-
Introduction
-
Getting Started
- First Login
- Dashboard
- Navigation
- User Profile
-
Administration
- User Management
- Tenant Settings
- Activity Log
-
Risk Management
- Risks
- Risk Assessments
- Threats
- Incidents
- Findings
-
Control Management
- Controls
- Control Objectives
- Effectiveness Reports
-
Tasks
- Task Management
-
Compliance
- References
- Requirements
- Requirement Groups
- Evidence
-
Assessments
- Baselines
- Challenges
-
Organization & Assets
- Legal Entities
- Locations
- Teams
- Persons
- IT Assets
- Information Assets
- Physical Assets
- Products
- Processes
- Capabilities
- Third Parties
- Engagements
- Scope Groups
-
Blueprints
- Blueprints
-
Structures
- Standards
- Domains
- Categories
- Projects
- Assurances
-
Compliance ID
- Overview
- General Settings
- VUCA Score Sharing
- Control Sharing
- Requirement Sharing
- Assurance Sharing
- News & FAQ
- Access Management
- Subscriber Management
- The Public ID Page
Introduction
Key Concepts
Introduction
Traditional GRC tools operate like filing cabinets. You create risks, controls, and requirements in separate lists. You manually track their relationships in spreadsheets. When someone asks "Are we compliant?", you scramble to piece together scattered information. vucavoid takes a different approach.
Everything in vucavoid connects. Requirements flow through references into requirement groups. Controls demonstrate how you satisfy those requirements. Evidence proves control effectiveness. Baselines map this entire structure to your organizational scope. Your VUCA score reflects the health of these connections in real time.
This page explains the concepts that make this integration possible.
The VUCA Methodology
VUCA stands for Volatility, Uncertainty, Complexity, and Ambiguity. Originally developed by the U.S. Army War College to describe the post-Cold War world, it now describes the operating environment for modern organizations. vucavoid applies this framework to GRC.
| Dimension | What It Measures | What Drives It |
|---|---|---|
| Volatility | Rate of change | Overdue deadlines, unresolved treatment plans, pending assessments |
| Uncertainty | Unpredictability | Unassessed risks, missing evidence, stale baseline matches |
| Complexity | Interconnectedness | Assets without clear ownership, undefined capabilities, structural ambiguity |
| Ambiguity | Lack of clarity | Missing process documentation, undefined business criticality, unclear accountability |
Your VUCA score aggregates these dimensions into a single health indicator. The lower your score, the better your compliance posture. But unlike a simple checkbox exercise, VUCA scoring reflects the quality and currency of your GRC program, not just its existence.
How VUCA Score Works
The score is calculated from 24 different generators, each examining a specific aspect of your GRC program. Overdue risk treatment deadlines increase Volatility. Stale baseline matches increase Uncertainty. Assets without owners increase Ambiguity.
Some generators only activate when you have sufficient data (minimum 10 relevant entities). Your score evolves as your program matures.
The Compliance Architecture
vucavoid structures compliance through a deliberate hierarchy. Understanding this architecture helps you use the platform effectively.
References and Requirements
References are the external standards, regulations, and frameworks your organization must comply with. ISO 27001. SOC 2. GDPR. PCI-DSS. Each reference contains specific mandates.
Requirements are those specific mandates. "Implement access controls for sensitive data." "Maintain audit logs for 12 months." "Encrypt data in transit." Requirements are the atomic units of compliance.
The relationship is straightforward: references contain requirements. But requirements can span multiple references. "Implement multi-factor authentication" might appear in ISO 27001, SOC 2, and your internal security policy. vucavoid tracks these relationships, so demonstrating MFA compliance once satisfies multiple obligations.
See References and Requirements for implementation details.
Requirement Groups
Requirement groups organize requirements for specific purposes. Instead of tracking 500 individual requirements, you create groups like:
- "ISO 27001 Annex A Controls" (all ISO requirements)
- "Data Protection Requirements" (GDPR + internal policy)
- "Third-Party Risk Requirements" (vendor management obligations)
Groups serve two purposes. First, they simplify navigation and reporting. Second, they feed into baselines, which use groups to define compliance scope.
