Run assessments across 9 frameworks. Manage controls, policies, risks, vendors, assets, incidents and DPIAs from one place. Let AI draft your policies, judge your evidence, find your gaps, and keep you audit-ready.
No credit card · ~15 min first assessment · Cancel anytime
Eighteen integrated modules covering compliance assessments, governance, risk, privacy, third-party management, incidents, security hardening and audit reporting.
9 frameworks, AI scoring per category, spider graphs, target maturity overlay.
Cross-framework controls with status, evidence and assessment auto-linking.
Versioned policies, control mappings, employee acknowledgments. AI drafter.
5×5 grid + FAIR-lite quantitative loss expectancy + treatment plans.
Inventory with criticality, classification, ownership and control links.
Lite + Standard questionnaires. Auto-generates risks from poor scores.
Auto 72h GDPR / 24h NIS2 / 4h DORA deadlines. AI drafts the regulator notification.
NMAP scans with AI analysis of open ports and vulnerabilities.
GDPR Art. 30 records of processing activities. Regulator-ready CSV export.
GDPR Art. 35 6-step wizard with auto Art. 36 prior-consultation trigger.
Unified view of audits, reviews, evidence expiries, contract renewals and deadlines.
Structured engagement records with findings, retest schedule, risk linkage.
Kanban board with effort/impact priorities, assignment and due dates.
Tamper-evident trail with PII pseudonymisation, comments, @mentions.
Org accounts, roles, time-boxed read-only auditor access, comments.
Forced MFA, login anomaly detection, trusted devices, tenant policy.
Risks, assets, vendors. Preview + validate + confirm. No 200-row hand entry.
Drag, collapse, reorder. Compliance snapshot, trends, benchmarks, calendar widget.
Built into the platform. Generous monthly allowances on every paid tier — no surprise overage bills, no margin death-spiral.
Each category individually analysed by our AI with full business context. 2-3 paragraphs per category. Free, bundled into every assessment.
Pick a policy type, scope, and framework. Our AI drafts a tailored policy you can review, edit and save as a versioned draft.
Upload a file, get a verdict — satisfies / partial / does not satisfy — plus confidence score and gap analysis. Vision for screenshots.
Picked NIST CSF? Want to know how close you are to ISO 27001 or SOC 2? Coverage % + gap list with priority and effort.
Triggered an Art. 33 / NIS2 incident? Our AI drafts your regulator notification using the incident data and the right legal template.
Low-scoring assessment categories and poor-scoring vendors automatically generate risk register entries with appropriate likelihood + impact.
Article 30 records of processing activities and Article 35 data protection impact assessments — built in, regulator-grade, with the EDPB-template rigour your DPO actually wants.
Quantitative loss expectancy. Formal acceptance workflow with separation of duties. Treatment plans with budget tracking. Vendor-inherited risks. Everything you'd expect from an enterprise GRC tool — at SME prices.
Single Loss Expectancy × Annual Rate of Occurrence = Annualized Loss Expectancy in real money. Roll up across the tenant for a board-ready exposure number.
Formal request → admin/DPO sign-off → optional expiry → auto-reopen on expiry. Separation of duties: requesters can never self-approve.
Multiple plans per risk. Estimated vs actual cost with auto variance. Milestones with their own status. Portfolio rollup of total spend across the tenant.
When a vendor scores poorly on TPRM, the platform auto-generates an inherited risk in your register, linked back to the vendor and its assessment.
Tenant-configurable security policy, login anomaly detection, trusted devices, and a structured pen test repository. Built with the rigour you'd want from a tool managing your compliance evidence.
High-risk sign-ins fire an email alert. Trusted devices skip the new-device flag. Geolocation cached.
Plus structured pen test report repository with engagement metadata, severity-bucketed findings, retest scheduling and risk linkage.
One platform. Nine frameworks. Zero spreadsheets.
Each category scored 0-100% by our AI with full understanding of your specific business context. Not a generic checklist — a personalised compliance analysis.
Spider graphs, risk heatmaps, executive summaries, and branded PDF reports. Present to the board with confidence — everything's already formatted.
Every suggestion rated by effort and impact. Know exactly what to fix first. No more guessing where to invest your security budget.
Scan any IP or domain with AI. AI analyses open ports, services, and vulnerabilities, then tells you exactly what to fix.
