Full Cybersecurity & Compliance Assessment | TechSavvi
TechSavvi MSP

Full Cybersecurity & Compliance Assessment

Client-Only | Hands-On | Evidence-Based | Standards-Aligned

A comprehensive engagement that validates your cybersecurity and compliance controls through direct evidence, technical testing, and operational verification.

Evidence-Based

Validation

NIST CSF 2.0

6 Functions

Penetration

Testing

Audit-Ready

Deliverables

Overview

Comprehensive Cybersecurity & Compliance Validation

The Full Cybersecurity & Compliance Assessment combines the discovery and gap-identification elements of our Free and In-Depth assessments with engineering-led validation, technical testing, and operational verification.

Assessment Purpose & Boundary

Clearly defined scope, methodology, and evidence-based approach tailored to your environment.

NIST CSF 2.0 Organized

Detailed scope organized by Govern, Identify, Protect, Detect, Respond, and Recover functions.

Technical Testing Modules

Vulnerability assessment, controlled penetration testing, and configuration validation.

Audit-Ready Deliverables

Required evidence artifacts and deliverables suitable for audit and executive communication.

What This Assessment Provides

Evidence-based control validation
Engineering-led technical testing
Configuration inspection & verification
Operational verification activities
Compliance mapping to standards
Prioritized remediation roadmap
Executive summary and risk narrative
Technical findings with evidence
Risk register with treatment options

Standards & Regulatory Alignment

Aligned to Industry Standards & Regulations

Our assessment is aligned to widely recognized standards and regulatory requirements, ensuring comprehensive coverage and audit readiness.

DoD

CMMC Alignment

Cybersecurity Maturity Model Certification

Supports organizations handling Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) by evaluating cybersecurity practices in line with CMMC program requirements.

Reference: 32 CFR Part 170 - CMMC Program (eCFR)
Framework

NIST Alignment

Cybersecurity Framework & Special Publications

  • NIST CSF 2.0 - Organizing model for security program and reporting
  • SP 800-171 Rev. 3 - Protecting Controlled Unclassified Information
  • SP 800-171A Rev. 3 - Assessing Security Requirements for CUI
  • SP 800-53 Rev. 5 - Security and Privacy Controls
Healthcare

HIPAA Security Rule

45 CFR Part 164, Subpart C

For HIPAA-regulated environments, the assessment evaluates safeguards and documentation requirements including:

  • • Administrative Safeguards (§164.308)
  • • Physical Safeguards (§164.310)
  • • Technical Safeguards (§164.312)
  • • Organizational Requirements (§164.314)
  • • Documentation Requirements (§164.316)
Guidance

Implementation Guidance

NIST SP 800-66 Rev. 2

NIST SP 800-66 Rev. 2 is used as a practical implementation resource guide for HIPAA Security Rule alignment, including crosswalks to NIST CSF and NIST SP 800-53 controls.

Title: Implementing the HIPAA Security Rule: A Cybersecurity Resource Guide

Methodology

Evidence-Based Assessment Methodology

Our structured approach is consistent with NIST assessment methodology, including documentation review, interviews, configuration inspection, observation, and technical testing.

Define the Assessment Boundary

TechSavvi will establish and document the assessment boundary

1 In-scope systems, networks, endpoints, cloud services, and identity platforms
2 Security services and tooling (e.g., identity, logging, EDR, backup)
3 Network segmentation and isolation design
4 Data flows and trust boundaries between internal systems and third parties

Evidence Categories

Specifications

Policies, standards, procedures, diagrams, configurations, security plans

Mechanisms

Technical controls and settings such as MFA, encryption, logging, EDR, backup protections

Activities

Operational execution such as onboarding/offboarding, patching, access reviews, incident response drills

Assessment Procedures

Documentation Review
Interviews
Configuration Inspection
Observation
Technical Testing

Rules of Engagement (RoE) & Safety

All active testing (scanning, vulnerability validation, and controlled penetration testing) is conducted under an approved Rules of Engagement document that defines:

Authorized targets
Test windows
Acceptable methods
Data handling
Evidence capture
Escalation procedures

Testing is designed to be controlled and non-disruptive, prioritizing operational continuity.

Assessment Scope

Organized by NIST CSF 2.0 Functions

Each function includes a combination of governance, technical control validation, and operational verification activities.

