Ordinex company brand · Keystone product platform

Bring cyber risk, assurance and compliance into one system of record.

Keystone is the enterprise security governance platform from Ordinex. It brings together risk, audit, legal and regulatory obligations, policy management, controls assurance, incidents, vulnerabilities, supplier risk, continuity, and board reporting in a single, structured platform.

Hero product graphic placeholder Replace this area with a Keystone dashboard screenshot, platform diagram, or product illustration.
19 Core modules across governance, risk, assurance and operations
1 Integrated platform for board, analyst and control owner views
ISO 27001 Supports Annex A controls, SoA and management system activities
CAF Tracks NCSC CAF assessments alongside wider governance activity

What Keystone does

Keystone is designed for organisations that need more than a basic GRC register. It provides a connected operating model for security governance, linking executive reporting with underlying evidence, actions, assurance activity and operational risk data.

Executive dashboards Board reporting Risk and RAID management Audit and assurance Compliance obligations Incident and vulnerability oversight

Single source of governance truth

Replace fragmented spreadsheets and disconnected registers with one structured platform for security governance.

Connected assurance model

Link audits, control testing, corrective actions, evidence and management review outputs across the lifecycle.

Operational to executive visibility

Surface analyst activity, incident data, vulnerabilities and control health in a format suitable for leadership.

Framework-aligned governance

Support ISO 27001, Statement of Applicability, CAF assessments and wider legal and regulatory obligations.

Platform modules

The module structure below reflects the current Keystone product concept and can be used as a basis for a website, investor summary, product brochure or internal platform architecture.

Executive and programme oversight

Overview Dashboard

Executive RAG summary across all modules, giving leadership a clear cross-platform view of current position and priority issues.

Owner: All users (read-only)

Board Reporting

Board-ready reporting workspace that supports concise status summaries, risk movement, key metrics and board pack generation.

Owner: Cyber Risk Lead

Audit Programme

Annual internal audit and assurance schedule used to plan, sequence and monitor formal assurance activity across the year.

Owner: Security Assurance Analyst

Risk and compliance management

RAID Log

Central log for risks, assumptions, issues and dependencies, supporting project-level and programme-level governance.

Owner: Project / Risk Lead

Risk Register

Information security risk register with treatment plans, ratings, ownership and tracking through review cycles.

Owner: Cyber Risk Lead

Legal & Regulatory

Structured register of legislation, regulations and compliance obligations with ownership, applicability and traceability.

Owner: DPO / Legal

Third Party Risk

Supplier risk assessments, due diligence outcomes, assurance status and risk visibility across the supply chain.

Owner: Procurement / DPO

Nonconformities & CAR

Nonconformity log with root cause analysis, corrective actions, due dates, validation and closure workflow.

Owner: Assurance Analyst

IS Objectives

Clause 6.2 information security objectives with progress tracking, evidence and formal status reporting.

Owner: Cyber Risk Lead

Assurance, policy and controls

Audit & Assurance

Repository for internal and external audit records, findings, recommendations, evidence references and follow-up tracking.

Owner: Security Assurance Analyst

Policy Library

Controlled document library for policies with versioning, ownership, review cycles and approval workflow.

Owner: CISO / Policy Owner

Controls Framework

Mapped control framework covering ISO 27001 Annex A controls, testing, control ownership and evidence status.

Owner: Security Assurance Analyst

Statement of Applicability

Formal ISO 27001:2022 SoA module covering all 93 Annex A controls, applicability decisions and implementation status.

Owner: CISO

CAF 4.0 Assessment

NCSC CAF Baseline and Advanced assessment module aligned to contributing outcomes and maturity progression.

Owner: Cyber Risk Lead

Management Review

Clause 9.3 management review records with agenda items, decisions, actions and retained evidence for governance purposes.

Owner: CISO / CEO

Security operations and resilience

Incident Log

Security incident management register supporting triage, investigation, lessons learned and post-incident review activity.

Owner: CISO / DPO

Vulnerability Tracker

Vulnerability management workflow with SLA tracking, prioritisation and integration points such as Tenable.io sync.

Owner: Security Analyst

Analyst Workbench

Operational work queue showing prioritised tasks, overdue items, SLA breaches and actionable alerts for analysts.

Owner: Security Analyst

Business Continuity

Business continuity and disaster recovery plans with exercise records, resilience assumptions, RTO and RPO tracking.

Owner: COO

Asset Register

Register of hardware, software, data, services and cloud assets to support ownership, assurance and risk traceability.

Owner: IT Manager

Action Tracker

Cross-module action management layer for findings, decisions, treatment tasks and corrective actions across the platform.

Owner: All owners

Core product capabilities

Keystone is built to support security leaders, assurance teams, risk owners, legal stakeholders and executives through a common platform with role-based views and consistent governance data.

Role-based ownership

Each module is aligned to a typical functional owner while still supporting shared visibility across the business.

Traceable evidence

Support evidence-led governance by linking records, findings, actions and decisions across assurance and compliance workflows.

Framework alignment

Organise governance activity against recognised standards and regulatory expectations without losing operational detail.

Board-ready outputs

Convert detailed operational data into concise, useful reporting for senior leadership and formal governance forums.

Platform summary

Keystone provides a unified approach to enterprise security governance by connecting governance records, assurance activity, operational security data and leadership reporting in a single platform.

  • Supports executive dashboards and board reporting.
  • Tracks risk, compliance, nonconformities and corrective action.
  • Manages audit, assurance, policy and control evidence.
  • Links incident and vulnerability activity to governance outcomes.
  • Supports ISO 27001, SoA and NCSC CAF assessment activity.

Suggested website copy block

Ordinex Keystone is an enterprise security governance platform designed to bring risk, assurance, compliance and operational oversight into one structured environment. It replaces fragmented trackers and disconnected governance records with a connected system of record that supports both day-to-day security management and board-level visibility.

From risk registers and legal obligations through to audits, controls, vulnerabilities, continuity and management review, Keystone helps organisations manage security governance in a way that is evidence-led, framework-aligned and operationally useful.

Ready to turn Keystone into a full product brand

This page is set up as a single-file starting point for the Ordinex website or product microsite. The next logical additions are a finished logo, a proper product illustration or screenshot, a contact form, and a module detail page for each capability.

Logo placement note Put the Ordinex logo in the top-left placeholder in the navigation bar. You can also place a larger Keystone product mark in the hero graphic placeholder if you want a separate product identity.