Pick from 9 frameworks: NIST CSF 2.0, NIS2, GDPR, ISO 27001, DORA, SOC 2, Cyber Essentials, EU AI Act, PCI DSS.
Practical, jargon-free questions. Auto-saves as you go. Takes ~15 minutes.
Each category assessed individually. Watch real-time progress as AI works through your responses.
Scores, graphs, heatmap, prioritised actions. Download PDF, export CSV, email to stakeholders.
Start free. Upgrade only when you need more. Save ~17% on annual billing.
free forever
per month
per month
per month
per month
All paid plans available with annual billing — pay for 10 months, get 12 (~17% discount). Charity, education and early-adopter discounts available.
Free to start. No credit card. Your first assessment takes under 15 minutes.
Select a compliance framework to begin your assessment.
Digital Operational Resilience for financial services.
Trust Services Criteria for SaaS companies.
UK government 5 core technical controls.
EU artificial intelligence regulation compliance.
Payment card data security standard.
Don't have an account? Register
Already have an account? Login
This questionnaire helps assess your organisation's cybersecurity posture. Your responses will be analysed against the NIST CSF 2.0 framework.
View and manage your previous cybersecurity assessments.
Loading your assessments...
Your unified GRC workspace — assessments, controls, policies, risks and assets in one place. Drag the handle to rearrange sections, click the chevron to collapse a section. Layout is saved to your profile.
Complete these steps to set up your compliance programme.
Our AI is evaluating your responses against each NIST CSF 2.0 category. This typically takes 2-4 minutes.
Your compliance scores across the framework categories.
Generating results visualisation...
Your scores (solid) compared to the platform average (dashed) across all users.
Loading results...
No evidence files uploaded yet.
Scan a target IP or domain to identify open ports, services, and vulnerabilities. AI analyses the results and provides actionable recommendations.
This may take a few minutes
| Port | State | Service | Version |
|---|
No previous scans.
Track your compliance improvement tasks. Actions are auto-generated from assessment suggestions.
Manage your team and view shared assessments.
Create an organisation to share assessments with your team.
| Company | Role |
|---|
Grant time-boxed read-only access so an external auditor can review your controls, policies, evidence and audit log without being able to make changes. They sign in with normal credentials but every write request is rejected by the API.
| Expires | ||
|---|---|---|
| No active auditor seats. | ||
Tenant-wide controls for authentication, session lifetime, password rules, and anomaly detection. Admin-only.
Last 100 sign-in attempts across the tenant, with anomaly risk scores and reasons.
| Time | User | IP | Location | Device | Risk | Status |
|---|---|---|---|---|---|---|
| Loading... | ||||||
| User | Framework | Company | Date |
|---|
View and manage all user assessments and accounts.
| ID | Company | Date | Actions | |
|---|---|---|---|---|
|
Loading assessments... |
||||
| ID | Company | Admin | Actions | |
|---|---|---|---|---|
|
Loading users... |
||||
| Title | Status | Date | Actions |
|---|---|---|---|
| Loading... | |||
Manage your organisation's security policies.
| Title | Status | Version | Acknowledged | Linked Controls |
|---|
Your central source of truth for every control in your compliance programme.
| Code | Control | Category | Frameworks | Status | |
|---|---|---|---|---|---|
| Loading... | |||||
Audit trail of changes across your organisation — who changed what and when.
Track and manage compliance risks.
| Risk | Category | Score | Severity | Treatment | Status | ALE | |
|---|---|---|---|---|---|---|---|
| Loading... | |||||||
Acceptance must be formally requested, justified, and signed off by an admin or named approver. The risk stays open until approved.
Track and classify your information assets.
| Asset | Type | Classification | Criticality | Owner | Status | |
|---|---|---|---|---|---|---|
| Loading... | ||||||
Manage your profile, security, and preferences.
Add an extra layer of security by requiring a verification code from your authenticator app at sign-in.
Compatible with Google Authenticator, Microsoft Authenticator, Authy, 1Password, and other TOTP apps.
Step 1: Scan this QR code with your authenticator app.
Or enter this secret manually:
Step 2: Enter the 6-digit code from your app.
MFA is enabled on your account.
To disable MFA, enter your password below.
Devices you've marked as trusted skip the "new device" anomaly flag on sign-in. Revoke a device if you've lost it or no longer use it.
