Client Guide
Guidance for clients using the Risk Ledger platform.
Client Onboarding Guide
Invite Primer (Email Template)
Connection Request (Email Template)
Supplier Invitations Escalations
Connection Request Escalations
Incomplete Supplier Profile (Email Template)
Incomplete Assessment Escalation
Outstanding Supplier Discussion (Email Template)
Remediations & Discussions Escalations
Reassessments Escalations
How do I use the supplier overview?
Compliance Score & Applying Overrides (Exemptions & Non-Compliance)
How to access your suppliers activity log
How to use private notes
How to start and use discussions to communicate with your suppliers
How to use remediation requests with your suppliers
Supplier Approval Flow
Flowchart - Reviewing Your Suppliers
How to download supplier evidence from the Risk Ledger platform
How to manage out of scope domains
Product Level Answers (PLA) for Clients
How can I track and report on Emerging Threats across my supplier base?
How will I be notified if there is an active threat?
What happens if your supplier doesn't respond to a threat?
How can I ask my supplier for more information about a new or emerging threat?
How can I create and respond to a discussion with a supplier?
How can I find out if I'm connected, or if my suppliers use CrowdStrike?
Emerging Threat Status Definitions
What criteria are used to declare an Emerging Threat?