For compliance consultants
who run audit readiness across multiple clients
Run ISO 27001, SOC 2, PCI DSS, and Cyber Essentials engagements as structured projects rather than spreadsheet binders. Track controls, capture evidence, log testing findings, and deliver audit-ready reports through a branded portal per client.
No credit card required. Free plan available forever.
A compliance consulting platform built around the engagement, not the framework binder
Compliance consultants and GRC consulting firms run a different shape of work to penetration testing firms. The deliverable is rarely a single report; it is a programme of control assessments, evidence collection, gap remediation, and audit support that runs across months and surfaces back into the same client record at the next surveillance cycle. The operational pain is rarely the assessment itself. It is the binder of documents, the version-drifted spreadsheets, and the email archaeology between the consultant, the client, and the certifying body.
SecPortal gives compliance consultants one workspace per client, a structured engagement per framework, pre-built control templates, evidence storage, findings management linked to failed controls, AI-assisted reporting, a branded client portal, and Stripe-powered invoicing on the same engagement record the work was tracked against. The next audit cycle picks up from a clean continuity record rather than a folder rebuild.
Compliance consulting capabilities in one workspace
Pre-built control templates
Spin up an ISO 27001, SOC 2, or Cyber Essentials engagement and the control set populates automatically. Each control has its own status, evidence attachments, notes, and assessor signoff so the engagement starts as a working artefact rather than a blank spreadsheet.
Evidence and audit trail in one record
Attach screenshots, exports, policies, and meeting notes to the control they relate to. Every change to every record is timestamped in the activity log, with CSV export when an auditor wants the trail rather than the document.
Findings linked to failed controls
A failed control links to the underlying finding (with CVSS 3.1 vector, severity, evidence, and remediation guidance from a 300+ template library) so the gap, the risk, and the fix all live on one record rather than three different tools.
Branded client portal per client
Each client sees a portal on your subdomain with their controls, evidence, findings, and reports. The portal is the working surface, not just a delivery wrapper, so clients stop asking for status updates by email.
AI-assisted reporting
Generate executive summaries, gap reports, and remediation roadmaps from the live engagement. Quarterly steering papers stop being a copy-paste exercise from a folder of last quarter docs.
Invoicing on the same engagement record
Bill milestones, retainers, or completed engagements through Stripe Connect against the engagement the work was tracked against. Revenue per client and engagement is visible without a parallel finance spreadsheet.
How compliance consultancies run a portfolio inside SecPortal
A compliance practice is most efficient when every client looks the same operationally: same engagement structure, same evidence model, same reporting pattern. SecPortal supports the full portfolio rather than one framework at a time.
- Manage a full client portfolio from one workspace, with separate client records, isolated data, and a dashboard that shows engagement status, control coverage, and remediation progress at a glance.
- Use role-based access so analysts work scoped to their assigned clients while the practice lead keeps visibility across every active engagement.
- Run multiple framework engagements (for example a SOC 2 readiness engagement and a separate ISO 27001 surveillance support engagement) against the same client without the data drifting apart.
- Bring in penetration test results, scanner output (Nessus, Burp Suite), and import any CSV with custom column mapping so technical evidence joins the same backlog the controls tracker uses.
- Maintain a defensible audit trail of every control assessment, evidence attachment, and finding update, suitable for the auditor or certifying body when they ask how a conclusion was reached.
- Roll engagements forward year over year on the same client record so surveillance audits and recertifications start from a clean continuity record rather than a folder rebuild.
From kickoff to audit support on one engagement record
Compliance engagements share an underlying shape across frameworks. The platform runs that shape so the consultant focuses on judgment work rather than coordination overhead.
- 1Open the client record with billing details, primary contacts, asset inventory at the level of detail the framework requires, and any previous testing or audit history.
- 2Create a framework-scoped engagement (ISO 27001 readiness, SOC 2 Type 1, PCI DSS RoC support, Cyber Essentials Plus assessment) and the control set populates automatically with assessor fields ready.
- 3Walk the controls with the client, mark each as compliant, partial, non-compliant, or not applicable, and attach the evidence the certifying body or auditor will look for.
- 4Log gaps as findings with CVSS scoring and severity. Findings get an owner, a target date by severity, and a remediation guidance pack drawn from the 300+ template library.
- 5Track remediation in the branded portal as the client closes gaps. Retest items the client believes are fixed, attach the verification evidence to the original finding, and move the linked control to compliant.
- 6Generate the readiness report or audit support pack from the live record. The auditor receives a controlled document; the consultant edits a draft rather than writes from blank.
Frameworks the platform supports out of the box
The platform ships pre-built control templates for the frameworks most consulting practices run as core engagements, with structured framework reference pages on each one for the scope, the assessor model, and the evidence pattern that auditors expect.
