Overview
The Workspace Settings section allows you to independently configure each CSFaaS workspace to align seamlessly with your organisation's specific requirements.
With nine dedicated tabs, you gain comprehensive control over various aspects of the platform, enabling you to fine-tune its functionalities for optimal performance.
Key Workspace Settings Tabs
General Settings
Manage overarching workspace settings to establish foundational parameters.
Framing Settings
Define the scope and complexity of your application environment, adapting it to your organisation's operational scale.
Properties Settings
Customise key properties relevant to your organisation’s context, ensuring alignment with strategic objectives.
Notifications Settings
Configure alerts and updates for critical events, maintaining transparency and responsiveness.
Billing & Limits Settings
Manage billing preferences, subscription details, and usage limits to ensure cost efficiency and compliance.
Users Settings
Oversee user accounts, permissions, and access controls, ensuring appropriate authorisation across your workspace.
Roles Settings
Define user roles, responsibilities, and permissions to enforce a structured access control model.
Workflows Settings
Set up and manage approval workflows to streamline processes, enhance accountability, and improve operational efficiency.
SLA (Demands) Settings
Configure Service Level Agreements (SLAs) to meet organisational standards and performance benchmarks.
Why Workspace Settings Matter
The Workspace Settings section empowers you to:
Customise the Environment
Adapt settings to align with your organisation's structure and objectives.
Optimise Governance
Ensure effective oversight and management of cybersecurity processes.
Enhance Collaboration
Define roles, workflows, and notifications to facilitate smooth operations across teams.
Maintain Compliance
Align configurations with regulatory requirements and internal policies.
This flexibility ensures that CSFaaS can be tailored precisely to your needs, supporting your organisation’s cybersecurity governance, risk management, and compliance activities effectively.
Let’s explore each of these features in the following sections, one by one.