Compliance -- Overview

If your organisation needs to comply with NIS2, ISO 27001, BSI C5, or all three -- this is where you manage it. The key insight: one assessment in amara creates evidence that satisfies multiple frameworks simultaneously. No duplicate work.

Why do I need compliance management?

Think of compliance like building codes for cybersecurity. Just as buildings must meet safety standards to protect the people inside, businesses that handle sensitive data or provide essential services must meet cybersecurity standards. The difference? Building code violations get you a fine. Cybersecurity violations under NIS2 can cost you EUR 10 million.

But compliance isn't just about avoiding fines. It's about:

The 5 assessment types -- and why you'd run each one

amara has 5 different assessments. That might sound like a lot, but each serves a very different purpose. Think of it like medical checkups: a quick blood pressure reading, a full physical, an eye exam, and a specialist visit are all "checkups" -- but you wouldn't use one to replace the other.

1. Rapid Assessment -- "How secure are we, overall?"

Your general health check. 16 questions, ~60 minutes, covering 10 security domains. You answer Yes / Partial / No and get a colour-coded heatmap showing where you're strong and where you have gaps. Run this first if you've never done a security assessment. It gives you a baseline and tells you where to focus.

Best for

First-time users, quarterly check-ins, pre-audit preparation. ~60 minutes.

2. ISO 27001 Assessment -- "Are we ready for certification?"

Your full physical exam. Go through all 93 security controls and score each on a maturity scale (0 = nothing in place, 5 = optimised). When you're done, amara auto-generates the Statement of Applicability (SoA) -- the first document every auditor asks for. Run this when you're pursuing ISO 27001 certification or clients require it.

Best for

ISO certification, client requirements. Takes several sessions over days/weeks.

3. NIS2 Assessment -- "Does EU cybersecurity law apply to us?"

A two-part specialist exam. Part 1: the Relevance Checker uses your org details to determine if NIS2 applies -- takes 5 minutes. Part 2: 40 questions across 10 mandatory Article 21 security domains. Your compliance score updates live as you answer. Run this if you might be affected by NIS2 (28,000+ German orgs are).

Best for

Organisations in NIS2 sectors (energy, health, transport, finance, digital infrastructure). Relevance: 5 min. Full: 2-3 hours.

4. BSI C5 Assessment -- "Does our cloud meet German standards?"

A specialist exam for cloud providers. 17 criteria groups covering physical security to portability. If you provide cloud services to German customers -- especially government or enterprise -- C5 attestation is increasingly expected. Run this if you're a cloud provider in Germany.

Best for

Cloud providers in the German market, public sector suppliers. Several sessions.

5. CIA Assessment -- "How critical is this specific asset?"

This one's different. The first four assess your organisation. CIA assesses a single asset. For each asset, score three dimensions: Confidentiality (what if someone sees this?), Integrity (what if someone changes it?), Availability (what if it goes offline?). Scores 1-4, highest becomes the Protection Class. Has a 4-phase approval workflow (data entry, asset owner, security team, risk owner) so no one person can under-classify something.

Best for

Every asset you register. Do it right after creating an asset. ~10-15 minutes per asset.

How they work together

These assessments are layers, not alternatives. A typical journey:

  1. Rapid Assessment -- overall baseline (Day 1)
  2. CIA Assessments -- classify your individual assets (Week 1)
  3. NIS2 Relevance Check -- does EU law apply? (Day 1, 5 minutes)
  4. ISO 27001 or NIS2 Full Assessment -- framework-specific compliance (Weeks 2-4)
  5. BSI C5 -- if you're a cloud provider (Weeks 3-6)

The beautiful part: evidence from one assessment automatically feeds the others. A risk assessment done for ISO 27001 also satisfies NIS2 Article 21, DORA Article 6, and BSI C5 Domain 2. No duplicate work.

Quick decision guide

Your situationStart with
Never done any security assessmentRapid Assessment -- baseline in 60 minutes
Clients require ISO 27001ISO 27001 -- 93 controls, auto SoA
"Does NIS2 apply to us?"NIS2 Relevance Check -- 5 minutes
We're a cloud provider in GermanyBSI C5 -- the trust badge customers expect
We just registered new assetsCIA Assessment -- classify criticality per asset
We need multiple frameworksRapid Assessment first, then specific frameworks

How assessments work in amara

All assessments follow the same pattern:

1

Define scope

Choose which parts of your organisation are covered. You can do this by business unit, location, or system group.

2

Answer questions / score controls

Work through the questions or controls one by one. For each, select your current status and upload evidence (policies, screenshots, configs). Progress is auto-saved -- you don't need to finish in one sitting.

3

Review gaps

amara highlights where you fall below target. Gaps are ranked by severity and linked to specific remediation actions.

4

Generate reports and evidence

One-click export: executive summary (PDF), detailed gap analysis, remediation roadmap, and auditor evidence package (ZIP).

Regulatory Compliance Landscape

NIS2 (up to EUR 10M fines, 28K+ DE orgs) | ISO 27001 (93 controls) | DSGVO/GDPR (up to EUR 20M) | DORA (EU finance)

Framework Coverage Radar
Compliance Score Trend (12 Months)

The four frameworks

FrameworkScopeamara coverageKey output
Rapid AssessmentQuick posture check160Q bank, 10 domainsScore, heatmap, roadmap
ISO 27001:2022ISMS certification93 Annex A controlsSoA, gap analysis
NIS2EU Directive 2022/2555Art. 21, 40 questionsCompliance %, relevance
BSI C5Cloud security17 criteria groupsC5 attestation readiness

The shared evidence model

Multi-Framework Compliance Efficiency

Without amara: 4 separate efforts. With amara: 1 assessment satisfies all frameworks simultaneously

Action in amaraISO 27001NIS2DORABSI C5
Risk assessmentClause 6.1Art. 21/1Art. 6OIS-01
Supplier reviewAnnex A.5.19Art. 21(d)Art. 28SSO-01
Training completionControl 6.3Art. 20Art. 13PS-01
Incident response planAnnex A.5.24Art. 23Art. 17SIM-01
Policy documentAnnex A.5.1Art. 21(a)Art. 5SP-01

The 5 Assessment Types

amara includes 5 different types of security assessments. Each one answers a different question about your organisation's security. This page explains what they are, when to use them, and how they work together.

Why do I need assessments?

Think of security assessments like medical checkups. You wouldn't skip your annual physical just because you "feel fine" -- and you wouldn't expect a blood pressure reading to catch a broken bone. Different assessments test different things, and together they give you a complete picture of your security health.

Without assessments, you're guessing. With them, you have measurable scores, documented evidence, and prioritised action plans. When an auditor asks "how secure are you?", you can answer with numbers instead of opinions.

The 5 types at a glance

#AssessmentWhat it answersTime neededWho runs it
1Rapid Assessment"How secure are we, overall?"~60 minutesAny security lead
2CIA Classification"How critical is this specific asset?"~15 min per assetAsset owner + security team
3ISO 27001"Are we ready for ISO certification?"Days/weeksISMS Manager
4NIS2"Does EU cybersecurity law apply to us?"5 min (scope) + 2-3h (full)Compliance Officer
5BSI C5"Does our cloud meet German standards?"Days/weeksCloud Security Lead

Understanding the difference

The first thing to understand: assessments 1, 3, 4, and 5 evaluate your organisation. Assessment 2 (CIA) evaluates a single asset. They're fundamentally different tools.

Rapid Assessment -- your general health check

This is where everyone should start. You answer 16 yes/partial/no questions across 10 security domains (access control, data protection, incident response, etc.). In about 60 minutes, you get a colour-coded heatmap showing exactly where you're strong and where you have gaps. Think of it as a blood pressure reading for your security -- quick, gives you a baseline, and tells you if something needs deeper investigation.

Run this: On your first day with amara. Then quarterly to track improvement.

CIA Classification -- how critical is each asset?

For every asset you register (a server, a database, a SaaS application), you need to answer three questions: What if someone sees it who shouldn't? (Confidentiality) What if someone changes it without permission? (Integrity) What if it goes offline? (Availability). Each gets a score from 1-4. The highest score becomes the asset's Protection Class, which drives what security controls apply and what risk impact it inherits.

This assessment has a 4-phase approval workflow -- the submitter, asset owner, security team, and risk owner all sign off. No single person can under-classify a critical asset.

Run this: Every time you register a new asset. Review annually.

ISO 27001 -- the international gold standard

ISO 27001 defines 93 specific security controls that auditors check you against. You score each control from 0 (nothing in place) to 5 (optimised/best practice). When you're done, amara auto-generates the Statement of Applicability (SoA) -- the first document every ISO auditor asks for. Think of this as a full physical exam -- thorough, takes time, but gives you a complete picture and a certification that opens doors.

Run this: When pursuing ISO 27001 certification or when clients require it.

NIS2 -- the EU cybersecurity directive

NIS2 is a two-part assessment. Part 1 is the Relevance Checker: it uses your organisation's sector, size, and revenue to determine if the EU NIS2 directive applies to you (takes 5 minutes). Part 2 is the Compliance Assessment: 40 questions across 10 mandatory security domains from Article 21. Your compliance score updates live as you answer. Fines reach EUR 10M, and management is personally liable.

Run this: If you're in one of 18 critical sectors with 50+ employees or EUR 10M+ revenue.

BSI C5 -- German cloud security

BSI C5 is specifically for cloud service providers operating in Germany. It covers 17 criteria groups at two levels (Basic and Enhanced). Think of it as "ISO 27001 for cloud" with German-specific requirements. Almost no other GRC tool includes native C5 assessment -- it's a DACH market differentiator.

Run this: If you provide cloud services to German customers, especially government or enterprise.

How they work together

These assessments aren't competitors -- they're layers. A typical journey looks like this:

1

Week 1: Rapid Assessment

Get your baseline. See where you stand across 10 domains. Takes 60 minutes.

2

Week 1: CIA Classifications

Score your most critical assets. Start with the top 10-20. ~15 minutes each.

3

Week 1: NIS2 Relevance Check

Find out if the EU directive applies to you. Takes 5 minutes.

4

Weeks 2-4: Framework-specific assessment

Based on your needs: ISO 27001 (if pursuing certification), NIS2 full assessment (if in scope), BSI C5 (if cloud provider).

The beautiful part: evidence you create in one assessment automatically feeds the others. A risk assessment done for ISO 27001 also satisfies NIS2 Article 21, DORA Article 6, and BSI C5 Domain 2. You never redo the work.

Assessment Workflow

All assessments follow the same 4-step workflow: Scope → Assess → Review → Report

Every assessment, same workflow

No matter which assessment you run, the process is always the same:

1

Scope

Pick the assessment type. Define which parts of your organisation are covered. Assign the assessor team. Set a target date.

2

Assess

Work through questions or controls one by one. Score each item. Upload evidence (policies, screenshots, configs). Progress is auto-saved -- you can stop and resume anytime.

3

Review

Findings ranked by severity. Remediation proposals generated. Owners and deadlines assigned. Management review session.

4

Report

One-click executive PDF. Control-level detail. Trend comparison vs prior runs. Audit evidence package (ZIP). SoA auto-generated (ISO only).

Quick decision guide

Your situationStart with
Never done any security assessmentRapid Assessment -- baseline in 60 minutes
Just registered new assetsCIA Classification -- score each asset's criticality
Clients require ISO 27001ISO 27001 -- 93 controls, auto SoA
"Does NIS2 apply to us?"NIS2 Relevance Check -- 5 minutes
We're a cloud provider in GermanyBSI C5 -- the trust badge customers expect
We need multiple frameworksRapid Assessment first, then specific frameworks
Where to find assessments in amara

In the left sidebar, click Assessments to see all available types. Or use Quick Access to jump directly to a new CIA, ISO, Rapid, NIS2, or C5 assessment.

