Visual Guard is a modular solution and a robust framework designed to ensure the security of your business applications.
| Issued by | Standard | Relevance | Alignment with Visual Guard |
|---|---|---|---|
| ISO/IEC | 27001 | Info. Security Management System (ISMS) | Access control, centralized governance, audit logs. Learn more |
| ISO/IEC | 27002 | Security measures and guidelines | RBAC, access review, SoD enforcement, logging |
| ISO/IEC | 27017 | Security in cloud environments | Cloud access control and governance |
| ISO/IEC | 27018 | Personal data protection in the cloud | Restricted access, traceability |
| EU | eIDAS | Electronic identification and trust services | MFA support, secure identity management. Learn more |
| EU / CNIL | GDPR | EU privacy regulation | Least privilege, access audit, personal data control. Learn more |
| DINUM | RGI | Public sector interoperability framework | Standards-compliant REST/JSON APIs. Learn more |
| ANSSI | RGS | Security of digital exchanges | MFA, logs, access lifecycle, integration |
| ANSSI | IAM | Best practices on identity and access | MFA, RBAC, SoD, lifecycle and audit logging |
| ANSSI | CSPN | Security product certification | Secure practices followed, but depends on compliant client architecture or integration |
| SecNum | SecNum Cloud |
Secured cloud hosting (OIV/public sector) | Deployable on compliant infrastructure - depends on client architecture. |
| NIST | SP 800-53 | Security & privacy controls for federal systems | IAM, logging, access review and policies. Learn more |
| NIST | SP 800-63 | Digital identity guidelines | MFA, session and identity assurance |
| NIST | SP 800-171 | Protection of Controlled Unclassified Info. | Identity-based access restriction |
| CIS | Control 4 | Secure configuration | Secure IAM implementation in configured environments |
| CIS | Control 6 | Access control management | RBAC, audit trail, account provisioning |
| CIS | Control 16 | Application software security | Application-level access governance |
| SEC | SOX | Financial compliance and auditability | SoD, access logging, periodic reviews |
| HHS | HIPAA | Healthcare data protection | Restricted access, logging, and account lifecycle |
| PCI | DSS | Payment card industry data security | Controlled access, audit, rights review |
| SWIFT | CSCF | Secure access for financial networks | MFA, access separation, trace logging |
| CSA CCM | IAM-01 to 11 | Cloud identity & access control | Provisioning, de-provisioning, RBAC, MFA |
| CSA CCM | SEF-01 | Secure engineering principles | Enforced access policies for secure applications |
| COBIT | DSS05 | Manage security services | Structured access and permission control processes |
| COBIT | DSS06 | Manage business process controls | Governance and oversight of access control |
| COBIT | MEA02 | Monitor internal control system | Audit, role tracking, and security supervision |
Native coverage or coverage that can be implemented with Visual Guard
Possible with Visual Guard, but depends on compliant client architecture or integration
A single solution to meet the requirements of multiple security standards.
Continuous evolution to efficiently adapt to changing regulatory landscape.
Complete protection with role-based access controls and separation of duties.
Early detection of risks thanks to our advanced audit and traceability tools.