LTS Secure SOC BOX: ISO 27001 Cyber Security Compliance Management
The International Electrotechnical Commission (IEC) along with International Organization for Standardization (ISO) developed 27001 to set a global standard for information security. It provides guidance for implementing security controls to establish a consistent & dependable security program.
But due to its broad scope, achieving ISO 27001 compliance can be a challenging task for many organizations, especially the ones having limited resources.
LTS Secure SOC BOX delivers multiple security capabilities required by organizations to demonstrate ISO 27001 security compliance along with a reporting template for the same.
- Asset Discovery & Management
- Vulnerability Assessment & Management
- Event Correlation
- Intrusion Detection System (IDS)
- File Integrity Monitoring (FIM)
- Automated log collection and storage
- Reporting templates for ISO 27001
- Security Analytics Dashboards
The solutions integrated approach helps you answer crucial questions needed for ISO 27001 compliance:-
- What are my critical assets?
- Where are they located?
- How are they configured?
- What vulnerabilities do they pose?
- Who has access to these assets?
- What are your privileged users doing?
- Which users are violating policies?
Discover How LTS Secure SOC BOX Supports Adoption of ISO 27001
ISO 27001 Control Objective |
ISO 27001 Control |
Examples of How the USM Platform Helps |
A.8 - Asset Management |
||
A.8.1 - Responsibility for assets |
A.8.1.1 - Inventory of Assets
|
|
A.9 - Access Control |
||
A.9.2 - User Access Management |
A.9.2.2 - User access provisioning |
· Monitors and logs the provisioning and de-provisioning of user accounts on endpoints, in Office 365, in G Suite, etc. |
|
A.9.2.3 - Management of privileged access rights |
|
A.12 - Operations Security |
||
A.12.2 - Protection from malware |
A.12.2.1 - Controls against malware |
|
A.12.4 - Logging and monitoring |
A.12.4.1 - Event logging |
|
|
A.12.4.2 - Protection of log information
|
|
|
A.12.4.3 - Administrator and operator logs
|
|
|
A.12.4.4 - Clock synchronization |
|
A.12.6 - Technical Vulnerability Management |
A.12.6.1 - Management of technical vulnerabilities |
|
A.13 - Communications Security |
||
A.13.1 - Network security management |
A.13.1.1 - Network controls |
|
A.13.2 - Information transfer |
A.13.2.3 - Electronic messaging |
|
A.14 - System acquisition, development and maintenance |
||
A.14.1 - Security requirements of information systems |
A.14.1.2 - Security application services on public networks |
|
|
A.14.1.3 - Protection application services transactions
|
· Monitors and correlates events gathered from network traffic and network devices (firewalls, routers, switches, and more) to identify anomalous network traffic, such as communication of transactions and data to a known malicious server. |
A.16 - Information security incident management |
||
A.16.1 - Management of information security incidents and improvements |
A.16.1.2 - Reporting information security events |
|
|
A.16.1.4 - Assessment of and decision on information security events |
|
|
A.16.1.5 - Response to information security incidents |
|
|
A.16.1.6 - Learning from information security incidents |
|
|
A.16.1.7 - Collection of evidence |
|
A.17 - Information security assets of business continuity management |
||
A.17.1 - Information security continuity |
A.17.1.2 - Implementing information security continuity |
|
A.18 - Compliance |
||
A.18.1 - Compliance with legal and contractual requirements |
A.18.1.3 - Protection of records |
|