Rapid Assessment

Not sure where you stand on security? The Rapid Assessment gives you a baseline in about 60 minutes. It's the fastest way to answer the question every CISO gets asked: "How secure are we, really?"

What is a Rapid Assessment?

Think of it as a health check for your organisation's security posture. Instead of spending weeks going through hundreds of ISO controls, the Rapid Assessment samples 16 questions from a bank of 160, spread across 10 security domains (things like access control, data protection, incident response, business continuity). For each question, you answer Yes (fully implemented), Partial (work in progress), or No (not addressed).

When you're done, amara gives you a colour-coded heatmap showing exactly where you're strong (green) and where you have gaps (red). The whole thing takes about 60 minutes -- and you walk away with a clear, prioritised picture of what needs attention first.

When should I run one?

How to run your first Rapid Assessment

Navigate to Assessments → Rapid Assessment (or use Quick Access → New Rapid Assessment in the sidebar). Click Start New Assessment, and you'll be presented with 16 questions, one at a time. For each question, pick Yes / Partial / No and optionally upload evidence (a screenshot, a policy document, a config file). You don't need evidence to complete the assessment -- but it helps later when auditors ask "how do you know?"

When you finish, amara generates 5 reports automatically: an executive summary, a domain breakdown radar chart, a gap analysis, a remediation roadmap, and a trend comparison (if you've run previous assessments).

160
Question Bank
16
Per-run Sample
10
Security Domains
5
Report Types
Assessment Workflow

4 assessment types, 4-step workflow: Scope → Assess → Review → Report

The 10 security domains

#DomainWhat it evaluates
1Access ControlAuthentication, authorisation, privilege management
2Data ProtectionEncryption, classification, DLP
3Network SecurityFirewalls, segmentation, monitoring
4Incident ResponsePlans, procedures, communication
5Business ContinuityBCP, DRP, backup, recovery
6Vendor ManagementSupplier risk, SLA, access control
7Security AwarenessTraining, phishing awareness
8Asset ManagementInventory, lifecycle, classification
9ComplianceRegulatory adherence, audit readiness
10Physical SecurityFacility access, environmental controls

Scoring

Rapid Assessment Scoring & Reports

Scoring: Yes (1.0) / Partial (0.5) / No (0.0). Five report types generated per assessment

Rapid Assessment Maturity Scale

6-tier maturity: Incomplete (0-22%) → Initial → Repeatable → Defined (target) → Managed → Optimised (100%)

ScoreLevelClassification
>75%StrongMature controls, minor improvements
50-75%DevelopingControls exist, gaps in implementation
25-50%GapsSignificant gaps, remediation needed
<25%CriticalFundamental controls missing

ISO 27001:2022

ISO 27001 is the international gold standard for information security management. If your clients require it (and increasingly they do), this is where you manage the entire certification journey.

What is ISO 27001?

ISO 27001 is a globally recognised standard that proves your organisation takes information security seriously. It defines 93 specific security controls (called "Annex A controls") grouped into four categories: Organisational (37 controls covering policies, roles, supplier relations), People (8 controls covering screening, awareness, remote work), Physical (14 controls covering facilities, equipment, cabling), and Technological (34 controls covering access control, encryption, logging).

To get certified, an external auditor checks that you've implemented these controls to an acceptable maturity level. The key document they ask for first is the Statement of Applicability (SoA) -- a table showing which of the 93 controls apply to you, how mature your implementation is, and why you've excluded any that don't apply.

Why does it matter?

Practically: you lose contracts without it. More and more clients (especially in enterprise and government) require ISO 27001 certification as a condition for doing business. Beyond that, it forces you to build a proper Information Security Management System (ISMS) -- which means you're actually more secure, not just compliant on paper.

How amara helps

amara maps all 93 controls with maturity scoring from 0 (ad-hoc) to 5 (optimised). You work through each control, score your current implementation, upload evidence, and note remediation plans for gaps. When you're done, amara auto-generates the SoA -- the document that would normally take a consultant days to compile. Your assessment data also feeds the risk module, so compliance gaps automatically become risk items with owners and deadlines.

93
Annex A Controls
4
Control Categories
0-5
CMMI Maturity
SoA
Auto-Generated

The 4 control categories (Annex A)

CategoryCodeControlsFocus
OrganisationalA.537Policies, roles, asset management, access control
PeopleA.68Screening, awareness, remote working
PhysicalA.714Perimeters, equipment, cabling, media
TechnologicalA.834Endpoints, access rights, malware, backup

CMMI maturity levels

LevelLabelWhat it means
0Ad-hocNo documented process
1InitialProcess exists but inconsistent
2RepeatableDocumented, sometimes followed
3DefinedStandardised, consistently applied
4ManagedMeasured, KPIs tracked
5OptimisedContinuous improvement, best practice

Running an ISO 27001 assessment

1

Define scope

Select which business units, locations, and systems are in scope for the ISMS.

2

Score each control (0-5)

Work through all 93 controls. For each: select maturity level, upload evidence, note remediation plan. Progress is auto-saved.

3

Review gap analysis

amara highlights controls below target maturity. Prioritised remediation list generated.

4

Generate the SoA

Statement of Applicability auto-generated with all 93 controls, maturity scores, and exclusion justifications.

NIS2 Compliance

NIS2 is the EU cybersecurity directive that's keeping CISOs up at night. If it applies to you, there's no opt-out -- and management is personally liable.

What is NIS2?

NIS2 (Network and Information Security Directive 2, EU 2022/2555) is an EU law that requires organisations in critical sectors to implement specific cybersecurity measures. It replaces the original NIS Directive and dramatically expands the scope: in Germany alone, 28,000+ organisations are now affected, up from about 2,000 under the old rules.

The law covers 18 sectors across two tiers: 11 "essential" sectors (energy, transport, banking, health, water, digital infrastructure, ICT services, public admin, space) and 7 "important" sectors (postal, waste, chemicals, food, manufacturing, digital providers, research). If you're in one of these sectors AND meet the size threshold (50+ employees or EUR 10M+ revenue), you're likely in scope.

Why should I care?

Three reasons:

How amara helps with NIS2

amara walks you through a 3-phase process:

1

Phase 1: Am I even affected?

The Relevance Checker uses your organisation settings (sector, employee count, revenue, balance sheet) to automatically determine if you're in scope. It classifies you as Essential, Important, or Not in Scope, with a confidence score. You'll know in 5 minutes -- no consultant needed.

2

Phase 2: How compliant am I?

If you're in scope, you answer 40 questions across the 10 mandatory security domains from Article 21 (risk analysis, incident handling, business continuity, supply chain security, network security, vulnerability management, effectiveness testing, cyber hygiene/training, cryptography, access control). Your compliance score updates live as you go -- each "Yes" adds 2.5% to your total.

3

Phase 3: What do I need to fix?

amara auto-generates remediation items from your gaps. Each gap becomes an actionable task with a priority, an owner, and a deadline. As you complete remediation items, your NIS2 score improves automatically -- you can literally watch it climb.

€10M
Max Fine
28K+
German Orgs Affected
40
Art. 21 Questions
24/72h
Incident Deadlines
NIS2 3-Phase Compliance Workflow

Phase 1: Relevance Assessment → Phase 2: Gap Assessment (40Q, 10 domains) → Phase 3: Remediation Planning

Phase 1: Are you in scope?

1

Sector classification

18 sectors covered: energy, transport, banking, health, digital infrastructure, ICT services, public admin, space, postal, waste, chemicals, food, manufacturing, digital providers, research.

2

Size threshold

Medium: 50+ employees OR EUR 10M+ revenue. Large: 250+ employees OR EUR 50M+ revenue.

3

Entity classification

Essential (large entities in high-criticality sectors) or Important (everything else in scope).

Phase 2: 40 Article 21 Questions

DomainQuestionsWhat it covers
C1: Risk Analysis4Risk policies, risk methodology
C2: Incident Handling4Detection, response, 24/72h reporting
C3: Business Continuity4BCP, DRP, crisis management
C4: Supply Chain4Supplier security, vulnerability handling
C5: Procurement Security4Secure development, maintenance
C6: Effectiveness4Assessment of measures, testing
C7: Cyber Hygiene & Training4Awareness, training, competence
C8: Cryptography4Encryption policies, key management
C9: HR & Access4Personnel security, access control
C10: MFA & Comms4Multi-factor auth, secure communications
Live score improvement

Your NIS2 compliance percentage updates in real-time as you answer questions. You can see the score change with every response.

BSI C5 Compliance

If you provide cloud services in Germany, BSI C5 is the trust badge your customers look for. Almost no other GRC platform includes native C5 assessment -- amara does.

What is BSI C5?

BSI C5 (Cloud Computing Compliance Criteria Catalogue) is a standard created by Germany's Federal Office for Information Security (BSI). It defines security requirements specifically for cloud service providers. Think of it as "ISO 27001 for cloud" -- but with German-specific requirements around data residency, transparency, and accountability.

The standard covers 17 criteria groups ranging from organisation security and physical security to incident response, portability, and transparency. Each group has specific controls at two levels: Basic (minimum requirements) and Enhanced (for sensitive workloads).

Who needs BSI C5?

How to run a BSI C5 assessment in amara

1

Navigate to Assessments → BSI C5

Or use Quick Access → New BSI C5 Assessment. You'll be asked for the cloud service type (IaaS, PaaS, SaaS, or Full Stack) and the primary data location (Germany, EU, EEA, or Worldwide).

2

Choose Basic or Enhanced level

Basic covers the minimum requirements. Enhanced adds stricter controls for sensitive workloads (e.g., health data, financial services). Start with Basic if you're unsure.

3

Work through the 17 criteria groups

For each group, score your controls and upload evidence. If you've already completed an ISO 27001 assessment, many fields will be pre-populated from the crosswalk -- you won't redo work that's already done.

4

Generate the C5 report

Export an attestation-ready report showing your compliance status per criteria group, with evidence references and gap analysis.

BSI C5:2020 Cloud Security Standard

17 BSI C5 criteria groups: OIS, SP, PS, AM, PHY, OPS, IAM, CRY, COS, SSO, COM, BCM, IRP, SIM, SDV, POR, TRK

Who Needs BSI C5

C5 in amara: 17 Criteria Groups

#GroupControls
OISOrganisation of Information Security5
SPSecurity Policies3
PSPersonnel Security4
AMAsset Management3
PHYPhysical Security5
OPSOperations Management8
IAMIdentity & Access Management6
CRYCryptography3
COSCommunication Security4
SSOSupplier & Service Oversight3
COMCompliance4
BCMBusiness Continuity Management4
IRPIncident Response & Processing5
SIMSecurity Incident Management4
SDVSecure Development5
PORPortability3
TRKTransparency & Accountability4
C5 + ISO 27001 Crosswalk

Many C5 criteria map directly to ISO 27001 controls. amara maintains this crosswalk, so completing one assessment accelerates the other.

Statement of Applicability (SoA)

The SoA is the single most important document in an ISO 27001 audit. It's a table that says "here are all 93 controls, here's which ones apply to us, here's how mature our implementation is, and here's why we've excluded any." Auditors ask for it first. amara generates it automatically from your assessment scores -- no manual compilation needed.

What the SoA Contains

What does an SoA actually look like?

