CSaaS Process
How Does Idril CSaaS Work?
From First Conversation to Ongoing Security Program
5-step CSaaS process: free risk assessment, tier selection, onboarding, ongoing delivery, and program scaling. Start with a 15–20 minute gap audit—no cost, no obligation.
No black boxes. No surprise scope. Here’s exactly what happens when you engage Idril for Cybersecurity as a Service.
Free Cyber Risk Assessment
What Happens in the Free Cyber Risk Assessment?
What happens: A focused gap audit that evaluates your current security posture against industry frameworks (NIST CSF, CIS Controls). We assess your policies, controls, compliance status, and threat exposure—not your budget.
What you get: A prioritized findings summary highlighting critical gaps, quick wins, and a clear picture of where you stand.
What happens next: If there’s a fit, we recommend a tier. If not, you keep the findings—no strings attached.
How Is Tier and Scope Determined?
Duration: 1–2 business days from assessment to signed scope.
What happens: Based on findings, we collaborate with your team to select the right tier (Essentials, Growth, or Advanced) and identify any add-on packs needed—AI Governance, Data Privacy, Cloud Security, or Incident Response Retainer.
What you get: A clear engagement scope with defined deliverables, timeline, and success
metrics. No ambiguity about what’s included.
Tier & Scope Selection
Onboarding
What Happens During Onboarding?
Duration: Weeks 1-4 of engagement.
What happens: Your dedicated team kicks off with structured onboarding: baselines established, initial assessments deployed, foundational policies implemented, and communication cadences set up (Slack channel, scheduled calls, reporting dashboards).
What you get: Documented security baseline, gap analysis, core policy pack, initial vulnerability scan results, and your first executive summary.
Key milestone: Time-to-value checkpoint—tangible deliverables in hand within your tier’s specified timeframe.
Ongoing Delivery
What Does Ongoing Program Delivery Look Like?
What happens: Continuous delivery on a structured cadence: quarterly vulnerability scans, compliance monitoring, vCISO leadership hours, risk management activities, and security testing—all on a predictable schedule.
What you get: Regular deliverables per your tier: scan reports, compliance dashboards, leadership briefings, pen test reports, tabletop results, and board presentations (Growth and Advanced).
Communication: Monthly or quarterly review calls (tier-dependent), plus ongoing Slack/email
support for ad hoc questions.
How Does Your Security Program Scale Over Time?
What happens: Periodic program reviews assess progress against your roadmap, update risk registers, and evaluate whether your current tier still fits.
As your organization grows—new requirements, larger teams, board scrutiny—your program scales with you.
What you get: Annual program review with recommendations. Clear upgrade path to the next tier. Continuous alignment between your security program and business objectives.
Program Scaling
Contact Us
+1-404-937-3377
172 Prospect Pl, Alpharetta, GA 30005
Monday-Friday: 9am – 5pm
Start With a Free Cyber Risk Assessment
A 15-20 minute gap audit with no cost or obligation. You’ll get a prioritized findings summary-and if there’s a fit, we’ll recommend a tier and walk through what engagement looks like.