Your last 50 sign-in attempts. Review them periodically — flagged events indicate a sign-in that looked unusual compared to your history.
| Time | IP | Location | Device | Risk | Status |
|---|---|---|---|---|---|
| Loading... | |||||
Platform-level administration. Restricted to ShieldIQ staff.
| Company | Tier | Verified | Admin | Orgs | Created | ||
|---|---|---|---|---|---|---|---|
| Loading... | |||||||
| Org Name | Created By | Members | Assessments | Controls | Policies | Risks | Created | |
|---|---|---|---|---|---|---|---|---|
| Loading... | ||||||||
| ID | Tenant | Type | Qty | Billing | Status | Expires | Notes | Created | |
|---|---|---|---|---|---|---|---|---|---|
| Loading... | |||||||||
| Time | Tenant | User | Action | Resource | Details | Status | IP |
|---|---|---|---|---|---|---|---|
| Loading... | |||||||
Permanently delete audit entries older than the selected age.
Download audit entries as CSV before trimming.
Transparency, security, and accountability are at the core of ShieldIQ. Review our policies and commitments below.
The agreement governing your use of ShieldIQ.
How we collect, use, and protect your personal data.
What cookies and local storage we use and why.
Our policy on cancellations, refunds, and billing.
Our security controls, practices, and incident response procedures.
How to responsibly report security vulnerabilities to us.
What you can and cannot do on the ShieldIQ platform.
How we process your data under GDPR and applicable laws.
Our uptime commitments and support response guarantees.
We use essential storage (localStorage) for authentication and app functionality. Optional analytics cookies help us improve the platform. See our cookie policy.
Inventory your suppliers, classify them by criticality, run security assessments, and track contract renewals. Rejected vendor reviews automatically open a Risk in your Risk Register.
| Ref | Name | Type | Criticality | Status | Score | DPA | Contract End |
|---|---|---|---|---|---|---|---|
| Loading... | |||||||
Attach evidence such as DPAs, SOC 2 reports, ISO certificates and pen test summaries.
Track security incidents from detection through closure. Regulatory deadlines are calculated automatically for personal data breaches and significant NIS2 incidents.
| Ref | Title | Severity | Status | Detected | Deadline |
|---|---|---|---|---|---|
| Loading... | |||||
A unified view of audit windows, control & policy reviews, evidence expiries, vendor reassessments, contract renewals, and incident regulatory deadlines.
Records of Processing Activities — GDPR Art. 30
| Reference | Activity | Legal Basis | Special Category | Children | Cross-border | Status | Next review | |
|---|---|---|---|---|---|---|---|---|
| Loading... | ||||||||
DPIA workflow — GDPR Art. 35
| Reference | v | Name | Status | Outcome | Progress | Art. 36? | Sign-off | |
|---|---|---|---|---|---|---|---|---|
| Loading... | ||||||||
List the risks to data subjects' rights and freedoms. Use the same 1–5 scale as the risk register.
Mitigations should map to the risks above. Linking to existing risk-treatment plans is recommended for traceability.
Structured record of every penetration test engagement, its findings, and retest schedule.
| Reference | Title | Vendor | Methodology | Status | Completed | Findings | Next retest | Report | |
|---|---|---|---|---|---|---|---|---|---|
| Loading... | |||||||||
Track Business Continuity and Disaster Recovery test exercises, outcomes, and remediation actions.
| Reference | Title | Type | Test Date | Outcome | Status | Next Test | Evidence | |
|---|---|---|---|---|---|---|---|---|
| Loading... | ||||||||
Everything you can do with ShieldIQ, in one place. Use the sidebar to jump to any section.
Welcome to ShieldIQ. This guide walks you through your first hour on the platform — from your first assessment to a board-ready PDF report.
Once your first assessment is complete, build out the rest of your compliance programme:
What it is: structured questionnaires across 9 compliance frameworks, scored individually per category by AI.
The 9 frameworks:
Key features:
Tip: low-scoring categories show a "Get expert support" CTA that links to the ShieldIQ Cyber consultancy.
What it is: the central source of truth for every control in your compliance programme. Each control can be linked to multiple frameworks via cross-mapping, so the same control can satisfy NIST CSF, ISO 27001 and Cyber Essentials simultaneously.
Key concepts:
Tip: the paperclip indicator on each control row turns green when evidence is attached. Click it to expand the evidence list inline.
What it is: versioned policy documents with control mappings and employee acknowledgment tracking.
