Free Assessment Tools

Score your compliance readiness in 15 minutes

Six interactive readiness checklists across ISO 27001, ISO 27701, ISO 42001, SOC 2, Essential Eight, and DISP/IRAP — each scored against the framework's published criteria, with a prioritised PDF roadmap delivered instantly.

No sign-up required Instant scored result Branded PDF roadmap Mapped to framework criteria
Choose a checklist → See how it works
365
Sample report
ISO 27001 Readiness Assessment
Overall readiness score
68%
Foundation — needs structured uplift
ISMS Scope & Context 85%
Risk Management 62%
Annex A Controls 45%
↓ Plus 5 more domains, top gaps, and prioritised next steps
15 min
Average completion time
6
Frameworks covered
230+
Total assessment questions
0
Sign-ups required

How the checklists work

Built around what auditors actually look for — not generic compliance theory. Each checklist is mapped directly to the published criteria of the standard it covers.

1

Pick your framework

Choose the standard most relevant to your situation. Not sure? See the decision guide below.

2

Answer questions

Yes / Partial / No across each control domain. Takes 12–16 minutes depending on the framework.

3

See your score

Real-time scoring across each domain — strong areas in green, gaps highlighted in red.

4

Download PDF roadmap

Branded report with score breakdown, top gaps, and a prioritised action plan you can take to your team.

Methodology note

Each checklist is built directly from the published criteria of the relevant standard — ASD's ML2 evidence requirements for Essential Eight, ISO 27001:2022 Annex A controls, AICPA Trust Services Criteria for SOC 2, and ISO 42001:2023 AIMS clauses. The scoring weighting reflects what certification auditors actually sample most heavily — not a generic best-practice list.

Not sure which checklist to start with?

Most organisations come to us with a specific trigger. Match your situation below to the right checklist.

Enterprise customers asking for security certification

→ Start with ISO 27001. If they're US-based, also run SOC 2.

Government tender requires Essential Eight maturity

Essential Eight — scored to ML1, ML2, and ML3 across all eight controls.

Cyber insurer is asking for evidence at renewal

Essential Eight first — most insurers map their questionnaires to ASD controls.

You use AI and customers are asking how you govern it

ISO 42001 — model inventory, risk assessment, oversight, monitoring.

You handle personal data and need Privacy Act evidence

ISO 27701 — DPIA, ROPA, data subject rights, consent management.

You want to enter the defence supply chain

DISP / ISM / IRAP — covers entry-level defence assurance frameworks.

All readiness checklists

Each checklist is free, takes 12–16 minutes, and produces a downloadable PDF roadmap.

Information Security Management

ISO 27001

Most popular

Score your ISMS across scope definition, risk assessment, Annex A controls, Statement of Applicability, internal audit, and management review.

ISMS scopeRisk methodologyAnnex A controlsSoAInternal audit
40 questions · 15 min Best for: SaaS, technology, enterprise procurement readiness
Start →
ASD Cyber Security Maturity

Essential Eight

Most popular

Assess your maturity across all eight ASD controls — application control, patching, macros, MFA, admin privileges, OS patching, hardening, and backups. Scored to ML0–ML3.

App controlPatchingMFAAdmin privilegesBackups
45 questions · 15 min Best for: Government supply chain, mid-market, cyber insurance
Start →
AI Governance & Management System

ISO 42001

Score your AI governance maturity — model inventory, AI risk and impact assessments, human oversight, monitoring, and responsible AI policy. Aligned to the Australian AI Safety Standard.

Model inventoryAI riskHuman oversightMonitoringPolicy
30 questions · 12 min Best for: AI-enabled SaaS, healthcare, financial services
Start →
Privacy Information Management

ISO 27701

Assess your PIMS across ROPA, DPIA, data subject rights handling, consent management, and third-party privacy risk. Aligned to the Australian Privacy Act and APP requirements.

ROPADPIAData rightsConsentThird-party
35 questions · 12 min Best for: Healthcare, financial services, data-intensive businesses
Start →
Trust Services Criteria

SOC 2

Score your SOC 2 readiness across the five Trust Services Criteria — Security, Availability, Confidentiality, Processing Integrity, and Privacy. Type I and Type II differentiated.

SecurityAvailabilityConfidentialityIntegrityPrivacy
38 questions · 14 min Best for: SaaS with US or global enterprise customers
Start →
Defence & Government Assurance

DISP / ISM / IRAP

Assess your readiness for DISP entry, ISM alignment, and IRAP assessment — covering the security domains required for government and defence supply chain participation.

DISPISMIRAPASD complianceSupply chain
42 questions · 16 min Best for: Defence contractors, government-adjacent technology firms
Start →

What you get in your PDF report

Every report is structured the same way — branded, ready to share with your team or board, and built to drive action rather than just sit in an inbox.

Section 1

Overall readiness score

A single percentage score — calibrated against the framework's maturity criteria — so you can see at a glance where you sit. With a maturity-stage label (Foundation / Developing / Audit-Ready) for context.

Section 2

Domain-by-domain breakdown

Score for each control domain (ISMS scope, risk, Annex A, etc.) with a visual progress bar. Strong areas in green, gaps in red — easy to scan and immediately useful for prioritisation.

Section 3

Top 5 priority gaps

The five highest-impact gaps based on your responses, with framework-specific guidance on what good looks like. The list a CISO would build for you in a 1-hour discovery call — automated.

Section 4

Prioritised action plan

A sequenced 90-day roadmap covering the most important steps — what to fix first, what depends on what, and realistic effort estimates for each priority.

Section 5

Microsoft 365 implementation tips

Where relevant, specific guidance on which Microsoft 365 capabilities (Conditional Access, Defender, Purview, Intune) address each priority gap — so you can implement using tools you already own.

Section 6

Next-step options

Three paths forward — a self-led DIY approach, a structured assessment engagement, or a full uplift programme — with realistic timelines and what each path delivers.

Common questions

Are these checklists really free?

Yes. No sign-up, no email gate, no paywall. The PDF download happens directly in the browser. We make the checklists genuinely free because they're a far better introduction to our practice than any sales pitch.

How accurate is the score?

The score is an honest indicator based on your responses, calibrated against the framework's published criteria. It's not a substitute for a formal gap assessment — but it'll tell you within a few percentage points where you actually sit.

Do you store our responses?

No. The checklist runs entirely in your browser — your responses never leave your device. The PDF is generated client-side. We don't collect, store, or analyse your inputs.

Can multiple people answer together?

Yes — many teams complete the checklist as a group, with the security lead, IT lead, and a senior stakeholder going through the questions together. It often surfaces internal disagreement about what's actually in place.

What if our score is low?

A low score isn't a problem — it's a starting point. Most organisations score 40–60% on first run. The PDF tells you the highest-impact gaps to close first, so a low score becomes a structured plan rather than an overwhelming list.

Should we share the PDF internally?

Yes — the report is designed to be shared with leadership, the board, or a security committee. Many clients use it as the discussion document for getting budget approval for a structured uplift programme.

Need help interpreting your results?

After running a checklist, a free 30-minute call will help you make sense of the score, prioritise the gaps that matter most, and understand what a realistic uplift programme would look like for your environment.

Choose a checklist Book a free call
📞 Microsoft Teams