Skip to content
  • There are no suggestions because the search field is empty.

Compliance Reports: International Standardization Organization 27002 (ISO 27002)

ISO 27002 establishes guidelines and general principles for initiating, implementing, maintaining and improving information security management in an organization. ISO 27002 is used as the foundation and technical guidelines for many international and industry compliance standards and are generally good practices for all organizations.

Dependencies

The PCI compliance reports have the following dependencies.

  • SA Rules:

    Accounts Created

    Accounts Deleted

    Accounts Disabled

    Accounts Modified

    Admin Access to Compliance Systems Details

    Admin Access to Compliance Systems Summary

    Antivirus Signature Update

    Change in Audit Settings

    Encryption Failures

    Encryption Key Generation and Changes

    Failed Escalation of Privileges Details

    Failed Escalation of Privileges Summary

    Failed Remote Access Details

    Failed Remote Access Summary

    Firewall Configuration Changes

    Firmware Changes on Wireless Devices

    Logon Failures Details

    Logon Failures Summary

    Password Changes

    Password Changes Summary

    Router Configuration Changes

    Successful Escalation of Privileges Details

    Successful Escalation of Privileges Summary

    Successful Remote Access Details

    Successful Remote Access Summary

    Successful Use of Encryption

    System Clock Synchronization

    User Access Revoked

    User Access to Compliance Systems Details

    User Access to Compliance Systems Summary

    User Session Terminated Summary

  • SA Lists:

    Administrative Users

    Compliance Systems

  • App Rules:

    account:created

    account:deleted

    account:disabled

    account:modified

    account:logon-success

    av:signature-update

    config:change-audit-setting

    encryption:failures

    encryption:key-gen-and-changes

    access:privilege-escalation-failure

    access:remote-failure

    access:remote-success

    config:fw-config-changes

    config:firmware-config-changes

    account:logon-failure

    account:password-change

    config:router-change

    access:privilege-escalation-success

    alm:system-clock-synch

    access:user-access-revoked

    account:logout


Citations

The ISO 27002 reports have the following Citations.

  • Report Rule: Accounts Created
  • Citation Number: 11.2.1
  • Citation Description: A formal process should be in place for the granting and revoking of access to information systems.

  • Report Rule: Accounts Deleted
  • Citation Number: 11.2.1
  • Citation Description: A formal process should be in place for the granting and revoking of access to information systems.

  • Report Rule: Accounts Modified
  • Citation Number: 11.2.1
  • Citation Description: A formal process should be in place for the granting and revoking of access to information systems.

  • Report Rule: Antivirus Signature Update
  • Citation Number: 10.4.1
  • Citation Description: The software should be set up to automatically download and update signature files to ensure the protection is kept up to date.

  • Report Rule: Change in Audit Settings
  • Citation Number: 12.52, 12.53
  • Citation Description: When the operating system is changed, all critical applications should be tested and reviewed to ensure there are no adverse impacts on operations or security.

  • Report Rule: Encryption Failures
  • Citation Number: 15.1.6
  • Citation Description: Cryptographic controls should be in compliance with all laws and regulations.

  • Report Rule: Key Generation and Changes
  • Citation Number: 12.3.2
  • Citation Description: Key-management techniques should be in place. All keys should be protected against modification, loss, destruction, and unauthorized disclosure

  • Report Rule: Escalation of Privileges - Detail
    Escalation of Privileges - Top 25
  • Citation Number: 10.10.4
  • Citation Description: All activities by System Administrators and System Operators should be logged.

  • Report Rule: Failed Remote  Access - Detail
  • Citation Number: 11.7.2
  • Citation Description: Operational procedures and plans should be developed for use by teleworking employees

  • Report Rule: Failed Remote Access - Top 25
  • Citation Number: 11.7.2
  • Citation Description: Operational procedures and plans should be developed for use by teleworking employees

  • Report Rule: Firewall Configuration Changes
  • Citation Number: 12.52, 12.53
  • Citation Description: When the operating system is changed, all critical applications should be tested and reviewed to ensure there are no adverse impacts on operations or security.

  • Report Rule: Firmware Changes Wireless Devices
  • Citation Number: 12.52, 12.53
  • Citation Description: When the operating system is changed, all critical applications should be tested and reviewed to ensure there are no adverse impacts on operations or security.

  • Report Rule: Logon Failures - Detail
  • Citation Number: 11.5.1
  • Citation Description: All successful and unsuccessful logon attempts should be recorded.

  • Report Rule: Logon Failures - Top 25
  • Citation Number: 11.5.1
  • Citation Description: All successful and unsuccessful logon attempts should be recorded.

  • Report Rule: Password Changes - Detail
    Password Changes - Top 25
  • Citation Number: 11.3.1
  • Citation Description: Passwords should be changed on a regular basis and when there is an indication of compromise.

  • Report Rule: Router Configuration Changes
  • Citation Number: 12.52, 12.53
  • Citation Description: When the operating system is changed, all critical applications should be tested and reviewed to ensure there are no adverse impacts on operations or security.

  • Report Rule: Admin Access to Compliance Systems - Detail
  • Citation Number: 11.5.1
  • Citation Description: All successful and unsuccessful logon attempts should be recorded.

  • Report Rule: Admin Access to Compliance Systems - Top 25
  • Citation Number: 11.5.1
  • Citation Description: All successful and unsuccessful logon attempts should be recorded.

  • Report Rule: Successful Remote Access - Detail
  • Citation Number: 11.7.2
  • Citation Description: Operational procedures and plans should be developed for use by teleworking employees

  • Report Rule: Successful Remote Access - Top 25
  • Citation Number: 11.7.2
  • Citation Description: Operational procedures and plans should be developed for use by teleworking employees

  • Report Rule: Successful Use of Encryption
  • Citation Number: 15.1.6
  • Citation Description: Cryptographic controls should be in compliance with all laws and regulations.

  • Report Rule: User Access to Compliance Systems - Detail
  • Citation Number: 11.5.1
  • Citation Description: All successful and unsuccessful logon attempts should be recorded.

  • Report Rule: User Access to Compliance Systems - Top 25
  • Citation Number: 11.5.1
  • Citation Description: All successful and unsuccessful logon attempts should be recorded.

  • Report Rule: System Clock Synchronization
  • Citation Number: 10.10.6
  • Citation Description: All system clocks should be automatically synchronized with an accurate time source.

  • Report Rule: User Access Revoked
  • Citation Number: 11.2.1
  • Citation Description: A formal process should be in place for the granting and revoking of access to information systems.

  • Report Rule: Account Management
  • Citation Number: 11.2.1
  • Citation Description: A formal process should be in place for the granting and revoking of access to information systems.

  • Report Rule: User Session Terminated - Top 25
  • Citation Number: 11.5.5
  • Citation Description: Inactive sessions should be shut down after a period of time.

docFeedback.png

You are here
Table of Contents > Compliance Reports: International Standardization Organization 27002 (ISO 27002)