Key features:
Where to find it: Quick Access tile → Policies, or via the nav drawer.
What it is: a structured register with both qualitative (5×5 grid) and quantitative (FAIR-lite monetary) risk scoring, treatment workflows, and budget tracking.
Standard 5×5 likelihood × impact grid. The live score card in the editor updates as you change either value. Risks are auto-bucketed:
Open the collapsible "Quantitative loss expectancy" section in the risk editor:
The risks page shows a tenant-wide ALE rollup card with min/max confidence range and top categories by loss expectancy.
Setting a risk's treatment to accept kicks off a formal request flow:
accepted; the request can be revoked at any timeSeparation of duties: the requester can never self-approve, even if they're an admin.
Approval evidence: upload a supporting document (email screenshot, signed approval) directly on the acceptance card, and/or paste an external approval URL (Jira ticket, SharePoint link) for auditability.
When a risk needs to be deferred rather than immediately treated, set the status to Deferred. This reveals two fields:
When the status changes away from Deferred, both fields are automatically cleared.
Each risk can have multiple treatment plans (iterations or alternatives). Each plan tracks:
The Treatment portfolio endpoint rolls up budget vs actual across the entire tenant for the dashboard view.
When a vendor scores poorly on its TPRM assessment (default threshold 70%), use the "Generate inherited risk" button on the vendor detail page. ShieldIQ creates a register entry tagged source=vendor with appropriate likelihood and impact, linked back to the vendor and its assessment. Inherited risks show a vendor icon in the register list.
Link assets to risks via the "Linked Assets" card in the risk editor. This creates a bidirectional M2M relationship — open an asset and you'll see the risk listed too. Useful for tracking which systems are affected by each risk.
Tip: the AI risk generator on the assessment results page automatically creates risks for any low-scoring categories.
What it is: structured inventory of your information assets with classification, ownership, criticality and control linkage.
Per-asset fields:
Bulk import: use the CSV import wizard to load 200+ assets at once. See Bulk CSV import.
What it is: third-party risk management module covering vendor inventory, questionnaires, scoring, and risk auto-generation.
Two pre-built questionnaire templates:
How it works:
The vendor detail page has a "Generate inherited risk" button that creates a register entry whenever a vendor's score is below the threshold (default 70%). See Risk register → vendor-inherited risks.
Editable vendor detail: all vendor fields are editable directly on the detail page — name, website, contacts, criticality, status, type, region, data classification, contract dates, DPA status, and notes. Click "Save changes" to persist.
Linked items: link controls and risks to vendors via the modal multi-select. Useful for tracking which controls a vendor should comply with, and which risks they introduce. Links auto-save when you click Apply.
Where to find it: GRC → Vendors, or via the Quick Access tile.
What it is: structured incident lifecycle management with automatic regulatory deadline calculation and AI-drafted notification templates.
Click the "Report Incident" button (always visible in the nav) and fill in:
ShieldIQ auto-generates a reference (INC-YYYY-NNNN) and computes the regulatory notification deadline based on the category and tenant country.
The incident card shows a countdown banner that pulses red when the deadline is <24h or overdue.
Click "AI Draft Notification" on the incident detail page. Our AI takes the incident facts (title, description, category, breach status, data subjects affected, your tenant country) and drafts a regulator-ready notification using the right legal template (Art. 33 / NIS2 / DORA). Edit and download as a PDF or copy to clipboard.
Incidents move through: detected → triaged → investigating → contained → eradicated → recovered → closed. Closure prompts you to enter lessons learned, which optionally auto-creates a risk register entry for follow-up.
Cross-links: incidents can have evidence attached (Evidence module) and remediation actions linked (Actions module). Incident timelines log every status change automatically.
What it is: structured evidence storage that ties files to controls, assessments and incidents with expiry-date tracking and AI judging.
Every uploaded file goes through a layered validation:
Files that fail any check are rejected with a specific reason.
One file can satisfy multiple controls. After uploading, click the "Link to additional controls" button and pick the additional controls. The file appears in all linked controls' evidence lists.
When uploading, set a "Valid for" period (30 days / 3 months / 6 months / 1 year / 2 years / custom date). Evidence freshness badges show on the control modal:
The dashboard "Calendar" widget surfaces all evidence expiring in the next 30 days.
Click the magic-wand icon next to any evidence file. Our AI reads the file (PDF / DOCX / XLSX / TXT / CSV / image via vision) and judges whether it satisfies the linked control. You get a verdict (satisfies / partial / does_not_satisfy), confidence score, and gap analysis.
