Trusted, the Drata Blog

Your hub for the latest security and compliance resources, updates, and expert insights. A simplified journey to compliance starts here.

Featured
New Launches From Drataverse

New Launches From Drataverse: Chart Your Course

This year, we unveiled a series of powerful new features designed to revolutionize your risk management and compliance processes.

Most Recent
Highlights From Drataverse: Chart Your Course

Highlights From Drataverse: Chart Your Course

Image - SOC 2 penetration test list

Penetration Tests and SOC 2: Preference, Tradition, or Requirement?

2024 Customer Excellence Awards

Drataverse: Winners of the 2024 Customer Excellence Awards

Compliance

ISO 27001 checklist hero

ISO 27001 Checklist: 8 Easy Steps to Get Started

CCM 101 - Header

CCM 101: Introducing the Cloud Control Matrix

Illustraction depicting a GDPR compliance checklist

GDPR Compliance Checklist: How to Become Compliant

Cost of Not Being Compliant with Frameworks

The Cost of Non-Compliance

Risk Management

Drataverse Digital Risk and Reward Header

Control Meets Confidence at Drataverse Digital: Risk and Reward

6 Types of Risk Assessment Methodologies + How to Choose

6 Types of Risk Assessment Methodologies + How to Choose

third-party-risk-management-hero

Beginner’s Guide to Third-Party Risk Management

Blog-Featured-Images-23

Penetration Testing vs. Vulnerability Scanning: What’s the Difference?

Security

Demand for Cybersecurity Talent Hero

Demand for Cybersecurity Analysts Is Growing Twice as Fast as the Workforce

Illustration of a scale showing different levels of risk and a clipboard.

Risk Register: How to Build One + Examples

CE Checklist

Cyber Essentials Checklist

Penetration testing hero

Penetration Testing: Why It’s Important + Common Types

News and Events

Image - Drataverse Tony Hawk

Drata Announces Tony Hawk As Drataverse Keynote Speaker

List

Welcoming Harmonize To the Drata Family

AWS Security Competency

Drata Becomes the First Compliance Automation Platform to Achieve AWS Security Competency Status

G2 Spring 2024 Header

Drata Leads the Charge in G2 Spring 2024 Reports

Product Updates

ICYMI Drataverse Digital Header

Drata Launches Control Readiness Approval

ICYMI Drataverse Digital Header

Streamlining Security and Compliance with Drata's New Role-Based Access Control

ICYMI Drataverse Digital Header

Drata's Evidence Library: Revolutionizing Evidence Collection and Management

ICYMI Drataverse Digital Header

Drata's User Access Review: Empowering GRC Teams with Streamlined Efficiency

The Latest Resources

Blog

User access review hero image

How to Perform User Access Reviews

A user access review is a process that involves regularly reviewing access rights for a company’s employees and third-party vendors.

Blog

third-party-risk-management-hero

Beginner’s Guide to Third-Party Risk Management

Third-party risk management helps bring your external risks under control and lets you address security, financial, legal, and compliance risks.

Blog

soc-2-hero

What Is a SOC 2 Bridge Letter? [+ Template]

A bridge letter is a document that covers the gap between your last SOC 2 report and your customer’s calendar or fiscal year-end.

Automate Your Journey

Drata's platform experience is designed by security and compliance experts so you don't have to be one.

Connect

Easily integrate your tech stack with Drata.

Configure

Pre-map auditor validated controls.

Comply

Begin automating evidence collection.

Put Security & Compliance on Autopilot®

Close more sales and build trust faster while eliminating hundreds of hours of manual work to maintain compliance.