Back to all activities

Resource Identification

Summary

In this component the auditor documents resources that the host may be able to leverage to address the technical, regulatory, organizational, or behavioral vulnerabilities identified during the audit.

This can include, but is not limited to, local technical support and incident response groups/trade organizations, places to obtain discount software, trainers, and guides/resources they can use to support their up-skilling.

Considerations

    • Use VPNs or Tor to search if conducting the search from a country that is highly competitive with the organization’s country, or is known to surveil.
    • Do not share any organization information or data when reaching out to possible resources.

Walkthrough

    A SAFETAG auditor has an opportunity to act as a trusted conduit between civil society organizations in need and organizations providing digital security training, technological support, legal assistance, and incident response. As SAFETAG auditors develop deep knowledge of regional and global resources available the organizations they audit will have a greater chance of identifying resources that they can use. As auditors share resources they have identified back to the SAFETAG network, each auditor's possible impact can be increased.

    • Lists of organizations that can assist the host accomplish their task.
    • Lists of educational resources the organization can use for training.
    • Contact information for recommended trainers who can help with digital security training.