Zero Trust Remediation Planner

Answer the same questions as the Zero Trust Scorecard and get a prioritised remediation runbook — with step-by-step instructions, admin portal links, and effort estimates for every gap identified.

Identity & MFA

How identities are secured and whether MFA can withstand modern phishing attacks.

Phish-resistant = FIDO2 keys, WHfB, passkeys, CBA. Standard = push, OTP, SMS, phone call.

Conditional Access

Policies that govern how and when access is granted.

Privileged Access

How privileged roles are managed, scoped, and reviewed.

Device & Endpoint

Device identity, management, and access restrictions.

Data Protection

Classification, labelling, and data loss prevention.