Only this pageAll pages
Powered by GitBook
1 of 61

CERRIX Documentation

Loading...

CERRIX Functionalities

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Best Practices & Guides

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

About CERRIX

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Business Improvement Management

While we work on creating content for this documentation, more information can be found in the document below.

2MB
Business Improvement Management - Work instructions.pdf
PDF
Open

Key Risk Indicators (KRI's)

While we work on creating content for this documentation, more information can be found in the document below.

990KB
KRI & KPI - CERRIX Work instructions v.1.pdf
PDF
Open

Admin Settings

AI Risk Description Refinement

Overview

The Risk Description Refinement feature in CERRIX helps users craft clear, comprehensive, and best-practice-aligned risk descriptions. By leveraging AI-powered suggestions, users can ensure their risk documentation is accurate, structured, and effective.

How It Works

Events

Getting Started

Welcome to CERRIX! Follow this guide to log in and familiarize yourself with the platform's interface.

Logging In

To access your personal CERRIX account:

  1. Visit the login page provided by your functional manager.

Audit

While we work on creating content for this documentation, more information can be found in the document below.

API Documentation

You can find the CERRIX API documentation directly in the platform by clicking the ❓icon in the top right of the platform, and clicking on "Manuals"

Next, go to API Manual. Here, you will see an overview of all supported API endpoints.

Data Management

While we work on creating content for this documentation, more information can be found in the document below.

1MB
Events - Work instructions.pdf
PDF
Open
276KB
CERRIX Work instructions Auditing.pdf
PDF
Open
1MB
Datamanagement - Work instructions.pdf
PDF
Open

Use one of the following login methods:

  • Username and Password: Provided by your manager. Reset your password after the first login.

  • Work Account: Log in using your Microsoft work account, if applicable.

Note: Two-factor authentication via Microsoft Authenticator might be required for added security.

Once logged in, you’ll land on your customizable dashboard.


Navigating the Dashboard

Key Elements

  • Left Menu: Use this menu to navigate between modules and settings.

  • Tabs: Toggle between previously opened pages using the tabs at the top of the screen.

  • Top Right Menu:

    • To-Do List: View tasks and responsibilities.

    • Help: Access manuals and FAQs.

    • Profile: Manage your account information and settings.

Customizing Your Dashboard

Your dashboard is fully customizable:

  • Add or remove widgets.

  • Rearrange widgets to prioritize your workflows.

Tip: Save your dashboard settings to quickly restore your preferred layout.


Next, learn about the core modules of CERRIX on the Modules Overview page.

Security Statement

Our security statement is a document that briefly describes the security measures that we have implemented to safeguard information.

371KB
Security Statement v2.2 (1).pdf
PDF
Open
This feature allows users to refine risk descriptions by providing AI-generated suggestions based on an initial input. Users can then choose the best suggestion and apply it to their risk record.

Step-by-Step Guide

1. Access the Risk Description Field

  • Open an existing risk or create a new one within CERRIX.

  • Navigate to the Description section of the risk entry page.

2. Enter an Initial Risk Description

  • Type a brief description of the risk in the provided field.

  • Example: "Fire destroying our offices and equipment."

3. Use AI to Refine the Description

  • Click the Refine with AI button.

  • The AI will analyze the input and generate five different suggestions that align with best practices.

Generating all suggestions using AI can take a few seconds.

4. Select and Apply a Suggested Description

  • Review the generated suggestions and select the one that best represents the risk.

  • Click Apply Suggestion to replace the original text with the selected AI-generated description.

  • The new description will now be displayed in the risk description field.

5. Save the Updated Risk Description

  • Ensure the refined description accurately captures the risk.

  • Fill in any other required fields to save the risk.

  • Click Save risk to finalize the risk entry.

Benefits of Using AI-Powered Risk Descriptions

  • Consistency: Ensures risk descriptions follow a standardized format.

  • Efficiency: Reduces the time needed to craft detailed risk descriptions.

  • Best Practices Compliance: AI-generated suggestions align with industry standards.

By using the Risk Description Refinement feature, CERRIX users can improve the quality and clarity of their risk documentation, making risk management more effective and actionable.

Process Management

While we work on creating content for this documentation, more information can be found in the document below.

655KB
CERRIX Manual - Process Management.pdf
PDF
Open

Print Functionality in Process Management

The print feature allows users to generate customized PDF exports of a process. When clicking the print icon, you can choose from the following three options, each offering different levels of detail and context:

Print Graph

This option includes:

  • Process Details

  • Process Graph

  • Process Steps

Use this to generate a clean and focused printout of the process without additional risk or control elements.

Print Graph, Risks, Controls, Events, and MoIs

This version extends the standard graph with related governance data. It includes:

  • All items from CERRIX (Risks, Controls, Events, and Moments of Insight) linked to the Business Dimension.

  • These items are visualized in the printout, and if a Risk or Control is represented (e.g., as a floating symbol), it is considered linked—regardless of where it appears.

The section “Not linked to a process step” will only show items that:

  • Are linked to the Business Dimension

  • But do not appear anywhere in the printout, either connected to a step or visualized separately.

Important: The system does not analyze the position or logic of the elements—presence of the item symbol in the print is sufficient to count it as “linked”.

Print Graph with Linked Risks and Controls

This option prints strictly what’s linked within the process graph.

Risks and Controls that are: linked to a Risk or Control symbol in the graph and that symbol is not linked to any process step are shown under the “Not linked to a process step” section.

Important: This option does not look outside the process graph. It does not include other Risks or Controls from CERRIX that may be linked to the Business Dimension but are not visually linked via a symbol in the graph.

AI Settings

The AI Settings page allows Application Administrators to enable and manage AI-powered features within the CERRIX environment. These features are designed to enhance functionality across various areas of risk, compliance, audit, and governance.

Access and Permissions

Only users with the Application Administrator role have access to the AI Settings page. Other user roles will not be able to view or modify these settings.

Enabling AI Features

To activate CERRIX AI features, Application Administrators must follow these steps:

  • Navigate to the AI Settings page under Administration Controls.

  • Review and accept the AI Terms and Conditions.

Enabling AI functionality requires administrators to explicitly acknowledge and accept the terms and conditions associated with the use of AI features in the CERRIX platform.

  • Activate AI functionality.

Once the terms and conditions are accepted, the CERRIX AI features will be enabled and accessible throughout the application, based on user roles and relevant context.

Examples of CERRIX AI functionality include:

Audit Trail

For transparency and compliance, CERRIX maintains a log of:

  • The user who accepted the AI Terms and Conditions.

  • The timestamp of when the acceptance occurred.

This information is available for auditing purposes and helps ensure proper governance over the use of AI in your environment.

Notes

  • AI cannot be enabled without accepting the terms and conditions.

  • The acceptance is recorded once per environment and applies globally.

How to Create an Anonymous Form (e.g. for Whistleblowing)

This tutorial is only valid starting with the release of July 15th (ACC) and August 12th (PRD)

In some use cases—such as whistleblowing—it’s essential to collect information anonymously. CERRIX allows for the creation of anonymous form submissions by using an API-based approach that is not linked to any specific user account.

This guide walks you through setting up such a form and enabling anonymous submission via the CERRIX API.


Step 1: Create the Form

  1. Go to the Forms module

    From your CERRIX dashboard, navigate to Forms in the main navigation menu.

  2. Click “Add new form”

    This opens the form builder interface.

  3. Define form fields

    Add the fields you want respondents to fill out. This can include text fields, dropdowns, attachments, etc.


Step 2: Generate an API Key

  1. Open your user profile

    Click on your name in the top-right corner and select API Keys.

  2. In the left-hand menu, click "API Keys"

  3. Click “Add API Key”

  4. Select the right permission


Step 3: Submit Anonymous Entries via API

Once your form is published and you have a valid API key, you can start submitting entries without linking them to a CERRIX user.

Refer to the Create Form Result description in the CERRIX API Manual for the exact request format.

This API enables anonymous submissions, but it should be embedded within a frontend form or tool—such as a website or internal portal—that whistleblowers or other users can interact with directly.

Authentication & User Provisioning

This page provides an overview of user provisioning and authentication options for CERRIX, leveraging Microsoft Azure Active Directory and Okta. It outlines the necessary steps and configurations to enable seamless user management and secure access to CERRIX applications.

The documentation is divided into three main guides, each addressing a specific aspect of integration:

  • Azure AD Authentication: This section describes how to configure Azure Active Directory authentication for CERRIX. It covers the steps for app registration in Azure, including setting up the application name, redirect URI, supported account types, and implicit grant flow. It also outlines how to configure API permissions and provides the necessary information to CERRIX for application setup.

262KB
CerrixAzureAdAuthentication 1.1.pdf
PDF
Open
  • User Provisioning using SCIM in Azure: This section details the process of configuring user provisioning in Azure Active Directory using the System for Cross-domain Identity Management (SCIM) protocol. It covers creating an enterprise application, setting up initial connections, configuring attribute mappings for groups and users, and assigning the relevant groups for synchronization. Information required from CERRIX, such as the SCIM endpoint URL and a secret token, is also specified.

  • User Provisioning using SCIM in Okta: This section focuses on setting up user provisioning via SCIM through Okta. It guides users through creating an Okta app integration, configuring SAML settings, enabling SCIM provisioning, and mapping user attributes. Essential information from CERRIX, including the CERRIX URL and secret token, is highlighted.

Measures of Improvement (MoIs)

Video Tutorial

Prefer to watch instead of read? Have a look at our Measures of Improvement (MoIs) Video Tutorials

The MOIs module is designed to address recurring issues or ineffective controls by implementing corrective measures. This module ensures that improvements are executed and reviewed effectively.

Key Features

MOI Planning

  • Create detailed plans for corrective actions.

  • Set deadlines and assign responsibilities.

MOI Execution

  • Monitor the progress of assigned MOIs.

  • Upload supporting documentation and comments.

MOI Review

  • Verify the completion and effectiveness of MOIs.

  • Provide feedback and finalize the review.

Strategic Information Security Policy

Our strategic information security policy is a high-level document that outlines our commitment to protecting information assets and managing risks associated with information security. It defines the guiding principles, roles, and responsibilities for ensuring the confidentiality, integrity, and availability of information across our organization. This policy aligns with business objectives and regulatory requirements, setting a framework for decision-making on security matters.

Key elements include:

  1. Scope and Purpose: Describes the policy's relevance to all information assets, systems, and employees.

  2. Roles and Responsibilities: Defines who is accountable for security tasks, from executive leadership to end users.

  3. Risk Management Approach: Outlines how risks are identified, evaluated, and mitigated.

  4. Compliance and Standards: References relevant standards (e.g., ISO 27001, GDPR) and regulatory compliance requirements.

  5. Enforcement and Review: States consequences for non-compliance and establishes a schedule for regular review and updates.

This policy provides the foundational direction for all security initiatives and helps ensure a cohesive and proactive security posture organization-wide.

Creating a New Incident

This guide explains the workflow for creating and reporting incidents within the Incidents Module of CERRIX. Follow these steps to efficiently log, track, and manage incidents in your organization.

Video Tutorial

Prefer to watch instead of read? Have a look at our Video Tutorials


Module Overview

CERRIX provides a range of modules designed to support governance, risk, and compliance processes. These modules help organizations streamline workflows and ensure compliance with policies and regulations.

Core Modules

Risks

CERRIX AI FAQ

General AI FAQs

Is my data secure?

Yes, your data is handled with the utmost security. All data sent to the Azure OpenAI API is encrypted in transit and at rest. Microsoft Azure as well as CERRIX comply with strict security standards, including GDPR and ISO certifications. We store your input and the AI-generated output securely within our platform to enhance and improve the functionality of this feature.

Using the Dashboard

The Dashboard in CERRIX serves as your centralized hub for accessing key features, modules, and tasks. Fully customizable, it allows users to create a workspace tailored to their needs.

Key Features

Design & Implementation (D&I) Testing

CERRIX supports a structured approach to testing the design and implementation of internal controls. This process ensures that controls are both appropriately defined and effectively implemented to mitigate associated risks.

This guide outlines the steps for initiating, executing, and documenting D&I tests in CERRIX.


Purpose of D&I Testing

The Design & Implementation test (also known as Opzet & Bestaanstest in Dutch) helps determine:

Control Design & Implementation, Execution & Effectiveness Testing: What's the Difference?

In the CERRIX platform, controls are a central component of your governance, risk, and compliance framework. Understanding the different types of control activities and testing phases is essential for effective risk mitigation and assurance.

This article explains the differences between Control Design & Implementation Testing, Control Execution, and Control Effectiveness Testing.


Control Design & Implementation Testing

Definition: This is a test of the suitability and proper setup of the control. It determines whether the control, as designed and implemented, is capable of addressing the associated risk.

Product Strategy & Roadmap

Product Strategy

Pillar 1: Enabling Comprehensive Risk & Compliance Management

Why? Managing risk and compliance effectively is the core value proposition of CERRIX. Customers rely on the platform to have full visibility and control over their risk landscape.

FSQS Certificate

The FSQS (Financial Services Qualification System) is a qualification and compliance standard widely used by financial institutions in the UK and Europe to assess the risk, performance, and compliance of suppliers and service providers. Managed by Hellios Information, FSQS is a community-driven approach designed to streamline the process of collecting and sharing supplier information for banks, insurance companies, and other financial organizations, ensuring that suppliers meet regulatory and security standards.

FSQS provides benefits such as:

  1. Centralized Supplier Data: Suppliers complete a single questionnaire for all participating financial institutions, reducing duplicated efforts and administrative burdens.

  2. Risk Assessment: The platform helps financial institutions assess potential risks in areas such as cybersecurity, operational resilience, data protection, and regulatory compliance.

Video Tutorials

Control Execution Tasks

Control Advanced Effectiveness Testing

Third Party Management

While we work on creating content for this documentation, more information can be found in the document below.

Release Planning

At CERRIX, we follow a regular release planning cycle to ensure our customers receive improvements, new features, and updates.

Release Types

We operate with two types of releases:

Getting Support

At CERRIX, we are committed to providing you with the help and guidance you need to make the most of our platform. Whether you’re encountering an issue, have a question, or need assistance using a feature, our Support Portal is the best place to reach out.

Contacting Support

You can easily get in touch with our support team via our dedicated portal:

👉

Through this portal, you can:

Trust & Compliance

At CERRIX, we recognize that trust and transparency are fundamental to supporting our clients in the domains of governance, risk, and compliance. Ensuring the security and privacy of your data, while operating in accordance with internationally recognized standards, is a cornerstone of how we build and maintain our SaaS platform.

Our compliance framework is designed to meet the expectations of regulated industries and to support your organization’s own compliance objectives. We are committed to continuously improving our internal controls, information security practices, and data protection processes.

On this page, you will find detailed information about our certifications, policies, and adherence to key frameworks and regulations that demonstrate our commitment to compliance and operational excellence:

Corporate Social Responsibility

CERRIX is committed to ethical standards and contributing to global climate goals. This Corporate Social Responsibility (CSR) policy outlines our principles, actions, and ambitions in environmental stewardship, social responsibility, and ethical business conduct.

Will the AI learn from my data?

The data you provide (both input and AI-generated output) contributes to improving the quality of the AI features, through analysis by CERRIX privileged employees. However, this data is anonymized and aggregated before being used for any analysis or updates to the feature. Only privileged CERRIX employees will use the data to improve the feature. Microsoft Azure OpenAI will not use the data to improve their models.

Will my input be shared with other customers?

No, your input and the AI-refined descriptions are not shared with other customers. The data is stored securely and used only to improve the functionality of the feature within the platform.

Do I have infinite usage of CERRIX AI features?

Using AI incurs costs for CERRIX, so we reserve the right to restrict usage for any customer at any time if usage patterns exceed reasonable limits or impact the service quality for other users.

Where can I read more about the Azure OpenAI services being used by CERRIX?

You can read more on this link: https://learn.microsoft.com/en-us/legal/cognitive-services/openai/data-privacy


AI Risk & Control Refinement FAQ

How does the AI work for risk & control description refinement?

The AI leverages the Azure OpenAI APIs together with custom prompting and workflows by CERRIX AI to process and enhance the descriptions you provide. It uses advanced natural language processing models to refine descriptions.

