| Availability |
Odoo Online
Odoo.sh
On Premise
|
| Odoo Apps Dependencies |
•
Discuss (mail)
• Employees (hr) • Project (project) |
| Lines of code | 12601 |
| Technical Name |
grc_risk_management |
| License | OPL-1 |
| Website | https://www.prismtech.be |
| Versions | 18.0 19.0 |
| Availability |
Odoo Online
Odoo.sh
On Premise
|
| Odoo Apps Dependencies |
•
Discuss (mail)
• Employees (hr) • Project (project) |
| Lines of code | 12601 |
| Technical Name |
grc_risk_management |
| License | OPL-1 |
| Website | https://www.prismtech.be |
| Versions | 18.0 19.0 |
GRC — Governance, Risk & Compliance
The all-in-one risk management platform built for Odoo 18 & 19
Identify risks, protect your assets, ensure regulatory compliance, and drive informed decisions — all from within the Odoo platform your teams already use every day.
ISO 27001 NIS2 DORA GDPR CYFUN Custom Frameworks
Why do you need a GRC solution?
Every organization faces risks. The question is: are you managing them proactively, or reacting when it's too late?
Avoid costly incidents
Identify and treat risks before they become security breaches, data leaks, or compliance violations that can cost millions.
Meet regulatory requirements
NIS2, DORA, ISO 27001, GDPR — regulations are multiplying. Demonstrate compliance with auditable evidence, not spreadsheets.
Make better decisions
Give leadership a clear, real-time picture of your risk posture with interactive dashboards and 5x5 risk matrices.
Automate workflows
Assessment lifecycles, recurring evaluations, and approval processes run automatically. No more scattered documents.
Scale your governance
From one department to a multi-entity organization: templates, methodologies, and framework tags standardize your approach.
One platform, zero silos
Risks, assets, controls, audits, and projects are all connected inside Odoo. No more switching between tools.
Natively integrated in Odoo
Your company already uses Odoo for projects, teams, and operations. GRC plugs directly into what you already have.
📌
Projects
Risks and controls visible on each project. Your PM sees the full GRC picture without switching tools.
🏢
HR / Departments
Import departments as GRC assets in one click. Your risk map follows the org chart automatically.
💬
Chatter & Messaging
Full history with notifications on every risk, control, and audit. Discussions happen where the data lives.
📊
Dashboards & KPIs
Interactive risk matrix, compliance rates, and real-time KPIs for leadership in seconds.
🔒
Access Rights
User, Manager, Auditor, Administrator — each person sees only what concerns them.
How does it work?
A structured, step-by-step approach to managing risk across your entire organization
1. Your personal GRC dashboard
When you log in, you immediately see what requires your attention: risks to assess, treatments to follow up, controls to evaluate, and approvals to review.
Each team member gets a focused view of their responsibilities. Managers get a bird's-eye view of all ongoing activities for oversight and approval.
2. Map your assets
Before managing risks, you need to know what you are protecting. Register your critical assets — IT systems, databases, departments, suppliers, processes — in a structured inventory.
- Parent/child hierarchy reflecting your organizational structure
- Import departments from Odoo HR directly as assets
- Link assets to projects for project-based risk management
- Supplier tracking with criticality levels for supply chain risk
- Compliance rate per asset showing protection coverage
3. Visualize your risk landscape
The interactive 5x5 risk matrix gives you an instant visual overview of where your organization stands. Click any cell to drill down into specific assessments.
Configure your risk appetite threshold — the module automatically flags risks that exceed your tolerance, so you focus attention where it matters most.
4. Assess your risks with a proven workflow
Each risk goes through a structured assessment lifecycle:
- Inherent risk — risk level before any controls
- Residual risk — risk level after existing controls
- Target risk — where you want to be after treatment
Impact and probability are scored on a 5-point scale. The module calculates risk levels automatically and determines whether each risk is within or outside your appetite. Approval workflows ensure assessments are validated by the right people.
5. Standardize with risk templates
Build a library of risk templates representing common risks in your industry or organization. Assign templates to assets and the module automatically creates the corresponding risks.
When you update a template, all linked risks stay in sync — ensuring consistency and saving hours of repetitive work.
6. Treat risks with clear action plans
For every risk outside your appetite, define a treatment strategy:
- Mitigate — implement new controls to reduce the risk
- Transfer — shift the risk to a third party (insurance, outsourcing)
- Avoid — eliminate the activity causing the risk
- Accept — acknowledge and monitor the risk as-is
Each treatment has an owner, a deadline, and tracked progress. Mitigations link directly to risk assessments for full traceability.