Download safety: evidence downloads are forced as application/octet-stream with X-Content-Type-Options: nosniff and a Content-Security-Policy: default-src 'none' header so the browser can't render anything inline.
What it is: Records of Processing Activities — the structured Article 30(1) field set that controllers must maintain. Required for any organisation with 250+ employees, or any organisation processing high-risk / regular / special-category data (so basically: everyone).
{country, mechanism} with mechanism dropdown (Adequacy / SCCs / BCRs / Code of conduct / Certification / Derogation)Records are numbered ROPA-YYYY-NNN per tenant per year.
The "Export CSV" button on the ROPA register page streams a regulator-ready CSV in the format supervisory authorities expect.
Tip: the summary cards on the register page show counts of records with special category data, records involving children, and records with cross-border transfers — these are the ones the regulator will look at first.
What it is: a structured 6-step Data Protection Impact Assessment workflow following the EDPB template. Mandatory under Art. 35 when processing is likely to result in a high risk to data subjects' rights and freedoms.
If any risk's residual likelihood × severity is ≥ 16, ShieldIQ flags "Prior consultation required". You can't sign off the DPIA until you've recorded evidence of consulting your supervisory authority (date + response).
Sign-off is admin/DPO-only. ShieldIQ requires all mandatory fields to be present (description, necessity, proportionality, risks, mitigations, outcome). Once signed off, the DPIA becomes immutable — further changes must go through "Duplicate (new version)", which bumps the version number and supersedes the previous record.
Schedule re-reviews via the DPIA detail page. Required by Art. 35(11) when the risk profile changes. Reviews show on the compliance calendar.
Tip: DPIAs always link to a ROPA record, so the regulator can trace the full processing → assessment chain.
What it is: structured engagement records for every penetration test with findings counts, retest scheduling, file storage, and risk linkage.
Per-engagement fields:
PT-YYYY-NNN per tenant per year)File upload: the report file goes through the same validated-upload pipeline as evidence (magic bytes, active-content scan, ClamAV). The file icon in the list matches the file type (PDF = red, DOCX = blue, other = grey). Download is forced as binary.
Tags & external links: add custom tags (e.g. "Internal Network", "PCI Segmentation") for filtering and external tracking links (Jira, GitHub) for remediation tracking.
Filters: the list page has from-date / to-date / status filters above the table.
Validation rules:
Multi-file attachments: upload multiple report files per engagement (PDF, DOCX, XLSX, images). Each file gets its own download link and type-specific icon. Previous files are preserved, not replaced.
Linked items: link controls and risks to each pen test via the modal multi-select. Useful for mapping findings to specific controls and tracking which risks were identified.
Where to find it: GRC → Pen Tests, or via the Quick Access tile.
What it is: a lightweight module to record Business Continuity and Disaster Recovery test exercises, their outcomes, and the remediation actions that arise from them.
Per-test fields:
BCDR-YYYY-NNN per tenant per year)Summary cards: the list page shows total tests, successful, partial, and failed counts.
Why it matters: BCDR testing is a common audit and compliance requirement (ISO 22301, NIST SP 800-34, DORA Art. 26). Having structured records with evidence makes audit preparation straightforward.
What it is: generate a verifiable compliance certificate from any completed assessment, with an embeddable SVG badge for your website.
The badge shows: "CERTIFIED" banner, your company name, overall score (%), framework name, level (Basic / Intermediate / Advanced), year, and app.shieldiqcyber.com footer.
Verification page: the public verification URL shows a branded page with status (Verified / Expired / Revoked / Not Found), company name, framework, score, issue date, and expiry date. API clients can append ?format=json for machine-readable verification.
Validity: certificates are valid for 1 year from the assessment date. Expired certificates show as "Expired" on the verification page.
What it is: custom labels and tracking links that you can attach to any risk, pen test, BCDR test, control, asset, vendor, incident, or policy.
Where they appear: the Tags and External Links sections are in the editor for Risks, Pen Tests, and BCDR Tests. Tags are supported on 8 resource types; external links on risks and pen tests.
What it is: a unified view of every date that matters across your compliance programme.
What it pulls in (automatically):
review_frequency_days on each control)expires_at)Two views:
The dashboard widget shows the next 7-14 days. The page also shows a 6-card stat strip (total / regulatory / evidence / reviews / contracts / actions).