What data does the AI use to refine descriptions?

The AI uses only the text you provide when describing a risk or control, along with the best practices CERRIX has defined. It does not access or analyze any other data from your account or organization.

Why does CERRIX store my input and the AI-generated output?

We store both your input and the AI-generated text to continuously improve the feature’s performance and ensure it aligns with industry best practices. Additionally, we track whether the refined descriptions are used to help refine the AI’s suggestions and tailor the tool to user needs.

What if the refined description doesn’t meet my needs?

We provide five different variations of refined descriptions. We recommend choosing the best one, and refining the generated description further using your expertise and the AI suggestions as a foundation. The feature is designed to assist, not replace, your judgment.

How can I ensure the refined descriptions align with my organization’s standards?

The AI is designed to use industry best practices, but you can always edit the descriptions to align with your organization's unique standards and compliance requirements.

Have more questions about CERRIX AI? Reach out to us!

419KB
UserProvisioningUsingScimInAzure.pdf
PDF
Open
366KB
UserProvisioningUsingOktav1.0.pdf
PDF
Open
1MB
Strategic Information security policy v2.1 ondertekend.pdf
PDF
Open
3MB
Third Party - Work instructions.pdf.pdf
PDF
Open

Create a new support ticket

Report an issue, ask a question, or request assistance from our team.

  • Track your existing tickets

    View the status of open tickets, read replies from our team, and follow up if needed.

  • Helpful Tips When Submitting a Ticket

    To help us assist you as quickly as possible, please include the following information when submitting a ticket:

    • A clear and concise description of your issue or question

    • Steps to reproduce the issue (if applicable)

    • Screenshots or error messages (if available)

    Account Access

    Please note that access to the support portal requires a Cerrix support account. If you don’t have an account yet, contact your organization’s administrator for access.

    https://support.cerrix.com/portal/home
    Strategic Information Security Policy
    ISO 27001
    ISAE 3402 Type II
    Privacy / GDPR
    Security Statement
    FSQS Certificate
    1MB
    CERRIX CSR.pdf
    PDF
    Open

    Optional: Add information for respondents explaining that submissions are anonymous.

  • Publish the form

    A form must be opened for responses before you can submit responses via the API.

  • Note down the form ID, which can be found by copying the URL of the form page.

  • Choose the permission: create form result

    This allows the API key to submit entries to the selected form.

  • Restrict by IP address

    For security reasons, specify the IP address or IP range that will be allowed to use this key.

  • Save your API key

    Copy the key somewhere secure—you will not be able to view it again.

  • Customization
    • Add, remove, and rearrange widgets to personalize your dashboard.

    • Save presets for quick access to preferred layouts.

    Navigation

    • Access all CERRIX modules directly from the dashboard.

    • Use tabs to toggle between active sessions and tasks.

    Notifications

    • Stay updated with task reminders, alerts, and system messages.

    • Manage notifications via the top-right menu.

    Tip: Set your default dashboard for a streamlined experience each time you log in.


    How to Customize Your Dashboard

    1. Adding Widgets

    1. Enter Edit Mode by clicking the pen icon in the top-right corner.

    2. Select widgets from the list.

    3. Drag and drop widgets onto the dashboard.

    2. Rearranging Widgets

    • Click and hold a widget to move it.

    • Resize widgets by dragging their edges.

    3. Saving Changes

    • After customizing, click Done Editing to save your layout.

    Managing Tabs and Filters

    • Use the tab bar at the top to switch between opened modules or tasks.

    • Apply filters to focus on specific data or widgets.


    For further assistance, refer to the Getting Started guide or explore other modules in the Modules Overview.

    AI Risk Description Refinement
    AI Control Description Refinement

    Import Templates

    CERRIX provides a set of standardized import templates to help you efficiently upload data into various modules of the application. These templates are designed to ensure structured input and alignment with the latest system features and validation rules.

    We strongly recommend always using the most recent version of each template to guarantee compatibility with the current version of the CERRIX platform.

    If you need guidance on using the templates or require support during the import process, please get in touch with us.

    11KB
    ControlTestPeriodImportTemplate May 2025.xlsx
    Open
    10KB
    RiskImportTemplate May 2025.xlsx
    Open
    17KB
    ControlImportTemplate May 2025.xlsx
    Open
    18KB
    ControlTestplanImportTemplate May 2025.xlsx
    Open
    9KB
    OrganizationsImportTemplate.xlsx
    Open
    10KB
    RiskCatalogueImportTemplate.xlsx
    Open
    9KB
    BusinessDimensionsImportTemplate.xlsx
    Open
    9KB
    FrameworksImportTemplate.xlsx
    Open
    18KB
    MoisImportTemplate.xlsx
    Open

    Root Cause Analysis

    ISO 27001

    CERRIX has achieved compliance with ISO/IEC 27001:2022 since August 20, 2024.

    930KB
    ISO 27001 certificate ISC 562 - 001.pdf
    PDF
    Open
    428KB
    ISO 27001 Statement of Applicability CERRIX v1.2.pdf
    PDF
    Open
    The Risks module is the foundation for identifying and managing potential risks to your organization. Use it to:
    • Document and assess risks.

    • Monitor changes and rescore risks as needed.

    Learn more about the Risks module:


    Controls

    Controls are preventive measures designed to mitigate identified risks. This module allows you to:

    • Create and document controls.

    • Test their design, implementation, and effectiveness.

    Learn more about the Controls module.


    Incidents

    Track and manage reported incidents to prevent recurrence. Key features include:

    • Logging incidents and adding supporting documentation.

    • Managing corrective actions and reviewing results.

    Learn more about the Incidents module.


    Measures of Improvement (MOIs)

    MOIs are corrective actions taken to address recurring issues or ineffective controls. This module supports:

    • Planning and executing MOIs.

    • Reviewing outcomes and providing feedback.

    Learn more about the MOIs module.


    Finding Reports

    This module allows you to generate reports and insights using integrated PowerBI tools. Use it to:

    • Visualize compliance data.

    • Generate actionable reports for stakeholders.

    Learn more about the Finding Reports module.


    Each module is designed to work seamlessly within CERRIX. Explore the detailed guides for each module by following the links above.

    Risks
    Controls
    Incidents
    Measures of Improvement (MoIs)
    Findings Report

    Regulatory Compliance: By using FSQS, suppliers demonstrate compliance with industry regulations like GDPR, Anti-Money Laundering (AML) standards, and other financial service requirements.

  • Streamlined Procurement: FSQS enables faster and more efficient procurement processes, as suppliers are pre-qualified and vetted, enhancing trust and collaboration across the financial sector.

  • For suppliers, being FSQS-certified increases their credibility and can make them more attractive to financial clients by showing a commitment to meeting high standards in security and compliance.

    156KB
    FSQS-NL certificaat.pdf
    PDF
    Open
    Starting to Create a New Incident

    You can create a new incident in one of two ways:

    • From the Incidents Dashboard page:

      • Navigate to Incidents.

      • Click the button labeled "Add New Incident".

    • From a Form:

      • Configure a Form to create new Incidents

    Note: Regardless of the method chosen, your incident will be appropriately logged and linked within the system.


    Completing the Incident Form

    When you open a new incident form, several fields are available to capture detailed information. Certain fields are required and must be filled out before you save the form.

    Incident Fields:

    • Incident Name: Provide a concise, descriptive title for easy reference. (Required)

    • Reporter: The user who reported the event. Automatically assigned to the user creating the incident. (Required)

    • Assessor: The assessor of the event. (Required)

    • Responsible: The user that is responsible for filling in the event details. (Required)

    • Informed: The user that needs to be informed about the events but does not have any responsibility within.

    • Date Detected: Date the event was detected. (Required)

    • Date Occurred: Date that the event occurred.

    • Due Date: Use this date to indicate when you prefer the incident investigation and resolution workflow to complete. Monitoring incident progress against the due date helps maintain timely administration and resolution.

    • Description: A short description of the incident and its essential details. (Required)

    • Reporting organization: Select the organization responsible for reporting this incident. (Required)

    • Incident type: The type of incident that occurred.

    • Caused by organization: The organization that caused the event.

    • Affected organization: The organization affected by the event.

    • Root cause category: The category of the root cause.

    • Root cause: A description of the root cause of the event.

    • Impact description: A short description of the impact that the event has.

    • Internal identifier: An optional ID for the event, that is editable by users. This can be used for Events that were already registered with an ID before documenting them in CERRIX.


    Assigning Incident Roles

    Incident roles clarify responsibilities within your team:

    • Reporter: Automatically assigned to the user creating the incident.

    • Assessor: Select a user to assess and evaluate the incident.

    • Responsible: Select the person accountable for addressing the incident.

    • Informed: Indicate other users to keep informed about the incident’s progress.

    You can select multiple users for Assessor, Responsible, and Informed roles if needed. Once selected, users can be added or removed easily at any time.

    You can read more about Incidents Roles & Rights here:


    Incident Type and Custom Fields

    Selecting an Incident Type may activate additional custom fields specific to your organization's configuration.

    • Choose your Incident Type from the dropdown menu (e.g., "Demo").

    • Upon selecting the incident type, extra tabs with custom fields may appear next to the default "Details" tab.

    • Complete these custom fields as required.


    Saving and Validating Your Incident

    • After providing all required details, click "Save".

    • If mandatory fields are incomplete, the system will prompt you with validation messages highlighting missing information.

    Upon successful validation and submission, you will see a confirmation message.

    Incidents

    Whether the control is well-designed (clear, complete, and risk-aligned).

  • Whether the control has been implemented and is functioning as described.

  • Whether sufficient evidence supports the design and execution.


  • Setting Up a D&I Test

    Navigate to an Existing Control

    Start by selecting the control for which you want to initiate a D&I test.

    Start a Design & Implementation Test

    1. Go to the D&I Testing section.

    2. Select a test template. Templates typically include a set of standard questions and evidence expectations.

    Define Evaluation Criteria

    Each D&I test typically includes the following key questions:

    • Design Assessment:

      Is the control defined in alignment with your risk management policy and methodology (e.g., the “5W1H” model: Who, What, When, Where and How)?

    • Expected Evidence:

      Define the types of evidence required (e.g., LMS reports, follow-up actions on training gaps).

    • Implementation Check:

      Can the tester verify, based on evidence, that the control has been implemented according to its description?


    Roles and Responsibilities

    First Line: Evidence Uploader

    • Uploads supporting evidence related to the control.

    • Receives a task and an automated reminder email to upload evidence by a specific date.

    • Uploads files directly via the task link or the D&I test page.

    Second Line: Tester

    • Reviews the uploaded evidence.

    • Assesses whether the control is appropriately designed and implemented.

    • Scores the test and adds comments as needed.


    Uploading Evidence

    1. The evidence uploader receives a task (and email) prompting them to submit evidence.

    2. They can click the task or email link to navigate directly to the test.

    3. Click the Evidence tab.

    4. Upload one or more files (e.g., LMS reports, corrective action logs).

    5. Click Apply Changes and confirm to submit.


    Finalizing the Test

    After evidence is submitted:

    • The Tester evaluates the control based on the predefined criteria.

    • The Test Scores and Comments are saved and visible in the Control Overview.

    • All scores are automatically updated in the control workspace for full audit traceability.


    Workflow Integration

    • Tasks and email notifications are automatically created and sent.

    • All actions are logged in the system for transparency.

    • Evidence deadlines and responsibilities are clearly defined and tracked.

    Purpose: To assess whether the control is appropriate and has been set up correctly within business processes or IT systems.

    Example: Reviewing if a purchase approval workflow enforces segregation of duties between requester and approver.

    In CERRIX: Documented in the Control Library or during Control Assessment workflows, often by second or third line teams (Compliance, Audit). Testing results are stored and linked to the control for transparency and auditability.


    Control Execution

    Definition: Control execution refers to the actual performance of a control activity by the responsible party or system, according to its defined frequency and procedure.

    Purpose: Ensure that the control is carried out as designed, on time, and by the appropriate stakeholder.

    Example: A weekly review of user access logs performed by an IT administrator.

    In CERRIX: Control execution is logged through the Control Monitoring module. Control owners receive automated tasks or notifications to perform and evidence control activities.


    Control Advanced Effectiveness Testing

    Definition: This test checks whether the control operates effectively over time. It involves reviewing historical evidence to confirm that the control consistently works as intended.

    Purpose: To validate that the control not only exists but also reliably mitigates the associated risk.

    Example: Sampling the past 6 months of control executions to verify timely and complete access reviews were performed.

    In CERRIX: Performed through the Control Advanced Effectiveness Testing feature, allowing testers to upload sampling results, attach evidence, and rate control performance (e.g., effective, partially effective, ineffective).

    Learn more about Control Advanced Effectiveness Testing here:


    Summary Table

    Activity
    Focus Area
    Key Question
    Typical Role

    Design & Implementation Testing

    Setup & Appropriateness

    Is the control well-designed and implemented correctly?

    Risk/Compliance/Audit

    Control Execution

    Operational Delivery

    Was the control performed as required?

    Control Owner

    Effectiveness Testing

    Performance Assurance

    Is the control working reliably over time?


    Best Practices

    • Ensure roles and responsibilities are clearly defined in the Control Owner field in Cerrix.

    • Use automation to schedule recurring control executions and reminders.

    • Link testing activities to relevant risks, processes, and audits for traceability.

    • Leverage AI Assistance in Cerrix to prefill control descriptions and suggest test procedures based on best practices.


    Need help setting up control workflows? Contact support or your CERRIX Customer Success Manager for hands-on assistance.

    Control Advanced Effectiveness Testing

    Key initiatives:

    • Launching and iterating on the Incidents module

    • Expanding ready-to-use frameworks

    • Optimizing the data and privacy registry

    Pillar 2: Increasing Risk Management Efficiency

    Why? Efficient risk management reduces compliance costs and maximizes the return on investment for CERRIX customers. The platform must streamline key workflows to help teams focus on critical decision-making instead of administrative tasks.

    Key initiatives:

    • Streamlining customer workflows

    • Embedding expertise and AI-driven automation

    • AI-driven risk assessments and test plan suggestions

    Pillar 3: Integrating GRC into the Application Landscape

    Why? Real-time risk assessment and automated controls are becoming essential for enterprises. Deep integration with other tools ensures that GRC is not a siloed function but a core part of business operations.

    Key initiatives:

    • Expanding API capabilities to push data to CERRIX

    • Developing out-of-the-box integrations with ticketing and asset management systems

    Product Roadmap

    Disclaimer: The product roadmap represents our current plan. It is subject to frequent and significant change.

    Incidents

    Measures of Improvement (MoIs)

    Acceptance (ACC) Environment Release
    • Purpose:

      Updates are deployed to the Acceptance (ACC) environment for internal validation and customer acceptance testing.

    • Frequency:

      Every 3 weeks.

    Production (PRD) Environment Release

    • Purpose:

      Fully validated updates are deployed to the Production (PRD) environment, making them available to all users.

    • Frequency:

      Every 3 weeks

    Release Schedule Overview

    Important:

    The release schedule is subject to change.

    Adjustments may occur due to shifting priorities, quality assurance findings, customer needs, or operational considerations.

    Date
    Environment

    26 November 2025

    PRD

    10 December 2025

    ACC

    31 December 2025

    ACC

    14 January 2026

    PRD

    11 February 2026

    ACC

    25 February 2026

    PRD

    Release Notes

    With every release, CERRIX publishes detailed release notes to ensure users are informed of new features, improvements, and fixes.

    Release notes are published at the time of the Acceptance release on the following page:

    Release Notes

    Incidents

    Video Tutorial

    Prefer to watch instead of read? Have a look at our Incidents Video Tutorials

    The Incidents module in CERRIX helps organizations track, manage, and resolve risk-related incidents in a structured and auditable manner. This module supports the full lifecycle of incident management, from initial reporting to final resolution, with integrated workflows, data governance, and transparency across all stakeholders.

    Use this overview to navigate to detailed guides on each component of the Incidents module.

    The Incidents module is designed to help users:

    • Capture and report new incidents in a standardized way

    • Monitor the status and progress of incidents via a structured workspace

    • Apply organization-specific workflows for processing incidents

    • Maintain accurate and consistent reference data for categorizing and analyzing incidents

    Below are the key documentation articles that explain each component of the Incidents module:

    Incidents Standing Data

    Review the reference data that underpins incident classification and reporting.

