

Defined security artefacts for assurance and review
Deliverables
Security documentation that supports assurance
Cyber Resilient produces cyber security deliverables required for government and regulated environments. The focus is on documentation that can be reviewed, verified, and relied upon during formal assessment and assurance activities.
Each deliverable is developed to reflect the specific system, environment, and risk context. Template-based outputs are not provided.
All deliverables are authored by Sarah Djula. Sarah remains accountable for their accuracy and completeness.
IRAP assessment reports
Cyber Resilient prepares IRAP assessment reports in support of government security assessment and accreditation activities.
Reports are written to align with assessment expectations in accordance with IRAP policy and procedures. Evidence is referenced clearly. Findings are documented in a way that supports review and decision-making.
Sarah Djula applies her experience as an accredited IRAP assessor and Cyber Security practitioner to ensure reports reflect how assessments are conducted in practice.
System Security Plans
Cyber Resilient develops System Security Plans (SSP) that describe how security is implemented and maintained within a system.
Plans are written to reflect actual system operation. Controls are described clearly. Responsibilities are defined.
Documentation is structured to support assessment, review, and ongoing use.
Security Risk Management Plans
Cyber Resilient produces Security Risk Management Plans that document identified risks, treatment approaches, and residual risk positions.
Risk descriptions are specific and evidence-based. Treatments are aligned with system design and operational reality.
Plans support informed decision-making and ongoing risk management.
Security operating procedures and supporting documentation
Cyber Resilient develops security operating procedures and supporting documentation required to demonstrate how security controls are applied in practice.
These artefacts provide clarity for operators and reviewers. They support consistency and traceability.
Documentation reflects how systems are managed day to day.
Supporting annexes
Cyber Resilient prepares supporting SSP annexes that complement primary security documentation.
These annexes provide additional detail where required, without overloading core documents.
They are structured to support assessment and ongoing reference.
IRAP readiness assessment
Cyber Resilient can review your system security documentation and architecture and provide a readiness report that includes findings and recommendations to help you identify and fix the gaps prior to undertaking IRAP assessment.
Deliverables aligned to system operation and risk
Secure by design approach
All deliverables are developed using a secure-by-design approach. Security considerations are addressed early and documented clearly.
This approach reduces rework and supports smoother assessment processes.
Deliverables reflect both intended design and operational reality.
How deliverables are developed
Each deliverable is developed through direct engagement with relevant stakeholders. Accurate inputs are gathered and validated.
Assumptions are avoided. Evidence is explicit.
Sarah Djula writes the documentation herself and confirms accuracy throughout the process.
Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Engagement structure
Deliverables are defined upfront through a written quote that outlines scope, assumptions, and outputs.
This approach provides clarity before work commences and supports predictable delivery.
Confidentiality is maintained throughout all engagements.
Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

Guy Hawkins
President of Sales

