Service Scan Rail
Use When
AnalysisStrategic Planning
Primary Outputs
- Comms plan + Q&A + timeline checklist
Time to Run
15-30minutes
Quick turnaround service
Inputs Required
Minimum1 fields
Ideal1 fields
Input types: cyber, defensive, resilience
Dream Team
- P4Cyber Security Lead
- P3Digital Forensics Analyst
- P2IT Security Officer
Risk Level
Low
Routine execution
Compliance Gates
ARCS Module
ARCF Validation
Data Provenance
Ethics Review
Overall StatusCompliant
Expected Output
Comms plan + Q&A + timeline checklist.
Required Inputs
SPStrategic Priority
The primary strategic objective or question to address
Quick Selector
Use this template to quickly invoke the service:
SERVICE: S185
SERVICE_NAME: Data Breach Communications Ladder (Truthful)
REQUIRED_INPUTS: SP
RUN WITH:
SP: {{SP}}
RS: {{RS}}
DL: {{DL}} (optional)
OP: {{OP}} (optional)
RUNS181
Embassy Cyber Governance Charter (Defensive)
Create cyber governance: roles, reporting, risk acceptance, incident response, and training cadence.
S182
Threat Modeling for Mission Systems (Non-Exploit)
Build threat model (assets, threats, controls, residual risk); no exploit instructions; include audit appendix.
S183
Critical Infrastructure Cyber Maturity Roadmap
Define maturity stages and prioritized controls; include governance and measurement.