    • Categories and subcategories

    • Impact and severity ratings

    • Cause and root cause options

    • Screenshot placeholders:


    Creating a New Incident

    Learn how to create a new incident from scratch, including required fields, categories, and options for assigning responsibilities.

    • Walkthrough of the incident form

    • Mandatory vs optional fields

    • Assigning responsible users or departments

    • Screenshot placeholders:


    Incidents Workflow

    Understand how incident workflows are configured and how incidents progress through stages in your organization.

    • Overview of workflow stages

    • Transition logic and actions

    • Escalation and reassignment rules

    • Screenshot placeholders:


    Incidents Workspace

    Explore the centralized workspace where you can view, filter, and manage all existing incidents.

    • Grid and filter functionalities

    • Status indicators and priority levels

    • Search and sorting capabilities

    • Screenshot placeholders:


    Incidents Roles & Rights

    Understand how user roles determine access and responsibilities within the Incidents module. This page outlines all available roles, their permissions, and how they support collaboration across teams during the incident lifecycle.


    Best Practices and Tips

    To make the most of the Incidents module, consider the following best practices and tips:

    • Define clear escalation paths and responsibilities in your workflow configuration

    • Regularly review and update standing data to align with organizational risk posture

    • Use custom fields if your organization requires additional data points

    • Consider integrating incidents with related modules (e.g., Risk, Controls, or MoI's) for better traceability


    Key Benefits of Incidents Compared to Events

    • Greater flexibility – Easily create custom fields for each incident type, allowing full customization to match your organization’s needs.

    • Streamlined workflows – A single, standardized workflow for all incident types simplifies handling and tracking.

    • Enhanced financial impact tracking – Record financial impact per department and third party for improved reporting.

    • New and improved fields

    Controls

    The Controls Module in CERRIX allows organizations to define, manage, and monitor internal controls related to processes, risks, and compliance frameworks. This guide explains how to create and manage a control, including how to link it to relevant elements such as risks and documentation.

    Purpose of Controls

    Controls help ensure that your organization is effectively mitigating risks and complying with relevant standards and frameworks. CERRIX supports various types of controls and enables detailed configuration, classification, and linkage to business elements.


    Adding a New Control

    To create a new control in CERRIX:

    1. Navigate to the Controls Module.

    2. Click Add New Control.

    Control Setup

    When adding a control, complete the following fields:

    • Organization: Select the relevant entity within your organization.

    • Control Name: Provide a descriptive name (e.g., Monitoring of Training Certification).

    • Control Description: Describe the control’s purpose (e.g., Training completion is monitored quarterly via LMS reports).

    • Control Owner: Assign responsibility for maintaining and executing the control.


    Linking a Control

    After saving a control, additional linking options become available in the left-hand panel.

    You can link the control to:

    • Processes: Attach it to one or more business processes.

    • Frameworks: Link the control to compliance frameworks or laws (e.g., ISO 27001, GDPR).

    • Risks: Associate the control with one or more risks it helps mitigate.

    • Documents: Upload supporting documentation relevant to the control.


    Additional Features

    • Version History: Keep track of control changes over time.

    • Audit Trail: Review who created or modified the control and when.

    • Filtering & Search: Quickly locate controls using filters or keywords.


    Controls Roles, Rights and Permissions

    You can find an overview of the different roles, rights and permission for controls in this handy overview:


    While we work on creating content for this documentation, more information can be found in the document below.

    Control Advanced Effectiveness Testing

    Video Tutorial

    Prefer to watch instead of read? Have a look at our Control Advanced Effectiveness Testing Video Tutorials

    Control Effectiveness Testing ensures that controls are functioning as intended to mitigate risks. This process involves multiple steps to validate design and operational effectiveness.

    Steps for Effectiveness Testing

    Step 1: Source Document Uploader

    1. Navigate to the test plan in the Controls module.

    2. Click Upload Source Document.

    3. Drag and drop files or browse to upload relevant documents.

    4. Optionally, add a description for the uploaded file.

    Step 2: Generating Samples

    • Choose a sampling method:

      • By Number: Generate samples based on a predefined count.

      • By Date: Use a date range to generate samples.

      • By Spreadsheet: Upload a spreadsheet and configure sample generation.

    Step 3: Uploading Evidence

    • Upload evidence for each sample.

    • Mark samples without evidence and provide a reason in the comments.

    Step 4: Testing

    • Assess each sample and document findings.

    • Provide scores and comments for each test step.

    Step 5: Reviewer Step

    • The reviewer assesses the results, provides feedback, and confirms the final outcome.

    Best Practice: Ensure all required documents are uploaded before moving to the next step.

    Control Description Snapshot

    When a test plan is closed, CERRIX automatically creates a snapshot of the control description as it was at that moment.

    This snapshot ensures that the historical context of the control is preserved, even if the control description is updated later on. When you open a Control Advanced Effectiveness Test Plan after it has been closed, this snapshot is displayed instead of the current control description.

    The date displayed next to the control description indicates when the snapshot was taken.

    Control Effectiveness Testing Roles, Rights and Permissions

    You can find an overview of the different roles, rights and permission for controls in this handy overview:

    Privacy / GDPR

    A Data Protection Impact Assessment (DPIA) is a process used to identify and minimize data protection risks in projects or initiatives that involve the processing of personal data, especially when new technologies are involved or when processing could significantly impact individuals' privacy. DPIAs are mandated under regulations like the GDPR when data processing poses high risks to the rights and freedoms of individuals.

    Key aspects of a DPIA include:

    1. Purpose: Identifying the need and objectives of processing personal data.

    2. Data Flow Analysis: Mapping out data collection, processing, storage, and sharing practices.

    3. Risk Assessment: Evaluating risks to individuals' privacy, such as unauthorized access, loss, or misuse of data.

    4. Mitigation Measures: Proposing actions to reduce identified risks, like implementing technical safeguards, limiting data access, or anonymizing data where possible.

    5. Documentation and Review: Keeping records of findings and reviewing the DPIA periodically, especially if processing changes.

    Our DPIA helps to ensure compliance with privacy laws, demonstrate accountability, and build trust with users by showing a proactive approach to data protection.

    API Key Management & Setup

    This document explains how to generate and configure API keys for connecting external applications to the CERRIX APIs. The CERRIX API manuals describe available endpoints and payload formats. This guide focuses on the steps required to securely create and manage API credentials.

    1. Create a New API Key

    1. Log in to CERRIX.

    2. In the top right corner, click on your name.

    3. Select View profile.

    4. In the left-hand menu, go to API Keys.

    5. Click Add to create a new API key.

    6. Enter a descriptive Name for the API key.

    7. The expiration date of an API key can be configured, but there is a maximum limit: it cannot be set to longer than one year from the date of creation. You can shorten this period if desired, but not extend it beyond the one-year maximum.

    2. Configure Allowed IPs

    To improve security, API keys can be restricted to specific IP addresses.

    1. Under Allowed IPs, click Add.

    2. Enter the IP address of the server or system that will use this API key.

      • This should typically be the IP of the system where your integration or application will run.

      • For testing purposes, you may also use your own IP address. (Confirm with your administrator which IP is appropriate.)

    3. Select Accessible APIs

    When creating an API key, you can define which APIs the key is authorized to call.

    1. In the API key configuration screen, select the APIs you want this key to have access to.

    2. Only the selected APIs can be accessed with this key. This allows you to follow the principle of least privilege.

    4. Save and Retrieve the Credentials

    1. Click Save to create the API key.

    2. Once saved, the system will generate:

      • Identifier

      • Password

    Important: This is the only time these credentials will be displayed. For security reasons, they cannot be retrieved later.

    • Copy the Identifier and Password immediately.

    • Store them securely in your integration application or a secure password manager.

    5. Using the API Key

    Use the generated Identifier and Password to authenticate your requests as described in the . Ensure that:

    • The calling system’s IP matches one of the allowed IPs.

    • The API key has been granted access to the endpoints you intend to call.

    Support Ticket Status

    The latest status of a ticket can always be viewed on the customer portal. Here, you can also add additional questions or information to a ticket.

    After creating a ticket, the customer receives a confirmation email containing a unique ticket number. This ticket number must be mentioned when contacting support so that the relevant employee can quickly locate and update the correct ticket with the latest information.

    A ticket can have one of the following statuses:

    Status
    Description

    New

    A newly submitted ticket receives the status Intake, meaning the intake process will still take place.

    Intake completed

    When the intake process is completed and the ticket is ready to be processed, its status changes to Intake Completed. At this point, the SLA resolution time starts.

    When the status of a ticket is updated, the customer receives a notification via email.

    ISAE 3402 Type II

    An ISAE 3402 Type II assurance report is an independent audit report that assesses the effectiveness of a service organization’s internal controls over a specific period, typically related to financial reporting. This report is based on the International Standard on Assurance Engagements (ISAE) 3402 and is commonly used by service organizations to demonstrate to clients that they have reliable controls in place.

    Key components of an ISAE 3402 Type II report include:

    1. Management Assertion: A statement from the service organization’s management regarding the controls' design and implementation.

    2. Scope and Objectives: Defines the systems, processes, and time period covered in the report.

    3. Description of Controls: An outline of the controls implemented, typically covering areas like access management, data processing, and risk management.

    4. Auditor’s Opinion: An independent auditor’s opinion on whether the controls are suitably designed and operating effectively over the specified period.

    5. Test Results: Findings from testing the controls to determine their operational effectiveness, identifying any deficiencies or areas for improvement.

    An ISAE 3402 Type II report offers a higher level of assurance than a Type I report by assessing not only the design but also the operating effectiveness of controls over time, giving clients confidence in the service provider’s ability to manage risks associated with financial reporting.

    Want to see the CERRIX ISAE 3402 Type II report? and we will provide it.

    AI Control Description Refinement

    Overview

    The Control Description Refinement feature in CERRIX helps users craft clear, comprehensive, and best-practice-aligned control descriptions. By leveraging AI-powered suggestions, users can ensure their control documentation is accurate, structured, and effective.

    How It Works

    Budget-based Risk Scoring

    Preparations for Using Risk Budgets

    Preparations start from a dashboard that includes the Administration Controls widget, which is available for an unrestricted administrative user.

    Compliance/Audit

    4 March 2026

    ACC

    18 March 2026

    PRD

    In progress

    The In Progress status means investigation, reproduction, analysis, or implementation work is underway. The SLA resolution time continues to run while the ticket is in this status.

    With CERRIX

    The With CERRIX status is used when the next action on the ticket lies with CERRIX, but the work has not yet started or resumed. Examples include tickets returned to CERRIX after a user response, internal handovers, or pending prioritization. The SLA resolution time continues to run while the ticket is in this status.

    With user

    If additional information is required from the reporter/user, the ticket status is set to With User, and the resolution time is paused. The inquiry takes place via the customer portal to ensure clear and well-documented communication.

    With supplier

    If tasks need to be performed by an external party, the ticket status is set to Waiting for Supplier. In this case, the resolution time continues to run.

    Awaiting confirmation

    When the issue has been addressed and the solution has been implemented, the ticket status changes to Completed. At this point, CERRIX awaits confirmation from the customer or a predefined waiting period before the ticket is closed. The SLA resolution time stops when the ticket reaches this status.

    Closed

    When CERRIX considers a ticket to be fully resolved, the status changes to Closed.

    367KB
    Data Protection Impact Assessment.pdf
    PDF
    Open
    Reach out to us

    Standing data configuration

  • Example dropdowns using standing data

  • Incident creation form

  • Example of a completed incident entry

  • Workflow stage diagram

  • Example of an incident in-progress

  • Incidents workspace grid

  • Filtering panel

  • – Includes a due date, support for Framework dimensions, and the ability to register third parties directly in incidents.
  • Improved collaboration – Discuss incidents directly within the incident page using built-in comments, enabling faster decision-making and follow-ups.

  • Incidents Standing Data & Emails
    Creating a New Incident
    Incidents Workflow
    Incidents Workspace
    Roles, Rights and Permissions
    If you lose the credentials, you will need to generate a new API key.
    CERRIX API manuals
    Incidents Permission Matrix

    Control Type:

    • Preventive

    • Detective

    • Corrective

  • Execution Type:

    • Manual

    • Semi-automated

    • Automated

  • Control Category:

    • Process Control

    • IT Control

    • Financial Control

    • Other (as defined)

  • Frequency: Define how often the control is executed (e.g., Quarterly).

  • Control Objective: Optionally link the control to a formal objective or goal.

  • Hyperlinks: Include direct links (e.g., to SharePoint or external systems).

    2MB
    Controls - Work instructions.pdf
    PDF
    Open
    Controls Permission Matrix
    Controls Permission Matrix
    This feature allows users to refine control descriptions by providing AI-generated suggestions based on an initial input. Users can then choose the best suggestion and apply it to their control record.

    Step-by-Step Guide

    Access the Control Description Field

    • Open an existing control or create a new one within CERRIX.

    • Navigate to the Description section of the control entry page.

    Enter an Initial Risk Description

    • Type a brief description of the control in the provided field.

    • Example: "Installing fire extinguishers to prevent our office from burning down."

    Use AI to Refine the Description

    • Click the Refine with AI button.

    • The AI will analyze the input and generate five different suggestions that align with best practices, and typical conventions for control descriptions:

      • <When>: The frequency or triggering event that activates the control. This could be time-based (e.g., daily, quarterly) or event-based (e.g., upon system access, after a software update).

      • <Who>: The role or responsible party that is accountable for carrying out the control. This could be an individual, a team, or a department (e.g., system administrator, security team, compliance officer).

      • <What - scope>: The specific scope or aspects that the control is designed to examine, monitor, or regulate. It highlights what is being checked, such as particular systems, data, or processes.

      • <What - purpose>: The objective or intended outcome of the control. It defines the reason the control exists, such as ensuring compliance, mitigating risks, or protecting sensitive data.

      • <With what - input>: The resources, tools, or information that are utilized during the control process. This can include data sources, documents, software, or systems that are necessary for the control to function (e.g., audit logs, security policies, monitoring tools).

      • <How>: The method or process through which the control is executed. This defines the actions or steps involved, which could be manual or automated procedures (e.g., running a security scan, conducting a manual review).

      • <With what - output>: The result or documentation generated by the control. This is the outcome of the control process, which could be a report, a status update, or other tangible evidence of the control’s execution (e.g., audit results, compliance certificates, error logs).

      • <What if>: The actions taken when an issue is detected during the control process. This defines the response procedure, such as investigating the issue, initiating corrective actions, or escalating to a higher authority (e.g., conducting an incident response, notifying management).

    • If AI doesn't detect one of these conventions (for example <Who>), it will put a placeholder for that convention, along with an example in the generated control description.

    Generating all suggestions using AI can take a few seconds.

    Select and Apply a Suggested Description

    • Review the generated suggestions and select the one that best represents the control.

    • Click Apply Suggestion to replace the original text with the selected AI-generated description.

    • The new description will now be displayed in the control description field.

    Save the Updated Control Description

    • Ensure the refined description accurately captures the control.

    • Fill in any other required fields to save the control.

    • Click Save control to finalize the control entry.

    Upcoming functionality

    In the current version, the AI-powered control description refinement follows a basic template. In our upcoming release, we will enhance this by enforcing a structured template that ensures all key control questions are addressed—covering when, who, what, how, and more.

    Benefits of Using AI-Powered Control Descriptions

    • Consistency: Ensures control descriptions follow a standardized format.

    • Efficiency: Reduces the time needed to craft detailed control descriptions.

    • Best Practices Compliance: AI-generated suggestions align with industry standards.

    By using the AI Control Description Refinement feature, CERRIX users can improve the quality and clarity of their control documentation, making risk and control management more effective and actionable.

    Set the Application Settings to Budget-Based Risk Scoring

    Steps to take:

    1. As an administrator, go to the Administration Controls section of the dashboard and select Environmental Settings.

    2. Select Risks in the left menu and activate the 5th toggle: Use Budget-Based Risk Scoring.

    3. Do not use the setting “Show Risk Quantitative Scoring Details” (this will display extra details, which might be confusing if budget-based risk scoring is used as well).