If you've never seen a Statement of Applicability, here's a concrete example. Each of the 93 controls gets a row like this:

Control IDControl NameApplicable?Maturity (0-5)Implementation StatusEvidenceExclusion Justification
A.8.5Secure AuthenticationYes3 -- DefinedMFA enforced for all users via TOTP. Password policy requires 12+ chars, complexity rules. Session timeout 30 min.Screenshot of MFA config, password policy doc (v2.1), SMTP alert config--
A.7.4Physical Security MonitoringNo0 -- N/A----Organisation operates fully remote with no physical offices. All infrastructure is hosted in certified German data centres (ISO 27001 certified). Physical security is the data centre provider's responsibility per SLA.
A.5.19Information Security in Supplier RelationshipsYes4 -- Managed3-phase supplier approval, 8-factor criticality scoring, annual reassessment. 34-field supplier profile with DPA tracking.Supplier register export, approval workflow logs, DPA signed copies--

When amara generates the SoA, it fills in the maturity level, implementation status, and evidence references automatically from your assessment scores and uploaded evidence. You don't compile this manually -- you just review and approve. For a typical 93-control SoA, this saves days of work.

The auditor's first request

In an ISO 27001 audit, the SoA is literally the first document the auditor asks for. It's their roadmap for the entire audit -- they'll use it to decide which controls to examine in detail. A well-prepared SoA with clear evidence references makes a strong first impression and can significantly reduce audit time.

How amara Generates the SoA

1

Complete your ISO 27001 assessment

Score all 93 controls.

2

Mark exclusions

For controls that don't apply, provide a justification.

3

Generate the document

Click "Generate SoA". amara compiles everything into a formatted document.

4

Review and approve

ISMS Manager reviews, approves. Document locked and version-controlled.

Keep It Current

Your SoA must be updated whenever you re-assess controls or change exclusions. Auditors will check it against your actual control implementation.

Supplier Management -- Overview

Your security is only as strong as your weakest vendor. Before a supplier gets access to your systems, they go through a structured 3-phase approval. amara scores their criticality, tracks their certifications, and blocks unapproved vendors from linking to your assets.

Why do I need Supplier Management?

Think of your suppliers like doors into your building. Each one is a potential entry point -- not just for the services they provide, but for the risks they carry. A cloud provider with weak encryption, an IT contractor with admin access to your network, a software vendor with poor update practices -- any of these can become your security incident.

Real-world example

The Target data breach that affected 40 million customers? It started through an HVAC contractor who had network access. The SolarWinds attack that hit thousands of organisations? It came through a trusted software supplier. Supplier management isn't paperwork -- it's how you prevent becoming the next headline.

What you'll see

The Supplier Management module shows a list of all registered vendors with their category, criticality level, approval status, and next review date. Colour-coded badges make it easy to spot issues: APPROVED means active and reviewed, IN REVIEW means assessment in progress, OVERDUE means the annual review is past due.

How supplier onboarding works

When you add a new supplier, they go through three phases before they can be linked to your assets:

1

Phase 1: Register the supplier

Fill in the 34-field profile: company details, services provided, data they'll process, what access they need (application, network, facility, device, physical assets), and their security certifications. This creates a complete picture of the vendor relationship.

2

Phase 2: Score their criticality

The security team reviews the profile and scores the supplier across 8 factors: dependency level, data sensitivity, access scope, linked asset criticality, financial exposure, geographic risk, security certifications, and subprocessor chain. The score (1-32) determines the criticality level and review frequency.

3

Phase 3: Risk owner approval

The risk owner or CISO reviews the criticality score and either approves or requests changes. Only after Phase 3 approval can the supplier be linked to assets. This is enforced at the database level -- there's no workaround.

Why this matters for NIS2

NIS2 Article 21(d) requires organisations to manage supply chain security. Every supplier you onboard through amara's 3-phase process automatically creates evidence for this requirement. Ask amara can tell you: "Which suppliers access critical systems?" or "Which suppliers are overdue for review?"

34
Fields per Supplier
8
Criticality Factors
6
Supplier Categories
3
Approval Phases
Supplier Management Lifecycle

3-phase lifecycle: Onboard (34 fields) → Score (8-factor criticality) → Approve (3-phase workflow)

The 6 supplier categories

CategoryExamplesTypical criticality
SoftwareSaaS, licenses, custom devMedium - High
IT ServicesMSP, hosting, supportHigh
CloudIaaS, PaaS, storageHigh - Critical
HardwareServers, network equipmentMedium
ConsultingSecurity, compliance, auditLow - Medium
OtherFacilities, utilitiesLow

The 5 access dimensions

For each supplier, you rate what kind of access they have to your organisation. This feeds directly into the criticality scoring:

A supplier with all five = very high risk. A supplier with none = low risk. Most fall somewhere in between.

How Supplier Management connects to other modules

Adding a Supplier

Adding a new supplier to amara means building a complete picture of the relationship: who they are, what services they provide, what data they'll touch, what access they need, and what security certifications they hold. Here's a walkthrough of the 34-field form, section by section.

Step-by-step walkthrough

Let's walk through adding a real supplier -- say your cloud hosting provider, "CloudHost GmbH."

1

Navigate to Supplier Management

Click Supplier Management in the left sidebar. You'll see your existing suppliers (if any) in a sortable table. Click the "+ Add New Supplier" button in the top-right corner. This opens a 6-section form.

2

Fill in the form (details below)

Work through each of the 6 sections. Required fields are marked with an asterisk (*). You can save a draft at any point and come back later -- the supplier will have "Draft" status until you submit it for review.

3

Submit for Phase 1 review

Once all required fields are complete, click Submit for Review. The status changes to "In Review" and the security team is notified to begin Phase 2 criticality scoring.

The 34 supplier fields -- section by section

Section 1: Identity (6 fields)

This is the "who are they?" section.

Section 2: Service & SLA (6 fields)

This captures the business relationship.

Section 3: Data Processing (6 fields)

If this supplier processes any data on your behalf, this section is critical for GDPR compliance.

Section 4: Access (5 fields)

For each type of access, answer Yes or No. The more "Yes" answers, the higher the risk. Think of each as a door into your organisation:

Section 5: Security & Compliance (6 fields)

This section tells you how seriously the supplier takes security. A vendor with ISO 27001 and recent pen tests is a very different risk profile from one with no certifications.

Section 6: Linked Assets

This section is read-only until the supplier reaches Phase 3 (Approved). Once approved, you can link assets to this supplier, creating a bidirectional dependency map: "which assets depend on CloudHost?" and "which vendors support our production database server?"

Don't have all the details?

Save as Draft and come back. Many fields (like pen test dates and insurance details) require information from the supplier. Send them a questionnaire and fill in Section 5 when they respond. The critical fields for Phase 1 review are Sections 1-3.

8-Factor Criticality Scoring

Not all suppliers are equally risky. Your office coffee supplier and your cloud hosting provider need very different levels of scrutiny. amara's 8-factor scoring engine quantifies that difference so you know where to focus your due diligence.

How criticality scoring works

For each supplier, amara scores 8 risk factors on a 1-4 scale. The scores are weighted and combined into a total criticality rating from 1 to 32. This determines how much oversight the supplier needs:

The beauty of this system: it's objective and repeatable. Two people scoring the same supplier should get similar results, because the criteria are specific and measurable. No more "I think they're fine" gut feelings.

The 8 factors

FactorScaleWhy it matters
Dependency level1-4How reliant are you on this supplier?
Data sensitivity1-4What classification of data do they access?
Access level1-4Network, application, physical access scope
Asset CIA inheritance1-4Criticality of linked assets
Financial exposure1-4Contract value, switching cost
Geographic risk1-4Data transfer, jurisdictional risk
Security certification1-4ISO, SOC 2, C5 attestation
Subprocessor chain1-4Number and risk of sub-processors

Criticality result

ScoreCriticalityRequired actions
1-10LowStandard monitoring, annual review
11-20MediumEnhanced monitoring, semi-annual review
21-28HighActive management, quarterly review, pen test required
29-32CriticalContinuous monitoring, dedicated risk owner, board visibility

Supplier Lifecycle Management

Suppliers aren't a one-time checkbox. Certifications expire, contracts renew, people change, and security postures shift. amara tracks the complete vendor lifecycle so you never miss a review date or lose track of who has access to what.

The 5 Lifecycle Stages

StageStatusWhat Happens
DraftDRAFTInitial data entry, supplier profile created
Phase 1 ReviewIN REVIEWSecurity questionnaire sent, documentation collected
Phase 2 ReviewIN REVIEWCriticality scoring, technical assessment
Phase 3 ApprovalPENDINGRisk owner reviews, final sign-off
ApprovedAPPROVEDCan be linked to assets, annual review scheduled

Annual Reassessment

Supplier approval isn't a one-time event. Companies change: they get acquired, lose certifications, suffer breaches, or shift their data centres to different countries. What was a low-risk vendor last year might be a high-risk one today. That's why every approved supplier goes through an annual reassessment.

How the reassessment works

amara sends automatic reminders to the supplier manager:

What you review during reassessment

1

Verify all 34 fields are current

Has their address changed? New sub-processors? Contract renewed? Data location shifted? Go through each section and update what's changed.

2

Re-score criticality

Run the 8-factor scoring again. Maybe their ISO 27001 certification expired (certification factor goes up). Maybe you reduced your dependency on them (dependency factor goes down). The new score may change their criticality level and review frequency.

3

Check certifications

Is their ISO 27001 still valid? When was their last pen test? Has their SOC 2 report been updated? Expired certifications are a red flag.

4

Review incidents

Did this supplier have any security incidents in the past year? Were they reported on time? How were they handled? This context matters for your risk assessment.

5

Sign off

The supplier manager confirms the review is complete. The security team or risk owner approves. Next review date is automatically calculated (12 months for standard, 6 months for high criticality, 3 months for critical).

Real-world consequence

A supplier whose annual review is overdue creates a compliance gap. If an auditor finds that your cloud provider hasn't been reviewed in 18 months, that's a finding -- regardless of how secure the provider actually is. The review is your proof that you're actively managing the relationship.

Decommissioning a Supplier

1

Unlink from all assets

2

Create decommission record

Reason, date, data return/deletion confirmation.

3

Archive the supplier

Record preserved for audit trail. No new asset links possible.

Access Revocation

Verify that all access (application, network, facility, physical) has been revoked before archiving.

3-Phase Supplier Approval

No shortcuts here -- a supplier must pass through 3 approval phases before they can touch your assets. This isn't bureaucracy for its own sake; it's how you satisfy NIS2 Article 21(d) supply chain requirements and make sure nobody slips through without proper vetting.

Supplier Management Lifecycle

Phase 1: Onboard (34 fields, DRAFT) → Phase 2: Score (8-factor, IN REVIEW) → Phase 3: Approve (risk owner, APPROVED)

Why three phases instead of one?

Think of it like hiring an employee. You wouldn't let someone start work just because HR received their CV (Phase 1). The hiring manager needs to interview them and check their skills (Phase 2). And someone with authority needs to approve the hire and set a start date (Phase 3). Supplier approval follows the same logic -- each phase catches different types of problems.

The 3 approval phases in detail

Phase 1: Profile Review (Supplier Manager)

Goal: "Do we have a complete picture of who this vendor is?"

The supplier manager verifies that all 34 fields are filled in accurately. Here's what they're checking:

Common rejection reasons: Missing DPA for a data processor. Incomplete service description. No security contact provided. Unknown data location.

If everything checks out, the supplier manager clicks Approve Phase 1. Status changes to "Phase 2 -- In Review" and the security team is notified.

Phase 2: Security Assessment (Security Team)

Goal: "How risky is this vendor, exactly?"

The security team runs the 8-factor criticality scoring. This is where the numbers come in:

Common rejection reasons: Criticality score too high for the business justification. Expired certifications. No pen test in over 12 months. Excessive access scope for the service provided.

After scoring, the security team clicks Approve Phase 2. Status changes to "Phase 3 -- Pending Approval."

Phase 3: Final Approval (Risk Owner / CISO)

Goal: "Knowing the full picture, do we accept this vendor relationship?"

