Resources

Curated content for the compliance connoisseur: We cover the latest on frameworks, risks, and security trends.

Show filters

All

Guides and reports

Tags
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Upcoming
On-demand
Security
Guide / Report
Template: ISO 27001 Internal Audit Checklist

Download Vanta’s ISO 27001 Internal Audit Checklist to streamline your internal audit process.

No items found.
Upcoming
On-demand
Security
Guide / Report
Template: Disaster Recovery Plan

Download Vanta’s customizable Disaster Recovery Plan (DRP) template to build a scalable, audit-friendly plan to restore critical operations and meet compliance requirements.

No items found.
Upcoming
On-demand
Security
Guide / Report
Template: The CRI Impact Tier Assessment

Download this assessment to identify your CRI impact tier.

No items found.
Upcoming
On-demand
FedRAMP
Guide / Report
FedRAMP Authorization Checklist

Here’s the step-by-step process to achieve FedRAMP authorization for the first time.

No items found.
Upcoming
On-demand
Compliance
Guide / Report
How AI startups prove trust and scale securely with Vanta

Discover how leading AI startups like Granola, Clay, and Factory scale securely, shorten sales cycles, and build customer confidence with Vanta.

No items found.
Upcoming
On-demand
Compliance
Guide / Report
The ultimate guide to FedRAMP: A requirements guide for authorization

Learn about FedRAMP authorization, from impact levels to compliance steps, to unlock opportunities with U.S. federal agencies.

Cybersecurity
Compliance
Upcoming
On-demand
DORA
Guide / Report
DORA Compliance Checklist

Get the clarity you need to navigate DORA—and the structure to act on it with our step-by-step checklist.

No items found.
Upcoming
On-demand
NIS 2
Guide / Report
The NIS 2 Compliance Checklist

Navigate NIS 2 compliance with confidence. Vanta’s checklist covers the key steps to fulfill the NIS 2 directive’s requirements.

No items found.
Upcoming
On-demand
CJIS
Guide / Report
The CJIS Security Policy checklist

A guide on how to achieve and maintain CJIS Security Policy compliance.

No items found.
No results found 🤷