    4. Restart the application by pressing Ctrl + F5 or Ctrl + R.

    Define Risk Scales Including Financial Impact and Likelihood

    Steps to take:

    1. As an administrator, go to the Administration Controls section of the dashboard and select Standing Data. The menu shows a screen with this set up (without values):

    2. Go to Risk > Risk Scores > Risk Financial Impact.

      • Five score options are predefined.

      • Each option can contain an explanation via the field “Name”, e.g., "1. Very low (less than 5%)" or "3. Moderate (between 20%-30%)".

      • For each score, a range can be given in Min% and Max%.

      • Note: The financial impact score is calculated only for defined ranges. If there is overlap, the highest score is chosen. Ranges should be contiguous or slightly overlapping. The Min% of the lowest range and the Max% of the highest range can remain undefined.

    3. Go to Risk Likelihood: Define likelihood ranges in a similar manner (e.g., 1%-5%, 5%-10%, etc.). Ensure the complete range from 1%-100% is covered.

    4. Go to Risk Impact Scales: Define alternative impact scales such as Reputation or Quality.

      • Click + ADD.

      • Give the scale a name.

      • Enter the required scores.

    Define Budget per Organization

    Defining a budget for an organization is a new functionality available only for administrative users.

    Steps to take:

    1. As an administrator, go to the Administration Controls section of the dashboard and select Organizational Budget (after restart if settings have changed).

    2. Two columns are displayed:

      • The first contains an overview of the internal organization as defined in CERRIX (Admin Module > Standing Data).

      • The second column is used to define budgets per department.

    3. After defining the budgets, press Save.

    Risk Budget-Based Scoring

    Score the Risk Financial Impact

    Steps to take:

    1. Choose a risk of an organization with a budget.

      1. In the risks, the budget that's shown is associated with the organization for which the risk is defined.

    2. Enter the Gross Likelihood.

    3. Enter the Gross Financial Impact in Euros.

    The Financial Impact Scale will be automatically calculated based on the given budget.

    Example:

    • Organization budget: €800.

    • Gross financial impact: €500 (60% of budget → Score 5: Catastrophic (>40%)).

    • Net financial impact: €300 (37.5% of budget → Score 4: Significant (20%-40%)).

    • Final Financial Impact Score: 4. Significant (20%-40%).

    Potential Loss Calculation:

    • Gross financial impact: €500.

    • Min & max gross likelihood: 10% - 20%.

    • Potential Gross Minimum Loss: €50.

    • Potential Gross Maximum Loss: €100.

    Score the Overall Risk Impact

    The overall gross impact score can be entered manually.

    • The overall score is checked against leading impact scales.

    • If no leading impact scale is selected, it will be checked against all impact scales.

    • If the leading impact scale or the max impact scale do not match, a warning is displayed.

    • If the warning is clicked, the overall impact is adjusted.

    Risk Workspace

    If the budget-based risk scoring is active, in the workspace the Gross and Net financial impact is shown per risk.

    Incidents Workflow

    The Incidents module in CERRIX is designed to streamline the process of handling incidents within your organization, providing a structured and auditable workflow. This guide walks you through the standard flow of an incident's lifecycle and highlights key actions and interface elements you can interact with during the process.

    Video Tutorial

    Prefer to watch instead of read? Have a look at our Incidents Video Tutorials


    Overview of the Incident Workflow

    The Incident Workflow guides users through each required step in processing incidents, clearly showing the current status and future actions needed.

    At the top of the incident screen, you'll see a clear visualization of the workflow steps:

    • Completed steps are highlighted green.

    • Available next steps are clearly indicated, showing what actions can currently be performed.

    • Future steps are visible but inactive until prior required steps have been completed.

    Note: Only assigned users can perform actions at each workflow step.


    Key Steps in the Workflow

    Incident Creation

    Read more about creating a new incident in this article:


    Assessing & Evaluating an Incident

    After an incident has been reported:

    1. To continue with processing, select either:

      • Accept incident to move forward.

      • Reject incident if it's invalid or incorrect.

      • Leave a comment (required). This comment will be visible in the


    Linking Related Items

    In the Assessing, Improving or Review stage, you’ll see a Link iconwhich can be used to link relevant items by clicking on the linking button:

    • Link existing Risks or Controls

      • Use the dedicated button to select relevant items from the system.

    • Create a Measure of Improvement (MOI)

      • Opens a new tab for MOI creation.

    If an incident is created and linked to a Risk or Control, that incident can also be found as a linked item in the specific Risk or Control. For Risks and Controls these incidents are shown in page of linked events.


    Business and Framework Dimensions

    Additional configuration dimensions include:

    • Business Dimensions Allow associating incidents with particular business dimensions defined in your system.

    • Framework Dimensions Facilitate linking incidents to your organization's compliance and internal control frameworks.


    Attach Supporting Documents

    • Click on the Attach icon

    • Drag and drop or select a file to upload.

    • Files will be attached directly to the incident for context and traceability.


    Review and Closing an Incident

    At the Review stage, the incident has the status Ready for Review:

    1. Review all linked data, documents, and details carefully.

    2. Next, there are two options:

      1. Approve & close, or click

        • The incident workflow finishes, and the incident moves to a read-only


    Chat and Incident History

    The incident page includes an interactive Chat and History Pane accessible from the right side:

    • View complete audit trails of incident updates, statuses, notes, and decisions made throughout the workflow.

    • Use this pane for update notes. Future releases will enable direct chat functionalities among incident participants for additional collaboration.


    Incidents Workflow Emails Notifications

    Email messages automatically alert relevant users when the incident advances through workflow stages:

    • Email behaviors in the Incidents module mirror those in the existing Events module used within your CERRIX environment.

    • In your production environment, relevant stakeholders will receive emails upon workflow status changes (e.g., confirmation, review readiness, approval).

    • In this demonstration environment, emails are inactive, but in production, known standard processes apply.

    Note: If your existing CERRIX configuration refers to these as "Events," you might consider standardizing your terminology to "Incidents" for clarity, though this naming choice remains flexible.

    Execution-Based Control Testing

    This functionality will be available in ACC on 31 December 2025 and in PRD on 14 January 2026.

    Execution-based control testing allows you to assess the effectiveness of controls by directly using the control execution tasks that occurred within a defined test period. This feature integrates control execution data with advanced effectiveness testing, providing a streamlined and auditable testing workflow.

    Execution-based control testing is only available when using the latest Control Advanced Effectiveness Testing screens. Most customers already use these screens. If your environment does not yet have them enabled, please contact .

    Overview

    In many organizations, controls require to be executed according to a predefined schedule (e.g., monthly access right reviews). Execution-based testing collects these tasks and uses them as the test source, removing the need to manually upload population files.

    All control executions scheduled within the test period are automatically included as the source for the control test.

    Preconditions

    Before initiating an execution-based test you must ensure that control execution is enabled in the configuration of the control:

    Activating Execution-Based Testing

    Execution-based testing is configured within the control test plan.

    1. Create or open a control test plan.

    2. Ensure the test period matches a period in which execution tasks are scheduled.

    3. On the second page: Sample Generation, enable the option: Use control execution

    This activates the automatic collection of execution tasks for the test source.

    Starting the Control Test

    Once the test period has ended, the tester can initiate the control test as usual.

    Execution-based testing consists of:

    1. Source Upload & Sampling

    2. Evidence Upload

    3. Testing

    4. (Optional) Review

    These follow the standard CERRIX test workflow, but with additional execution-based functionality.

    Source Upload & Sampling

    When execution-based testing is enabled, CERRIX automatically loads all execution tasks planned within the test period.

    What you will see:

    • A summary of all execution tasks found.

    • A count of execution tasks that were not yet completed. (In normal scenarios, all tasks should be completed when effectiveness testing begins.)

    Sample generation:

    The source uploader only needs to provide the sample size. After sample generation, the evidence uploader can begin their work.

    Notes

    • The original source, an overview of all control executions for the test plan period, remains accessible through the Source documents section.

    • Completed execution tasks included in a test sample cannot be deleted or reopened to safeguard audit integrity.

    • If no execution tasks are found in the test period, CERRIX assumes the control did not occur. The tester can only give a final conclusion, based on that assumption. If the control did occur, with the source evidence not being registered in control executions but elsewhere, the testplan should be recreated without the option "Use control execution".

    Evidence Upload

    The evidence uploader sees all selected samples, each corresponding to a specific control execution. For example:

    Automatic evidence linking

    If the control execution includes evidence, this evidence is automatically copied into the sample.

    Linked evidence is marked with a link icon, indicating that it originated from a control execution rather than a manual upload. For example:

    Situations the evidence uploader may encounter

    Situation
    Explanation
    What the uploader can do

    Testing & Reviewing

    The tester and reviewer can assess samples as they normally would. Both roles can access:

    • The source document

    • The linked control execution tasks

    • Automatically or manually uploaded evidence

    Additional execution-based indicators

    • A warning appears when a task is not completed.

    • A warning appears when a task was completed after the evidence uploader finished their work.

    • Linked evidence from execution tasks displays a link icon; manually uploaded evidence does not.

    Additional Notes

    • If there are no execution tasks within the period of the control test, it is assumed that the control didn't occur.

    • Execution tasks that were deleted or rescheduled outside the test period before sampling took place are not included in the population. After sampling it is not possible to delete and even rescheduling the task will not remove it from the source of the testplan.

    • This mechanism ensures a fully auditable snapshot: Execution tasks used in a test cannot be removed from the testplan after sampling, ensuring the integrity of the sample.

    Incidents Standing Data & Emails

    The Incident Standing Data functionality in CERRIX enables users to define and manage reusable data components used when creating and handling incidents. This feature provides flexibility, control, and customization tailored to your organization's specific incident management needs.

    This documentation explains how to manage Incident Standing Data, including classifications, incident types, custom fields, and email notifications in CERRIX’s Incident Management module.

    Video Tutorial

    Prefer to watch instead of read? Have a look at our Incidents Video Tutorials


    Accessing Incident Standing Data

    Incident Standing Data is located within the Incident Workspace in CERRIX.

    1. Navigate to Incidents from your main menu.

    2. On the Incident Workspace, locate and click on the Standing Data in t

    3. he left hand menu.


    Managing Classifications

    Classifications define the severity or urgency level of an incident (for example: Low, Medium, High).

    To manage classifications:

    1. Within the Standing Data menu, select Classification.

    2. Modify or add new classifications:

      • Change the name of existing classifications.

      • Apply a color code to quickly visualize severity.


    Managing Incident Types

    Incident Types allow you to define and tailor the data fields specifically needed when users log incidents.

    Creating an Incident Type

    To create a new incident type:

    1. Within Standing Data, click on Incident Types.

    2. Select Add.

    3. Enter a descriptive name to identify the Incident Type clearly.

    Adding Custom Fields

    You can add custom fields to any new incident type:

    1. Create Sections to logically group custom fields:

      • Name and rearrange sections easily.

      • Remove fields and sections as needed.

    2. Add Fields within sections:

    Examples of Adding Custom Fields:

    • Text area field: Provide open-ended text inputs.

    • Drop down single select: Let users select from a predetermined list. Colors can be optionally assigned per choice.

    • Financial Impact: Numerical data or specific values tailored to your incident reporting needs.

    Configuring Email Notifications

    Incident types can trigger notifications to specific recipients upon creation.

    To configure notifications per incident type:

    1. Select your incident type.

    2. Navigate to the Configuration tab.

    3. Add email address(es) for recipients who need notification when an incident with this type is created.


    Standard (Built-in) Incident Types

    CERRIX provides two pre-defined incident types for common use cases:

    • Operational Incident

    • Data Breach

    These built-in incident types:

    • Cannot be edited or deleted.

    • Guarantee compatibility with pre-established forms and reporting structures.

    • Maintain existing data mappings and integration points.

    Important: Custom fields cannot yet be added to standard types (e.g., Data Breach). However, this enhancement will be available in future updates.

    DORA Incident Types

    As part of CERRIX’s support for the Digital Operational Resilience Act (DORA), a standardized set of DORA-specific incident types is now available. These incident types are aligned with the reporting obligations under DORA and are designed to help organizations track and report major ICT-related incidents effectively.

    Overview

    The DORA incident types are provided as a predefined template in the system. These are separate from your custom incident types and follow the structure required for DORA-compliant reporting.

    Available in the Following Report Types

    The DORA incident fields and structure are embedded in three predefined report types:

    • DORA Initial Report

    • DORA Intermediate Report

    • DORA Final Report

    These templates ensure that incident reporting aligns with regulatory expectations throughout the incident lifecycle.

    Key Features

    • Standardized Structure: Includes all fields required for DORA reporting (e.g., incident classification, root cause, impact, response timeline).

    • Pre-filled Field Labels: Uses terminology aligned with regulatory guidelines to ensure consistency.

    • Integration Ready: Templates are structured for easy integration with external DORA reporting systems.

    Incident Sent Emails

    As an administrator, all sent mails can be viewed via an extra tab in the incident module, underneath the Standing Data.

    Roles, Rights and Permissions

    CERRIX uses a role-based access model to manage who can view, edit, and approve information across the platform. This ensures that every user only has access to the functions and data they need for their responsibilities, supporting both data security and efficient collaboration.

    Roles and Permissions in CERRIX

    Each user is assigned one or more roles, which define their level of access. Roles are aligned with common responsibilities in governance, risk, compliance, audit, and incident management. Permissions specify what a role can do within a module.

    Permission Matrices per Module

    CERRIX provides a Permission Matrix for each key module. These matrices are the authoritative reference for configuring and validating user rights. In the matrix sheet:

    • Each row lists a specific action (e.g., Can report new incidents, Can delete risks).

    • Each column represents a role (e.g., Risk Unrestricted Admin, Incident Assessor).

    • The cells indicate whether the role has permission, and what the scope of their permission is (Unrestricted, Restricted, or Assigned).

    Incidents Permission Matrix

    Role
    Description

    You can see which permissions these roles have in this permission matrix:

    Risks Permission Matrix

    Roles
    Description

    You can see which permissions these roles have in this permission matrix:

    Controls Permission Matrix

    Roles
    Description

    You can see which permissions these roles have in this permission matrix:

    Control Effectiveness Testing Permission Matrix

    The role descriptions for Control Effectiveness Testing are the same as those for the .

    You can see which permissions these roles have in this permission matrix:

    Introduction to CERRIX

    Welcome to CERRIX, your comprehensive solution for Governance, Risk, and Compliance (GRC) management. This documentation will provide you with an understanding of how to use CERRIX effectively.

    This documentation is still a work in progress and does not cover all functionalities of the CERRIX product yet. The CERRIX team is working on bringing new content into this documentation on a continuous basis.

    Overview

    CERRIX is a cloud-based platform that centralizes and streamlines compliance, risk management, and audit processes. By integrating all four lines of governance, it ensures consistent workflows and enhanced operational efficiency.

    Why Use CERRIX?

    • Simplifies GRC Management: Tracks human processes across your organization.

    • Improves Compliance: Helps meet regulatory and organizational frameworks.

    • Enhances Efficiency: Reduces time and resources spent on manual processes.

    Tip: Use CERRIX to reduce complexity and bring clarity to your compliance workflows.


    Ready to get started? Proceed to the page for instructions on logging in and navigating the dashboard.

    Control Execution Tasks

    Video Tutorial

    Prefer to watch instead of read? Have a look at our Video Tutorial

    Control execution tasks are essential for ensuring that your risk and compliance controls are regularly tested and updated. In CERRIX, these tasks are linked directly to your controls, providing transparency and traceability throughout your compliance program.

    This guide will cover:

    Implementation Guide

    On this page you’ll find comprehensive instructions and best practices for implementing the CERRIX platform within your organization.

    The document below is designed to help you navigate every step of the implementation journey, from initial project setup to going live and ongoing support. It covers:

    • Project Setup – Defining your implementation plan, roles, and communication strategy.

    • Configuration – Structuring and customizing CERRIX to fit your unique processes and frameworks.

    Unrestricted means that a user has rights across all organizations
  • Restricted means that a user has rights for a specific organization

  • Event Unrestricted Viewer

    View-only access to all events, across all organizations.

    Event Restricted Viewer

    View-only access to events within the user’s own organization (and daughters org)

    Control Evidence Uploader

    The Evidence Uploader can be assigned in test plans for both Design & Implementation and Effectiveness testing. This role is responsible for uploading and maintaining supporting evidence used during control testing.