7. Manage and evaluate your controls
Build a comprehensive control library and continuously evaluate effectiveness:
- Design effectiveness — is the control properly designed to address the risk?
- Operating effectiveness — is the control actually working in practice?
- Control testing — run test procedures with PASS/FAIL results and evidence
Controls are linked to assets, regulatory requirements, and risk assessments for complete traceability from regulation to implementation.
8. Deploy controls faster with templates
Build a reusable library of control templates aligned with your frameworks. Each template defines design criteria, testing procedures, and authorization levels.
Deploy a template on an asset and the module creates the control with all predefined settings — ensuring a consistent security baseline across your entire organization.
9. Stay compliant with regulations
Import and manage the regulations and standards that apply to your organization. Break them down into individual requirements and map each requirement to controls.
The module tracks your compliance rate per regulation in real time — you always know exactly where you stand and where the gaps are.
DORA NIS2 GDPR ISO 27001 ISO 9001 CYFUN Custom
10. Document your policies
Create and maintain your security and governance policies directly inside Odoo. Track versions, manage approval workflows, and ensure everyone has access to the latest approved version.
Policies are the foundation of your governance framework — the module makes sure they're actively managed and up to date, not written once and forgotten.
11. Track and learn from incidents
When something goes wrong, you need a structured response. Log security incidents, perform root cause analysis, assess impact, and define corrective actions.
Incidents are linked to affected assets, providing a complete incident history that helps identify patterns and strengthen your defenses over time.
Built-in role-based access
Every user sees exactly what they need — nothing more, nothing less
User
Manages their own risks, assessments, and controls. Sees only records they own or are assigned to.
Manager
Oversees all GRC activities. Reviews and approves assessments, treatments, and controls across the organization.
Administrator
Full access including configuration: methodologies, categories, templates, regulations, and system settings.
Need help getting started?
Prism Technology specializes in GRC implementation with certified expertise.
Our team includes certified ISO 27001 Lead Implementers and NIS2 Lead Implementers from the Data Protection Institute.
brouwersn@prismtech.be • www.prismtech.be
GRC - Governance, Risk & Compliance
The all-in-one risk management solution built for Odoo 19
Identify your risks, protect your assets, ensure regulatory compliance, and make informed decisions — all from within the Odoo platform your teams already use every day.
Supported frameworks: ISO 27001 · NIS2 · DORA · GDPR · CYFUN · ISO 9001 · Custom frameworks
Natively Integrated in Odoo
Your company already uses Odoo for projects, teams, and operations. GRC plugs directly into what you already have.
- Projects — Risks and controls are visible directly on each project form. Your project manager sees the full GRC picture without switching tools.
- HR / Departments — Import your departments as GRC assets in one click. Your risk map follows your organizational chart automatically.
- Messaging & Chatter — Every risk, control, and audit has a full history with notifications. Discussions happen where the data lives.
- Dashboards & KPIs — Interactive risk matrix, compliance rates, and real-time KPIs. Leadership gets a clear picture in seconds.
- Access Rights — Dedicated roles: User, Manager, Auditor, Administrator. Each person sees only what concerns them.
Why do you need a GRC solution?
Every organization faces risks. The question is: are you managing them proactively, or reacting when it's too late?
- Avoid costly incidents — Proactively identify and treat risks before they become security breaches, data leaks, or compliance violations that can cost millions.
- Meet regulatory requirements — NIS2, DORA, ISO 27001, GDPR, CYFUN — regulations are multiplying. Demonstrate compliance with auditable evidence, not spreadsheets.
- Make better decisions — Give your leadership a clear, real-time picture of your organization's risk posture with interactive dashboards and risk matrices.
- Save time — Automatic scoring, reusable templates, real-time calculations. No more scattered documents and forgotten follow-ups.
- One single tool — No more Excel and expensive GRC software. Everything in your existing Odoo. No third-party license needed.
- Full traceability — Every action is documented. Ideal for audits and regulator inspections.
How does it work?
A structured, step-by-step approach to managing risk across your organization.
1. Your personal GRC dashboard
When you log in, you immediately see what requires your attention: risks to assess, treatments to follow up on, controls to evaluate, and approvals to review.
Each team member gets a focused view of their responsibilities — no noise, no confusion. Managers get a bird's-eye view of all ongoing activities for oversight and approval.
2. Map your assets
Before managing risks, you need to know what you are protecting. Register your critical assets — IT systems, databases, departments, suppliers, processes — in a structured inventory.
