◆
AIS Platform
KSA-Native AI
🧠
AI Agents
Monitor and launch all 21 autonomous agents
⚡
Full Engagement Run
Run all agents for one client automatically
⬡
Overview
Your compliance dashboard and key metrics
📁
Client Projects
Manage audit and consulting engagements
⬆
Upload Documents
Upload evidence files for AI analysis
📋
Documents & Reports
All generated workpapers and saved outputs
◆
Quick Tools
Generate one document at a time — workpapers, RCM, reports
🧭
All Tools
Browse and search all 43+ compliance tools
💬
Hakim حكيم
Your AI advisor — ask about regulations, tools, or get guided help
📅
Calendar
Compliance deadlines and auto-reminders
⚡
Automations
Chain multiple tools into automated workflows
🔗
Integrations
Connect Slack, email, and government portals
🌐
Client Access
Share reports securely with your clients
⚙
Settings
Workspace, team, and account preferences
⏻
Sign out
IT Security Audit Checklist
KSA · AI-Native
🔒
IT Security Audit Checklist
NCA ECC · SAMA CSF · ISO 27001
عربي
0%
0/27
📊 Generate Findings Report
🔑
Access Control
0%
Role-based access control (RBAC) implemented
Multi-factor authentication on critical systems
Privileged access management (PAM) deployed
Quarterly access reviews completed
Automated deprovisioning on termination
Password policy enforced (complexity, rotation)
🔄
Change Management
0%
Formal change management process documented
Change Advisory Board (CAB) reviews
Segregation of dev/test/prod environments
Rollback procedures documented and tested
Emergency change procedures defined
🚨
Incident Response
0%
Incident response plan documented
CSIRT team established and trained
SAMA/NCA incident reporting procedures
Tabletop exercises conducted quarterly
Forensic investigation capability
🏗️
Business Continuity
0%
Business Impact Analysis (BIA) current
RTO/RPO targets defined and achievable
DR site operational and tested
Annual BCP/DR testing completed
Cloud backup strategy implemented
🛡️
Data Protection
0%
Data classification policy implemented
Encryption at rest and in transit
PDPL (Personal Data Protection Law) compliance
Data loss prevention (DLP) deployed
Data retention and disposal procedures
Third-party data processing agreements
💬
Need guidance?
Ask Hakim — your KSA advisor
⬡
Home
◆
Tools
🤖
Agents
📋
Reports
⚙
More