eBook: An IT Auditor’s Guide to Security Controls & Risk Compliance

By Robert Berg January 6, 2016

[vc_row][vc_column width=”2/3″][sm_custom_heading font_style=”sm-semibold”]eBook: An IT Auditor’s Guide to Security Controls & Risk Compliance[/sm_custom_heading][vc_row_inner el_class=”form”][vc_column_inner width=”1/6″][sm_image alt=”eBook: An IT Auditor’s Guide to Security Controls & Risk Compliance” title=”eBook: An IT Auditor’s Guide to Security Controls & Risk Compliance” align=”left” style=”sm-style-shadow” image=”5300″][/vc_column_inner][vc_column_inner width=”5/6″][sm_column_text]Fortunately, the overlapping standards agree on a single concept; implementing appropriate security controls to protect information from improper disclosure.  However, GRC requirements do not exist in a vacuum.  Organizational objectives must also be supported.  Critical functions can be disrupted if business needs are not considered when establishing compliance activities.  In addition, providing evidence that the appropriate controls are in place and enforced is a requirement of any audit.  Investing in selecting the right policies, controls and solutions leads to more successful audits and security that is more reliable.

A Simple, Effective Approach

Carbon Blacks’s approach to compliance is simple.  Organizations should include relevant stakeholders in building Compliance Control Policies to meet regulatory standards while supporting business goals.  Control Policies dictate which assets are covered by each Standard and what actions users can execute for each asset.  By grouping similar classes of assets and users, policies can be logical to users, enforcement is automatic and audits are simplified.

This paper will review creating Compliance Control Policies and six key controls supported by Carbon Black:

  1. Configuration Change Monitoring and Chain of Custody
  2. File Integrity Control and Monitoring
  3. Malware Prevention and Continuous Compliance Visibility
  4. Compliance Risk Analysis and Measurement
  5. Security Policy Awareness, Enforcement and Audit
  6. Portable Device Usage and Control

[/sm_column_text][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/3″][vc_row_inner el_class=”form”][vc_column_inner][sm_custom_heading heading_tag=”h4″ align=”sm-center” font_style=”sm-semibold” letter_spacing=”1px” uppercase=”yes”]Download eBook [/sm_custom_heading][sm_contact_form id=”1740″ eloqua_campaign_id=”70180000000eQ8W” eloqua_form=”WebsiteReg” eloqua_lead_source=”Website – Content Download” eloqua_member_status=”Downloaded” eloqua_last_download=”An IT Auditor’s Guide to Security Controls Risk Compliance” eloqua_child_campaigns=”%5B%7B%22eloqua_child_campaign_id%22%3A%22701340000016dGM%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Email%20Campaign%20-%20Nurture%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000000f3QG%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Email%20Campaign%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000000eokF%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Email%20Campaign%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000000eSZp%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Website%20-%20Content%20Download%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000000eV30%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Website%20-%20Content%20Download%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000000eVCH%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Website%20-%20Content%20Download%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000000eX7e%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Website%20-%20Content%20Download%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000000eUNO%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Website%20-%20Content%20Download%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000000erWR%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Email%20Campaign%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000000dxlU%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Email%20Campaign%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000000eu7B%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Email%20Campaign%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270180000001PUuk%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Email%20Campaign%22%7D%2C%7B%22eloqua_child_campaign_id%22%3A%2270134000000VLlu%22%2C%22eloqua_child_form%22%3A%22WebsiteReg%22%2C%22eloqua_child_lead_source%22%3A%22Email%20Campaign%22%7D%5D” input_shape=”sm-shape-rounded”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_row_inner el_class=”ty”][vc_column_inner][sm_custom_heading heading_tag=”h3″]Thank you for your interest in Carbon Black. Your file is available below.[/sm_custom_heading][sm_file][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]

comments

comments for this post are closed