    Control Tester

    The Tester is responsible for executing both Design & Implementation and Effectiveness testing. This role carries out control tests and documents the test results.

    Control Reviewer

    The Reviewer evaluates and approves the results of Effectiveness testing. This role is responsible for reviewing the tester’s work and ensuring that control assessments are complete and accurate.

    Control Testplan Creator

    The Test Plan Creator is responsible for designing and maintaining test plans for both Design & Implementation and Effectiveness testing. This role can also manage the corresponding test catalogues.

    Control Executor

    The Control Executor is responsible for performing the operational execution of controls as defined in the system. This role records the performance results and can upload relevant evidence demonstrating that the control has been executed according to plan.

    Event Unrestricted Administrator

    Full access to all event-related functionality and visibility across all organizations.

    Event Restricted Administrator

    Similar to the Unrestricted Administrator but limited to their own organization (and daughters org) and without access to Standing data.

    Event Assessor

    Full editing rights (in statuses: Awaiting acceptance and Ready for review) for events assigned to them

    Event Responsible

    Editing rights (in status Awaiting improvements) for assigned events, except for user assignments.

    Event Reporter

    Can report new events for any organization in CERRIX.

    Event Informed

    View-only access to events where the user is assigned.

    Risk Unrestricted Administrator

    The Unrestricted Administrator has unrestricted read and write rights, can add entries in catalogues.

    Risk Restricted Administrator

    The Restricted Administrator has restricted read and write rights for his own organization.

    Risk Unrestricted Writer

    The Unrestricted Writer has write rights for the entire organization.

    Risk Restricted Writer

    The Restricted Writer has write rights for his own organization.

    Risk Unrestricted Viewer

    The Unrestricted Viewer has view rights for the entire organization.

    Risk Restricted Viewer

    The Restricted Viewer has read rights for his own organization.

    Control Unrestricted Administrator

    The Unrestricted Administrator is responsible for setting up and maintaining a complete overview of the Controls module across all organizations. This role grants full visibility and editing rights on all controls, as well as access to all standing data in the module. The user can also be assigned to any role within testing activities.

    Control Restricted Administrator

    The Restricted Administrator is also able to set up and keep the overview of the controls. However, the Restricted Administrator is limited to controls of his own organization. Also, the Restricted Administrator can be selected in every role in testing within his own organization.

    Control Unrestricted Writer

    The Unrestricted Writer has full write permissions for the Controls module across all organizations. They can create, edit, and delete controls but have no testing-related permissions.

    Control Restricted Writer

    The Restricted Writer can create, edit, and delete controls within their own organization. Similar to the Unrestricted Writer, this role does not include any testing rights.

    Control Unrestricted Viewer

    The Unrestricted Viewer can open and view all controls across all organizations in read-only mode. This role has no editing or testing permissions.

    Control Restricted Viewer

    The Restricted Viewer can open and view controls only within their own organization in read-only mode. This role has no editing or testing permissions.

    24KB
    CERRIX-INCIDENT-PERMISSION-MATRIX-17-09-2025.xlsx
    Open
    30KB
    CERRIX-RISKS-PERMISSION-MATRIX-14-10-2025.xlsx
    Open
    24KB
    CERRIX-CONTROLS-PERMISSION-MATRIX-11-11-2025.xlsx
    Open
    Controls
    25KB
    CERRIX-CONTROL EFFECTIVENESS TESTING-PERMISSION-MATRIX-17-11-2025.xlsx
    Open

    Fields can be configured by:

    • Field Type: Text field, Text area, Date, Date-Time, Number, Checkbox, Dropdown single select, Dropdown multi select, Financial impact.

    • Name

    • Placeholder (optional)

    • Instruction guide text (optional)

    • Visibility status (visible/hidden)

    • Required status (mandatory/optional)

  • Adjust whether fields are required or optional.

  • Click Confirm.

    • The "Assessing" workflow status at the top of the page changes to green, indicating the incident is officially confirmed.

    • The incident now moves to the Improving stage.

    state.
  • The workflow view clearly indicates that the incident is completed and can no longer be edited unless it's reopened.

  • Reject

    1. The incident workflow goes back to the Improving stage

  • Creating a New Incident
    Chat and Incident History

    Add a qualification to each score.

    Getting Started
    Data Quality & Import – Ensuring your data is accurate, consistent, and ready for use in CERRIX.
  • Dashboarding & Reporting – Creating meaningful dashboards and reports to monitor performance.

  • Acceptance Testing – Testing the system with your data to ensure it meets your requirements.

  • Go Live & Support – Preparing end users and setting up support structures for a smooth launch.

  • Evaluation – Reflecting on the implementation process to identify lessons learned.

  • Whether you’re a project lead, administrator, or stakeholder, this guide will give you the insight and structure you need for a successful CERRIX implementation.

    If you have any questions or need assistance along the way, don’t hesitate to contact your CERRIX consultant.

    113KB
    CERRIX-implementation-guide-2025.pdf
    PDF
    Open
    The process of activating control execution for a control.
  • How to create and manage control execution tasks.

  • Key interfaces for responsible and reviewer roles.

  • Did you know you can use Control Execution Tasks as evidence for Control Advanced Effectiveness Testing? Read more here.

    Activating Control Execution for a Control

    To start using control execution tasks, you must first activate control execution for the relevant control:

    1. Go to the Controls module.

    2. Select the control you want to enable execution for.

    3. Locate the Control Execution section within the control’s detail page.

    4. Enable the Control Execution toggle.

    5. Save the changes.

    6. Wait for the screen to refresh automatically. After saving, 'Control execution' will appear in the upper right corner of the screen.

    Creating Control Execution Tasks

    Option 1: Creating a Task Series (Recurring Tasks)

    To create recurring control execution tasks, you need to create a new task series:

    1. Click on the 'Control execution' button. A new tab will open.

    2. Stay on the 'Recent and upcoming' tab. Initially, no control execution tasks will be shown.

    3. Open the 'Task series' tab and click on 'add'. A new tab will open showing the details page of the task series.

    4. Define the task series by filling in the following details:

      • Name: Enter a name for the task series.

      • Responsible(s): Select one or more individuals responsible for the tasks.

      • Notifications: Select when automatic notifications must be sent to the responsible(s).

      • Description: Provide a clear description for the execution steps of the task. This is crucial for quality execution and evidence.

      • Task Type: Currently, only 'control execution' is available.

      • Reviewer(s): Optionally, select one or more reviewers. If a reviewer is selected, a workflow will be created for all tasks in this series.

      • Task Score Options: Choose whether the responsible must give a score, has the option to give a score, or if the score field should be invisible. Select 'not required' as a task score.

    5. Navigate to the end of the page to plan the control task series.

    6. Select the frequency for the recurring task:

      • Yearly: For example, repeat 1, first Monday.

      • Monthly: For example, repeat 3, first Monday (each quarter).

      • Weekly: For example, repeat 1, select Monday.

    7. Fill in the Start date (e.g., 1 January 2025) and End date (e.g., 31 December 2025) for the task series.

    8. Click 'Save' to create the task series.

    9. After the page refreshes, the task series will be created based on the selected frequency. Only the end date can now be changed.

    10. Close the task series tab and refresh the control execution screen to get an overview of the created task series. The task series that was just created will be shown.

    11. Open 'Recent and upcoming' to view the individual tasks.

    Option 2: Creating an On-Event Control Execution Task

    To create an on-event control execution task:

    1. Open 'All control executions'.

    2. Click 'add'.

    3. Fill in the required fields. This 'on event' control execution consists of the same fields as the task series, except there are no fields to make the task recurring.

    4. Click 'Save' to create the on-event control task.

    5. Close the tab, open and refresh the control execution tab (showing 'All control executions'). This task is now visible in the task overview. Highlight the on-event task.

    Task Workspace for Responsible

    This section describes how a responsible user interacts with control execution tasks.

    The responsible user can view and open control execution tasks using their personal calendar. The task is marked as an all-day event. Alternatively, the responsible can use the task workspace, which provides an overview of all tasks and can be used by responsibles, reviewers, and control writers to monitor tasks.

    To open and execute a task as a responsible:

    1. Login as a control execution responsible.

    2. Go to the calendar and highlight the task, or navigate to the task workspace.

    3. Open the task from the workspace. A new tab will open showing the details page of the task.

    4. The task will initially be in the 'To do' status.

    5. On the left navigation panel, you can:

      • See the linked controls.

      • Add and view documents.

      • Add and view hyperlinks.

      • See the task history.

    6. To execute the control task, go back to the details page.

    7. Add the evidence.

    8. Fill in the score (e.g., select 'Effective').

    9. Write a comment.

    10. You can save your work using the save button and complete it later.

    11. When you are ready, click on the 'Mark as done' button.

    12. The responsible has now completed the task.

    Task Workspace for Reviewer

    This section outlines the process for reviewing control execution tasks.

    If a reviewer has been selected for a task, they will receive an email to review it.

    To review a task:

    1. Login with the user linked as a reviewer.

    2. Open the email link or navigate directly to the task.

    3. The task will open and its status will be 'Ready for review'.

    4. The reviewer has read-only rights and can only reject or accept the task.

    5. If rejecting the task: The status of the task will change to 'rejected', and the responsible will be notified by email. The responsible must then execute/update the task again.

    6. To accept the task:

      • Click on 'Accept'.

      • Fill in a comment.

    7. The status of the task will change to 'done', and the responsible will be notified by email that the task has been accepted by the reviewer.

    8. The reviewer has the option to reopen the task. If the task is reopened, it will revert one step back in the workflow to be handled by the reviewer. The responsible will also be informed by email that the task has been re-opened.

    9. In a scenario where no reviewer has been selected for the task, the responsible can reopen the task if needed.

    Control Execution Tasks

    Control execution completed with evidence

    Evidence is already present

    Sample is marked Done. Optional: add extra evidence.

    Control execution completed without evidence

    No evidence found

    Add evidence or mark No evidence and provide an explanation.

    Control execution not completed

    Task still open

    Either ask the responsible person to complete the task, upload evidence manually, or mark No evidence with justification.

    CERRIX Support
    tasks
    A screenshot of a computer AI-generated content may be incorrect.

    SLA Dashboard

    The SLA Dashboard provides customers with real-time insights into support performance and platform availability. It is designed to help you monitor ticket trends, track SLA adherence, and review uptime metrics relevant to your organization.

    This article explains how to access the SLA Dashboard, what information it contains, and how to interpret the widgets.


    Accessing the SLA Dashboard

    You can access the SLA Dashboard through the CERRIX Support Portal

    • Log in to the .

    • Navigate to Dashboards → SLA Dashboard (individual customer).

    Access to the SLA Dashboard is restricted to authorized customer contacts. If you believe you should have access but do not see the dashboard, please contact your CERRIX account administrator.


    Filtering Options

    The SLA Dashboard includes a date range filter:

    • Default setting: Last quarter (3 months).

    • Filter behavior: The filter applies to the ticket creation date. Only tickets created within the selected date range are shown in the widgets.


    Dashboard Widgets

    The SLA Dashboard is organized into several widgets, each focused on a specific area of support and availability:

    Ticket Trend

    • Purpose: Provides an overview of how many tickets were opened and closed by your team.

    • Granularity: Displayed per month within the selected date range.

    Tickets per Type

    • Purpose: Shows the breakdown of tickets created by type (e.g., incident, bug, change request).

    You can review the definitions of the different ticket types in the .

    Response and Resolution Times

    • Purpose: Shows how your support tickets performed against agreed service levels for response and resolution, separated per ticket type.

    • Definitions:

      • Response SLA Met (%): Percentage of tickets that received an initial response within the defined SLA timeframe.

      • Resolution SLA Met (%): Percentage of tickets resolved within the SLA timeframe.

    You can review the SLA timeframes in the .

    Uptime

    • Purpose: Displays the measured uptime percentage of your CERRIX environment.

    • Method: Based on automated checks that validate the basic availability of your environment.

    • Important to note:

      • Scheduled maintenance is not filtered out.

    You can review the definitions of uptime in the .

    Further Information

    • Purpose: Provides context for availability metrics.

    • Contents:

      • Overview of recent releases.

      • Summary of incidents that may have impacted platform availability.

    Drill-Down & Export Options

    Each SLA Dashboard widget includes an arrow icon in the top-right corner. Clicking this arrow allows you to drill down into the underlying data for that specific widget.

    Available actions:

    • Print: Generate a printer-friendly version of the drill-down view.

    • Export: Download the underlying dataset in Excel or CSV format.


    SLA Dashboard Data

    • Data Source: The SLA Dashboard pulls directly from the CERRIX support and monitoring systems.

    • Refresh Rate: Data is updated in real time.

    • Only use data from July 1st 2025 onwards as a source, as only to these tickets the correct SLA's have been applied.

    RCA P1 Incident 2025-07-09

    Incident Summary

    Product: CERRIX Platform

    Date: 2025-07-09

    Reference ID: RCA-20250709-P1-ReleaseDowntime

    Risks

    The Risks module in CERRIX is the foundation for identifying and managing potential risks to your organization. It enables organizations to proactively manage risks and ensure alignment with compliance standards.

    Key Features

    Risk Identification

    Daily.

    Total Tickets: Total number of tickets created in the selected date range.

  • Unresolved Tickets: Tickets still open at the time of reporting. These are excluded from SLA target calculations.

  • False negatives may occur due to limitations in the automated check (e.g., temporary network hiccups).

  • As a result, the reported uptime percentage is typically slightly lower than actual availability.

  • CERRIX Support Portal
    Service Level Agreement (SLA)
    Service Level Agreement (SLA)
    Service Level Agreement (SLA)

    Document potential risks to your organization.

  • Categorize risks based on severity, likelihood, and impact.

  • Risk Assessment

    • Perform regular assessments to evaluate risks.

    • Update risk scores based on new insights or changes in the business environment.

    Risk Monitoring

    • Continuously monitor risks to track progress on mitigations.

    • Generate reports to review the organization's risk landscape.

    Tip: Regularly update risk assessments to stay ahead of potential threats.


    While we work on creating content for this documentation, more information can be found in the document below.

    1MB
    Risk - Work instructions.pdf
    PDF
    Open
    Incident Timeline
    Timestamp
    Event

    2025-07-08 22:00

    Opening of release window of sprint 46 and sprint 23 to all production environments

    2025-07-08 22:13

    Downtime starts for first customer environment

    2025-07-08 23:59

    All customer environments unavailable

    2025-07-09 07:20

    Detection that the production environments not available

    2025-07-09 07:30

    Requeued the release for all production environments

    2025-07-09 08:00

    Customer environments starting to become available again one by one

    Root Cause

    Root Cause

    The incident was caused by a configuration error related to deployment permissions. As a safety measure, the environments were automatically shut down to prevent further issues and required manual intervention to restore service.

    Detection Gaps

    Although monitoring and alerting systems functioned as designed, the alerts were not noticed by the responsibles at time of deployment.

    Reason the Issue Was Not Identified Before Release

    The incident was not related to the code changes deployed, but rather to the deployment configuration itself. As a result, it was not identified during pre-release testing or acceptance testing.

    Impact Analysis

    Customers have experienced 8.5-11 hours downtime in all their production environments, mostly outside of business hours. The environments were not accessible, instead they provided the customer with an error page, making it impossible for them to log in.

    The release concerned the production environments only, all their test and acceptance environments have been up and running without any issues.

    Resolution & Recovery Steps

    Short-term fixes implemented

    A new deployment was executed on PRD for all environments, with the correct configuration.

    Confirmation of stability

    Confirmation from customers, monitoring on environments, health check and smoke testing on internal production environments, all took place in order to make sure that the environments are back to normal.

    Lessons Learned

    What worked well

    The communication was handled by the Product Team and Consultancy with great care. The time between time of detection and time of resolution was quite fast.

    What didn’t work well

    One of the main issues highlighted by this incident, is the fact that for the time when the incident took place, the alerting did not notify a member of the team when manual intervention was required for the update to be completed.

    Preventive & Corrective Actions

    To prevent similar incidents in the future and further strengthen our service reliability, we are taking the following actions:

    Action
    Due date

    We will review and improve our release configurations to prevent this specific issue from occurring again in future deployments.