See Requirement Groups for details.
Controls and Evidence
Controls are what you actually do to satisfy requirements. Policies, procedures, technical safeguards, organizational measures. "All employees complete security awareness training annually" is a control. "Firewall blocks unauthorized inbound traffic" is a control.
Evidence proves controls work. Training completion records. Firewall configuration exports. Access review logs. Evidence accumulates through control effectiveness reports, periodic assessments that verify controls remain effective.
The connection is explicit: controls link to requirements they satisfy. When you demonstrate control effectiveness with evidence, you simultaneously demonstrate requirement compliance.
See Controls and Evidence for details.
The Compliance Flow
References → Requirements → Requirement Groups
↓
Baselines ← Scope Groups
↓
Baseline Matches
↓
Controls → Effectiveness Reports → Evidence
This flow represents how compliance works in vucavoid:
- External references define requirements
- You organize requirements into requirement groups
- Baselines combine requirement groups with scope groups (your organizational assets)
- The combination generates baseline matches, each representing one requirement applying to one scope element
- You attach controls to matches demonstrating how requirements are satisfied
- Effectiveness reports prove controls work, automatically aggregating evidence to matches
When an auditor asks "How do you comply with requirement X?", the baseline match shows the scope, attached controls, and aggregated evidence in one view.
Organizational Taxonomy
Nearly everything in vucavoid can be tagged with organizational taxonomy. This enables powerful filtering, reporting, and scope definition.
Standards
Standards represent compliance frameworks: ISO 27001, SOC 2, NIST CSF, GDPR. Tagging records with standards lets you filter your entire GRC program for specific certification or audit preparation.
When you filter risks by "ISO 27001", you see only risks relevant to that certification. When you filter controls by "SOC 2", you see your trust services criteria coverage.
See Standards for details.
Domains
Domains represent functional areas: Information Security, Privacy, Business Continuity, Physical Security. Cross-cutting concerns that span multiple standards.
A domain like "Access Management" might include requirements from ISO 27001, SOC 2, and GDPR simultaneously. Domains help you organize by competency area rather than compliance framework.
See Domains for details.
Categories
Categories represent your organizational classification scheme. Business units, product lines, geographic regions, risk types. Categories are flexible, adapting to how your organization thinks about itself.
A retail company might categorize by store region. A software company might categorize by product line. Categories let you slice your GRC data in organization-specific ways.
See Categories for details.
Projects
Projects represent time-bound initiatives: "SOC 2 Type II Certification Q4", "GDPR Remediation Phase 2", "M&A Due Diligence". Tagging records with projects enables project-specific dashboards and reporting.
See Projects for details.
Using Taxonomy Effectively
Tag consistently from the start. When creating a risk, immediately assign relevant standards, domains, and categories. This upfront investment pays off when you need to:
- Prepare for a specific audit (filter by standard)
- Review a functional area (filter by domain)
- Report to business unit owners (filter by category)
- Track initiative progress (filter by project)
Assessment Modes
vucavoid supports two assessment modes for different purposes.
Baselines: Continuous Compliance Monitoring
Baselines provide ongoing compliance monitoring. You define the scope (which requirements, which assets), and the system generates matches tracking compliance status over time.
Baselines answer: "Are we maintaining compliance?" They detect drift, flag stale matches when structural changes occur, and aggregate evidence to demonstrate continuous compliance posture.
Use baselines for:
- Ongoing certification maintenance
- Continuous compliance monitoring
- Multi-standard compliance programs
- Audit readiness tracking
See Baselines for details.
Challenges: Point-in-Time Assessment
Challenges provide point-in-time assessment for specific scenarios. Security assessments, vendor due diligence, pre-audit preparation. Challenges have defined start and end dates, specific scope, and produce snapshot results.
Challenges answer: "What is our compliance status right now?" They provide structured assessment workflows, assign slots to assessors, and generate assessment reports.
Use challenges for:
- Annual security assessments
- Vendor risk assessments
- Pre-certification readiness checks
- Incident response assessments
See Challenges for details.