Tip: click any event to jump straight to the underlying record.
What it is: threaded comments with @mentions and a tenant-wide activity feed driven by the audit log.
Comments are available on:
@mentions — type @username in any comment. ShieldIQ resolves the mention against your tenant members (no cross-tenant exposure) and creates a Mention record. Mentioned users see them in their account drawer.
Activity feed on the dashboard shows the last N events from the audit log: who created/updated/deleted what, when, with action-coloured icons and relative timestamps. Update events show field-level diffs (e.g. "status: open → mitigated · likelihood: 3 → 4") so you can see exactly what changed at a glance.
Editing: comments can be edited within 15 minutes of posting. After that, edits leave an "edited" timestamp visible. Soft-delete only — the audit log keeps the original.
What it is: a 3-step wizard for importing risks, assets and vendors from CSV. No more hand-entering 200 assets.
The flow:
Exports are available from the same buttons on each register page. CSVs are generated via defusedcsv to prevent formula injection attacks.
Where to find it: the "Import" and "Export" buttons in the page header on the Risks, Assets, and Vendors pages.
What it is: a kanban board for tracking remediation tasks generated from assessments, risks, vendor reviews, and incidents.
Columns: Backlog → In Progress → Blocked → Done
Per-action fields: title, description, owner, due date, source (assessment / risk / vendor / incident / manual), effort (low / medium / high), impact (low / medium / high), priority bucket (low effort + high impact = "fix first")
Auto-generation: the assessment results page has a "Generate Actions" button that creates one action per low-scoring category, prefilled with the AI's recommendations.
Tip: drag actions between columns to update their status. The dashboard widget shows the top 5 "fix first" actions.
What it is: NMAP-based vulnerability scanner with AI analysis of the results.
Three scan profiles:
After the scan completes, our AI analyses the open ports, identified services, and any version banners, then writes a plain-English summary of the risks and what to do about them.
Compliance use: link scan results to specific controls (e.g. NIST PR.AC-3 = "Remote access is managed") for evidence.
ShieldIQ has five AI features. They share a single monthly credit pool that drains by one credit on each successful call.
Tier credit allocations:
Credits reset on the 1st of each month. Unused credits do not roll over. Top-up packs are available if you exhaust your quota mid-month.
What costs a credit:
incident_ai_drafts_per_month pool)Free: per-category assessment scoring runs on every assessment submission and is bundled into the cost of the assessment.
What it is: tenant-wide controls for authentication, session lifetime, password rules and anomaly detection. Admin-only.
Where to find it: Organisation page → Security Policy card.
Settings:
Effect: when MFA is required and a user past the grace period tries to sign in without MFA enabled, they get a 403 with a message directing them to set up MFA in Account Settings.
What it is: ShieldIQ scores every login attempt for risk on five factors and alerts when something looks unusual.
The 5 factors (cumulative score):
Risk levels:
High-risk sign-ins fire an email alert (if your tenant has alerting enabled). With "Step-up on risk" enabled, high-risk sign-ins also force a re-auth before the user can do anything.
Trusted devices: on your Account page, click "Trust this device" to add the current browser to your trusted list. Trusted devices skip the new-device flag. Revoke trust at any time from the same page.
Where to view events: the Organisation page (admin view of all tenant events) and your Account page (your own last 50 events).
What it is: team accounts with role-based permissions and a special read-only mode for external auditors.
Roles:
Use the "External Auditors" card on the Organisation page to invite an auditor with a specific expiry date (7 / 14 / 30 / 60 / 90 days). They sign in with normal credentials but every non-GET request is rejected by the API. The UI hides write controls and shows a yellow auditor banner. After their access expires, their sessions are terminated automatically.
Audit ZIP export: the Business+ tiers can generate a full audit-ready ZIP containing controls, risks, evidence, policies, ROPA records, DPIAs and the audit log. Use this to hand over to an auditor without giving them login access.
The Account page (top-right user menu) lets you manage:
All uploaded evidence files and pen test reports are stored in Amazon S3 with server-side encryption (AES-256). Files are versioned, so accidental overwrites can be recovered. Downloads are served via time-limited presigned URLs that expire after 5 minutes.
Tip: if your organisation has "Require MFA" enabled, you'll see a banner counting down your grace period. Set up MFA before it expires or you'll be locked out.
