Standard compliance

Last updated: Mar 2, 2026


The platform offers a comprehensive view of how well your organization and individual groups are meeting various international cybersecurity standards, as validated by Fluid Attacks. You can find this information in Compliance, which offers two sections:

  • Overview: Provides a high-level summary of your overall compliance posture and allows benchmarking against other organizations.
  • Unfulfilled: Lets you drill down into unfulfilled standards per group and generate detailed reports on any gaps that need to be addressed.

Across Compliance, a header provides the following information:

  • % Compliance of [organization]: The percentage corresponding to the fulfillment of security requirements within standards
  • ET to full compliance: A projection of the number of days it might take to address all noncompliance issues, achieving a 100% compliance level
  • Standard least complied with: The name of the specific standard where your organization is struggling the most
  • Lowest % compliance: The percentage of fulfilled requirements associated with the standard you comply with the least
Check compliance with standards on the Fluid Attacks platform

See an overview of your compliance

Fluid Attacks' platform allows you to gauge your performance relative to your peers. In the Overview section within Compliance, you see how your organization stacks up against the best, worst, and average performance levels in terms of compliance with each of the standards validated by Fluid Attacks.

Check unfulfilled standards in your groups

The Unfulfilled section within Compliance allows you to zoom in on specific groups within your organization and assess their compliance with individual standards.

View standard compliance of groups on the Fluid Attacks platform

To examine compliance at a granular level within your groups, do the following:

  1. Use the dropdown menu next to the title Unfulfilled standards (#) in group to choose the group you want to analyze. Only the groups you have access to are listed.

    Choose group to assess compliance on the Fluid Attacks platform
  2. Once you have selected a group, you see a breakdown of the standards that the group is not currently meeting in full and the number of security requirements you have yet to implement.

    See group noncompliance with standards on the Fluid Attacks platform

    Click on the dropdown menu for the standard to see the names of unfulfilled requirements.

    View unfulfilled requirements on the Fluid Attacks platform

Download reports of requirements needed to reach compliance

In the Unfulfilled section, the platform allows you to download comprehensive reports of areas of noncompliance for any selected group. These are the steps:

  1. In the Unfulfilled section within Compliance, select the group for which you need a report.

    Select group for compliance report on the Fluid Attacks platform
  2. Click on the Generate report button to the right.

    Find button for compliance reports on the Fluid Attacks platform
  3. In the pop-up window, select whether you want a PDF or CSV file. PDF is advised if you want the links to the security requirements in the report, whereas CSV is advised for further filtering the report (e.g., by requirements). Then choose which standards to include by using the toggle in the Action column.

    Download compliance report on the Fluid Attacks platform
  4. You need a verification code to proceed. Select whether you would like to receive it via SMS or WhatsApp.

    Get verification code for reports on the Fluid Attacks platform
  5. Enter the code you received and click on Verify.

    Enter verification code for reports on the Fluid Attacks platform

    Upon successful verification, the platform informs you that the report is ready, and your browser downloads it. The file becomes available in the platform for seven days thanks to the Downloads feature.

The downloaded report provides a group-level overview, customized by you. The PDF version shows

The CSV version shows

  • the name(s) of the specific standard(s);
  • the vulnerability URL(s);
  • the name(s) of the type or types of vulnerabilities, and
  • the three-number code(s) of the associated requirement(s).

On this page