CyFun Tracker

Reports

Export compliance reports for audits and management review

CSV Export

All 34 controls with scores and details

PDF Report

Print-ready compliance summary

Statement of Applicability

CCB SoA format for NIS2 submission

CyberFundamentals Compliance Report
Generated: 23/3/2026· Basic Level · Overall Score: 63%
Control IDFunctionRequirementKeyStatusScoreDocImpl
ID.AM-1IdePhysical devices and systems are inventoriedPartially72%33
ID.AM-2IdeSoftware platforms and applications are inventoriedPartially65%33
ID.AM-3IdeOrganizational communication and data flows are mappedNot11
ID.AM-5IdeResources are prioritized based on classification and business valueNot11
ID.GV-1IdeOrganizational cybersecurity policy is established and communicatedNon-Compliant30%22
ID.GV-3IdeLegal and regulatory requirements regarding cybersecurity are understood and managedPartially55%33
ID.GV-4IdeGovernance and risk management processes address cybersecurity risksNon-Compliant25%11
ID.RA-1IdeAsset vulnerabilities are identified and documentedPartially60%33
ID.RA-5IdeThreats, vulnerabilities, likelihoods, and impacts are used to determine riskNon-Compliant20%11
PR.AC-1ProIdentities and credentials are issued, managed, verified, revoked, and auditedPartially78%44
PR.AC-2ProPhysical access to assets is managed and protectedCompliant95%44
PR.AC-3(a)ProRemote access is managedPartially70%33
PR.AC-3(b)ProRemote access is secured with multi-factor authentication (MFA)Partially82%44
PR.AC-4(a)ProAccess permissions and authorizations are managedPartially75%33
PR.AC-4(b)ProAccess to critical information is identified and managedPartially68%33
PR.AC-4(c)ProLeast privilege access is enforcedNon-Compliant45%22
PR.AC-4(d)ProAdministrator privileges are not used for daily tasksNon-Compliant35%22
PR.AC-5(a)ProNetwork integrity is protected with firewallsCompliant98%44
PR.AC-5(b)ProNetwork segmentation is implemented where appropriateNot11
PR.AT-1ProAll users are informed and trainedNon-Compliant40%22
PR.DS-3ProAssets are formally managed throughout removal, transfers, and dispositionNot11
PR.IP-4ProBackups of information are conducted, maintained, and testedPartially70%33
PR.IP-11ProCybersecurity is included in human resources practicesNot11
PR.MA-1ProMaintenance and repair of assets is performed and logged with approved toolsCompliant92%44
PR.PT-1ProAudit/log records are determined, documented, implemented, and reviewedCompliant96%44
PR.PT-4ProCommunications and control networks are protectedPartially75%33
DE.AE-3DetEvent data are collected and correlated from multiple sourcesPartially80%44
DE.CM-1DetThe network is monitored to detect potential cybersecurity eventsPartially65%33
DE.CM-3DetPersonnel activity is monitored to detect potential cybersecurity eventsCompliant90%44
DE.CM-4DetMalicious code is detectedCompliant97%44
RS.RP-1ResResponse plan is executed during or after an incidentNon-Compliant15%11
RS.CO-3ResInformation is shared consistent with response plansNot11
RS.IM-1ResResponse plans incorporate lessons learnedNot11
RC.RP-1RecRecovery plan is executed during or after a cybersecurity incidentNon-Compliant10%11