ShieldIQ offers five tiers. All paid plans save ~17% with annual billing (pay for 10 months, get 12).
| Feature | Starter (Free) | Individual | Professional | Business | Enterprise |
|---|---|---|---|---|---|
| Pricing | |||||
| Monthly | Free | €79 | €169 | €399 | €1,099 |
| Annual | Free | €790 | €1,690 | €3,990 | €10,990 |
| Frameworks & Assessments | |||||
| Frameworks | 1 (NIST CSF) | 2 (NIST CSF + 1) | Any 3 | Any 5 | All + custom |
| Assessments / quarter | 1 | 3 | 6 | 10 | Unlimited |
| AI-powered analysis | ✓ | ✓ | ✓ | ✓ | ✓ |
| Target maturity levels | — | ✓ | ✓ | ✓ | ✓ |
| Scheduled reassessments | — | ✓ | ✓ | ✓ | ✓ |
| GRC Modules | |||||
| Control library | View only | Full | Full | Full | Full |
| Policies | — | — | 10 | 1,000 | Unlimited |
| Risks | — | 100 | 500 | 1,000 | Unlimited |
| Assets | — | 50 | 500 | 1,000 | Unlimited |
| Remediation actions | Manual | Full | Full | Full | Full |
| Incident management | — | — | ✓ | ✓ | ✓ |
| AI & Automation | |||||
| AI credits / month | — | 10 | 50 | 200 | 1,000 |
| Incident AI drafts / month | — | 5 | 20 | 50 | Unlimited |
| Scanning | |||||
| Quick scans / month | 1 | 5 | 10 | 50 | Unlimited |
| Standard scans | — | — | ✓ | ✓ | ✓ |
| Deep scans | — | — | — | ✓ | ✓ |
| Exports & Reports | |||||
| PDF reports | — | ✓ | ✓ | ✓ | ✓ |
| CSV export | — | — | ✓ | ✓ | ✓ |
| Email reports | — | — | ✓ | ✓ | ✓ |
| Audit export | — | — | — | ✓ | ✓ |
| Compliance certificates | — | — | — | ✓ | ✓ |
| Team & Organisation | |||||
| Team members | 1 | 1 | 3 | 10 | 25 |
| Organisations | 1 | 1 | 1 | 3 | 10 |
| Roles & permissions | — | Basic | Full | Full | Full |
| Support | |||||
| Support level | Community | Priority email | Dedicated CSM | ||
| Response time | — | 48h | 48h | 24h | 4h |
| Onboarding sessions | — | — | — | 1 | 3 |
Note: charity, education, and early-adopter discounts are available. Contact us for details.
Need more of a specific resource without upgrading your full plan? Add-on packs extend individual limits on top of your current tier.
| Add-on | Increment | Monthly | Annual |
|---|---|---|---|
| Team & Access | |||
| Extra team seats | +5 seats | €29 | €290 |
| Extra team seats | +10 seats | €49 | €490 |
| Extra team seats | +25 seats | €99 | €990 |
| Additional organisations | +1 org | €19 | €190 |
| Additional organisations | +3 orgs | €49 | €490 |
| GRC Resources | |||
| Extra risks | +100 | €15 | €150 |
| Extra risks | +500 | €59 | €590 |
| Extra assets | +100 | €15 | €150 |
| Extra assets | +500 | €59 | €590 |
| Extra policies | +10 | €9 | €90 |
| Extra policies | +50 | €29 | €290 |
| AI & Automation | |||
| Extra AI credits | +50 | €19 | €190 |
| Extra AI credits | +200 | €59 | €590 |
| Extra AI credits | +500 | €119 | €1,190 |
| Scanning | |||
| Extra quick scans | +20/mo | €9 | €90 |
| Extra quick scans | +50/mo | €19 | €190 |
| Standard scan unlock | Unlock | €29 | €290 |
| Deep scan unlock | Unlock | €49 | €490 |
| Frameworks & Assessments | |||
| Extra framework slot | +1 | €19 | €190 |
| Extra framework slots | +3 | €49 | €490 |
| All frameworks unlock | All 9+ | €79 | €790 |
| Extra assessments | +5/quarter | €15 | €150 |
| Extra assessments | +10/quarter | €25 | €250 |
| Unlimited assessments | Unlimited | €39 | €390 |
To purchase an add-on pack, email info@shieldiqcyber.com with your account email and the add-on you need. We'll apply it within 24 hours.
