Compliance Reports: International Standardization Organization 27002 (ISO 27002)
ISO 27002 establishes guidelines and general principles for initiating, implementing, maintaining and improving information security management in an organization. ISO 27002 is used as the foundation and technical guidelines for many international and industry compliance standards and are generally good practices for all organizations.
Dependencies
The PCI compliance reports have the following dependencies.
- SA Rules:
Accounts Created
Accounts Deleted
Accounts Disabled
Accounts Modified
Admin Access to Compliance Systems Details
Admin Access to Compliance Systems Summary
Antivirus Signature Update
Change in Audit Settings
Encryption Failures
Encryption Key Generation and Changes
Failed Escalation of Privileges Details
Failed Escalation of Privileges Summary
Failed Remote Access Details
Failed Remote Access Summary
Firewall Configuration Changes
Firmware Changes on Wireless Devices
Logon Failures Details
Logon Failures Summary
Password Changes
Password Changes Summary
Router Configuration Changes
Successful Escalation of Privileges Details
Successful Escalation of Privileges Summary
Successful Remote Access Details
Successful Remote Access Summary
Successful Use of Encryption
System Clock Synchronization
User Access Revoked
User Access to Compliance Systems Details
User Access to Compliance Systems Summary
User Session Terminated Summary
- SA Lists:
Administrative Users
Compliance Systems
- App Rules:
account:created
account:deleted
account:disabled
account:modified
account:logon-success
av:signature-update
config:change-audit-setting
encryption:failures
encryption:key-gen-and-changes
access:privilege-escalation-failure
access:remote-failure
access:remote-success
config:fw-config-changes
config:firmware-config-changes
account:logon-failure
account:password-change
config:router-change
access:privilege-escalation-success
alm:system-clock-synch
access:user-access-revoked
account:logout
Citations
The ISO 27002 reports have the following Citations.
- Report Rule: Accounts Created
- Citation Number: 11.2.1
- Citation Description: A formal process should be in place for the granting and revoking of access to information systems.
- Report Rule: Accounts Deleted
- Citation Number: 11.2.1
- Citation Description: A formal process should be in place for the granting and revoking of access to information systems.
- Report Rule: Accounts Modified
- Citation Number: 11.2.1
- Citation Description: A formal process should be in place for the granting and revoking of access to information systems.
- Report Rule: Antivirus Signature Update
- Citation Number: 10.4.1
- Citation Description: The software should be set up to automatically download and update signature files to ensure the protection is kept up to date.
- Report Rule: Change in Audit Settings
- Citation Number: 12.52, 12.53
- Citation Description: When the operating system is changed, all critical applications should be tested and reviewed to ensure there are no adverse impacts on operations or security.
- Report Rule: Encryption Failures
- Citation Number: 15.1.6
- Citation Description: Cryptographic controls should be in compliance with all laws and regulations.
- Report Rule: Key Generation and Changes
- Citation Number: 12.3.2
- Citation Description: Key-management techniques should be in place. All keys should be protected against modification, loss, destruction, and unauthorized disclosure
- Report Rule: Escalation of Privileges - Detail
Escalation of Privileges - Top 25 - Citation Number: 10.10.4
- Citation Description: All activities by System Administrators and System Operators should be logged.
- Report Rule: Failed Remote Access - Detail
- Citation Number: 11.7.2
- Citation Description: Operational procedures and plans should be developed for use by teleworking employees
- Report Rule: Failed Remote Access - Top 25
- Citation Number: 11.7.2
- Citation Description: Operational procedures and plans should be developed for use by teleworking employees
- Report Rule: Firewall Configuration Changes
- Citation Number: 12.52, 12.53
- Citation Description: When the operating system is changed, all critical applications should be tested and reviewed to ensure there are no adverse impacts on operations or security.
- Report Rule: Firmware Changes Wireless Devices
- Citation Number: 12.52, 12.53
- Citation Description: When the operating system is changed, all critical applications should be tested and reviewed to ensure there are no adverse impacts on operations or security.
- Report Rule: Logon Failures - Detail
- Citation Number: 11.5.1
- Citation Description: All successful and unsuccessful logon attempts should be recorded.
- Report Rule: Logon Failures - Top 25
- Citation Number: 11.5.1
- Citation Description: All successful and unsuccessful logon attempts should be recorded.
- Report Rule: Password Changes - Detail
Password Changes - Top 25 - Citation Number: 11.3.1
- Citation Description: Passwords should be changed on a regular basis and when there is an indication of compromise.
- Report Rule: Router Configuration Changes
- Citation Number: 12.52, 12.53
- Citation Description: When the operating system is changed, all critical applications should be tested and reviewed to ensure there are no adverse impacts on operations or security.
- Report Rule: Admin Access to Compliance Systems - Detail
- Citation Number: 11.5.1
- Citation Description: All successful and unsuccessful logon attempts should be recorded.
- Report Rule: Admin Access to Compliance Systems - Top 25
- Citation Number: 11.5.1
- Citation Description: All successful and unsuccessful logon attempts should be recorded.
- Report Rule: Successful Remote Access - Detail
- Citation Number: 11.7.2
- Citation Description: Operational procedures and plans should be developed for use by teleworking employees
- Report Rule: Successful Remote Access - Top 25
- Citation Number: 11.7.2
- Citation Description: Operational procedures and plans should be developed for use by teleworking employees
- Report Rule: Successful Use of Encryption
- Citation Number: 15.1.6
- Citation Description: Cryptographic controls should be in compliance with all laws and regulations.
- Report Rule: User Access to Compliance Systems - Detail
- Citation Number: 11.5.1
- Citation Description: All successful and unsuccessful logon attempts should be recorded.
- Report Rule: User Access to Compliance Systems - Top 25
- Citation Number: 11.5.1
- Citation Description: All successful and unsuccessful logon attempts should be recorded.
- Report Rule: System Clock Synchronization
- Citation Number: 10.10.6
- Citation Description: All system clocks should be automatically synchronized with an accurate time source.
- Report Rule: User Access Revoked
- Citation Number: 11.2.1
- Citation Description: A formal process should be in place for the granting and revoking of access to information systems.
- Report Rule: Account Management
- Citation Number: 11.2.1
- Citation Description: A formal process should be in place for the granting and revoking of access to information systems.
- Report Rule: User Session Terminated - Top 25
- Citation Number: 11.5.5
- Citation Description: Inactive sessions should be shut down after a period of time.