The Risk Owner or CISO reviews everything: the complete profile, the criticality score, the security team's notes, and any flagged concerns. They make the final call:

PhaseWho approvesWhat they checkTypical duration
Phase 1Supplier ManagerProfile completeness, DPA status, access dimensions1-2 days
Phase 2Security Team8-factor criticality scoring, certification verification, technical risk3-5 days
Phase 3Risk Owner / CISOBusiness justification vs. risk level, final sign-off1-2 days
Database Enforced -- No Workarounds

Only Phase 3-approved suppliers can be linked to assets. This isn't just a policy -- it's enforced at the PostgreSQL database level with foreign key constraints and status checks. Even a Super Admin can't bypass it. This guarantee is what makes your supplier management audit-proof.

Fast-track for low-risk suppliers

A low-criticality supplier (e.g., office supplies vendor with no data access and no network access) can move through all three phases in a single day. The phases don't add delay -- they add structure. The time spent is proportional to the risk.

Supplier Module -- Module Connections

Your suppliers don't exist in a vacuum -- they touch your assets, create risks, affect your compliance posture, and can be queried by the AI. Here's how the supplier module connects to the rest of amara.

Suppliers ↔ Assets

  • Bidirectional dependency mapping
  • Approval gate enforced
  • Criticality inherits from asset CIA

Suppliers → Risks

  • Supplier incidents become risk items
  • Geographic risk feeds risk register
  • Subprocessor chain risks tracked

Suppliers → Compliance

  • NIS2 Art. 21(d) supply chain evidence
  • ISO 27001 Annex A.5.19 satisfied
  • BSI C5 SSO criteria coverage

Suppliers → Ask amara

  • 6 dedicated supplier query functions
  • "Which suppliers are overdue?" -- instant
  • 93%+ accuracy on supplier queries

Document Dialog -- Overview

Writing policy documents from scratch costs EUR 22,000-44,000 in consultant fees. amara ships with 44 ready-to-use ISO 27001 templates containing ~1,500 dynamic fields. Answer structured questions, and the AI generates your policies in minutes -- version-controlled and audit-ready.

Why do I need policy documents?

Security policies are like an employee handbook for cybersecurity. They set the rules everyone follows, and they're your legal protection when things go wrong. Without documented policies:

The problem? Writing professional security policies from scratch typically costs EUR 22,000-44,000 in consultant fees, and takes weeks. amara generates them in minutes from templates built by a GRC veteran with 20+ years of audit experience.

How it works in practice

Let's say you need an Access Control Policy for your ISO 27001 certification:

1

Browse the template library

Open Document Dialog from the sidebar. You'll see 44 policy templates organised by category (Governance, Access Control, Incident Management, etc.). Each template shows which ISO 27001 controls it covers. You can also let amara recommend templates based on your assessment gaps -- if your ISO assessment flagged access control as weak, the Access Control Policy template will be highlighted.

2

Click "Generate" on a template

amara now fills in the ~1,500 dynamic fields automatically. Your company name, CISO contact, industry sector, and other org settings are injected into the document. Asset lists, risk registers, and supplier data are pulled from the database using BLOCK markers. The result is a first draft that's already 80% complete with your actual data.

3

Review and edit

Read through the generated policy. Adjust wording, add org-specific procedures, remove sections that don't apply. Every edit is tracked -- change history shows who changed what and when. Reviewers can add comments.

4

Approve and distribute

When the policy is ready, the designated approver signs it off. The document is locked (no more edits), a 12-month review reminder is set, and the full text is added to the RAG knowledge base -- meaning Ask amara can now answer questions about your access control policy based on the actual approved version.

Dual purpose

Every approved document serves two functions: (1) it's your official policy for auditors, and (2) it feeds the AI knowledge base so Ask amara can answer policy questions. "What does our access control policy say about remote access?" returns actual quotes from your approved document.

44
Policy Templates
~1,500
Dynamic Fields
6
Field Types
12mo
Review Cycle
Document Dialog Workflow

Select template → AI generates (~1,500 fields auto-filled) → Review (versioned) → Approve (locked, distributed, added to RAG)

The document lifecycle

StageWho actsamara feature
DraftAuthorAI-generated content, field tokens populated
ReviewReviewersComments, change tracking, version diff
ApprovedApproverDigital signature, locked, distribution triggered
ArchiveSystem12-month review reminder, added to RAG

The FIELD and BLOCK marker system

MarkerSyntaxExampleSource
Field{FIELD:xxx}{FIELD:org_name}Org settings
Block{BLOCK:xxx}{BLOCK:asset_list}Asset register
Date{DATE:xxx}{DATE:today}System
User{USER:xxx}{USER:ciso_name}User table
Calc{CALC:xxx}{CALC:risk_count}Database query

How Document Dialog connects to other modules

44 Policy Templates

44 templates, all mapped to ISO 27001:2022 controls. Each is pre-written by a GRC veteran with 20+ years of audit experience, ready for AI generation with your organisation's data.

How to choose your first template

Don't try to generate all 44 at once. Here's a practical starting order:

  1. Information Security Policy -- the master document. Everything else references it. Generate this first.
  2. Access Control Policy and Password Policy -- immediate, practical impact. Employees can start following these right away.
  3. Incident Response Plan -- you need this before something goes wrong, not after.
  4. Whatever your ISO assessment flagged -- if you scored low on a control, amara recommends the template that addresses it.
Let amara recommend

After running an ISO 27001 assessment, go to Document Dialog -- amara highlights which templates to generate first based on your lowest-scoring controls. Smart prioritisation instead of guesswork.

Full template catalogue

Information Security Governance (8)

Information Security Policy, ISMS Manual, Risk Management Policy, Data Classification Policy, Acceptable Use Policy, Security Organisation, Management Commitment, Policy Review Schedule.

Access Control & Identity (6)

Access Control Policy, Password Policy, User Access Management, Privileged Access, Remote Access, MFA Policy.

Human Resources Security (4)

Pre-Employment Screening, Security Awareness Training, Disciplinary Process, Termination & Change.

Physical & Environmental Security (4)

Physical Security Policy, Secure Areas, Equipment Security, Clear Desk / Clear Screen.

Operations Security (6)

Change Management, Capacity Management, Malware Protection, Backup Policy, Logging & Monitoring, Technical Vulnerability Management.

Incident Management (4)

Incident Response Plan, Incident Classification, Forensic Investigation, Lessons Learned.

Business Continuity (4)

BCP Policy, Disaster Recovery Plan, Backup & Recovery, Crisis Communication.

Data Protection & Cryptography (4)

Data Protection Policy, Encryption Policy, Key Management, Data Retention & Disposal.

Network & System Security (4)

Network Security Policy, Firewall Management, Wireless Security, System Hardening.

Let amara recommend

After running your ISO 27001 assessment, amara recommends which templates to generate first based on your compliance gaps.

Generating a Document

Step-by-step guide to generating your first policy document from a template.

Document Dialog Workflow

4-step workflow: Select → Generate (AI fills ~1,500 fields) → Review (version-tracked) → Approve (locked)

1

Select a template

Navigate to Document Dialog in the sidebar. You'll see 44 templates arranged by category (Governance, Access Control, Incident Management, etc.). Each template shows which ISO 27001 Annex A controls it covers, so you can match it to your assessment gaps.

Not sure which to pick? If you've already run an ISO 27001 assessment, amara highlights recommended templates -- the ones that address your lowest-scoring controls. If you haven't, start with the Information Security Policy (the master document everything else references).

2

Generate the document

Click Generate on your chosen template. Here's what happens behind the scenes:

  • FIELD tokens (like {FIELD:org_name}) are replaced with your organisation data -- company name, CISO contact, DPO email, sector, etc.
  • BLOCK tokens (like {BLOCK:asset_list}) pull live data from the database -- your actual asset inventory, supplier list, or risk register.
  • DATE tokens insert current dates, and CALC tokens run database queries (e.g., risk count, asset totals).

The result is a first draft that's already 80% complete with your real data. Generation takes 5-15 seconds depending on document complexity.

3

Review and edit

The generated document opens in the built-in editor. Read through it and make adjustments:

  • Add org-specific procedures -- the template gives you a framework, but you know your specific processes. Add your escalation paths, your specific tools, your team names.
  • Remove what doesn't apply -- if a section covers remote work and you're fully on-site, delete or modify it.
  • Adjust the tone -- templates are written in formal policy language. If your org prefers a more approachable style, adapt accordingly.

Every save creates a new version. Reviewers can add inline comments. Change tracking shows who edited what and when -- all visible in the version diff view.

4

Approve and lock

When the document is ready, submit it for approval. The designated approver (typically CISO or ISMS Manager) reviews and signs off. Once approved:

  • The document is locked -- no more edits. To change it, you create a new version.
  • A 12-month review reminder is set automatically.
  • The full text is indexed in the RAG knowledge base, so Ask amara can answer questions about your policies using the actual approved content.
  • The document becomes available as compliance evidence in audit evidence packages.

Troubleshooting common issues

If your generated document doesn't look right, here's what to check:

ProblemCauseFix
Fields show {FIELD:org_name} instead of your company nameOrganisation settings are incompleteGo to Admin → Org Settings and fill in the missing fields. Then re-generate the document.
BLOCK sections are empty (e.g., no asset list)No data in that module yetRegister some assets/risks/suppliers first, then re-generate. The BLOCK tokens pull from live data -- if there's nothing in the database, the block is empty.
Document looks generic / not customisedTemplate was generated before org settings were configuredDelete the draft and re-generate. amara uses the settings at generation time, not retroactively.
Review reminder not appearingDocument still in Draft statusReview reminders only activate after a document is Approved. Draft documents don't trigger reminders.
Ask amara doesn't know about the policyDocument hasn't been approved yetOnly Approved documents are indexed in the RAG knowledge base. Draft and In Review documents are not searchable by the AI.
Generate early, even with incomplete data

It's better to generate a document with partial data and improve it over time than to wait until everything is perfect. The version control system means you can always see what changed, and re-generating updates the dynamic fields with your latest data.

Version Control

Auditors love one thing above all: proof that you can show exactly who changed what, when, and why. In amara, every time you save a document, a new immutable version is created. You can never lose a previous version, and you can always compare any two side by side.

How versioning works

Every time you save a document, amara creates a new version with a timestamp, author ID, and change summary. Previous versions are never overwritten.

Version states

StateWho can editCan be approved?
DraftAuthor, editorsNo -- needs review first
In ReviewReviewers (comments only)Yes, by approver
ApprovedNo one (locked)Already approved
ArchivedNo one (read-only)Historical reference

Diff view

Compare any two versions side by side. Green = added, Red = removed, Yellow = changed.

7-year retention

All document versions are retained for 7 years minimum, meeting ISO 27001 and GDPR record-keeping requirements.

ISP Generator

If ISO 27001 is your destination, the Information Security Policy is your roadmap. It's the master document that defines how your organisation approaches security -- from who's responsible for what, to how you handle incidents, to what encryption standards you use. amara auto-generates the entire ISP skeleton (49 files) from your organisation data, so you're not starting from a blank page.

49
Source Files
1,205
Lines
8+4
Sections + Appendices
12
Implementation Guidelines

How to generate your ISP

1

Navigate to ISP in the sidebar

Under Resources, click ISP. You'll see the ISP module with sections for each part of the policy framework.

2

Click Generate ISP Skeleton

amara pulls your organisation name, sector, contacts, and other settings from the database and generates all 49 files. This takes about 30 seconds.

3

Review and customise

Browse through the generated sections. The content is pre-written but customisable -- add your specific procedures, remove sections that don't apply, adjust wording to match your organisation's voice.