The dashboard is your operational command centre — a single-glance view of your entire compliance programme.
Two rows of clickable cards showing live counts with mini severity/status breakdowns:
Horizontal progress bars showing your latest assessment score per framework, colour-coded (green ≥70%, amber ≥40%, red <40%). Click any bar to jump to that framework's results. Shows "Overall: X%" average across all assessed frameworks.
New users see a checklist at the top of the dashboard with 5 steps: complete an assessment, sync controls, create a policy, register risks, add vendors. Each step auto-detects when complete (green checkmark). Dismiss with the × button once you're up and running.
Coloured bar showing the proportion of risks at each severity level (Critical/High/Medium/Low). Click → Risks page.
The search bar at the bottom of the navigation bar searches across all modules — risks, controls, policies, incidents, vendors, and assets — by keyword. Results appear in a grouped dropdown. Click a result to jump to that item's detail view.
Shortcut: press Ctrl+K (or ⌘+K on Mac) from anywhere to focus the search bar instantly.
When logged in on desktop, a full navigation bar replaces the top links with grouped dropdown menus:
The right side shows: notification bell, Help, Blog, Trust, Login/Logout, Report Incident button, and dark mode toggle.
When editing a risk, viewing a vendor, or working in any detail view, a breadcrumb trail appears below the navigation: Dashboard > Risks > Unpatched servers. Click any segment to navigate back to that level.
After completing a key action (assessment, risk creation, policy creation, incident close, evidence upload), a floating card appears at the bottom-left suggesting natural next steps. Auto-dismisses after 15 seconds or click any button to navigate.
ShieldIQ uses a connected data model — risks link to controls, controls link to policies, assets link to risks, vendors link to controls. These relationships are central to how a GRC programme works.
Every editor (Risk, Policy, Asset, Vendor, Pen Test, BCDR Test) has linked-item cards — uniform panels with a coloured icon and a "Link Controls..." (or Risks/Assets) button. Clicking the button opens a modal with a searchable checkbox list where you can select multiple items at once. Click Apply to save.
| From | Can link to |
|---|---|
| Risk | Controls, Assets, Tags, External Links |
| Policy | Controls |
| Asset | Controls, Risks |
| Vendor | Controls, Risks |
| Pen Test | Controls, Risks, Tags, External Links |
| BCDR Test | Controls, Risks, Tags, External Links |
AC-01) on policy rows, risk rows, and asset rows. Click a chip to open the control detail.The bell icon in the navigation bar shows a red badge with the count of pending items that need attention. Click the bell to open the notification panel.
What triggers a notification:
Click any notification to navigate directly to the relevant record. The panel auto-refreshes every 5 minutes.
A few global shortcuts to speed things up:
| Shortcut | Action |
|---|---|
| Ctrl + F | Browser find — works on the help page for searching |
| Esc | Close any open modal |
| Tab / Shift+Tab | Move between assessment questions |
| 1 – 5 | Quick-pick answer options on assessment questions |
| Ctrl + S | Save (where applicable, e.g. risk editor, DPIA wizard) |
Upgrade to Professional to unlock:
ShieldIQ automatically computes whether an incident triggers a regulatory notification requirement and how long you have. The rules below mirror what regulators in the EU expect.
Triggered when:
You must notify the lead supervisory authority (e.g. Irish DPC, CNIL, ICO) within 72 hours of becoming aware. If high risk to subjects, you may also need to notify the affected individuals directly.
Triggered when both of these are true:
data_breach, malware, ddos, system_outage, supplier_incident.If your organisation is an essential or important entity under NIS2, you have 24 hours for an early warning to your national CSIRT or competent authority, with a fuller report within 72 hours and a final report within one month.
Major ICT-related incidents in financial entities require notification to the relevant national competent authority. ShieldIQ does not auto-trigger this — toggle regulatory notification required manually if you're a DORA-scoped entity.
Drafting with our AI...
Drafting with our AI…
Estimate how much of a target framework you already cover based on your existing controls under another framework. Useful for "if I'm ISO 27001 compliant, how close to SOC 2?"
Analysing with our AI…
Upload a CSV file with the columns listed below. Required columns are marked with *. The first row must be column headers.
Set your target compliance score (0-100%) for each category. These targets will appear as a dashed line on your spider graph.
| Domain | Category | Target % |
|---|