8 domains.
One board−ready picture
of your cyber governance.

Aligned to NCSC CAF, FCA PS21/3, NIST CSF v2.0 and CIS Controls v8. Delivered through structured interviews and document review. No system access required.

Built on the frameworks your insurers and FCA supervisors reference

NCSC Cyber Assessment Framework (CAF)

Primary structural reference. Four objectives: managing security risk, protecting against cyber attack, detecting cyber security events, minimising the impact of incidents. Referenced directly by the FCA in operational resilience guidance.

FCA Operational Resilience − PS21/3

Regulatory anchor. Important Business Services identification, impact tolerance setting and third-party dependency mapping. Assessment outputs formatted for FCA supervisory file inclusion.

NIST Cybersecurity Framework v2.0

Technical depth reference. The most recognised international cybersecurity framework, accepted by insurers and compliance auditors. Used to provide structured sub-categories within each domain.

CIS Controls v8

The most actionable, prioritised control implementation guidance for SMEs. Implementation Groups 1 and 2 map directly to GOIA's target client size. The CIS Controls v8 Gap Map is included in every Executive Review.

What GOIA assesses − and what you receive

A governance assessment - not a penetration test. No privileged system access required. Delivered through structured interviews, document review and passive open-source analysis.

D1

External Exposure and Attack Surface

Passive OSINT - No system access

Assesses your firm's visible attack surface from the outside - public-facing domains, open ports, SSL certificate status, DNS configuration and credentials leaked in public data breach datasets. This is what a threat actor sees before deciding whether your firm is worth targeting.

Most IFA firms have never had an independent view of their external exposure. The findings are consistently more serious than any managing director expects.

What you receive: A risk rating (Low, Medium, or High) for your external exposure, with a prioritised list of specific items to address - each one named, not generalised.
D2

Identity and Access Management

Structured interview - MSP contract review

Assesses how your firm controls who has access to what - and whether that access is properly enforced, regularly reviewed and cleanly removed when someone leaves. This covers MFA enforcement, privileged account management, shared credentials and offboarding processes.

The single most common finding: MFA is not enforced on email, former staff credentials remain active weeks after departure and no documented access review has ever been conducted.

What you receive: A governance rating against NCSC MFA guidance, with a specific gap list identifying which controls are absent, which are partial and which are in place and evidenced.
D3

Email Resilience and Phishing

Passive DNS analysis - IT contact interview

Assesses whether your firm's email domain is properly authenticated - meaning whether it is configured to prevent fraudulent emails from appearing to come from your address. This covers SPF, DKIM and DMARC configuration.

A DMARC record set to "none" means your firm's email domain can currently be impersonated. This creates a direct, specific risk of Business Email Compromise - a fraudulent payment instruction that appears to come from your managing director's address.

What you receive: A technical configuration summary for SPF, DKIM and DMARC with a plain-language explanation of what each finding means and a specific recommendation aligned to NCSC email security guidance.
D4

Backup Integrity and Recovery

Interview - MSP SLA review

Assesses whether your firm could recover its critical systems and client data following a significant incident - and whether that recovery could happen within the timeframes that FCA operational resilience rules require for your Important Business Services.

The question most managing directors cannot answer clearly: when did your IT provider last perform a full tested restoration in your presence, with a documented result?

What you receive: A backup posture rating with a gap assessment against FCA operational resilience recovery expectations and a specific note on whether your current recovery timeline would keep you within your Important Business Service impact tolerances.
D5

Incident Response Maturity

Interview - Document review

Assesses whether your firm has a documented, board-aware incident response plan and whether the people who would lead the response know what to do, in what order, when an incident occurs. This covers insurer notification obligations, FCA reporting, ICO 72-hour notification and client communication.

In most IFA firms: the IR plan either does not exist at board level, or lives in IT provider documentation that the MD has never read, or has never been tested.

What you receive: An IR maturity score across five dimensions, plus a minimum viable IR plan structure that your board can adopt immediately.
D6

Regulatory Defensibility

FCA governance questionnaire session

Assesses how well your firm can demonstrate to the FCA that it has met its operational resilience obligations. This is the domain most directly linked to personal director accountability. It covers Important Business Services identification, impact tolerances, Consumer Duty board champion oversight and third-party dependency mapping.

Patrick Murphy's Consumer Duty expertise and firsthand IFA governance experience is directly embedded in this domain.

What you receive: A regulatory gap register mapping your firm's current governance position against specific FCA obligations, with a priority order for addressing gaps. Formatted for your FCA supervisory file.
D7

Accountability and Governance Clarity

MD interview - Governance document review

Assesses whether cyber risk is genuinely owned and documented at board level - not just delegated informally to an IT provider. This covers whether a specific director owns cyber risk, whether cyber is a standing item on board meeting agendas and whether governance documentation exists that evidences board-level oversight.

The most common finding: the managing director is personally accountable under FCA rules but has no documented record of having reviewed or discussed cyber risk at board level.

What you receive: An accountability map showing the current distribution of cyber responsibility in your firm, with a recommended governance structure including who should own what, what should be reported to the board and how often.
D8

Third-Party and Supply Chain Risk

MSP contract - SOC 2/CE evidence - Platform checklist

Assesses the governance posture of your firm's key third-party dependencies - your IT managed service provider, investment platforms (Transact, Nucleus, Parmenion, Quilter) and practice management software. FCA operational resilience rules require firms to understand and manage third-party risk. Most IFA firms have never formally requested security assurance documentation from their MSP.

DORA implications are also addressed where relevant - for firms with EU-based clients or ICT providers operating across EU jurisdictions.

What you receive: A third-party risk matrix identifying your key suppliers and their assurance status, plus specific assurance questions to ask your IT provider and platforms, with guidance on what acceptable evidence looks like.

About the "What you receive" section

Each domain above shows a "What you receive" line. This is the specific document, rating, or structured finding that appears in your board-ready report and FCA compliance file. These are concrete deliverables - not theoretical findings.

See the methodology applied to your firm.

The Executive Review applies all 8 domains to your specific governance context. Fixed fee. Board-ready. 10 working days.

NCSC CAF aligned
FCA PS21/3 mapped
NIST CSF v2.0 referenced
CIS Controls v8 gap map included
No privileged system access