A Clear Path to GITC

Build trust and accelerate business growth, securely. Tentacle streamlines GITC alignment and risk assessments.
Try it free. No card required. Instant setup.
Tentacle is solving a core problem in our industry – capturing and communicating information about security posture. Rather than spending countless hours filling out and emailing custom spreadsheets, Tentacle is revolutionizing how security assessments are performed. Tentacle is doing for information security what the common application did for college admissions.
- Peter Troost | Managing Director - Providence Strategic Growth (PSG)

What Is GITC?

General IT Control (GITC) is a critical component of business operations and financial information controls. The security, integrity, and reliability of financial information relies on proper access controls, change management, and operational controls.

Get GITC assessment-ready fast with Tentacle

Build your security program on Tentacle using controls mapped to GITC. Tentacle recommends key policies, processes, and procedures needed for GITC to help you streamline the assessment process.

GITC Considerations

Primary Goal
Aligning with GITC helps to ensure the integrity of the data and processes that the systems support within an organization.
Validating Security
GITC helps organizations with software controls, physical hardware controls, computer operations controls, data security controls, controls over the systems implementation process, and administrative controls.
Assessment Effort Level
Tentacle guides your organization through responding to the 65 total controls within GITC so you fully understand how your security program maps to the framework.

Who typically adheres to GITC?

Any organizations that is trying to implement more stringent internal IT controls can find GITC to be helpful in guiding the process.

Harness the Security of GITC with Tentacle

Tentacle maps your security program to GITC. Get a Risk Rating as well as instant feedback of your GITC Content Performance. Easily identify and address gaps to scale your business securely.

Build & assess your security program against major security frameworks for free.

Try it free. No card required. Instant setup.
Create Your Free Account
submit-question