    2025-07-14

    We are enhancing our release tooling to allow for more streamlined and reliable requeuing of releases, ensuring smoother and faster resolution in case of unexpected issues.

    2025-08-04

    In addition, we are providing further training and knowledge sharing to ensure that senior team members are fully up to speed with all aspects of the release process.

    2025-07-14

    Finally, we are revising our release planning and support structure to ensure that technical support is always available during release windows, including outside regular business hours when needed.

    2025-08-04 (before the next PRD release)

    We remain fully committed to continuously improving our processes and minimizing any potential impact on our customers. Thank you for your understanding and trust.

    If you have any questions about this Root Cause Analysis, please get in touch with us.

    2025-07-09 08:45

    Mail sent to all customers informing them of the downtime

    2025-07-09 09:37

    All production environments up and running except for the incidents module

    2025-07-09 11:00

    All production environments up and running including the incidents module

    External Connections

    CERRIX enables secure, controlled sharing of control test information and evidence through the External Connections module. This feature is especially useful for auditors or third parties who require direct access to relevant control data and documentation.

    Steps to Set Up External Connection:

    Navigate to the Administration Controls menu.

    Click on External Connections.

    Click on Add.

    Fill in the following fields:

    Click Next

    Provide the following details:

    Click Next

    Select the controls that can be queried through the API.

    Click Next

    From the dropdown menu, select Effectiveness under Testplan type.

    Specify the Start Date and End Date for the testplans from the controls that may be queried through the API.

    Click Next

    Click Complete

    Your API key and secret are now displayed on the screen. Ensure you store them securely, as they won't be shown again.

    Requesting data through the API calls

    Use your new API credentials to export control data. You can use any API tool (e.g., Postman) or your terminal. In the example below, we will use Postman.

    Request the Export

    Steps to Set Up ControlTestInformation:

    • Open Postman: Start the Postman application on your computer.

    • Create a New Request:

    Click on the '+' icon or 'Create a request' to create a new request tab.

    • Set the HTTP Method:

    From the dropdown menu next to the URL input bar, select the POST method.

    • Enter the URL:

    Input the Base URL followed by the Routing path.

    The Base URL is always composed of the environment URL followed by "/api,"

    For routing to Control Test Information, please use the following path:

    Fill in the URL as:

    https://<your-environment>.cerrix.com/api/thirdpartyassurance/requestexport

    • Add the following query Params:

    Key
    Value
    • Set up the Authorization.

      • Select the “Basic Auth” type.

      • Fill in the API key and secret as provided in the earlier step.

    1. Press "Send"

    2. A Request ID will be retrieved from the API call. Save this Request ID.

    Retrieve the Export Results

    • Create a New Request:

    Click on the '+' icon or 'Create a request' to create a new request tab.

    • Set the HTTP Method:

    From the dropdown menu next to the URL input bar, select the GET method.

    • Enter the URL:

    Input the Base URL followed by the Routing path.

    The Base URL is always composed of the environment URL followed by "/api,"

    For routing to Get Result, please use the following path:

    Fill in the URL as:

    https://<your-environment>.cerrix.com/api/thirdpartyassurance/getresults/<requestId>

    1. Fill in the 'requestId' field with the Request ID received through the previous API call.

    2. Set up the Authorization.

      1. Select the “Basic Auth” type.

      2. Fill in the API key and secret as provided in the earlier step.

    Here's a sample response containing all information related to the control:

    Request the export for Get Evidence Document

    • Create a New Request:

    Click on the '+' icon or 'Create a request' to create a new request tab.

    • Set the HTTP Method:

    From the dropdown menu next to the URL input bar, select the GET method.

    • Enter the URL:

    Input the Base URL followed by the Routing path.

    The Base URL is always composed of the environment URL followed by "/api,"

    For routing to Get Evidence Document, please use the following path:

    Fill in the URL as:

    https://<your-environment>.cerrix.com/api/thirdpartyassurance/getevidencedocument/<requestId>

    • Add the following query Params:

    Key
    Value
    • Fill in the 'requestId' field with the Request ID received in the first API call.

    • Set up the Authorization.

      • Select the “Basic Auth” type.

      • Fill in the API key and secret as provided in the earlier step.

    Logging

    CERRIX logs all API calls made for external connections. This ensures users always have an overview of the requested APIs and their respective timestamps. Furthermore, it provides insight into the specific controls that were requested.

    • Navigate to the Administration Controls menu.

    • Click on Third Party Assurance.

    On this page you can find an overview of all Third Party Assurance connections.

    For each connection, you can access a log of which controls were accessed.

    Heavy & Light Users

    At CERRIX, we value transparency in how our pricing is determined. A key component in our pricing structure is based on user roles and the level of functionality they access within the platform. This document outlines how we define light and heavy users to provide clarity on which metrics are used in your subscription.

    Only users that are in status active and that have login credentials are counted as users for billing purposes.

    What Are Heavy and Light Users?

    In CERRIX, a user’s classification as light or heavy is determined by the roles assigned to them. These roles reflect the actions and responsibilities users have across the different modules of the system.

    • Heavy users have one or more roles that involve administrative, editorial, or decision-making access. They perform tasks such as configuring modules, managing risks and controls, reviewing or testing data, and overseeing compliance workflows.

    • Light users only have roles with limited responsibilities. These typically include viewing data, reporting events, uploading evidence, or participating in processes without administrative or strategic involvement.

    Role Classification Table

    The following table lists all roles in CERRIX that classify a user as a Heavy user. If a user holds one or more of these roles, they are considered a Heavy user for licensing purposes, regardless of any other Light roles they may have.

    Role
    Category
    User status

    Findings Report

    The Finding Reports module in CERRIX enables users to generate actionable insights and reports based on organizational data. With integrated PowerBI tools, this module helps stakeholders make informed decisions.

    Key Features

    Report Generation

    • Create custom reports tailored to your organization’s needs.

    • Use predefined templates for quick reporting.

    Data Visualization

    • Leverage PowerBI integration for advanced visualizations.

    • View trends, summaries, and detailed breakdowns.

    Sharing Insights

    • Share reports with stakeholders or export them in multiple formats.

    • Set access permissions to control report visibility.

    Tip: Regularly review reports to identify areas of improvement and track progress.


    How to Use the Finding Reports Module

    1. Accessing the Module

    1. Navigate to the Finding Reports module.

    2. Choose between creating a new report or viewing existing ones.

    2. Generating a Report

    1. Select a predefined template or start with a blank report.

    2. Customize the report by selecting relevant data sources and fields.

    3. Add visualizations such as charts, graphs, or tables.

    4. Save the report for future reference.

    3. Sharing a Report

    • Use the share option to send reports to team members or stakeholders.

    • Export the report in formats like PDF, Excel, or PowerBI dashboards.


    Continue exploring other modules in the or learn more about .

    Service Level Agreement (SLA)

    Introduction

    This Service Level Agreement ("SLA") sets forth the terms and conditions under which CERRIX ("Service Provider") commits to deliver its Governance, Risk Management and Compliance ("GRC") SaaS platform ("the Service") to its customers ("Customer"). This SLA is an integral part of the agreement between the Service Provider and the Customer, ensuring clarity, accountability, and a shared understanding of service expectations.

    Risk Unrestricted Writer

    Risks

    Heavy

    Risk Restricted Writer

    Risks

    Heavy

    KRI Unrestricted Administrator

    Key Risk Indicators

    Heavy

    KRI Restricted Administrator

    Key Risk Indicators

    Heavy

    KRI Unrestricted Writer

    Key Risk Indicators

    Heavy

    KRI Restricted Writer

    Key Risk Indicators

    Heavy

    Event Unrestricted Administrator

    Events

    Heavy

    Event Restricted Administrator

    Events

    Heavy

    Event Assessor

    Events

    Heavy

    Data Breach Assessor

    Events

    Heavy

    Data protection Officer

    Events

    Heavy

    Control Unrestricted Administrator

    Controls

    Heavy

    Control Restricted Administrator

    Controls

    Heavy

    Control Unrestricted Writer

    Controls

    Heavy

    Control Restricted Writer

    Controls

    Heavy

    Control Testplan Creator

    Controls

    Heavy

    BIM Administrator

    Business Improvement Management

    Heavy

    BIM Reviewer

    Business Improvement Management

    Heavy

    BIM Report Type Restricted Admin

    Business Improvement Management

    Heavy

    Forms Administrator

    Forms

    Heavy

    Forms Responsible

    Forms

    Heavy

    Cerrix Documents Administrator

    Cerrix Documents

    Heavy

    Shared Cerrix Documents Administrator

    Cerrix Documents

    Heavy

    Cerrix Invite Administrator Unrestricted

    Cerrix Invite

    Heavy

    Dashboard Administrator

    Dashboard

    Heavy

    Data Management Unrestricted Administrator

    Data management

    Heavy

    Data Management Restricted Administrator

    Data management

    Heavy

    Data Management Unrestricted Writer

    Data management

    Heavy

    Data Management Restricted Writer

    Data management

    Heavy

    Process Administrator

    Navigators

    Heavy

    Process Editor Unrestricted

    Navigators

    Heavy

    Process Editor Restricted

    Navigators

    Heavy

    Process Reviewer

    Navigators

    Heavy

    MoI Responsible Supervisor

    Improvement management

    Heavy

    Third Party Unrestricted Administrator

    Third Party

    Heavy

    Third Party Restricted Administrator

    Third Party

    Heavy

    Third Party Unrestricted Writer

    Third Party

    Heavy

    Third Party Restricted Writer

    Third Party

    Heavy

    Third Party Reviewer

    Third Party

    Heavy

    Audit Administrator

    Audit

    Heavy

    Audit Auditor

    Audit

    Heavy

    Audit Chief Audit Executive

    Audit

    Heavy

    Application Administrator

    General

    Heavy

    User Management Administrator

    General

    Heavy

    Risk Unrestricted Administrator

    Risks

    Heavy

    Risk Restricted Administrator

    Risks

    Heavy

    Modules Overview
    custom dashboards

    Press "Send"

  • The API will respond with a JSON file.

  • Press "Send"

  • The document will be received as a binary stream from the API.

  • Name

    Enter a name for the external connection.

    Description (optional)

    Provide a brief description of the external connection.

    Assurance Employee (optional)

    Select the person responsible for the external connection.

    Expiration Date

    Specify the date until which the API can be accessed (maximum: 1 year from today).

    IP Restriction

    Enter the IP address from which the API can be accessed. Only API requests from these IP addresses will be accepted.

    controlids

    Enter the control ID in format “00000001”.

    Add multiple controls by adding a semicolon ";" between the control IDs

    testplantypes

    Enter “Effectiveness”

    testplanperiodstart

    Enter the Start Date from the Period in format “2022-01-01”

    testplanperiodend

    Enter the End Date from the Period in format “2022-12-31”

    controlidentifier

    Enter the control ID in format “00000001”

    documentid

    Locate the Document ID within the JSON file received with the Export Results API call. This ID can be found within the SourceDocuments, SampleDocuments, or StepDocuments sections.

    A black text on a white background

Description automatically generated
    A black text on a white background

Description automatically generated
    A black text on a white background

Description automatically generated
    A black text on a white background

Description automatically generated
    A black text on a white background

Description automatically generated
    A close-up of a text

Description automatically generated
    {
        "Status": "Data is ready",
        "Controls": [
            {
                "ControlIdentifier": "00000106",
                "ControlName": "User Acceptance Testing",
                "ControlDescription": "After the software change has been made based on the approved functional design, it is subject to a User Acceptance Testing process.",
                "ControlFrequency": "On Event",
                "KeyControl": true,
                "RequiresMonitoring": true,
                "ControlExecution": "Manual execution",
                "AspectIC": "Process controls",
                "MitigatedRisks": "Business Disruption due to implemented changes that are unsupported by ADHB requirements;Data in component banker can be filled in incorrectly",
                "RelatedOrganization": "Demo Organization\\Group Mortgages\\Operating companies\\Mortgages The Netherlands\\CFRO\\IT",
                "RelatedBusinessDimensions": [
                    "Processes\\Supporting processes\\IT\\5 Regular Change Management"
                ],
                "RelatedFrameworkDimensions": [],
                "TestPeriods": [
                    {
                        "TestPeriodName": "2024",
                        "TestPeriodScore": null,
                        "TestPeriodStartDate": "2024-01-01T00:00:00Z",
                        "TestPeriodEndDate": "2024-12-31T00:00:00Z",
                        "TestPlans": [
                            {
                                "TestPlanName": "2024",
                                "TestPlanStatus": "Waiting for evidence",
                                "TestPlanStartDate": "2024-01-01T00:00:00Z",
                                "TestPlanEndDate": "2024-12-31T00:00:00Z",
                                "SampleMethod": "One sample",
                                "ReasonForManualGeneration": "",
                                "SampleType": "Default",
                                "TestSample": 0,
                                "TestPopulation": 0,
                                "SourceDocumentUploader": "",
                                "DueDateSourceDocumentUploader": "0001-01-01T00:00:00Z",
                                "EvidenceUploaders": [
                                    "Doe, John"
                                ],
                                "DueDateEvidenceUploader": "2025-01-01T00:00:00Z",
                                "Testers": [
                                    "Doe, John"
                                ],
                                "DueDateTester": "2025-01-01T00:00:00Z",
                                "Reviewers": [
                                    "Stas, Dart"
                                ],
                                "DueDateReviewer": "2025-01-01T00:00:00Z",
                                "LinkedStandard": "ISAE3402",
                                "QualityAspects": "Accuracy;Completeness;In Time",
                                "TestNorm": "",
                                "TestedBy": null,
                                "OverallScoreTester": null,
                                "CommentTester": null,
                                "DateTesterTested": "0001-01-01T00:00:00Z",
                                "ReviewedBy": null,
                                "OverallScoreReviewer": null,
                                "CommentReviewer": null,
                                "DateReviewerTested": "0001-01-01T00:00:00Z",
                                "TestSamples": [],
                                "SourceDocuments": []
                            }
                        ]
                    }
                ]
            }
        ]
    }
    Purpose

    The purpose of this SLA is to define the levels of service the Customer can expect from the Service Provider, including performance metrics, support availability, and issue resolution timelines. It establishes the foundation for a productive partnership aimed at supporting the Customer’s operational and strategic goals in governance, risk management, compliance, and audit management.

    Scope

    This SLA applies exclusively to the GRC SaaS platform hosted on Microsoft Azure. It outlines the responsibilities of the Service Provider in ensuring platform availability, reliability, security, and performance, as well as the responsibilities of the Customer in adhering to usage guidelines and reporting issues.

    Out of scope

    This SLA does not cover:

    • Issues caused by factors outside the Service Provider’s control, such as Customer misuse, third-party integrations, or natural disasters.

    • Downtime during scheduled maintenance periods, provided the Customer is notified in advance.

    • Beta features or experimental functionalities to which the customer opted in are not explicitly covered under this SLA.

    Objectives

    The primary objectives of this SLA are to:

    1. Define service availability, reliability, and performance standards.

    2. Specify support response and resolution times for various issue severities.

    3. Promote a collaborative approach to continuous service improvement.

    Service Levels

    Service Window

    1. The Platform shall be available to the Customer 24 hours a day, 7 days a week, 365 days a year, excluding periods of scheduled maintenance as described below.

    Maintenance Window

    Maintenance windows are defined in the publicly available release planning.

    The Service Provider is responsible for all changes, updates and maintenance to the Platform In this respect, the Service Provider:

    1. May at its discretion make changes or and updates to the Platform or application such as Infrastructure, Security and/or Functionality.

    2. Remind the customer prior to the start of scheduled maintenance.

    3. Shall plan the maintenance outside business hours. Such activities are typically planned between 22:00 and 07:00 (CET). Notwithstanding the foregoing, the Service Provider reserves the right to deviate from this timeframe, in which case the adjusted schedule shall be clearly communicated to the Customer as part of the scheduled maintenance notification.

    4. May, for corrective and preventive maintenance, execute unscheduled maintenance. The Service Provider will inform the customer of unscheduled maintenance.

    Support Window

    1. The customer is entitled to functional support during business hours, being Monday till Friday from 09:00 till 17:00 (CET), excluding National holidays in The Netherlands.