- ISO 27001 readiness, surveillance support, and recertification engagements with Annex A control tracking and an SoA-aligned evidence pack.
- SOC 2 Type 1 and Type 2 readiness engagements with trust service criteria mapping and control deficiency tracking.
- PCI DSS assessor support engagements with requirement-level mapping, scope verification, and segmentation testing evidence.
- Cyber Essentials and Cyber Essentials Plus self-assessment and assessor-led engagements with the IASME control set and the 30-day remediation window built in.
- NIST CSF, NIST SP 800-53, and CIS Controls maturity engagements where the deliverable is a gap analysis and a remediation roadmap rather than a certification.
- European and US federal programmes including NIS2, DORA, GDPR, HIPAA, and CMMC where the engagement spans control mapping, evidence, and articulating residual risk to the regulator or the board.
Where compliance work meets technical testing
Most compliance frameworks now require evidence that technical testing happened: a penetration test, a vulnerability scan, a code review, or a combination. Consultancies that subcontract testing or run their own technical workstream gain the most when both sides of the engagement live on the same record.
- The compliance audit use case covers the day-to-day flow of running a control assessment with evidence and exception handling.
- The vulnerability assessment use case shows how scanner output (Nessus, Burp Suite, or any CSV) flows into the same findings database the compliance tracker reads from.
- The remediation tracking use case covers the end-to-end fix cycle, including how findings link back to the controls they unblock.
- The security advisory request workflow is the structured way to handle the non-audit consulting hours that sit alongside a compliance engagement: control gap opinions, questionnaire responses, and pre-audit readiness reviews captured as engagements rather than email threads.
- The risk acceptance form template gives a structured pattern for documenting accepted residual risk so the audit trail captures the rationale and the review date alongside the linked finding.
- The vulnerability remediation SLA calculator builds severity-driven fix windows aligned with NIST SP 800-40r4 and a chosen programme profile (PCI DSS, ISO 27001, SOC 2, or CISA KEV prioritised).
- For the deeper analytical view of why findings drift past their remediation windows in compliance-driven programmes, see the aging pentest findings research.
Where to start
Most compliance consultancies adopt the platform in three steps: stand up a single client on the framework that matters most this quarter, move surveillance and recertification clients onto the same model, then bring testing-led engagements (vulnerability assessments, readiness penetration tests, code reviews) into the same workspace so technical and compliance evidence sit on one record.
If your practice runs alongside a virtual CISO offering, the sister page SecPortal for vCISOs covers the multi-client board-reporting pattern. If your practice covers a broader security service line, the security consultants page covers engagement management across pentest, IR, and assessment work in the same workspace. If the compliance work spans into operational technology and industrial control system environments, the OT and ICS security consultancies page covers the IEC 62443 and NIST SP 800-82 operating pattern that bridges compliance and technical assessment. If the compliance programme covers AWS, Azure, or GCP estates, the cloud security consultancies page covers the cloud configuration review pattern that pairs with the framework-driven compliance work. If you support an in-house GRC function rather than acting as the GRC function, point the client team to the SecPortal for GRC and compliance teams page, which covers the in-house operating model the consultancy hands off to between engagements.
For the operational shape of running compliance assessments inside the platform, the compliance audits use case walks through framework selection, control assessment, evidence capture, and report generation in detail.
The problems you face
And how SecPortal solves each one.
Every client lives in a different folder of spreadsheets and document drives
One workspace with separate client records, separate engagements per framework, and a single searchable database for controls, findings, and evidence.
Pre-audit evidence collection eats two weeks per client and produces inconsistent packs
Pre-built control templates for ISO 27001, SOC 2, and Cyber Essentials populate engagements automatically. Evidence and notes attach to each control, and the activity log exports to CSV for the auditor.
Findings from internal testing live in one tool and the control gap log lives in another
Findings management with CVSS 3.1 scoring sits in the same workspace as the compliance tracker. A failed control links straight to the underlying finding so the audit trail is one record, not two.
Clients ask for status updates the consultant has to assemble by hand each week
A branded client portal on a tenant subdomain shows control coverage, open findings, remediation status, and report deliverables. Clients see the live picture without an email thread.
Quarterly summary reports for client steering committees take a full day each
AI generates executive summaries, technical writeups, and remediation roadmaps from the live engagement record. The consultant edits rather than writes from a blank page.
Billing the work is a separate spreadsheet exercise that drags a week after delivery
Create invoices against the same engagement record the work was tracked against. Clients pay through Stripe inside the branded portal, and revenue per client is visible at a glance.
Key features for you
Run compliance engagements as projects, not as folders
Controls, evidence, findings, reports, and invoicing on one record per client. Free plan available.
No credit card required. Free plan available forever.