4

Approve

Once reviewed, the ISP is locked and versioned. All 49 files are indexed in the AI knowledge base, so Ask amara can answer questions about your security policy.

What's in the ISP?

Think of the ISP as your organisation's security constitution. It's not one document -- it's 49 interconnected files that together define everything about how your organisation handles information security. From "who's responsible for security?" to "how do we encrypt data?" to "what happens when there's a breach?" -- it's all here.

When amara generates the ISP, it pulls your company name, sector, contacts, and other org settings from the database and weaves them into every document. You're not filling in templates -- the system is generating a customised policy framework for your specific organisation.

ISP structure

SectionContents
1. IntroductionPurpose, scope, applicability
2. Information Security PrinciplesCIA triad, risk-based approach
3. Roles & ResponsibilitiesCISO, DPO, asset owners, all staff
4. Risk ManagementMethodology, acceptance criteria
5. Access ControlAuthentication, authorisation, reviews
6. Incident ManagementResponse procedures, reporting
7. Business ContinuityBCP, DRP, recovery objectives
8. Compliance & AuditRegulatory requirements, audit schedule

Review Cycles

A policy that nobody reviews for two years isn't a policy -- it's a liability. Auditors check when your documents were last reviewed, and "we forgot" isn't an answer they accept. amara sends automatic reminders and tracks review status so no document falls through the cracks.

Review Cycle Options

CycleTypical Use Case
MonthlyRapidly changing policies (security bulletins)
QuarterlyOperational procedures
Semi-AnnualAccess control, incident response
AnnualMost ISMS policies (default)
BiennialStrategic policies, governance

Review Workflow

1

Notification

14 days before the review due date, the document owner receives an email: "Your Access Control Policy (v2.1) is due for annual review on April 18. Please review and update if needed." The document also appears with a Due Soon badge on your dashboard.

2

Review Decision

Open the document and read through it. You have three options, and here's how to choose between them:

  • No Changes (Re-approve): Everything is still accurate. The policy reflects current practice, no laws have changed, no org structure changes affect it. Click "Re-approve" -- the review is recorded in the audit trail, the review date resets, and the document keeps its current version number. Example: Your Data Classification Policy still has the right categories and nothing has changed in your data handling.
  • Minor Update (Edit + Approve): Small tweaks needed -- a contact name changed, a tool was replaced, a sentence needs clarification. You edit the document (creating a new version automatically), then approve the updated version. Example: Your Incident Response Plan still references "Slack" but you've switched to "Teams" for crisis communication. Quick find-and-replace, re-approve.
  • Major Revision (New Draft Cycle): Significant changes needed -- a new regulation affects the policy, your org restructured, or the policy no longer reflects reality. The document goes back to "Draft" status, goes through the full review and approval cycle again. Example: NIS2 came into force and your Business Continuity Policy needs entirely new sections on incident reporting deadlines and supply chain requirements.
3

Approval

The designated approver (typically CISO or ISMS Manager) reviews the decision. For "No Changes" and "Minor Update," this is usually a quick sign-off. For "Major Revision," the approver waits until the new draft has been fully reviewed before approving.

4

New cycle set

Once approved, the next review date is automatically calculated based on the document's review cycle setting (monthly, quarterly, semi-annual, annual, or biennial). The clock resets from the approval date, not the original due date -- so if a review was 2 weeks late, you still get a full cycle from the actual review date.

Dashboard visibility

Your document dashboard shows the review status of every policy at a glance:

Batch your reviews

If you generated all your policies in the same week, they'll all come due for review in the same week next year. Consider staggering review cycles -- approve some documents a month apart so you're reviewing 3-4 policies per month instead of 20 in one week. Set this up when you first approve the documents.

Training University -- Overview

NIS2 Article 20 makes management personally liable for cybersecurity training. amara includes a complete training platform with 20 role-based courses, from board-level governance awareness to specialist penetration testing skills. Each course has 24 knowledge cards and 24 quizzes, with SHA-256 signed certificates that serve as direct compliance evidence.

How training works for you

If you're a learner

When your admin assigns you a role (e.g., "Operations" or "CISO"), the relevant courses are automatically assigned to your account. Open Training from the sidebar and you'll see your assigned courses with progress bars. Each course follows the same pattern:

  1. 24 Knowledge Cards -- visual, role-specific learning content. Read through them at your own pace.
  2. 24 Quizzes -- 5 questions per quiz. You need 70% to pass each one. If you score below 65%, amara suggests re-reading specific cards before retrying.
  3. Certificate -- once you pass all quizzes, a SHA-256 signed certificate is issued automatically. It's valid for 12 months and serves as compliance evidence for NIS2 Art. 20 and ISO 27001 Control 6.3.

If you're a training admin

You can assign courses individually or in bulk (by department, by role, or for all new employees). The admin dashboard shows overall completion rates, overdue users, failed quiz questions (to identify knowledge gaps), and certificates expiring in the next 90 days.

Board training is not optional

Under NIS2 Article 20, management bodies are personally liable for ensuring cybersecurity measures. The EXEC_BOARD and EXEC_MGMT courses are specifically designed for this requirement. Make sure board members complete them before any NIS2 audit.

20
Role-based Courses
1,008
Content Files
480
Quizzes
100%
NIS2 Art. 20/21
Training & Awareness Module

ENISA ECSF framework: 12 specialist + 2 executive + 6 functional roles, with NIS2 Art. 21 C7 compliance

Training Completion by Role

The Three Training Tiers

Specialist Tier (12 Roles)

ENISA ECSF framework: CISO, Cyber Incident Responder, Cyber Legal/Policy/Compliance, Cyber Threat Intelligence Specialist, Cybersecurity Architect, Cybersecurity Auditor, Cybersecurity Educator, Cybersecurity Implementer, Cybersecurity Researcher, Digital Forensics Investigator, Penetration Tester, Vulnerability Manager.

Executive Tier (2 Roles)

Board of Directors (NIS2 Art. 20 governance liability) and Management (operational security oversight).

Functional Tier (6 Roles)

Operations (mandatory baseline for all staff), HR, Finance, Development, Legal, Procurement.

Training Course Completion Flow

Admin assigns role → mandatory courses auto-assigned → 24 knowledge cards + 24 quizzes → certificate issued (12-month validity)

Quick Start

Assign the FUNC_OPS role (Operations Awareness) to all users as a baseline. Then layer specialist and executive roles on top.

How Training connects to other modules

Course Catalogue -- 20 Courses

All 20 courses follow the same proven structure: learn with visual Knowledge Cards, then prove your understanding with quizzes. Here's the full catalogue organised by the three training tiers.

Why role-based training?

A one-size-fits-all security training is a waste of everyone's time. Your CISO doesn't need "how to spot a phishing email" and your receptionist doesn't need "advanced penetration testing methodology." amara's training is based on the ENISA European Cybersecurity Skills Framework (ECSF) -- the EU's official framework for cybersecurity roles and competences.

Each role gets courses tailored to their responsibilities. A developer learns about secure coding and dependency management. A board member learns about governance liability and strategic oversight. A procurement officer learns about supplier contract security clauses. Everyone gets what's relevant to their job -- and nothing they don't need.

The three training tiers

Specialist Tier (12 courses) -- for cybersecurity professionals. Based directly on ENISA ECSF role definitions. Think: CISO, incident responder, penetration tester, security architect.

Executive Tier (2 courses) -- for board members and management. Focused on governance, liability, and strategic decision-making. These exist because NIS2 Article 20 makes executives personally liable.

Functional Tier (6 courses) -- for everyone else, tailored by department. Operations (mandatory baseline for all staff), HR, Finance, Development, Legal, Procurement. Each focuses on the security aspects most relevant to that function.

Tier 1: ECSF Specialist Courses (12)

ENISA CodeCourse TitleWho takes it
CISOChief Information Security OfficerCISO, Security Director
CIRCyber Incident ResponderSOC analysts, incident team
CLPCCyber Legal, Policy & ComplianceLegal, compliance officers
CTISCyber Threat IntelligenceThreat analysts
CACybersecurity ArchitectSecurity architects
CAUCybersecurity AuditorInternal auditors
CECybersecurity EducatorTraining managers
CICybersecurity ImplementerSecurity engineers
CRCybersecurity ResearcherR&D, innovation team
DFIDigital Forensics InvestigatorForensic analysts
PTPenetration TesterPen testers, red team
VMVulnerability ManagerVulnerability analysts

Tier 2: Executive Governance (2)

CodeTitleContent
EXEC_BOARDBoard Cyber GovernanceNIS2 Art. 20 liability, strategic oversight
EXEC_MGMTManagement Security OversightOperational security, budget, risk acceptance
NIS2 Art. 20

Management bodies are personally liable for ensuring cybersecurity measures. Board training is not optional.

Tier 3: All-Staff Awareness (6)

CodeTitleFocus
FUNC_OPSOperations AwarenessMandatory baseline for all staff
FUNC_HRHR Security AwarenessPersonnel security, onboarding/offboarding
FUNC_FINFinance SecurityFinancial fraud, payment security
FUNC_DEVDeveloper SecuritySecure coding, OWASP, dependency management
FUNC_LEGALLegal Data ProtectionGDPR, NIS2 legal requirements
FUNC_PROCUREMENTProcurement SecuritySupplier risk, contract security clauses

Knowledge Cards & Quizzes

Training in amara isn't a boring slideshow. Each course uses visual Knowledge Cards (think flashcards with depth) to teach concepts, followed by quizzes to make sure the knowledge sticks. The system adapts -- if you're struggling, it suggests specific cards to re-read.

Knowledge Card Format

Think of knowledge cards like flashcards with depth. Each card teaches one concept, in a way that's specific to your role. A CISO card about incident response covers governance and liability. A developer card about incident response covers secure logging and evidence preservation. Same topic, different angle.

Each card contains:

Quiz Format

After every set of knowledge cards, you face a quiz. Here's how they work:

Example quiz question

Here's a real example from the CISO course, Quiz 12 (Incident Response):

Sample Question (multi-select)

Under NIS2, which of the following incident reporting deadlines must an essential entity meet?

A. Early warning to the national CSIRT within 24 hours
B. Full incident notification within 72 hours
C. Detailed technical report within 7 days
D. Final report within 30 days (or 1 month of resolution)
E. Public disclosure within 48 hours

Correct answers: A, B, D. Option C is wrong (no 7-day requirement). Option E is wrong (NIS2 doesn't mandate public disclosure to general public).

Questions are designed to test practical knowledge, not trivia. They focus on "what would you do in this situation?" rather than "what year was this regulation published?"

Adaptive Difficulty

If you score below 65% on a quiz, amara doesn't just tell you "try again." It analyses which questions you got wrong, maps them back to the knowledge cards that cover those topics, and says something like: "You missed questions about incident classification and reporting timelines. We recommend re-reading Cards 11-13 before retrying."

This targeted guidance means you're not re-reading the entire course -- just the parts you need to strengthen. Most people pass on the second attempt after reviewing the suggested cards.

Custom Content

Admins can add organisation-specific knowledge cards and quizzes alongside the standard ECSF content. For example, you might add a card about your specific incident response procedure, or a quiz about your company's password policy. Custom content follows the same format and is mixed into the course flow.

Certification & Competency Records

When someone completes a training course, amara issues a tamper-proof certificate. It's not just a nice PDF -- it's cryptographically signed so nobody can fake it, and it serves as direct evidence for NIS2 Article 20 and ISO 27001 Control 6.3 audits.

