Compliance
Security posture, control register, NIS2 and ISO 27001 mapping
Risk Register
Risk assessment, heat map, PSE exceptions and management action plans
Vendor Management
Third-party risk, assessments, findings and contract timeline
Secrets Management
Azure Key Vault secrets, keys and certificates
PKI Management
Certificate authority, issuance, provisioners and audit log