Glossary
Report an Issue
Newsroom
Try SAFE for Free
SAFE 3.1
SAFE One
SAFE 3.1
SAFE 3.2
Contents
x
Getting Started
User Guide
Integration Guide
Release Notes
Support Matrix
SAFE KB Articles
Powered by
SAFE KB Articles
15 Articles
in this category
Print
Contents
SAFE KB Articles
15 Articles
in this category
User Audit Log in CEF Format
About this document SAFE records all the important user audit logs in the CEF format. This document contains the information about the user's audit log in the SAFE application. CEF Log Format DateTime hostname CEF:Version|Device Vendor|Dev...
Data Residency in SAFE
Overview As a customer, when you sign up for SAFE, you are essentially allocated a tenant. As part of this process, you can select a region where the application data is stored. Currently, SAFE is hosted in the following AWS regions: There are ...
Bulk Upload Third-parties to SAFE
About this document This document gives the step-by-step procedure to upload third parties in bulk. Introduction SAFE allows admins to upload third parties in bulk via CSV. SAFE admin can download the CSV template from the SAFE, fill in the det...
How to find the reason for technology asset's score change
About this document This document describes the step-by-step procedure to find reasons for the change in the SAFE score of technology assets. Introduction SAFE continuously assesses the onboarded assets under technology, and the asset's SAFE sc...
Export Assets and Controls in CSV via SAFE APIs
About this document This document explains the procedure for downloading the assets and controls in CSV via SAFE REST APIs. Introduction Downloading the Asset and Control in CSV via SAFE REST APIs has the following capabilities: Users can dow...
Export controls list for all assets via SAFE APIs
About this document This document explains the procedure to export the control lists for all assets in SAFE in one go using Python script and SAFE APIs. Pre-requisite Download the Python package . Python Packages - pip install requests Oper...
SAFE’s Outgoing IP Addresses
About this document This document contains the list of SAFE's outgoing IP addresses per region. Outgoing IP addresses The following is the list of outgoing IP addresses of SAFE. All traffic to any integrations in SAFE will see one IP addre...
SAFE Scalability
About this document This document provides you with the details on the number of assessments per day, number of rows per CSV upload, and number of assets per action via SAFE REST APIs, supported in SAFE. Assessment Scalability CSV Upload Scal...
Import Azure Tags and GCP Labels in SAFE
About this document This documents provides how you can import Microsoft Azure Tags and Google Cloud Platform (GCP) Labels in SAFE. Introduction Tags in Microsoft Azure and Labels in Google Cloud Platform (GCP) are the metadata element...
Risk Scenario without Financial Risk
Financial Risk Estimation for General Risks Financial Risk is the product of Breach Likelihood (SAFE Score) and Estimated Financial Impact with Monte Carlo simulation to predict the most likely amount of money at risk from cyber attacks within t...
NIST CSF Questionnaire Upload Instructions
About this document This document gives step-by-step instructions to upload NIST CSF Assessment data in SAFE. Introduction SAFE allows you to assess the NIST CSF Questionnaires in SAFE. The system ingests the assessment into SAFE's risk sce...
Financial Impact Questionnaire Assessment Instructions
What is a financial impact questionnaire? The financial impact questionnaire is a dedicated assessment that captures the key risk drivers required to estimate the financial impact of risk scenarios. How to assess the financial impact questionn...
Add multiple integration accounts via APIs
About this document This document outlines a detailed process for setting up integrations in SAFE using APIs. Unlike the user interface method, which only permits onboarding a single account per integration, this advanced approach allows you to ...
Integration History
History Table SAFE displays an Integration Sync History table on the configuration page of each integration that provides a comprehensive overview of sync history, including action, start time, started by, and sync status. Action - It display...
NIST CSF Assessment Instructions
1. Introduction The NIST Cybersecurity Framework helps organizations begin or improve their cybersecurity program. It draws upon established practices that have proven effectiveness, enabling organizations to elevate their cybersecurity stance. ...