Certificate Data Fields

FieldExampleNotes
Certificate IDCERT-CISO-0042-20260405Format: CERT-{ROLE}-{USER_ID}-{DATE}
User NameMax MustermannFull legal name
CourseCISO -- Chief Information Security OfficerENISA ECSF role code + title
Score87%Average across all 24 quizzes
Completion Date2026-04-04ISO 8601
Expiry Date2027-04-0412-month validity
SHA-256 Hasha3f2...Tamper-proof verification
Issuing OrgMustermann GmbHFrom org settings
amara Version(current)Platform version at issuance

Re-Certification

Certificates expire after 12 months. 30-day advance notice sent. User must retake the course to re-certify.

Audit-Ready Proof

SHA-256 signed certificates serve as tamper-proof evidence for NIS2 Art. 20, ISO 27001 Control 6.3, and DORA Art. 13 compliance.

Training Analytics (Admin)

As a training admin, you need to answer one question quickly: "Is everyone trained, and can I prove it?" This dashboard gives you that answer -- completion rates by role, overdue users, expiring certificates, and the ability to assign courses in bulk.

Dashboard Views

Organisation Overview

This is your "are we compliant?" view. When you open Training Analytics, you'll see:

Course-Level Analytics

Drill into any specific course to see:

Individual User View

Click any user to see their complete training profile:

This view is what you'll pull up when an auditor asks "show me that your CISO has completed cybersecurity governance training." One click, full evidence.

Compliance Reporting Integration

Training data doesn't just live in the Training module -- it feeds directly into compliance evidence:

NIS2 Preparation

Verify 100% EXEC_BOARD and EXEC_MGMT completion before your NIS2 assessment. Management liability under Art. 20 requires documented training.

Ask amara -- Your GRC Co-pilot

Instead of navigating dashboards and exporting reports, just ask a question. "What are my top 10 risks?" "Which suppliers access critical systems?" Ask amara queries your actual data and gives you grounded answers in seconds -- and your data never leaves your server.

How to use Ask amara

Click Ask amara under Resources in the left sidebar. You'll see a clean chat interface with the greeting "Hello! I'm amara -- How can I help you today?" At the bottom, there's an input box labelled "Message amara..." with a send button. Type your question in natural language (English or German) and press Enter or click the arrow.

Your messages appear on the right side, amara's responses on the left. Below the input, a small disclaimer reminds you to "verify important information" -- because while amara is 98% accurate, you should always double-check critical decisions.

Try these queries right now

Here are real queries you can try, ordered from simple to complex:

Try this queryWhat you'll getSpeed
"How many assets do we have?"Exact count from the database, broken down by categoryInstant (~0.02s)
"Show me our top 5 risks"Ranked list with scores, owners, and treatment statusInstant (~0.02s)
"Which suppliers are overdue for review?"List of suppliers past their annual review dateInstant (~0.02s)
"What does our access control policy say about remote work?"Relevant excerpts from your approved policy documents~3 seconds (RAG search)
"What's our biggest NIS2 compliance gap?"Analysis of your assessment scores identifying weakest domains~8 seconds (AI analysis)
"Draft a risk treatment plan for unpatched servers"A structured treatment plan based on your actual risk data~10 seconds (AI drafting)

Why Ask amara answers are different from ChatGPT

When you ask "How many critical assets do we have?", Ask amara doesn't guess -- it runs a real database query against your asset register and returns the exact number. When you ask about policies, it searches your actual approved documents, not the internet. Every answer is grounded in your data.

Data sovereignty

In local mode, your questions and data never leave your server. The AI model runs on your hardware, the vector database is local, and every query is logged in the audit trail. There are no API calls to external services.

98%
Query Accuracy
33
Database Functions
0.02s
Fast Path Speed
0
Hallucinations in 100-query test

How the AI decides what to do with your question

Ask amara uses a 3-tier system to route your question to the fastest, most accurate answer:

1

Fast Path (instant, ~70% of queries)

Simple counts, lookups, and status queries. 233 keyword patterns match your question to one of 33 pre-built database functions. The AI never touches the database directly -- it picks from safe, pre-defined queries. 100% accuracy, zero cost.

2

RAG Search (~3 seconds)

Policy questions and compliance guidance. The system searches your approved documents using semantic similarity (not just keywords). It finds relevant passages and quotes them with references. Used when you ask about what your policies say.

3

Local LLM (~8 seconds)

Complex analysis, drafting, and multi-step reasoning. The local AI model processes your question with full context from the database and documents. Used for "draft me a..." and "analyse my..." type queries.

Ask amara Pro Pipeline

Query pipeline: Compliance Gate → Smart Router → Privacy Shield → LLM + Audit

MCP Architecture Overview

Full architecture: MCP integrations → amara GRC → Ask amara Pro → Local LLM → MCP server outbound

What you can ask

Question typeExampleRouted to
Counts"How many active assets?"Database (Tier 1)
Specific data"Show critical risks"Database (Tier 1)
Policy questions"What does our access control policy say?"RAG (Tier 2)
Analysis"What's our biggest compliance gap?"Local LLM (Tier 3)
Drafting"Draft a risk treatment plan"Local LLM (Tier 3)
Complex reasoning"Compare our NIS2 posture to last quarter"Cloud opt-in (Tier 4)
Your data never leaves your server

Tier 1-3 queries are processed entirely on-premise. Tier 4 (cloud) is opt-in only and requires explicit user consent per query.

4-Tier Query Routing

When you ask amara a question, it doesn't just throw everything at an AI model. It figures out the fastest, most accurate way to answer you. Simple counting questions get instant database answers. Policy questions search your documents. Complex analysis goes to the local AI. Here's how the routing works under the hood.

Ask amara Smart Router Tiers

Tier 1: Database (33 functions, ~0 cost) → Tier 2: RAG (vector search, ~0 cost) → Tier 3: Local LLM → Tier 4: Cloud opt-in

The 4 intelligence tiers

TierTechnologySpeedBest forCost
1. Database33 SQL functions<1sExact counts, specific records~0
2. RAG SearchVector database1-3sPolicy questions, document search~0
3. Local LLMOn-premise model5-15sAnalysis, drafting, reasoning~0
4. Cloud opt-inClaude / GPT3-10sComplex reasoning, multi-stepPer-query

~70% of queries resolve at Tier 1 or 2 (instant, zero cost).

How the router decides: a behind-the-scenes look

When you type a question, the Smart Router doesn't use AI to classify your query -- that would add latency. Instead, it uses a fast keyword-matching system with 233 patterns. Here's how the decision flows:

Tier 1 decision: "Can I answer this from the database?"

The router scans your query for keywords like "how many," "count," "list," "show me," "top," "overdue," combined with module terms like "assets," "risks," "suppliers," "training." If a pattern matches, the router picks one of the 33 pre-built SQL functions. No AI is involved at all -- it's a direct database query, which is why it's instant and 100% accurate.

Example: "How many critical assets do we have?" matches a keyword pattern and routes to the appropriate database function. Result appears in ~20 milliseconds.

Tier 2 decision: "Is this about policy content?"

If no database pattern matches, the router checks for policy-related keywords: "policy," "says," "what does," "according to," "procedure for." If detected, it sends the query to the vector database for semantic search against your approved documents. The embedding model converts your question into a high-dimensional vector and finds the most similar passages in your document library.

Example: "What does our access control policy say about remote work?" has no database function for this -- but the vector search finds the relevant section in your approved Access Control Policy and returns the actual text with page references.

Tier 3 decision: "This needs reasoning"

If neither Tier 1 nor Tier 2 can handle it, the query goes to the local LLM. This handles analysis, drafting, comparison, and "help me think about" queries. The LLM receives your question plus relevant context from the database and documents, so its answers are grounded in your actual data.

Example: "Draft a risk treatment plan for our unpatched server vulnerability" requires the LLM to look at your specific risk, the linked asset, current controls, and your org context to generate a meaningful plan.

Tier 4 decision: "This is beyond local capability"

The cloud tier is only used when explicitly opted in. It handles queries that exceed the local model's context window or require more sophisticated reasoning (multi-step analysis, long-form report generation, cross-quarter trend analysis). You'll see a consent dialog before any data is sent externally.

How to write better queries

The routing system is designed to work with natural language, but a few tips help you get faster, better answers:

Keep GPU warm

A background ping every 15 seconds keeps the local LLM loaded in memory. Without this, the first Tier 3 query after idle time would take 30-60 seconds to load the model. With it, Tier 3 responses stay consistently at 5-15 seconds.

What You Can Ask -- By Module

Ask amara has 33 pre-built database queries covering every module. The AI never writes raw SQL -- it picks from a curated, tested set. That's why the accuracy is 98% with zero hallucinations. Here's what you can ask, organised by module.

Assets (5 queries)

Try asking...What you'll get
"How many assets do we have?"Total count by category
"Show me our hardware assets"Filtered list by category
"Tell me about asset #42"Full asset record with CIA scores
"Which assets are critical?"All assets with high CIA scores
"Give me an asset status overview"Breakdown by status (Active, Inactive, Retired, etc.)

Risks (7 queries)

Try asking...What you'll get
"How many risks do we have?"Total count
"Show me our cyber risks"Risks filtered by category
"What are our highest risks?"All risks scoring 10 or above
"Any overdue risk treatments?"Treatments past their deadline
"Risk score breakdown"Distribution histogram of all risk scores
"Risk trend last 6 months"Monthly risk counts over time
"Which assets have risks?"Risk-to-asset mapping

Suppliers (6 queries)

Try asking...What you'll get
"How many suppliers do we have?"Total count
"Show suppliers by category"Breakdown by type (Cloud, IT Services, etc.)
"Which suppliers are critical?"High-criticality vendors
"Supplier approval status"Breakdown by approval phase
"Which suppliers are overdue for review?"Suppliers past their review date
"Which suppliers are linked to our assets?"Supplier-asset dependency map

Compliance (5 queries)

Try asking...What you'll get
"What's our NIS2 compliance score?"Current NIS2 compliance percentage
"How far are we with ISO 27001?"ISO maturity percentage
"Show our latest rapid assessment score"Most recent Rapid Assessment results
"What are our biggest compliance gaps?"Gaps ranked by severity
"Compare our ISO and NIS2 scores"Side-by-side framework comparison

Training (4 queries)

Try asking...What you'll get
"What's our training completion rate?"Completion rates by role and user
"Who hasn't completed mandatory training?"Users with overdue courses
"Which certificates expire in the next 90 days?"Upcoming certificate expirations
"Do all CISOs have the CISO course assigned?"Role-to-course coverage check

Documents (4 queries)

Try asking...What you'll get
"Which policies are approved?"Status of all documents
"Any overdue document reviews?"Documents past their review date
"How many templates have we used?"Template generation statistics
"Show version history for our Access Control Policy"Full version log for a specific document

Reporting (2 queries)

Try asking...What you'll get
"Give me a GRC executive summary"Cross-module executive overview
"Export our risk register as CSV"Triggers data export in your chosen format

Privacy Shield & Data Sovereignty

For many organisations -- hospitals, government agencies, defence contractors, anyone handling classified data -- sending compliance information to a cloud API simply isn't an option. amara is built from the ground up so your data never has to leave your building.

What does "data sovereignty" actually mean here?

It means three things: (1) The AI model runs on your hardware -- no API calls to OpenAI, Google, or anyone else. (2) The vector database for document search is local. (3) Every query and response is logged in your own audit trail. When you ask amara "What are my top risks?", the question, the database query, and the answer all happen inside your infrastructure. Nothing phones home.

Data Classification Levels

4 classification tiers: Public → Internal → Confidential → Restricted (each with ISO controls mapped)

What "Privacy Shield" means

  1. Local-first AI: The LLM runs on your hardware. No API calls for Tier 1-3.
  2. PII scrubbing: Multi-layer PII detection pipeline scrubs personal data before any cloud query.
  3. Consent per query: Tier 4 cloud queries require explicit user consent each time.
  4. Full audit trail: Every AI interaction is logged -- query, response, tier used, data accessed.