The Risk-Control-Compliance Triad
Three interconnected disciplines form vucavoid's core: risk management, control management, and compliance management. They reinforce each other.
Risk Drives Control Selection
Risks identify what could go wrong. Controls address those risks. Without understanding risks, control selection is arbitrary. "Why do we have MFA?" becomes "Because we identified credential theft as a high-impact risk."
Every risk should connect to the controls that mitigate it. Every control should justify its existence through the risks it addresses.
Controls Demonstrate Compliance
Requirements mandate outcomes. Controls achieve those outcomes. The connection is explicit: controls link to the requirements they satisfy, and effectiveness reports prove they work.
A single control often satisfies multiple requirements across multiple standards. "Annual security awareness training" might satisfy ISO 27001 A.7.2.2, SOC 2 CC1.4, and GDPR Article 39. One implementation, multiple compliance demonstrations.
Compliance Identifies Risk Gaps
Compliance requirements surface risks you might not have considered. "Maintain audit logs for 12 months" implies a risk: what happens if you can't produce logs during an investigation?
Working through compliance requirements systematically often reveals risks that intuition missed.
Don't Work in Silos
The triad only works when connected. Risks without controls are identified but unaddressed. Controls without risks lack justification. Compliance without controls is aspirational.
Build connections early. When creating a risk, immediately consider which controls address it. When creating a control, immediately link it to requirements it satisfies.
Ownership and Accountability
Every significant record in vucavoid has an owner. Risks, controls, baselines, requirements, assets, all have explicit accountability.
Ownership matters for three reasons:
- Notifications: Owners receive alerts about due dates, status changes, and items requiring attention
- Reporting: Management can review workload distribution and identify accountability gaps
- VUCA Score: Records without owners increase your Ambiguity score
Beyond ownership, most records support managers (people who help with execution) and watchers (people who need visibility without edit access). This three-tier model balances accountability with collaboration.
Unowned Records Are Orphaned Records
Records without owners decay. No one updates them. No one reviews them. No one knows they're outdated.
When creating any record, always assign an owner. When an owner leaves the organization, immediately reassign their records. Ownership gaps are compliance gaps.
Business Criticality
Not all assets are equally important. A payment processing system matters more than an internal wiki. Customer data demands more protection than marketing content. Business Criticality captures these distinctions systematically.
Every object in vucavoid's Meta Model, from IT assets to legal entities to processes, can have its criticality assessed. This drives prioritization across your GRC program: which assets need stronger controls, which incidents demand faster response, which recovery targets to enforce.
Understanding Criticality Modes
vucavoid offers two criticality modes to match your organizational maturity.
Basic Mode
Basic mode provides a single criticality tier: Essential, High, Medium, or Low. This straightforward classification works for organizations starting their GRC journey or those with simpler risk profiles.
Basic mode answers a single question: "How important is this asset to the business?" The answer drives filtering, prioritization, and reporting without requiring detailed security analysis.
Detailed Mode
Detailed mode expands criticality assessment to include CIAA attributes (Confidentiality, Integrity, Availability, Authenticity) and Business Continuity metrics (RTO and RPO). This granular approach suits mature GRC programs and organizations subject to frameworks like ISO 27001 or NIS2 that require formal asset classification.
In Detailed mode, the overall criticality tier is automatically calculated from your CIAA selections, so you get both the detailed analysis and the simple tier for filtering and inheritance.
CIAA Attributes
CIAA provides four dimensions of information security classification. Each attribute rates an aspect of potential impact from Critical to None.
| Attribute | Question It Answers | Example Impact |
|---|---|---|
| Confidentiality | How damaging would unauthorized disclosure be? | Customer PII vs public marketing content |
| Integrity | How damaging would unauthorized modification be? | Financial records vs draft internal documents |
| Availability | How damaging would service interruption be? | Payment processing vs internal wiki |
| Authenticity | How important is verifying the source? | Legal contracts vs internal memos |
Automatic Tier Calculation
In Detailed mode, the overall criticality tier is automatically calculated from your CIAA selections. The tier equals the highest value among enabled attributes. If Confidentiality = High, Integrity = Medium, Availability = Critical, and Authenticity = Low, the resulting tier is Essential (mapped from the Critical CIAA level).
