The toolkits are dynamic, vendor-agnostic clearinghouses of GCA-vetted tools and resources. GCA assesses tools for how they address specific standards including the Center for Internet Security®, Inc. (CIS®) Controls, the UK’s National Cyber Security Centre’s Cyber Essentials, and the Australia Cyber Security Centre’s Mitigation Strategies. All of these recommendations are globally recognized cybersecurity standards. According to CIS, implementation of Group 1 of the CIS Controls can prevent up to 86% of the most common cyber attacks.
Additional selection criteria include a description of the tool’s functionality, the level of IT knowledge required for use, and the estimated time required to setup and/or use each tool. Toolkit users may request additional information, and we incorporate input and feedback from the GCA Change Control Board, Advisory Groups, and key partners to continually inform future versions of the toolkits.
GCA includes third-party content (such as tools, resources, guides, training, and videos) as a service to users of the toolkits. However, use of third-party tools or interaction with third parties are activities solely between the user and the third party. GCA makes no representations or warranties regarding any third-party content or dealings. GCA reviews the tools included in the toolkits regularly to determine if tools are still valid, free, and appropriate for the specific toolkit and/or toolbox.
All tools and resources must meet our requirements, outlined in our Toolkit Selection Guidelines. If you would like to recommend a tool or resource that meets those requirements, please submit an application. For any other questions regarding tool or resource inclusion, please contact us at email@example.com.
For more detail, please see our Terms of Service.