NIST CSF 2.0

GOVERN

Program governance, roles, policies, and risk management

Included Activities

  • 1.Validate security governance structure, assigned responsibility, and decision-making cadence
  • 2.Review security policies and procedures for completeness, applicability, and enforcement
  • 3.Validate risk management process and risk register (likelihood, impact, treatment decisions)
  • 4.Review third-party governance approach and contractual requirements (including BAAs where applicable)
  • 5.Verify documentation management, retention, and periodic review/update practices

Key Outputs

  • Governance & compliance scorecard
  • Policy/procedure gap report with prioritized remediation roadmap
  • Risk register with risk treatment recommendations
  • Evidence binder index for governance artifacts
NIST CSF 2.0

IDENTIFY

Asset management, system boundary, data flow mapping, and risk context

Included Activities

  • 1.Asset inventory validation (endpoints, servers, network devices, cloud resources, applications)
  • 2.Network and system boundary documentation and validation of trust boundaries
  • 3.Data classification approach and identification of CUI/ePHI locations and flows
  • 4.Threat modeling and risk context for critical assets and business processes

Key Outputs

  • In-scope asset inventory summary (with gaps identified)
  • Network/system diagrams and boundary statement
  • Data flow diagrams (as applicable)
  • Risk prioritization inputs for remediation planning
NIST CSF 2.0

PROTECT

Preventive controls: access control, hardening, encryption, training, and hygiene

Included Activities

  • 1.Identity & Access Management (IAM): MFA, least privilege, privileged access, account lifecycle
  • 2.Endpoint & server hardening: configuration baselines, patching validation, EDR/AV configuration review
  • 3.Network protections: firewall rule review, segmentation validation, secure remote access review
  • 4.Email and collaboration protections: anti-phishing controls and domain authentication validation (SPF/DKIM/DMARC)
  • 5.Data protection: encryption at rest/in transit, DLP considerations, secure file sharing controls
  • 6.Security awareness and workforce practices: cyber hygiene baseline and targeted training plan

Key Outputs

  • Protect control evidence pack (config exports, screenshots, policy references)
  • Hardening and patching gaps with prioritized remediation steps
  • Identity and privileged access improvement plan
NIST CSF 2.0

DETECT

Detective controls: logging, monitoring, alerting, and auditability

Included Activities

  • 1.Audit logging coverage review across endpoints, servers, network devices, cloud services, and email systems
  • 2.SIEM/log management validation where implemented (sources, parsing, correlation, retention)
  • 3.Alerting and detection use case review for common threats (phishing, credential abuse, ransomware indicators)
  • 4.Audit controls verification for systems containing regulated data (ePHI/CUI as applicable)

Key Outputs

  • Logging coverage map and monitoring gaps
  • Detection improvement recommendations (priority-ranked)
  • Evidence artifacts for audit control requirements
NIST CSF 2.0

RESPOND

Incident response capability, escalation paths, and tested execution

Included Activities

  • 1.Review and validate incident response plan, roles, and communications procedures
  • 2.Verify security incident reporting obligations and third-party notification expectations (as applicable)
  • 3.Conduct a tabletop exercise and document lessons learned
  • 4.Validate ticketing, evidence handling, and post-incident review processes

Key Outputs

  • Incident response maturity findings and improvement plan
  • Tabletop exercise report and action items
  • Incident handling documentation gaps and recommendations
NIST CSF 2.0

RECOVER

Resilience: backup integrity, restoration validation, and continuity readiness

Included Activities

  • 1.Backup architecture review (including offline/immutable protections where available)
  • 2.Restore testing (sample restores) and validation of recovery time objectives (RTO/RPO) where defined
  • 3.Disaster recovery and emergency operations review (as applicable to operational needs)
  • 4.Ransomware resilience review and recovery process validation

Key Outputs

  • Backup/restore test evidence and recovery gaps
  • Resilience and continuity improvement roadmap
  • Recovery playbook recommendations

Technical Testing

Hands-On Technical Testing Modules

Engineering-led technical validation to identify vulnerabilities, validate exploitable paths, and confirm control enforcement across your environment.

Module 1

Vulnerability Assessment

Internal & External Scanning

  • Credentialed and non-credentialed vulnerability scanning
  • Internal and external scanning (where authorized)
  • Configuration weakness discovery
  • Risk-ranked findings with remediation guidance
Module 2

Controlled Penetration Testing

Authorized & Scoped Testing

  • Controlled validation of exploitable paths and weaknesses
  • Conducted under approved Rules of Engagement
  • Severity ranking and proof-of-concept evidence
  • Designed to minimize business disruption
Module 3

Configuration & Control Validation

Direct Technical Enforcement

  • MFA policies and conditional access validation
  • Privileged access controls verification
  • Audit logging settings confirmation
  • Encryption configurations and backup protections
  • Network segmentation validation

Deliverables

Deliverables & Evidence Artifacts

TechSavvi delivers a structured set of outputs suitable for executive review and audit readiness.

