2TS

NIST Disclaimer

Disclaimer: This assessment was conducted using the ‘Thuthukanis internal methodology’. The scope of controls wasdetermined with reference to the statement of Applicability, which may be provided upon request. Thuthukani is not affiliated with the National Institute of Standards and Technology (‘NIST’), nor does it claim ownership of our rights to any NIST publications, including the NIST Cyversecurity framework (‘NIST CSF’). References to the NIST CSF are made solely for the purpose of alignment and benchmarking.

The assessment findings are based on information made available at the time of review and may not reflect subsequent changes in the environment, systems, or processes. Accordingly, the results do not constitute a guarantee or certification of security, compliance, or regulatory approval.

This document is provided for the sole use of the recipient organization. It may not be distributed, reproduced, or relied upon by any third party without the Thuthukani’s prior written consent. The Thuthukani expressly disclaims any liability for decisions made or actions taken based on this assessment.

All methodologies, analyses, and materials contained herein remain the intellectual property of Thuthukani. Nothing in this document shall be construed as creating any endorsement by, or affiliation with, NIST.

Copyright © 2025. All rights