Business Continuity Metrics
Detailed mode also includes Recovery Time Objective (RTO) and Recovery Point Objective (RPO), measured in hours. These support business continuity planning at the asset level.
| Metric | What It Captures | Example |
|---|---|---|
| RTO | Maximum acceptable downtime | 4 hours for payment system, 72 hours for archive |
| RPO | Maximum acceptable data loss | 1 hour for transactions, 24 hours for logs |
When criticality is inherited, RTO and RPO aggregate using the minimum value across sources, ensuring downstream objects inherit the most stringent recovery requirements.
Criticality Inheritance
Manually assessing criticality for hundreds of assets is tedious and error-prone. Inheritance automates this by flowing criticality from top-level objects to their connected downstream objects.
How Inheritance Works:
- Configure Processes or Capabilities as your top level
- Assess criticality on top-level objects manually
- Criticality flows downstream through object relationships
- Connected objects inherit the highest criticality from their upstream sources
- Changes at the top level automatically propagate downstream
Inheritance Best Practice
Start with Processes as your top level if your organization thinks in terms of business workflows. Use Capabilities if you organize around what the organization can do rather than how it does it. Either approach works. Choose what matches your organizational mental model.
Manual Override:
When override is allowed, users can enable the "Override inherited criticality" toggle to set custom values. The overridden values then propagate to that object's downstream connections. Overrides are logged in the activity history for audit purposes.
Override With Care
Overriding inherited criticality breaks the automatic flow. The overridden object and its downstream connections will no longer update when upstream criticality changes. Use overrides sparingly for legitimate exceptions, not as a workaround for incorrect upstream values.
Configuring Criticality
Criticality settings are tenant-wide, configured in Administration > Tenant Settings. The Tenant Manager controls:
- Mode: Basic or Detailed
- Inheritance Mode: Manual (each object independent) or Inheritance (values flow from top level)
- Top Level: Processes or Capabilities as the source of truth
- Override Allowed: Whether users can override inherited values
- Enabled Attributes: Which CIAA attributes and BC metrics appear on forms
See Tenant Settings for detailed configuration guidance.
Criticality and VUCA Score
Objects without defined criticality increase your Ambiguity score. The VUCA scoring system expects criticality to be assessed for assets that matter. Higher criticality objects without owners also incur higher penalties than lower criticality ones.
Well-maintained criticality assessments demonstrate that you understand what matters to your organization. This is a key indicator of GRC program maturity.
Staying on Top: The vucavoid Philosophy
GRC programs fail in predictable ways. They start with enthusiasm: comprehensive risk registers, detailed control documentation, thorough compliance mapping. Then entropy sets in. Deadlines pass without updates. Assessments become stale. Ownership becomes unclear. The documentation increasingly diverges from reality.
vucavoid's design fights this entropy:
The VUCA score makes decay visible. You can't hide from overdue treatments, stale assessments, or missing evidence. The score reflects reality, not intentions.
Automatic stale detection surfaces drift. When a requirement is deactivated or an asset changes status, affected baseline matches become stale. The system forces you to address structural changes rather than ignoring them.
Connected records expose gaps. Risks without controls, controls without evidence, requirements without fulfillment, all visible in relationship views and dashboard widgets.
Deadline-driven workflows maintain currency. Treatment deadlines, assessment schedules, effectiveness report cycles, the platform enforces cadence.
The goal isn't compliance theater. It's maintaining a GRC program that reflects your actual security and compliance posture. When an auditor arrives, when a board member asks about risk, when an incident occurs, your data is current, connected, and complete.
Next Steps
Now that you understand the conceptual architecture, explore these resources:
- Dashboard — See your VUCA score and compliance posture at a glance
- Risks — Start building your risk register
- Controls — Document your security and compliance controls
- Baselines — Set up continuous compliance monitoring
- References — Import the compliance standards you need to satisfy