Executive Summary

Risk narrative aligned to CSF 2.0 Functions - designed for leadership and board communication

Technical Findings Report

Severity-ranked findings with supporting evidence, screenshots, and configuration exports

Risk Register & Remediation Roadmap

30/60/90 day priorities plus long-term maturity recommendations

Compliance Mapping Matrix

HIPAA Security Rule safeguards and/or NIST/CMMC control families as applicable

Evidence Binder / Artifact Index

Screenshots, exports, logs, policies, procedures, diagrams - audit-ready documentation

Optional Remediation Plan

MSP-led or co-managed project list for addressing identified gaps

Assumptions
  • Client provides timely access to in-scope systems, documentation, and subject matter experts
  • Active testing is performed only under written authorization and agreed Rules of Engagement
  • Operational constraints (maintenance windows, critical systems) are communicated prior to testing
Client Responsibilities
  • Assign a primary point of contact and ensure stakeholder availability
  • Maintain backups and business continuity safeguards during testing windows
  • Review findings and prioritize remediation actions with TechSavvi guidance
Typical Exclusions (can be added if needed)
- Full red-team adversary emulation beyond agreed scope
- Denial-of-service (DoS) testing unless explicitly authorized
- Forensic investigation beyond assessment-level evidence capture
- Application source code review unless specifically included
Optional

Recommended Add-Ons

These optional modules add measurable maturity and ongoing risk reduction to complement your assessment.

Recommended

Continuous Vulnerability Management

Monthly/quarterly scanning with trend reporting to track improvement and identify new risks

Quarterly Mini-Assessments

Evidence refresh for ongoing audit readiness and continuous compliance validation

Managed SIEM/MDR Onboarding

Implementation and tuning of security monitoring and detection capabilities

Security Awareness Training

Training program and phishing simulations to reduce human-factor risk

Cyber Insurance Readiness Review

Control alignment and documentation readiness for insurance applications and renewals

Policy Development & Enforcement

Draft, approve, implement, and verify policy program for organizational alignment

Comparison

How This Assessment Compares

Choose the assessment level that matches your organization's needs and compliance requirements.

Free

Free Cybersecurity Assessment

General awareness and early detection

~10 min

Self-service questionnaire

Perfect for initial awareness and identifying whether deeper analysis may be needed.

In-Depth

In-Depth Compliance & Cybersecurity

Executive-level risk clarity

~1 Hour

Live guided session

For leadership seeking clear visibility into cyber risk and compliance exposure.

Recommended
Full

Full Cybersecurity & Compliance

Comprehensive evidence-based validation

Multi-Day

Hands-on technical engagement

For organizations requiring audit-ready evidence and technical control validation.

Feature Free In-Depth Full Assessment
Assessment Duration ~10 minutes ~1 hour guided session Multi-day engagement
Technical Testing
Vulnerability Assessment
Penetration Testing
Configuration Validation
Evidence Collection Limited Comprehensive audit-ready
NIST CSF 2.0 Organized
Compliance Mapping (CMMC/HIPAA) High-level Detailed control-level
Risk Register
Remediation Roadmap Basic awareness Prioritized recommendations 30/60/90 day + long-term
Executive Summary
Technical Findings Report
Tabletop Exercise
Already completed the Free or In-Depth assessment? The Full Assessment is your next step.

Ready for Comprehensive Cybersecurity & Compliance Validation?

Get audit-ready evidence, technical testing, and a prioritized remediation roadmap aligned to your compliance requirements.

Free Assessment First?

Start with our free 10-minute assessment for initial awareness.

Take Free Assessment

Have Questions?

Contact us to discuss your specific compliance needs and requirements.

Contact Us

Standards & Regulatory Alignment

CMMC
NIST CSF 2.0
NIST SP 800-171
HIPAA Security Rule
NIST SP 800-53
TechSavvi

Be Smart. Stay Savvi.

Note: This document is provided for informational and operational planning purposes and does not constitute legal advice. Regulatory and contractual requirements may vary by organization and contract; TechSavvi will tailor the assessment scope and evidence requirements to the client's environment and obligations.

© 2026 TechSavvi LLC. All rights reserved.