ISO 27001 Compliance

education

ISO 27001 Compliance

Achieving ISO 27001 compliance could be challenging to small and medium size companies, as they have limited resources. Yet it is possible to accelerate ISO 27001 compliance by simplifying and automating many of the security controls for threat detection and meeting compliance. SQ1Shield delivers the essential capabilities to demonstrate ISO 27001 compliance and be ready for audit with greater confidence.

Be Secure. Be Compliant.

Customized assessments of IT Landscape (on-premise network & cloud), to identify security controls that are necessary to meet ISO 27001 Compliance.

Locate gaps that exist between your current security posture and the requirements

SQ1Shield helps you confront your ISO 27001 compliance gaps so that risks can be prioritized and addressed

SQ1Shield built-in ISO27001 reports help you report easily on security controls

Customize the reports to meet your business requirements and stay Compliant

SQ1Shield & ISO 27001 – Fulfil Compliance requirement with SQ1Shield

ISO 27001 Control Objective ISO 27001 Control SQ1Shield Coverage

A5 Information Security Policy

A 5.1.1 – Policies for Information Security

Policy Management helps you establish policies, update it and circulate within your employees

A6 Organization of Information Security

A6.2.1 – Mobile Device Policy

Identify and monitor all mobile devices that have access to the network

A6.2.2 - Teleworking

Remote access monitoring

A7 Human Resource Security

A.7.2.2 – Information Security Awareness education and training

Security reminders - Automated updates of threat intelligence and security awareness shared through policy management portal

A7.3.1 – Termination or Change of employment responsibilities

Monitor & alert logon of de-provisioned users

A8 Asset Management

A.8.1.1 – Inventory of Assets

Asset Discovery – Identifies all the devices in the network including firewalls, routers.

A.8.3.2 – Disposal of media

Media destruction procedures established and stored, update it and circulate within your employees

A9 Access Control

A.9.1.1 – Access Control Policy

Policy Management helps you establish policies, update it and circulate within your employees

A.9.2.2 – User Access Provisioning

Monitor and log the provisioning and de-provisioning of user accounts on endpoints, in Office 365 (Azure Active Directory), and G Suite.

A9.2.3 – Management of Privileged access rights

Monitor and log successful and failed logon events to assets across your on-premises and cloud environments.

A9.2.6 – Removal or adjustment of access rights

Monitor & alert logon of de-provisioned users

A11 Physical and Environmental Security

A11.1.2 – Physical entry controls

Perimeter access control device assessment and monitoring

A11.1.3 – Securing offices, rooms and facilities

Endpoint Detection and Response – Secure all workstations

A11.1.4 – Protecting against external and environmental threats

Guest access Procedures established and stored, update it and circulate within your employees

A11.2.7 – Secure disposal or reuse of equipment

Media destruction procedures established and stored, update it and circulate within your employees

A12 Operational Security

A12.1.1 – Documented Operating Procedures

Policy Management – Review and update all policies and procedures documents within the portal

A12.1.2 – Change Management

Monitor & alert configuration changes within your network

A12.2.1 – Controls against malware

Identify malware-based IoC, orchestrate manual and automated actions to isolate infected systems and block malicious domains.

A12.3.1 – Information Backup

Review and test the Data backup and recommend remedial measures

A12.4.1 – Event Logging

Aggregate logs and events from systems, applications, and devices from across your on-premises and cloud environments.

Monitor access to and attempt to modify system and application binaries, configuration files, and log files.

Monitor user access to your Cloud environment

A12.4.2 – Protection of log information

Monitor access to and attempt to modify system and application binaries, configuration files, and log files.

File Integrity Monitoring can detect modification attempts to applications or online storage containing critical data.

A12.4.3 – Administrator and Operator logs

Monitor and log successful and failed logon events to assets across your on-premises and cloud environments

Monitor user and administrator activities, including access and modification of files and content, in on-premises and cloud-hosted assets

A12.4.4 – Clock Synchronization

Monitor and alarm which could indicate issues or attempts to disable clock synchronization

A12.6.1 – Management of Technical vulnerabilities

Perform vulnerability assessment on all networks, applications, wireless including AWS or Azure

Threat intelligence feed ensures that SQ1Shield operates with latest correlation directives, threat signatures and provide guided remediation

13. Communications Security

13.1 – Network Controls

Monitor and correlate events gathered from network traffic (network IDS, cloud IDS) and network devices (routers, switches, firewalls, and more) to identify anomalous network traffic, such as communication to a known malicious server Classify threats across a kill-chain taxonomy to inform the risk level of that threat Monitor public and dark web sources for the trade or communication of stolen credentials

A13.2.3 – Electronic messaging

Monitors for phishing or malware attacks against email services, including Office 365 and G Suite

A14 System acquisition, development and maintenance

A14.1.2 – Securing application services on public networks

Monitor and alarm on Group Policy errors, which could indicate attempts to disable local security services and introduce misconfigurations that compromise asset integrity and security

A14.1.3 – Protecting application services transactions

Monitor and correlate events gathered from network traffic (network IDS, cloud IDS) and network devices (routers, switches, firewalls, and more) to identify anomalous network traffic, such as communication of transactions and data to a known malicious server

A14.2.8 – Systems security testing

Perform application vulnerability testing during SDLC process

A14.3.1 – Protection of test data

Review and test the Data Storage & backup and recommend remedial measures

A15 Supplier relationships

A15.1.2 – Addressing security within supplier agreements

Vendor Risk Management – Perform third party risk assessment and monitor the risks in third party that have access ePHI.

A15.2.1 – Monitoring and review of supplier services

Perform vulnerability assessment on Vendor Network and remediate.

A16 Information security incident management

A16.1.2 – Reporting information security events

SQ1Shield enables monitoring and review of alarms, events, and reports Built-in notification capabilities enable analysts to be alerted to alarms through email, and SMS

A16.1.4 – Assessment of and decisions on information security events

Uses threat intelligence and correlation capabilities to detect threat and analyzes and swiftly respond

A16.1.5 – Response to information security incidents

Uses security orchestration and playbooks provides automated response to incidents

A16.1.6 – Learning from information security incidents

Provides forensic analysis of the incidents to ensure that such breaches do not reoccur

A16.1.7 – Collection of evidence

Aggregates events and log data from across your on-premises and cloud environments

A17 Information security aspects of business continuity management

A17.1.2 – Implementing Information security continuity

Review the contingency plan in place and recommend remedial measures

A18 Compliance

A18.1.3 – Protection of data

Review and test the Data Storage & backup and recommend remedial measures

Contact Us
Invalid email address
Please Wait....

READY TO TALK TO OUR EXPERT?

Contact Us