GDPR Compliance

With local AI: no DPA needed, no DPIA required, no Art. 46 international transfers. Your data stays in your infrastructure.

Air-Gap Deployment

Docker images loaded via removable media. Pre-downloaded models. Zero network dependency after initial setup.

BSI C5 Compliant

amara's architecture meets BSI C5 criteria for data residency, encryption, and access control.

Base vs. Pro AI Mode

amara gives you a choice: keep everything 100% local (Base mode -- your data never leaves your server), or opt into cloud AI for harder questions (Pro mode -- higher quality, but queries go to an external API). Most organisations start with Base and never need Pro.

When to use which mode

Base mode is the default and handles the vast majority of queries. It runs a local AI model on your hardware -- no internet needed, no API costs, no data leaving your building. For questions like "how many critical assets?", "show my top risks", or "what does our password policy say?" -- Base mode gives you 98% accuracy at zero cost.

Pro mode adds a cloud AI (like GPT-4o or Claude) for queries that need more sophisticated reasoning: multi-step analysis, comparing trends across quarters, drafting complex treatment plans, or generating detailed executive summaries. It's better for open-ended "help me think about this" questions. But it means your query goes to an external API, so you need a Data Processing Agreement under GDPR Article 28.

The practical advice: start with Base. If you find yourself wishing the answers were more nuanced or detailed, try Pro for those specific queries. You can switch modes at any time -- it's not a permanent choice.

Comparison

FeatureBasePro
Data sovereignty100% localCloud opt-in
Query quality98% accuracy99%+ accuracy
Complex reasoningGoodExcellent
Cost per query~0 (hardware only)Per-token pricing
Speed5-15s (Tier 3)3-10s
Air-gap compatibleYesNo
DPA requiredNoYes
Multi-languageGoodExcellent
Context window128K tokens200K+ tokens
Legal Requirement

Using Pro mode (cloud AI) requires a Data Processing Agreement with the cloud AI provider under GDPR Art. 28.

Reporting -- Overview

When your board asks "where do we stand on compliance?" or an auditor asks "show me your evidence" -- this is where you go. One-click PDF reports, complete audit evidence packages, and live dashboards. What used to take 40 hours of preparation now takes 40 seconds.

How to generate a report

Open Reporting from the sidebar. You'll see 28 pre-built report templates organised by audience (board, CISO, auditor, operational). Here's how to generate one:

1

Pick a template

Choose based on your audience. For a board meeting: Executive GRC Summary. For an auditor: Audit Evidence Package. For weekly ops: Risk Treatment Burndown.

2

Set parameters

Date range, which modules to include, confidentiality label, language (DE/EN).

3

Click Generate

amara pulls live data from all relevant modules, generates charts, compiles evidence, and produces a branded PDF with your organisation's logo. The Evidence Package creates a structured ZIP file with folders for each compliance requirement.

Board report in 3 charts

The most effective board presentation uses three charts: Compliance Score Trend (are we improving?), NIS2 Domain Radar (where are we strong/weak?), and Risk Heatmap (what are our biggest risks?). All three are in the Executive GRC Summary template.

Reporting & Analytics Overview

18 report routes, 28 templates, 44 charts, 1-click PDF export

Who Uses Reports and When

AudienceReport TypeFrequency
Board / C-LevelExecutive GRC SummaryMonthly / Quarterly
CISORisk Dashboard, Compliance TrendWeekly
AuditorEvidence Package, SoAPer audit
Compliance OfficerNIS2 / ISO ProgressMonthly
Risk ManagerRisk Register, Treatment BurndownWeekly
HR / TrainingTraining CompletionMonthly

28 Report Templates

28 report templates, each pre-formatted with your logo and branding, generated from live data. Pick a template, set a date range, click Generate.

Which reports should I start with?

You don't need all 28. Here are the 5 most useful reports for different situations:

SituationReportWhy
Board meeting next weekGRC Executive SummaryOne-page overview: compliance trend, top risks, key metrics
Auditor comingAudit Evidence PackageComplete ZIP with all evidence, structured by requirement
CISO weekly reviewRisk Heatmap + Treatment ProgressWhere are risks clustered? Are treatments on track?
NIS2 deadline approachingNIS2 Compliance ReportCurrent score, gaps, remediation status per domain
Training compliance checkOverdue Training ReportWho hasn't completed mandatory courses?

All 28 templates by category

Executive reports (4)

For board members and C-level. High-level summaries with charts, no technical detail: GRC Executive Summary, Board Risk Report, Compliance Dashboard, KPI Scorecard.

Risk reports (5)

For CISOs and risk managers. Risk distribution, treatment tracking, trend analysis: Risk Register, Risk Heatmap, Treatment Progress, Residual Risk Summary, Risk Trend Analysis.

Compliance reports (7)

For compliance officers and auditors. Framework-specific scores and gap analysis: Rapid Assessment Report, ISO 27001 Gap Analysis, NIS2 Compliance Report, BSI C5 Status, SoA Document, Cross-Framework Summary, Remediation Roadmap.

Asset reports (3)

For IT asset managers. Inventory, classification, and lifecycle status: Asset Register, CIA Classification Summary, Asset Lifecycle Report.

Supplier reports (3)

For procurement and vendor managers. Vendor risk landscape: Supplier Register, Criticality Matrix, Approval Status Report.

Training reports (3)

For HR and training admins. Compliance status per person: Completion Dashboard, Certificate Register, Overdue Training Report.

Cross-module reports (3)

For auditors and annual reviews. Everything in one package: Full Audit Evidence Package, Data Flow Report, Annual Review Summary.

Audit Evidence Packages

The night before an audit, most people panic. With amara, you click one button and get a complete, structured evidence package -- assessment results, approved policies, risk register, training certificates, supplier records, and full audit trail -- all in a ZIP file ready to hand over.

Why evidence packages matter

An audit isn't about whether you think you're secure. It's about whether you can prove it. The auditor will ask: "Show me your risk register. Show me who approved this policy. Show me that your board completed cybersecurity training. Show me your supplier security assessments." Without documented evidence, all your hard work counts for nothing.

Traditional approach: spend 2-3 weeks gathering screenshots, exporting spreadsheets, chasing sign-offs, and compiling everything into a folder structure. With amara: click Generate Evidence Package, wait 30 seconds, download a ZIP file. Everything is already there because you've been working in the system all along.

ISO 27001 Package includes

NIS2 Package includes

Generating an Evidence Package

1

Navigate to Reporting → Evidence Packages

2

Review checklist

amara shows what's included and flags any gaps.

3

Resolve gaps

Missing evidence highlighted in red. Direct links to fix.

4

Generate and download

ZIP file with structured folder hierarchy, ready for auditor handoff.

Charts & Visualisations

Numbers in tables are hard to read. Charts tell the story instantly. amara includes risk heatmaps, compliance radar charts, training completion bars, asset distribution donuts, and more -- all interactive and exportable for your presentations.

Available Chart Types

Each chart is designed to answer a specific question at a glance. Here's what you'll see and when each one is most useful:

Risk Heatmap (4x4 matrix)

The heatmap is probably the most powerful single chart in amara. It plots every risk on a Likelihood (y-axis) x Impact (x-axis) grid. Each cell is colour-coded: green (Low, 1-4), yellow (Medium, 5-9), orange (High, 10-15), red (Critical, 16). You can see at a glance where your risks cluster. If you have a pile of dots in the top-right corner (high likelihood, high impact), you know exactly where to focus. Hover over any cell to see the specific risks in that score range.

Best for: Board presentations ("here's our risk landscape"), CISO reviews ("where should I focus this quarter?"), and auditor meetings ("here's proof we prioritise risk treatment").

Compliance Score Trend (time-series line)

A line chart showing your compliance score over 12 months for each framework (ISO 27001, NIS2, Rapid Assessment). The x-axis is time, the y-axis is percentage. Multiple lines let you compare frameworks side by side. An upward trend proves you're improving -- which is exactly what auditors and boards want to see.

Best for: Monthly board reports, tracking improvement after remediation efforts, demonstrating ROI of your GRC program.

Asset Distribution (donut chart)

A donut chart breaking down your assets by category (Hardware, Software, Data, Services, Facilities). The centre shows the total count. Each slice is clickable -- click "Software" and you'll jump to the filtered asset list. Useful for spotting imbalances: if 80% of your assets are hardware but you've only registered 2 data assets, you're probably missing some.

Best for: Asset inventory reviews, completeness checks, management overviews.

Supplier Approval Funnel (funnel chart)

Shows how many suppliers are at each approval stage: Draft, Phase 1 Review, Phase 2 Review, Phase 3 Pending, Approved. A healthy funnel flows smoothly from top to bottom. If suppliers are piling up in Phase 2, your security team might be a bottleneck.

Best for: Supplier management dashboards, identifying process bottlenecks, quarterly supplier reviews.

Training Completion (horizontal bar)

Each bar represents a training tier or department, showing the percentage completed vs. assigned. The bars are colour-coded: green (80%+), yellow (50-79%), red (below 50%). A quick scan tells you which groups need attention. If the Executive tier bar is red, that's a NIS2 Art. 20 liability issue.

Best for: Training admin dashboard, HR reviews, NIS2 preparation ("are all executives trained?").

NIS2 Domain Radar (radar/spider chart)

A 10-pointed radar chart with one axis per NIS2 Article 21 domain (Risk Analysis, Incident Handling, Business Continuity, Supply Chain, etc.). Your scores form a shape -- ideally a full, even polygon. Dents in the shape show your weakest domains at a glance. Comparing two overlaid shapes (this quarter vs. last quarter) shows exactly where you've improved.

Best for: NIS2 gap analysis, identifying your weakest compliance domains, tracking improvement over time.

Risk Treatment Burndown (burndown chart)

Like a project burndown chart but for risk treatments. The x-axis is time, the y-axis is the number of open treatment items. The line should trend downward as treatments are completed. If the line flattens or goes up, treatments are being created faster than they're being resolved -- a sign you need more resources or shorter deadlines.

Best for: Weekly CISO reviews, sprint-style risk remediation tracking, demonstrating progress to management.

ChartTypeUsed in
Risk Heatmap4x4 matrixRisk Management, Dashboard
Compliance Score TrendTime-series lineCompliance, Dashboard
Asset DistributionDonut chartAsset Management
Supplier Approval FunnelFunnel chartSupplier Management
Training CompletionHorizontal barTraining, Admin
NIS2 Domain RadarRadar/spiderNIS2 Compliance
Risk Treatment BurndownBurndownRisk Management

Exporting Charts

All charts can be exported in three formats:

To export, hover over any chart and click the download icon in the top-right corner. Choose your format and the file downloads immediately.

The three-chart board report

For board presentations, these three charts tell the complete story in 60 seconds: Compliance Score Trend (are we improving?), NIS2 Domain Radar (where are we strong/weak?), and Risk Heatmap (what are our biggest risks?). All three are included in the Executive GRC Summary report template -- one click to generate.

Export Formats

Different audiences need different formats. Board members want a polished PDF. Your data analyst wants a CSV. Your SIEM integration wants JSON. amara exports in all of them -- and you can schedule automated exports so they land in your inbox without you lifting a finger.

Format Overview

FormatBest ForAvailable In
PDFBoard reports, auditor handoffAll reports, documents
HTMLSelf-contained sharingReports, dashboards
CSVData analysis, import to other toolsRegisters, audit logs
JSONAPI integration, automationAll data, audit trail
ZIPComplete evidence packagesAudit packages

PDF Export Details

Org logo on every page, searchable text, PDF/A-1b for long-term archiving. Watermark and confidentiality labels configurable.