    2. New support tickets are to be created by the customer in the customer support portal of the Service Provider: https://support.cerrix.com.

    Ticket types & Priorities

    The Service Provider will classify all tickets and assign one of the following ticket types to the customers ticket:

    1. Service Request

    2. Incident

    3. Bug

    4. Change Request

    5. Feature Request

    During the classification process, Incidents and Bugs receive a priority:

    1. The Priority is based on the Impact and the Urgency of the ticket.

    2. The priority is based on the Service Provider classification, supported by the priority matrix below:

    Category
    High
    Medium
    Low

    Impact

    The entire application is down or unusable.

    One or more modules of the application are unusable or crucial functionality does not work. No approved workaround available.

    Non crucial functionality does not work. Approved work around available.

    Urgency

    Resolution time is of the highest urgency.

    Some flexibility with regards to the resolution time.

    Can be solved later because there is no immediate impact on the Customer.

    Response & Resolution Times

    Availability

    1. The Service Provider shall make all reasonable efforts to ensure that the production platform of its GRC system is available 99,5% per month.

    2. Only the Production environment is included in this Service Level.

    3. Schedule Maintenance is excluded from this Service Level and therefore not calculated as downtime (unavailability).

    4. In case of full application downtime, a Recovery Point Objective of 1 hour is applicable and a Resolution Time Objective of 8 hours.

      1. For incidents of this nature, the Service Provider shall prepare a Root Cause Analysis (RCA) report, which shall include a summary of the incident, a timeline of events, the identified root cause, and a plan outlining the preventive and corrective actions to be taken.

    Software Updates

    1. The Service Provider shall regularly update the SaaS Platform to improve functionality, security, and performance. Updates may include bug fixes, security patches, performance enhancements, and new features.

    2. The Provider shall carry out software updates during scheduled maintenance windows.

    3. In cases where emergency maintenance is required, the Provider reserves the right to apply hotfixes immediately without prior notice. The Provider will make reasonable efforts to notify the Customer as soon as possible in such events.

    4. The Service Provider will take all reasonable effort to ensure that updates do not disrupt functionality and/or use of the application.

    5. When a Critical bug disrupts the functionality of the system, a hotfix will be applied by the Service Provider.

    Service Improvement

    When the Service Provider does not meet the Service Levels for Availability or Incident Resolution Times for three consecutive months, we commit to a Service Improvement Program. The Service Improvement program is a documented program containing:

    • Objectives & Scope

    • A Root Cause Analysis

    • Improvement Actions and Timelines

    • Continuous Monitoring and feedback

    • Accountability & Governance

    The documented Service Improvement Program will be shared with affected customers.

    Reporting

    The Service Provider shall make available a secure, web-based Service Level Agreement Dashboard through which the Customer can monitor actual service levels in near real-time. The portal shall provide transparency into achieved Service Levels:

    • Availability

    • Response Times

    • Resolution Times

    The Service Level Agreement Dashboard shall be accessible to authorized Customer personnel. Access credentials and role-based permissions shall be managed in coordination with the Customer.

    Definition of Terms

    Term
    Description

    Availability

    The proportion of total time that the application is fully functional and accessible to end users, excluding periods of scheduled maintenance.

    Bug

    An error, flaw, or unintended behavior in a software application that causes it to produce incorrect or unexpected results.

    Change Request

    A formal request to modify the Service or its configuration, typically outside standard operations, subject to evaluation and approval.

    Crucial Functionality

    CERRIX will determine, in good faith, whether functionality is considered crucial based on the extent to which its unavailability materially disrupts business-critical workflows, and whether a reasonable workaround exists. This assessment is made during the ticket classification process and will be clearly communicated to the customer.

    Customer Misuse

    Any improper or unauthorized use of the Service outside intended functionality or agreed terms, including misconfiguration, unsupported integrations, or failure to follow provided guidance.

    Feature Request

    A suggestion from the Customer for new functionality or enhancements to existing features, considered for future product development but not covered under the SLA.

    Incidents Workspace

    This document provides you with a clear and comprehensive overview of the Incident workspace module in CERRIX, enabling you to efficiently manage, track, and resolve incidents reported in your organization.


    Navigating the Incident Workspace

    The Incidents workspace provides an easy-to-use interface for viewing incidents, managing incident data, and tracking incident statuses from creation through resolution.

    In the incidents table you can see all relevant fields for each incident, such as:

    • Identifier (automatically generated)

    • Incident Name/Title

    • Classification

    • Reporting organization

    • Status

    • Reporter by

    • Relevant Dates (Created, Due, Closed)

    • Any other additional fields configured in your workspace

    • Gross and Net financial impact

    • ...


    Using Presets & Filters in the Incident Workspace

    Presets allow you to customize your Incident workspace view, helping you access specific subsets of data quickly.

    Creating a Workspace Preset

    To create a workspace preset:

    1. Click Edit Presets in the workspace interface.

    2. Configure your filters:

      • Select criteria (e.g., "Reported By," "Creation Date," "Due Date").

      • Specify conditions (e.g., equals, contains, greater than).

    Your saved presets appear in your favorites for easy future access.

    Making a Preset Public

    To make a preset public in the Incidents Workspace, navigate to Browse Presets located at the top left of the navigation menu. In the list of available presets, find the one you want to make public. Next to the preset, you’ll see a button with a globe icon — this represents the option to make the preset public. Clicking this button will publish the preset, making it accessible to all users who have the appropriate permissions to use it.

    Hot fix

    A quick and targeted software update released to fix a critical bug or security vulnerability.

    Incident

    An unplanned event or disruption that affects the normal operation of a system or service.

    Maintenance Window

    A scheduled period during which system updates, patches, or upgrades are performed.

    Recovery Point Objective

    The measure of the time a service is accessible and operational for use by customers.

    Recovery Time Objective

    The maximum acceptable amount of data loss measured in time before a disaster affects the service.

    Resolution Time

    The total time taken to fully resolve an issue or incident, from the initial report to the implementation of a permanent fix.

    Only time inside the support window is counted as resolution time.

    Response Time

    The time taken to acknowledge and begin addressing an issue, request, or incident after it has been reported.

    Only time inside the support window is counted as response time.

    Service Level

    The target time set for the recovery of IT and business activities after a disaster has occurred

    Service Level Agreement

    he specific performance standards or service quality metrics agreed upon in a Service Level Agreement

    Service Level Report

    A document that provides details on the performance of a service against the agreed Service Levels.

    Service Request

    A formal request from the Customer for information, advice, or a standard change or request that does not involve an incident or service disruption.

    Service Window

    The predefined time period during which a system, application, or service is expected to be operational and available to users.

    Uptime

    The percentage of time a system, service, or application is operational and available, measured over a month.

    Example: Reported By equals [Your Name] Due Date greater than [Today]

  • Click Preview to review results before saving.

  • Manage Columns:

    • Choose which columns you want visible or hidden.

    • Adjust column arrangement as desired.

  • Name your preset to easily identify it later.

  • Click Save to finalize your preset.

  • Release Notes

    On this page you’ll find a summary of new features, enhancements, bug fixes, and other changes included in each software update. This documentation is intended to keep you informed of the latest improvements and how they may impact your use of the platform.

    For insight into our release schedule for acceptance and production, please refer to our Release Planning page.

    The release notes are published shortly before a new release to the acceptance environment.

    ACC: 10 December 2025, PRD: 14 January 2026

    General

    • Hyperlink Length Across all modules where hyperlinks can be added, the maximum allowed hyperlink length has been extended to 32,767 characters. Line breaks and whitespace characters are not permitted.

    Incidents

    • Notification for Added Incident Types

      In the configuration tab of an Incident Type, you can define notification email addresses. These recipients will now be notified not only when a new incident is created, but also when an incident type is added.

    • Highlight Active Browse Preset In the browse preset overview the active preset is highlighted by a dark line around the active preset

    • Export of Financial Details (fix will be released on 31 December 2025 in ACC)

      From Dashboard Insights → Exports

    Controls

    • API for Custom Fields

      A dedicated API is now available to retrieve custom field definitions and values for controls.

      • GET /directdata/v1/controlcustomfields

        Returns all custom field definitions, including fields that are not visible.

      • GET /directdata/v1/controlcustomfieldvalues

    Third Party

    • Custom Field History Visible

      Changes to custom fields within Third Party records are now fully traceable in the History overview.

    Notable Fixes

    • Process Print Formatting

      Hard returns and spaces were previously omitted in process printouts. These are now properly included to improve readability.

    • Organizations & Business Dimensions Navigator: Assessment document upload restored For assessments targeting only an Organization (without a Business Dimension), documents could not be uploaded in the Assessment Documents section. This issue has been resolved.

    • Task Series Definition

      When defining a task series, users choose between recurrence by number of days or by specific weekday using a radio button. The task series is now correctly created based on the selected option.

    ACC: 12 November 2025, PRD: 26 November 2025

    General

    • Favicon changed The CERRIX icon in the browser tab is updated to the new logo.

    Tasks

    • Tasks tab title now contains task identifier The tab header for a Task in the CERRIX application did not include the task identifier. The Task tab header is changed to: (T) <Identifier> - <Action name> - <Task name>. (T) indicates that the tab contains a task.

    • API: POST Document to a Task It is now possible to upload a document to a Task via an API connection. More information can be found in the updated in-platform API documentation.

    Controls

    • API: Generate samples for a control test plan It is now possible to generate samples for a control test plan via an API. More information can be found in the updated in-platform API documentation.

    Notable Fixes

    Control testing

    • Evidence upload error handling Evidence uploaded can no longer be lost if during saving an issue is found. Now even when an error is shown, the evidence uploaded but not yet saved will remain available.

    MOI widget

    • Widget graph click through The Widget graphs can click through to an overview using that same filter. For MOI widgets a problem with that filtering is solved.

    Incidents

    • History Deletion of incident types and some other field values of multiselect fields is now shown correctly.

    ACC: 21 October 2025, PRD: 4 November 2025

    Risk

    • Custom fields Custom fields are now displayed in 2 columns and follow the order configured in the Standing data (In standing data the Administrator can configure settings for the application)

    Tasks

    • API GET Update: identifier The Task "identifier" is now included in the Tasks API and Direct Data API for Tasks

    • API POST update: hyperlinks Hyperlinks can be included in the POST request for the Tasks API

    For more information about the Task API, click the question mark icon in the CERRIX application and go to "API Documentation".

    Incidents

    • Standing data configuration

      • It is now possible to change the name of the standard incident types "Data breach" and "Operational incident".

      • Move fields within a section and from 1 section to another

        It is now possible to reorganize the custom fields of an incident type by moving fields within a section and from 1 section to another. Note: Only the main tab "details" cannot be organized in this way

    Notable Fixes

    Risks

    • Restricted risk writers could create a risk for any internal organization A user with only restricted rights can only view and edit risk of their own organizatio, Yet they were able to create a risk for any organization. This is now limited as well: restricted writers can only create a risk within their own organization.

    Forms

    • Forms freeze upon saving If a form contains multiple pages and the form is saved, the form "freezed" and could only be closed and reopened again to continue

    Incidents

    • System default preset update

      System default preset was shown but it did not refresh the filter if clicked. The Default preset is not shown anymore, unless the preset is added as favorite.

    • Assigned reporter

      A reporter with no further rights should not be able to assign another reporter.

    • Preset preview

      The Preset filter preview did not work anymore.

    ACC: 30 September 2025, PRD: 4 November 2025

    General lay out

    • New CERRIX Logo. A new CERRIX logo is implemented in the application and in the mails sent via the application

    Tasks

    • API Post: Update Task Score and Task Status A new API POST Update Task Score and Task Status. It is now possible to update the status and the score of Tasks via an API

    • Tasks Dataset A dataset of tasks is created. This data set can be used to create a Power BI overview for Tasks.

    Incidents

    • Change the standard incident type tabs Operational Incident and Databreach

      • To hide the standard fields defined in the associated tab. Please note that a field is hidden and is used in an Incident Form, the data entered in the Form for this field will still be mapped to the incident but it will not be visible because the field is hidden.

      • To add new sections and to add fields to all sections

    Notable Fixes

    Data management

    • Data management history details Details of History items could not be opened

    Business assessments

    • Add documents as restricted process editor As restricted process editor it was not possible to add Assessment related document

    Incidents

    • Presets for Incident count widget

      If an incident preset is public (accessible for everyone) and used in a incident count widget on a CERRIX dashboard, it is not possible anymore to switch the preset to private, because that would break the count widget .

    ACC: 9 September 2025, PRD: 23 September 2025

    Incidents

    • Hyperlinks

      At the location where documents can be added, it is now also possible to add hyperlinks. Hyperlinks can also be edited or deleted. Changes to hyperlinks can be tracked in the history.

    • Administrators can view Deleted incidents

      Deleted incidents are now visible for the unrestricted Administrators as one of the categories of Deleted Items. In a next sprint it will become possible to restore these deleted incidents.

    • Comments section change of color of rejection comments

    Tasks

    • Admin Permissions Update

      In tasks where no score is given yet, Administrators can now change task details and action dates without needing to add a score, even if it is a required field. This allows adjustments to task descriptions in response to changing circumstances.

    • Task Editing Enhancement

      Administrators can also edit fields such as Task Scoring, Comment, Documents, and Hyperlinks while a task is "in review," regardless of whether they are designated as a reviewer in the task configuration.

    API Update and Addition

    • Update of Direct data API "Task"

      The Task Status has been integrated into the direct data API "Task".

    • New Post API for Tasks

      A Post API is now available for adding tasks into CERRIX. This feature enables the execution of control tasks created outside of CERRIX within the CERRIX environment.

    Notable Fixes

    BIM (MOI) export

    • Visibility of selected MOIs report types

      Resolved: If many reports are selected, the selection box did not show all these reports properly

    Business assessments

    • Be able to end periodic reviews of Business Assessments

      Now it is possible to end a periodic review in Business assessments, simply by changing the review frequency to "Single test". The next review date will be left empty and no error will appear.

    Forms

    • File upload removal

      When deleting a "File upload" field from a Form with results linked to that field that still have a workflow unfinished, the application no longer throws an error.

    • Unsaved changes pop-up

      Form results that have un unfinished workflow status showed the "Unsaved changes pop-up even when no changes were made

    Risk import

    • Import with a risk with catalogue that has Event category as mandatory field

      Resolved: A risk import sheet including a risk with risk catalogue with mandatory event category resulted in a validation error

    ACC: 19 August 2025, PRD: 23 September 2025

    Summary

    Incident module gains richer history features, including document version tracking and custom field changes. The incident widget is improved and an incident count widget is introduced. Fixes include keeping personal incident presets private, form result handling, widget downloads, event linking, task scheduling, API stability, and MOI document updates.

    Incidents

    • Document history inside incidents A new History tab in the document information pop‑up lets users view current version details (uploader, timestamp, description, type) and browse/download prior versions. The list shows User, Date, Type, Description, File size, with improved filename hovers and consistent actions (“Edit document”, “Apply changes”).

    • Incident history now includes custom fields The incident history view now records who changed what and when for visible custom fields, grouped by incident type. Noise‑only records are hidden. Linked MOI history is excluded; financial impact changes show totals only.

    • Incidents count widget The Module count widget now supports the Incidents module, displaying the number of incidents as defined by a selected public incident workspace preset.

    • Incidents widget improvements Add a multiselect to hide/show specific incident statuses in the widget configuration (no filter by default). If an incident workspace tab is already open, clicking a data point now prompts to load the new preset before navigating.

    Controls & Effectiveness Testing

    • Simpler view for non‑occurrence When a control did not occur, the source document area removes irrelevant sampling headers and shows either “No source documents uploaded” or only the uploaded source documents.


    Notable Fixes

    Incidents

    • Email field validation no longer triggers too soon In incident type configuration, email validation now waits until users have finished entering one or more addresses (e.g., after separators), instead of triggering prematurely.

    • Correct tab icon highlighting The Links, Attachments, and History tab icons now highlight the active tab correctly when switching between them.

    • Personal incident presets stay private Newly created incident presets are visible only to their creator until explicitly set to Public; they no longer appear to other users by default.

    Forms & Form APIs

    • Form results now include entered time Data breach form results now display HH:MM for time fields, and the workspace view shows the full date & time as expected.

