Getting to know Cerivo
Understand how Cerivo can help you elevate your GRC program.
Introduction
Welcome to Cerivo.
Whether you’re just getting started or returning to your work, this guide gives you a clear overview of each area in the platform and how they fit together.
Dashboard
Get a clear view of where you stand.
See your progress, understand what’s outstanding, and track how tasks are planned across the months ahead.
Systems
Build a structured overview of where your data lives.
Map your systems and set up routines for maintaining and deleting data, so nothing is left unmanaged.
Vendors
Keep control of your vendor relationships.
Track data processors, manage agreements, and stay on top of audits.
You can also document third-country transfers and your legal basis for them.
Processing Activities
Create and maintain your Records of Processing Activities.
This is where you document how personal data is used across your organization, giving you a clear, up-to-date foundation for compliance.
Task Manager
Create, maintain and delegate tasks.
See all tasks in one place, whether recurring or ad hoc, and assign responsibilities across your team to keep work moving.
Risk assessments
Identify and manage risk in a structured way.
Document risks to both data subjects and your organization, and track how they are mitigated over time.
Incident Manager (data breaches)
Log and review incidets (E.g. data breaches)
Build a clear record of incidents so you can identify patterns and respond more effectively.
Customers
Manage relationships where you act as a data processor.
Keep track of agreements and document any conditions beyond standard terms.
DPIA
Document Data Protection Impact Assessments in a structured and connected way.
Link them to relevant systems, risks, and processing activities so everything stays aligned.
TIA
Document Transfer Impact Assessments with the same structured approach.
Keep all related information connected and easy to review.
Request log
Track requests from data subjects.
Maintain clear documentation so you can respond consistently to your customers.
Security incidents
Log and review security incidents. (E.g. cyber attack)
Identify patterns and use them to strengthen your security measures over time.
Governance
Manage the frameworks you follow, such as ISO 27001, NIS2, or CIS18.
Track your progress, maintain structure, and generate reporting for stakeholders.
Additional functionality
Depending on your plan, you may also have access to the following modules.
These extend Cerivo to support deeper risk management, documentation, and governance.