Automated Exports

Instead of manually generating reports every week, you can schedule them to run automatically. Set it up once, and the right report lands in the right inbox at the right time. Here's how:

Setting up a scheduled export

1

Navigate to Reporting → Scheduled Exports

You'll see a list of any existing schedules and a "+ New Schedule" button.

2

Choose the report and format

Select which report template to use, which format to export (PDF, CSV, JSON), and any parameters (date range, modules to include, language).

3

Set the schedule

Choose the frequency: daily, weekly (pick a day), monthly (pick a date), or quarterly. Set the time -- early morning (e.g., 06:00) works well so the report is ready when people arrive.

4

Set recipients

Enter the email addresses of people who should receive the export. You can send different reports to different people.

Common automated export setups

ExportFormatFrequencyRecipientWhy
Full database backupCSVDaily (03:00)IT AdminSecondary backup alongside PostgreSQL dumps. Belt and suspenders.
Executive GRC SummaryPDFWeekly (Mon 07:00)CISO, CTOManagement stays informed without asking. The report is waiting in their inbox every Monday morning.
Risk Treatment ProgressPDFWeekly (Fri 16:00)Risk ManagerEnd-of-week review: which treatments moved forward, which are falling behind?
Overdue Training ReportPDFMonthly (1st)HR, CISOWho hasn't completed mandatory training? HR can follow up before it becomes a compliance gap.
Audit Trail ArchiveJSONMonthly (1st)Compliance OfficerImmutable audit log export for long-term archiving. Feeds SIEM integration if configured.
NIS2 Compliance ReportPDFQuarterlyBoard, LegalQuarterly compliance snapshot for board reporting and legal documentation.
Set it and forget it

The best time to set up automated exports is right after you finish your initial configuration. Schedule the reports during onboarding and they'll just work -- no one has to remember to generate them manually. When the auditor asks for "the last 6 months of compliance reports," you already have them.

Admin Panel -- Overview

This is the control room for your amara instance. Set up your organisation, create user accounts, assign roles, monitor the audit trail, and manage backups. If you're setting up amara for the first time, start with Organisation Settings -- it powers everything else.

First-time setup checklist

If you're the admin setting up a fresh amara instance, do these in order:

1

Fill in Organisation Settings

Go to Admin → Organisation Settings. Enter your company name, industry sector, employee count, annual revenue, and balance sheet total. This is critical -- the NIS2 relevance engine uses these values to determine if you're in scope, document templates use them to populate your policies, and Ask amara uses them for company-specific answers. Also upload your company logo (it appears on all reports and certificates).

2

Create user accounts

Go to Admin → Users. Create accounts for your team. For each user, set their email, name, department, and assign RBAC roles. Roles are additive -- a CISO typically needs 6+ roles stacked (admin, risk, NIS2, ISO, documents, training admin). A regular employee just needs the Training role.

3

Verify backup schedule

Check Admin → Backup. By default, amara runs daily backups at 03:00 with AES-256 GPG encryption. Verify the schedule is active and test a manual backup to confirm it works.

4

Configure notifications

Set up SMTP so amara can send email alerts for treatment deadlines, document reviews, training reminders, and supplier reviews.

5

Test the audit trail

Make a change somewhere (e.g., edit your own user profile). Then check Admin → Audit Trail to verify the change was logged with timestamp, user ID, and before/after values. Every action in amara is logged here -- this is immutable and retained for 7 years.

24
Total Users
13
Modules Active
147
Audit Events Today
03:00
Last Backup
Module Activity (Last 7 Days)
Docker Compose Production Stack

Production stack: reverse proxy → application server → database + vector store + local LLM

What's in the Admin Panel

SectionWhat You Do Here
Org SettingsCompany name, sector, contacts, NIS2 parameters
User ManagementCreate, edit, deactivate users
Roles & Permissions14 RBAC roles, role stacking
Audit TrailImmutable log of all actions, 7-year retention
Backup & RestoreDaily backups, GPG encryption, PITR
AI ConfigurationModel settings, tier thresholds, GPU config
NotificationsEmail, SMTP settings, alert thresholds
AutomationScheduled tasks, recurring reports
LicenceSubscription status, module activation
Principle of Least Privilege

Limit Super Admin role to 1-3 people. Most users need only their module-specific roles.

14 RBAC Roles -- Reference

This is the full reference for all 14 RBAC roles. Each role is a simple on/off toggle on the user record. Stack multiple roles to create the exact permission set each person needs -- a CISO might need 6 roles, while a regular employee just needs Training.

RBAC Role Reference

14 boolean role columns mapped to job titles: Super Admin, Read Only, Asset Mgmt, Supplier, NIS2, Assessments, ISO, CIA, C5, Risk, Documents, Rapid, Training, Training Admin

How is this different from Users & Roles?

The Users & Roles page explains how to create users and gives you an overview of the 14 roles. This page is the deep reference -- when you need to decide exactly which combination of roles to give someone, or when you want to understand what each role specifically permits and denies.

What each role actually controls

Each role is a boolean toggle (on/off) on the user record. When a role is on, that user can access the corresponding module's features. Here's what each role specifically permits:

RoleCan viewCan create/editCan approve/delete
Super AdminEverythingEverything, including users and settingsEverything, including user deactivation and backup/restore
Read OnlyAll module dashboards and reportsNothingNothing -- view only, perfect for auditors
Asset ManagementAsset register, categories, statusAssets, CIA scores, supplier linksAsset retirement, review sign-off
Supplier Due DiligenceSupplier register, criticality scoresNew suppliers, profile updates, Phase 1Cannot approve Phase 2/3 alone
NIS2 ComplianceNIS2 relevance, assessment, scoresNIS2 assessment answers, remediation itemsAssessment completion, remediation sign-off
Assessments (General)Rapid Assessment resultsRun Rapid Assessments, answer questionsAssessment completion
Assessments (ISO)ISO 27001 assessment, SoAScore controls, upload evidenceSoA generation and approval
Assessments (CIA)CIA assessment formsCIA scores for assetsCIA assessment approval (4-phase)
Assessments (C5)BSI C5 assessment, criteria groupsScore C5 criteria, upload evidenceC5 report generation
Risk AssessmentRisk register, heatmap, treatmentsNew risks, scoring, treatment plansRisk approval, treatment verification
Document DialogTemplate library, generated documentsGenerate documents, edit draftsDocument approval, version locking
Rapid AssessmentRapid Assessment onlyRun assessments, answer questionsAssessment completion
TrainingOwn assigned courses and certificatesTake quizzes, complete coursesNothing -- learner role only
Training AdminAll training data, analytics, all usersAssign courses, create custom contentBulk assignments, certificate management

Recommended role assignments

Here are tested role combinations for common job titles. Remember: roles are additive -- more roles = more access. When in doubt, start with fewer roles and add more as needed.

Job titleRecommended rolesWhy this combination
CISOAdmin + Risk + NIS2 + ISO + Documents + Training AdminNeeds full visibility and approval authority across all security domains
IT Asset ManagerAsset Mgmt + CIARegisters assets and scores their criticality. Doesn't need risk or compliance access.
Risk ManagerRisk + AssessmentsCreates and scores risks, needs assessment context for risk identification
Compliance OfficerNIS2 + ISO + C5 + Rapid + DocumentsRuns all compliance frameworks and generates policy documents
ProcurementSupplier Due DiligenceManages vendor onboarding. Doesn't need visibility into internal risks or assets.
HR ManagerTraining AdminAssigns and monitors training. Add Read Only if they need visibility into other modules.
Internal AuditorRead OnlyFull visibility, zero edit capability. Exactly what an auditor needs.
Security EngineerAssessments + Asset Mgmt + RiskHands-on security work: register assets, run assessments, create risks
Board MemberRead Only + TrainingCan view dashboards/reports and complete mandatory executive training courses
Department HeadTraining + Read OnlyCompletes training and can view (not edit) module dashboards for their domain
Regular EmployeeTrainingCompletes assigned training courses. Can only see their own courses and certificates.
Common pitfalls

Don't give everyone Super Admin. It's tempting to avoid permission issues by making everyone an admin. But this defeats the purpose of RBAC and creates audit findings. Limit Super Admin to 1-3 people.

Don't forget Training for board members. Board members often get only Read Only, but they also need the Training role to complete their mandatory NIS2 Art. 20 courses.

Review roles quarterly. People change jobs, leave the company, or take on new responsibilities. A quarterly role review (takes 15 minutes) ensures permissions stay current.

Organisation Settings

This is the reference for every setting in the Organisation panel. If you're wondering "what does this field actually do?" -- you're in the right place. Each setting is listed with where it's used and why it matters.

Settings Reference

FieldUsed InNotes
Org NameAll documents, reports, certsLegal entity name
SectorNIS2 relevance, risk contextMaps to 18 NIS2 sectors
CountryRegulatory jurisdictionDrives compliance framework selection
Employee CountNIS2 size threshold50/250 boundary
RevenueNIS2 revenue thresholdEUR 10M/50M boundary
Balance SheetNIS2 asset thresholdEUR 10M/43M boundary
CISO ContactRisk ownership, reportsEmail + name
DPO ContactGDPR docs, templatesEmail + name
LogoAll reports, certificatesSVG or PNG, max 2MB
SMTP SettingsNotifications, alertsHost, port, auth
Session TimeoutSecurity policyDefault: 30 minutes

NIS2 Relevance Engine

After setting sector, employee count, revenue, and balance sheet, amara auto-calculates a NIS2 relevance confidence score (0-100%), entity type (Essential/Important/Not in scope), and provides reasoning.

Keep Settings Current

Changes to employee count, revenue, or sector can change your NIS2 classification. Review quarterly.

Audit Trail

Everything that happens in amara is logged -- every record created, every field changed, every login, every AI query. The audit trail is immutable (nobody can delete or edit log entries, not even admins) and retained for 7 years. When an auditor asks "who approved this risk on March 15th?", you have the answer in seconds.

What gets logged

Action typeLogged fields
Record creationWho, when, what module, all field values
Record modificationWho, when, old values, new values
Record deletionWho, when, full record snapshot
Authentication eventsLogin, logout, failed attempts, MFA status
Admin changesRole changes, user creation, settings changes
Document approvalsWho approved, version, timestamp
Risk approvalsTreatment decisions, score changes
AI queriesQuery text, tier used, response summary
Evidence packagesGeneration timestamp, contents, recipient

Accessing the audit trail

Filter by module, date range, user, action type, or record ID. Full-text search across all log entries.

Exporting

FormatUse case
JSONMachine processing, SIEM integration
PDFAuditor handoff, board reporting
CSVData analysis, spreadsheet review

Backup & Restore

Your GRC data is too important to lose. amara runs daily encrypted backups automatically at 03:00, keeps 750+ snapshots (~2 years), and supports point-in-time recovery. If the worst happens, you can restore to any point in time. Only Super Admins can access this.

Backup configuration

SettingDefaultDescription
FrequencyDaily at 03:00Configurable cron schedule
Retention750+ snapshots~2 years of daily backups
EncryptionGPG AES-256Symmetric key, stored separately
LocationLocal + optional remote/backups/ directory
PITREnabledWAL archiving for point-in-time recovery

Manual backup

  1. Navigate to Admin → Backup
  2. Click "Create Manual Backup"
  3. Wait for completion (typically 30-60 seconds)
  4. Download encrypted backup file
  5. Verify integrity via checksum

Restore procedure

Warning

Restore overwrites current data. Create a manual backup before restoring.

  1. Navigate to Admin → Backup → Restore
  2. Select backup file (local or upload)
  3. Enter GPG decryption key
  4. Confirm by typing "RESTORE"
  5. Wait for restore completion
  6. Verify data integrity
  7. Check audit trail for restore event