- Parent/child hierarchy to reflect your organizational structure
- Import departments from HR directly as assets in one click
- Link assets to projects for project-based risk management
- Supplier tracking with criticality levels for supply chain risk
- Compliance rate per asset showing how well each asset is protected
3. Visualize your risk landscape
The interactive 5x5 risk matrix gives you an instant visual overview of where your organization stands. Click any cell to drill down into specific assessments at that level.
Configure your risk appetite threshold — the module automatically flags risks that exceed your tolerance level, so you can focus your attention where it matters most.
4. Assess your risks with a proven workflow
Each risk goes through a structured assessment lifecycle:
- Inherent risk — What is the risk level before any controls?
- Residual risk — What is the risk level after existing controls?
- Target risk — Where do you want to be after treatment?
Impact and probability are scored on a 5-point scale. The module calculates the risk level automatically and determines whether the risk is within or outside your appetite. Approval workflows ensure that assessments are validated by the right people.
5. Standardize with risk templates
Don't start from scratch every time. Build a library of risk templates that represent common risks in your industry or organization.
Assign templates to assets, and the module automatically creates the corresponding risks. When you update a template, all linked risks stay in sync. This ensures consistency and saves hours of repetitive work.
6. Treat risks with clear action plans
For every risk outside your appetite, define a treatment strategy:
- Mitigate — Implement new controls to reduce the risk
- Transfer — Shift the risk to a third party (e.g., insurance)
- Avoid — Eliminate the activity causing the risk
- Accept — Acknowledge and monitor the risk as-is
Each treatment has an owner, a deadline, and a tracked progress status. For mitigations, the module directly links new controls to the risk assessment for full traceability.
7. Manage and evaluate your controls
Controls are the measures you put in place to reduce risk. The module lets you build a comprehensive control library and continuously evaluate their effectiveness:
- Design effectiveness — Is the control properly designed to address the risk?
- Operating effectiveness — Is the control actually working in practice?
- Control testing — Run test procedures with PASS/FAIL results and evidence
Controls are linked to assets, regulatory requirements, and risk assessments for complete traceability from regulation to implementation.
8. Deploy controls faster with templates
Build a reusable library of control templates aligned with your frameworks. Each template defines the expected design criteria, testing procedures, and authorization levels.
When you deploy a control template on an asset, the module creates the control with all predefined settings. This ensures a consistent security baseline across all your assets and departments.
9. Stay compliant with regulations
Import and manage the regulations and standards that apply to your organization. Break them down into individual requirements, and map each requirement to the controls that address it.
The module tracks your compliance rate per regulation in real time, so you always know exactly where you stand and where the gaps are.
Supported: DORA · NIS2 · GDPR · ISO 27001 · ISO 9001 · CYFUN · Custom
10. Document your policies
Create and maintain your organization's security and governance policies directly inside Odoo. Track versions, manage approval workflows, and ensure everyone has access to the latest approved version.
Policies are the foundation of your governance framework — the module makes sure they're not just written once and forgotten, but actively managed and up to date.
11. Track and learn from incidents
When something goes wrong, you need a structured response. Log security incidents, perform root cause analysis, assess the impact, and define corrective actions.
Incidents are linked to the affected assets, providing a complete incident history that helps you identify patterns and strengthen your defenses over time.
Role-based access
Every user sees exactly what they need — nothing more, nothing less.
- User — Manages their own risks, assessments, and controls. Sees only records they own or are assigned to.
- Manager — Oversees all GRC activities. Reviews and approves assessments, treatments, and controls across the organization.
- Administrator — Full access including configuration: methodologies, categories, templates, regulations, and system settings.
Support & Expertise
Prism Technology specializes in GRC implementation with certified expertise.
- Certified ISO 27001 Lead Implementers
- Certified NIS2 Lead Implementers
- Data Protection Institute certified professionals
Contact: brouwersn@prismtech.be | https://www.prismtech.be
Free demonstration available upon request.
Odoo Proprietary License v1.0 This software and associated files (the "Software") may only be used (executed, modified, executed after modifications) if you have purchased a valid license from the authors, typically via Odoo Apps, or if you have received a written agreement from the authors of the Software (see the COPYRIGHT file). You may develop Odoo modules that use the Software as a library (typically by depending on it, importing it and using its resources), but without copying any source code or material from the Software. You may distribute those modules under the license of your choice, provided that this license is compatible with the terms of the Odoo Proprietary License (For example: LGPL, MIT, or proprietary licenses similar to this one). It is forbidden to publish, distribute, sublicense, or sell copies of the Software or modified copies of the Software. The above copyright notice and this permission notice must be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Please log in to comment on this module