Compliance Mappings

See how different laws, regulations, standards map each other and against template internal controls and policies.

3,709

0%
Current Compliance Items

0

0%
New Compliance Items

0

0%
Updated Compliance Items
Actions
ISO 27002:2013
Internal Controls
Policies
5.1.1 Security Awareness Trainings Security Governance Policy Vulnerability and Incident Management
5.1.2 Security Governance Policy
6.1.1 Security Awareness Trainings Security Governance Policy Network Team Roles and Responsibilities GRC Team Roles and Responsibilities Vulnerability and Incident Management
6.1.2 Change Mgt Reviews DMZ Firewall Reviews Active Directory User Reviews AD Group Reviews Database Administrator Account Reviews Service Accounts Reviews Endpoint Hardware Inventory Standard Server Build - Linux Standard Server Build - Windows High Privilege Service Accounts CRM Application - Account Reviews Security Governance Policy Change Management Procedure SDLC Procedures Hardening Standards Account Management Procedures Logging & Monitoring Standards System inventory
6.1.3 Regular Vulnerability Scanning CCTV Log Reviews Incident Management Process Review Vulnerability and Incident Management Security Governance Policy HR Security Policy
6.1.4 Vulnerability and Incident Management
6.1.5 Software Deployment Reviews Software Testing Security Governance Policy SDLC Procedures
6.2.1 Endpoint Hardware Inventory Standard Server Build - Linux Standard Server Build - Windows Security Awareness Trainings Dual Factor Authentication Google Apps 2-Factor Hardening Standards Change Management Procedure System inventory PCI-DSS Scope Security Governance Policy Account Management Procedures
6.2.2 Hardening Standards HR Security Policy
7.1.1 NDA and Policy Signing Reviews Background Check Reviews1!!! Security Governance Policy NDA Agreement HR Security Policy
7.1.2 NDA and Policy Signing Reviews NDA Agreement HR Security Policy
7.2.1 Regular Vulnerability Scanning CCTV Log Reviews Security Governance Policy HR Security Policy Vulnerability and Incident Management
7.2.2 Security Awareness Trainings Security Governance Policy
7.2.3 HR Security Policy
7.3.1 Badge Reviews Active Directory User Reviews Database Administrator Account Reviews AD Group Reviews Service Accounts Reviews Background Check Reviews1!!! HR Security Policy Physical Security Standards Hardening Standards Account Management Procedures
8.1.1 DMZ Firewall Reviews IDS Reviews Rogue Wifi APs WPA2 Secured Wifi Networks Transport of Media Datacenter Security Storage of Media CMDB Reviews Endpoint Hardware Inventory Corporate Application Inventory System inventory Network Diagram Account Management Procedures Media Handling Policy Change Management Procedure Vulnerability and Incident Management Hardening Standards PCI-DSS Scope End Point CMDB Management Procedure
8.1.2 CMDB Reviews Endpoint Hardware Inventory Corporate Application Inventory Acceptable use of Assets System inventory Change Management Procedure End Point CMDB Management Procedure
8.1.3 Acceptable use of Assets HR Security Policy Security Governance Policy Change Management Procedure
8.1.4 Background Check Reviews1!!! Acceptable use of Assets HR Security Policy
8.2.1 Media Handling Policy
8.2.2 Endpoint Hardware Inventory Media Handling Policy Hardening Standards
8.2.3 Datacenter Security Storage of Media Application Hardening Standards WPA2 Secured Wifi Networks Destruction of Media Endpoint Hardware Inventory Media Handling Policy Hardening Standards
8.3.1 Storage of Media Endpoint Hardware Inventory Datacenter Security Destruction of Media Media Handling Policy Vulnerability and Incident Management Hardening Standards Security Governance Policy Encryption Standards Account Management Procedures Backup Policies Physical Security Standards
8.3.2 Destruction of Media Media Handling Policy
8.3.3 Transport of Media Endpoint Hardware Inventory Media Handling Policy Hardening Standards