One workbook per pillar.
Each is a self-contained Excel assessment, audit & control tool. Buy a single pillar, or take all five.
1
Pillar 1
Articles 5–16
ICT Risk Management
Assess, audit and control the full ICT risk management framework — governance, the risk lifecycle, asset management, protection, detection and continuity.
Inside the workbook
- Article-by-article control checklist (Art. 5–16)
- ICT risk maturity scorecard (5 levels)
- Governance, roles & risk-appetite register
- Asset & dependency mapping sheet
- Gap register with owners & deadlines
- Evidence tracker & management dashboard
2
Pillar 2
Articles 17–23
ICT Incident Management & Reporting
Classify incidents, drive the regulatory reporting clock and control the whole detection-to-final-report workflow.
Inside the workbook
- Incident classification calculator (RTS criteria)
- 4h / 72h / 1-month reporting timeline tracker
- Article-by-article control checklist (Art. 17–23)
- Incident log & register
- Gap register with owners & deadlines
- Evidence tracker & reporting dashboard
3
Pillar 3
Articles 24–27
Digital Operational Resilience Testing
Plan the testing programme, score TLPT readiness and control every test from vulnerability scan to threat-led penetration test.
Inside the workbook
- Testing programme planner & calendar
- TLPT readiness scorecard (Art. 26–27)
- Article-by-article control checklist (Art. 24–27)
- Test inventory & scope register
- Findings & remediation register
- Evidence tracker & testing dashboard
4
Pillar 4
Articles 28–44
ICT Third-Party Risk Management
Build the Register of Information, audit Article 30 contracts and control concentration risk across the whole third-party estate.
Inside the workbook
- Register of Information template (ITS-aligned)
- Article 30 contract clause checklist
- Concentration risk & CTPP analysis
- Article-by-article control checklist (Art. 28–44)
- Sub-outsourcing & exit-strategy tracker
- Gap register & third-party dashboard
5
Pillar 5
Article 45
Information & Intelligence Sharing
Assess and control participation in cyber threat-intelligence sharing arrangements — scope, safeguards and governance.
Inside the workbook
- Threat-intel sharing arrangement checklist
- Participation readiness scorecard (Art. 45)
- Control checklist & governance register
- Data-protection & confidentiality safeguards
- Gap register with owners & deadlines
- Evidence tracker & sharing dashboard