    • Fetching results works after fields are deleted The Get form results API continues to return results even if fields/pages were removed after data collection; 404 errors are eliminated.

    Dashboard & Widgets

    • Chart images download correctly Downloading a widget as an image (PNG/SVG) no longer throws an error.

    Events

    • Custom field updates are saved Updating an event’s custom dropdown now persists correctly, with the value reflecting immediately after save.

    • Opening a linked event no longer errors (old Events module) When the Incidents setting is off, opening a linked event from risks/controls works without error in environments using the older Events module.

    Tasks & Scheduling

    • Weekly repeat schedules stay correct after extending end date Weekly tasks that repeat (every 2/3/6 weeks) retain the correct cadence even after extending the schedule window.

    Control Testing & Notifications

    • AcceptedReason now appears in acceptance emails The [AcceptedReason] keyword correctly maps and displays the approver’s comment in acceptance notifications.

    • Correct API manual route for uploading source documents The Effectiveness Testing API documentation/route for Upload Source Document (manual) is corrected so calls reach the right endpoint.

    APIs & Integrations

    • Finding Report API includes report name The DirectData Finding Report API now returns the report name, aligning the response with documentation and consumer expectations.

    • API key performance with large IP whitelists Requests using API keys with very large IP whitelists now execute efficiently without timeouts or excessive CPU usage.

    MOI & Document Updates

    • Updating document type/description no longer fails in MOI Changing a MOI’s document type or description after upload no longer triggers a “mime type not specified” error.

    ACC: 29 July 2025, PRD: 12 August 2025

    Summary

    • Tasks: Reviewers can now update task scores and edit the comments field.

    • Incidents: Basic history is now available on the front page, and a new incident widget can be added to the dashboard.

    Tasks

    Extended Reviewer Rights: For tasks with an assigned reviewer, the reviewer now has the ability to:

    • Change the task score

    • Edit the comments field

    • Upload and attach documents

    Incident widget

    An incidents widget has been made available. The widget can be added to the dashboard. The incident widget shows the number of incidents in every status: waiting for acceptance, waiting for improvements, ready for review, rejected and approved.

    Incident basic history

    For incidents the history of all standard items is made available via a third icon next to the icon for adding documents. . The history shown is basic: only changes in the header and fields displayed in the details are now made available. History of linked items and custom fields will be included in a next release.

    General fixes

    Count widget

    The count shown in the count widget was sometimes incorrect. It did not include all filtering in calculating the total. This was the case for Risks where always the unfiltered total of risks was shown and for other count widgets the organization filter was not included in the count.

    Incidents

    It is not possible anymore to create an incident without a name

    In dropdowns filter values kept on being displayed and could be confused with actual values. This issue is solved

    ACC: 15 July 2025, PRD: 12 August 2025

    Summary

    A new API for Forms is added. In the incident module sections are made visible and foldable, and fixes for exports and financial impact visibility.

    Forms

    API-driven form entries

    With this API Forms results can be created. So forms can be populated through data gathered by other applications. Limitations: All field names of the Form are unique. It is not possible to use these form results for creating new incidents (via “mapbacking”). More information can be found in the API documentation (see the “?” in the top right of the CERRIX APP)

    Incidents Module

    Page sections

    Sections defined for an incident type are made visible in the incident type tabs. Sections are shown with a title. The first section is always called “Details”. This Details section is only visible if more sections are defined.

    General fixes

    Forms workflow review comments

    Form workflow review comments were not completely shown. Issue is resolved.

    API Module

    Help icons in API key settings

    The help icons in the API key settings don't redirect to the relevant API documentation page. This will be fixed in our next release.

    Controls Module

    Controls workspace column “Latest period score”

    The column “Latest period score” in the Controls workspace now correctly displays the latest period score, instead of the first period score.

    Incidents Module

    Exports

    Fixed the issue that Exports could fail because of old data formats.

    Financial impact

    The financial impact component was not fully visible for lower resolution screens. As solution for these situations a scroll bar appears.

    Financial impact in workspace

    The workspace column “Financial impact Gross & Net” now will display values in correct format in all cases and the export will contain these values as well.

    ACC: 24 June 2025, PRD: 8 July 2025

    Summary

    This release includes updates across several core modules including Incidents, Control Testing, Roles & Permissions, AI Assistant, Test Plans, and KRI Management. Below is a categorized summary of improvements and fixes.

    AI Risk & Control Descriptions

    The AI Risk & Control Descriptions Refinement functionalities are now available for all customers. Read more here: ,

    Incidents Module

    Uniform Menu Text Color

    All left-side menu items now use a consistent white text color, improving readability and eliminating display inconsistencies between sections.

    Linked Items Icon Update

    The icon for linked items has been modernized to enhance visual clarity and align with CERRIX’s updated design language.

    Document Versioning Support

    Users can now replace incident documents with new versions directly in the interface. The updated design includes:

    • A "Drop file or browse to replace" option.

    • Uploader details (username + timestamp) displayed below the filename.

    • Streamlined access controls (edit rights required).

    The complete history will be made available in a later release

    Measures of Improvement

    Display Incident Details in MOI Workspace

    Incident details (identifier, name, description) are now consistently displayed in the MOI workspace for incident-based MOIs. This aligns with how other MOI types are presented, ensuring a unified user experience.

    Control Testing

    Enhanced Email Notifications for Control Testing

    Period names and test plan details are now included in control testing emails and notifications. For notifications, periods appear in the "Controls" table (empty for simple testing).

    Expanded Control Effectiveness Catalogue

    Added default fields to streamline test plan creation:

    • New section: Sample generation (method + manual reason).

    • Default Test Information: Source/evidence/test instructions.

    • Default Involved Persons: Review settings (reviewer + yes/no toggle). Sections renamed for clarity (e.g., "Method of testing" → "Default Test Steps").

    Risk Module

    Optional Likelihood Validation

    A new environment setting allows net likelihood to exceed gross likelihood for risks (disabled by default). When enabled, the system skips validation checks during imports or saves.

    Navigation

    Help Menu Redesign

    The help menu has been reorganized for clarity, with new links and icons:

    • Product Documentation: External link to .

    • API Documentation: Internal link to the API documentation.

    • Release Notes: External link to release notes.

    • Support: External link to support resources.


    Notable Fixes

    Incidents Module

    Startup Cache Issues

    Resolved crashes causing application downtime by fixing cache-loading logic during startup, particularly affecting incident-module URL fetching.

    Default Incident Type Options

    Added default dropdown options for "Operational Incident" and "Databreach" in case no drop-down options are defined yet, for example during environment setup, to prevent save/export errors.

    Deleted User Role Consistency

    Fixed inconsistent behavior where deleting a user removed them from the "Reporter" role in incidents. All roles (Assessor, Responsible, Informed, Reporter) now retain deleted users (deleted users are marked with *).

    General Fixes

    KRI Writer Edit Permissions

    KRI restricted writers can now edit KRI datapoints. Previously, changes were not saved.

    Role Group Wizard

    • Role Removal: Roles are now correctly removed from users when deleted via the wizard.

    • User Removal: Users are no longer retained in role groups after removal via the wizard.

    AI-Generated Risk Descriptions

    Fixed formatting issues where line breaks in AI responses incorrectly split risk descriptions into multiple suggestions.

    Test Plan Mandatory Fields

    "Sample Generation Method" is now properly validated as mandatory during test plan creation using the "copy from catalogue" option. UI indicators (red outline/❌ icon) alert users if left empty.

    Known issues

    Help icons in API key settings

    The help icons in the API key settings don't redirect to the relevant API documentation page. This will be fixed in our next release.

    ACC: 3 June 2025, PRD: 8 July 2025

    Control testing improvements

    Show historical control details

    In control tests, the control details are shown in a dropdown field on the right side. The ID, Name, but also frequency, execution method, and description are available.

    Because the testing done at the time of the actual testing is based on the control description that was valid at that time, the historic values are shown: the name, description, frequency and execution method as they were defined at that time of the control test.

    Comment boxes can be enlarged via a pop-up

    Sometimes a test comment requires more space than available in the control test screen. Pop-up signs have been added which, when clicked, the text is displayed in a large pop-up.

    Hover for attachment names

    Attachments shown per test step were abbreviated if the name was longer than ca. 25 characters. To improve the readability, a hover is added so that the full name can easily be checked.

    Incidents

    Warning is displayed when removing an incident type from an incident when data has already been entered in the incident type fields

    A warning is displayed when clicking the "x" on an incident type for an incident type field that already contains data.

    Ability to add files when creating an incident via a Form

    Files included in a Form result which is used to create an incident, are now included in that incident.

    All users that add an incident will be registered as incident reporter

    All users, even users without the role “Reporter”, who add an incident via a Form, will be registered as incident reporters.

    Incident types can be archived

    Archiving an incident type results in users not being able to create an incident of this type anymore. In the workspace these fields belonging to the archived incident were hidden. Incidents that already have this incident type will show the archived incident type.

    An incident administrator can archive an incident type via the standing data tab “Configuration”.

    Notable fixes

    Periodic MOIs - Users that have no role in the workflow of an MOI should not receive notifications

    Users who are removed from an MOI still get a periodic notification about the MOI. This has been fixed.

    Documents - Document information

    In MOIs and Audit, for instance, the information about a document was not fully available, and the description was not visible. This has been fixed.

    Incidents

    Financial impact in workspace

    The financial impact for Gross and Net amounts were displayed as JSON (code), instead of numbers. With this change both variables are now displayed as numbers. They are still shown together in one column. This will be improved later to enable searching and ordering the workspace based on these numbers.

    Notification email addresses for standard Incident types Databreach and Operational incident are not saved

    In Standing Data, in tab Configuration, you can specify which Email addresses receive a message whenever an incident of that type is created. However, saving these addresses for the default types “Databreach” and “Operational incident” was not possible. That has been fixed.

    Predefined incident type names like “Databreach” and “Operational incident” looked editable

    Predefined incident type names looked editable, but they are not. So now it is not possible to edit the names.

    May 2025

    Budget-based risk management

    Show budget in risks if budget-based risk scoring active

    In the risks, the budget is shown associated with the organization where the risk is defined for.

    Show financial impact in the workspace

    If the budget-based risk scoring is active, in the workspace the Gross and Net financial impact is shown per risk.

    Incidents

    Financial impact in workspace

    Total Gross and Net financial impact are shown in the workspace, for now in 1 column. Therefore, ordering and filtering is not yet possible. This will be further improved later.

    Sent mails overview

    As an administrator, all sent mails can be viewed via an extra tab in the incident module, underneath the Standing Data.

    Show Linked incidents in Risks and Controls

    If an incident is created and linked to a Risk or Control, that incident can also be found as a linked item in the specific Risk or Control. For Risks and Controls these incidents are shown in the existing page of linked events.

    Show Linked incidents for third parties affected

    If an incident was caused by a third party or the third party was affected, the incident can now be found as a linked incident. The incident link can also show the relation if the “+” sign is clicked. The details of date occurred, due date, description, and caused by, or affected by are shown.

    Date registered

    Date registered is now made available per incident in the workspace.

    Notable Fixes

    Control testplan import - Import of one-sample testplans

    The import of one-sample testplans resulted in testplans without a sample instead of testplans with one sample.

    Tasks - Extending tasks sometimes resulted in a task being created twice

    While extending a task, the previous end-date was included in the extension period. If a task is planned for that specific day, the task would be created again, resulting in a double task in the list.

    Customer Logo - The Logo format SVG caused problems in sending mails

    SVG Logo format is not accepted anymore by the system.

    Incidents - Notifications

    Notification email addresses for Incident types “Databreach” and “Operational incident” are not saved. Therefore, the mails to inform contact persons that a new incident of this type is created, were not sent. Now this has been fixed.

    Incidents - Required fields unclear warning

    If no “Responsible” or “Assessor” is assigned, the error was not clearly indicated in screen when saving the incident: under assigned, users can be added. Now the user can easily see what is missing.

    Incidents - MOI PowerBI

    PowerBI reports fail for MoIs of the type “Incident”. PowerBI will be improved to be able to handle Incident MoIs.

    Incidents - Deleted users

    Deleted Users used to be visible in the “Assigned Users” component. Now that has been fixed.

    Incidents - Missing values workspace

    The fields “Completed by” and “Closed on” were always empty columns in Incidents workspace.

    Incidents - Cannot delete Root cause

    Root cause in use in an incident could be deleted.

    April 2025

    New Incidents module

    We are introducing a new Incidents module which brings significant improvements over the current Events module, offering:

    Greater flexibility

    Easily create custom fields for each incident type, allowing full customization to match your organization’s needs.

    Streamlined workflows

    A single, standardized workflow for all incident types simplifies handling and tracking.

    Enhanced financial impact tracking

    Record financial impact per department and third party for improved reporting

    New and improved fields

    Includes a due date, support for Framework dimensions, and the ability to register third parties directly in incidents.

    Improved collaboration

    Discuss incidents directly within the incident page using built-in comments, enabling faster decision-making and follow-ups.

    Moving from Events to Incidents

    Event Creation

    Once migrated, you will no longer be able to create new Events, but existing Events will remain viewable and editable.

    Form Updates

    Your existing forms used for Event creation will be automatically updated to create new Incidents.

    Standing Data

    All standing data from Events will be seamlessly transferred to Incidents.

    March 2025

    Third party

    LEI code

    It is now possible to register the LEI code of a third party including a LEI code validity check. The LEI code is available in the workspace and API.

    Audit

    Audit sponsor

    In an Audit, the Sponsor or Sponsors, can now be registered. The Sponsor could be, for instance, the initiator of the audit. The sponsor does not have any rights, not even view rights. In the document templates the field Sponsor(s) can be added.

    Risk

    Budget-based risk scoring

    A new way of scoring risks has been made available. Budget-based risk scoring is the first set-up for this initiative. The purpose is to enable risk scoring based on an estimated financial impact in relation to an organizational budget.

    This feature is still experimental. If you are interested, please submit a ticket in the Customer Portal.

    February 2025

    Workspace preset hyperlink

    Hyperlinks for public presets

    It is now possible in the Browse presets overview to create a link to a preset. If the preset is public, this link can be shared with other users via mail or messaging tool for instance. Please be aware that this is only possible for presets that are made public.

    Notable fixes

    User management - Role group removal does not lead to removal of the associated roles for the user

    Role group removal did not lead to removal of the corresponding roles of the user. This issue has now been solved. After removing a role group for a user, the corresponding roles are removed for the user if no other active rolegroup for that user includes that role.

    January 2025

    Notable fixes

    KRI - KRI restricted writer can't edit KRI datapoints

    KRI restricted writer could not edit KRI datapoints

    Audit - Unassigned Auditee cannot be requested to provide a document

    All users with the role Auditee could be asked via a mail request defined in the Audit to supply information to an audit. However, only users assigned to an Audit have the rights to do so. In this release both have been aligned: only Auditees assigned to the Audit can be asked to add information to an audit.

    , you can create an Incident Overview Export. This export is intended to provide an Excel file containing details not available through a workspace export, such as financial information and the names of linked risks and controls.

    The export is visible but not yet fully functional: after deleting a custom field, the export currently fails. This issue will be resolved in the next ACC release on 31 December 2025, prior to the production rollout on 14 January 2026.

    Returns, per control, the values of all visible custom fields that contain a value.

    Financial impact component ordering

    Affected internal organizations and third parties are now shown below each other:

    • On top all internal organizations are shown in the order that they are added,

    • Below the organizations the third parties are shown in alphabetical order.

  • Warning when removing incident type

    A warning is shown if an incident type is removed and the associated tab contains data. The warning is introduced because these data in the incident type tab will be removed automatically.

  • Administrators can restore Deleted incidents

    Deleted incidents are visible for the unrestricted Administrators as one of the categories of Deleted Items. Now it is possible to restore these deleted incidents as well.

  • Incidents are included in Business assessments

    Incidents are now included in Business assessments: in the overviews generated via the Organizations & Business Dimensions Navigator.

  • Rejection messages in the comments section have a reddisch color to make them stand out from the rest of the messages.

    About CERRIX: Unchanged.

    AI Risk Description Refinement
    AI Control Description Refinement
    docs.cerrix.com
    Budget-based Risk Scoring